208 research outputs found
On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol
This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies. Experimental investigations based on three NOMA down-link models involved (1) a single-input-single-output (SISO) scenario in which a single antenna was equipped at a BS and for all users, (2) a multi-input-single-output (MISO) scenario in which multiple transmitter antennae were equipped at a BS and a single receiver antenna for all users and (3) a multi-input-multi-output (MIMO) scenario in which multiple transmitter antennae were equipped at a BS and multiple receiver antenna for all users. This study investigated and compared the outage probability (OP) and system throughput assuming all users were over Rayleigh fading channels. The individual scenarios also each had an eavesdropper. Secure system performance of the individual scenarios was therefore also investigated. In order to detect data from superimposed signals, successive interference cancellation (SIC) was deployed for users, taking into account perfect, imperfect and fully imperfect SICs. The results of analysis of users in these three scenarios were obtained in an approximate closed form by using the Gaussian-Chebyshev quadrature method. However, the clearly and accurately presented results obtained using Monte Carlo simulations prove and verify that the MIMO-NOMA scenario equipped with multiple antennae significantly improved system performance.Web of Science20201art. no. 1
E-model modification for case of cascade codecs arrangement
Speech quality assessment is one of the key matters of
voice services and every provider should ensure adequate connection
quality to end users. Speech quality has to be measured by a trusted
method and results have to correlate with intelligibility and clarity of
the speech, as perceived by the listener. It can be achieved by
subjective methods but in real life we must rely on objective
measurements based on reliable models. One of them is E-model that
we can consider as mainly adopted method in IP telephony. This
method is based on evaluation of transmission path impairments
influencing speech signal, especially delays and packet losses. These
parameters which are common in IP network can affect dramatically
speech quality. In this article, a new modification of E-model, that
takes into consideration the cascade codecs arrangement, is
presented. The proposed a correction function improves the current
computational non-intrusive approach that is described in
recommendation ITU-T G.107, so-called E-model.Scopus551447143
Security risks in IP telephony
This paper deals with VoIP communication
security and various techniques of VoIP attacks. We
divided these threats in several categories according to
their specific behaviour and their impact on the affected
system. We also tried to find effective methods to prevent
or mitigate these attacks. We focused our work on Spam
over Internet Telephony (SPIT) as a real threat for the
future. We have developed both a tool generating SPIT
attacks and AntiSPIT tool defending communication
systems against SPIT attacks. AntiSPIT represents an
effective protection based on statistical blacklist and works
without participation of the called party which is a
significant advantage
SIP threats detection system
The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system
that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent
of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of
security. We have developed web-based penetration system which is able to check the SIP server if can face to the
most common attacks.The developed application is distributed as an open-source and is equipped with four modules.
The result is reported to the particular e-mail and information supplemeted to the report should help to improve the
overall protection of the SIP server. The developed application represents effective tool which is able to point out the
weaknesses of the tested system.Scopu
On outage probability and throughput performance of cognitive radio inspired NOMA relay system
To improve the throughput and the outage probability of the Cognitive Radio (CR) inspired system, a novel Non-Orthogonal Multiple Access (NOMA) can be deployed to adapt multiple services in 5G wireless communication. In this scheme, after the reception of the superposition coded symbol with a predefined power allocation factors from the primary source, the relay decodes and forwards with a new superposition coded symbol (i.e. allocating another power factors) to the destination. By employing twin antenna design at the relay, the bandwidth efficiency in such scheme will be improved. Assuming Rayleigh fading channels, the closed-form expressions in terms of throughput and the outage performance are derived. Through numerical results, they showed that the outage performance of the proposed scheme using a Single Antenna (SA) scheme at the relay is better than a Twin Antenna (TA) scheme because SA scheme is not affected by its own antenna interference
SIP registration stress test
This paper deals with a benchmarking of SIP infrastructure and improves the methodology of SIP
performance evaluation further to better fit into the design of the SIP testing platform, which is being designed
in the VSB – Technical University of Ostrava. By separating registrations from calls, we were able to measure
both cases without the need of extensive postprocessing of data to ensure the data in one case is not affected by
the ones from the other case. Moreover the security vulnerability of the SIP protocol has been harnessed to
allow measuring software for performing both registrations and calls together but in individual processes,
which builds the basis for planned and already mentioned modular design of the platform. In this paper, we
present the results from separate registration stress tests and we explain the usage of the proposed SIP
benchmarking methodology
Multi-points cooperative relay in NOMA system with N-1 DF relaying nodes in HD/FD mode for N user equipments with energy harvesting
Non-Orthogonal Multiple Access (NOMA) is the key technology promised to be applied in next-generation networks in the near future. In this study, we propose a multi-points cooperative relay (MPCR) NOMA model instead of just using a relay as in previous studies. Based on the channel state information (CSI), the base station (BS) selects a closest user equipment (UE) and sends a superposed signal to this UE as a first relay node. We have assumed that there are N UEs in the network and the N-th UE, which is farthest from BS, has the poorest quality signal transmitted from the BS compared the other UEs. The N-th UE received a forwarded signal from N - 1 relaying nodes that are the UEs with better signal quality. At the i-th relaying node, it detects its own symbol by using successive interference cancellation (SIC) and will forward the superimposed signal to the next closest user, namely the (i + 1)-th UE, and include an excess power which will use for energy harvesting (EH) intention at the next UE. By these, the farthest UE in network can be significantly improved. In addition, closed-form expressions of outage probability for users over both the Rayleigh and Nakagami-m fading channels are also presented. Analysis and simulation results performed by Matlab software, which are presented accurately and clearly, show that the effectiveness of our proposed model and this model will be consistent with the multi-access wireless network in the future.Web of Science82art. no. 16
Wireless powered D2D communications underlying cellular networks: design and performance of the extended coverage
Because of the short battery life of user equipments (UEs), and the requirements for better quality of service have been more demanding, energy efficiency (EE) has emerged to be important in device-to-device (D2D) communications. In this paper, we consider a scenario, in which D2D UEs in a half-duplex decode-and-forward cognitive D2D communication underlying a traditional cellular network harvest energy and communicate with each other by using the spectrum allocated by the base station (BS). In order to develop a practical design, we achieve the optimal time switching (TS) ratio for energy harvesting. Besides that, we derive closed-form expressions for outage probability, sum-bit error rate, average EE and instantaneous rate by considering the scenario when installing the BS near UEs or far from the UEs. Two communication types are enabled by TS-based protocol. Our numerical and simulation results prove that the data rate of the D2D communication can be significantly enhanced.Web of Science58439939
Toward designing a quantum key distribution network simulation model
As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several routing protocols in terms of the number of sent routing packets, goodput and Packet Delivery Ratio of data traffic flow using NS-3 simulator
Human abnormal behavior impact on speaker verification systems
Human behavior plays a major role in improving human-machine communication. The performance must be affected by abnormal behavior as systems are trained using normal utterances. The abnormal behavior is often associated with a change in the human emotional state. Different emotional states cause physiological changes in the human body that affect the vocal tract. Fear, anger, or even happiness we recognize as a deviation from a normal behavior. The whole spectrum of human-machine application is susceptible to behavioral changes. Abnormal behavior is a major factor, especially for security applications such as verification systems. Face, fingerprint, iris, or speaker verification is a group of the most common approaches to biometric authentication today. This paper discusses human normal and abnormal behavior and its impact on the accuracy and effectiveness of automatic speaker verification (ASV). The support vector machines classifier inputs are Mel-frequency cepstral coefficients and their dynamic changes. For this purpose, the Berlin Database of Emotional Speech was used. Research has shown that abnormal behavior has a major impact on the accuracy of verification, where the equal error rate increase to 37 %. This paper also describes a new design and application of the ASV system that is much more immune to the rejection of a target user with abnormal behavior.Web of Science6401274012
- …