The rapid growth of Internet of Things (IoT) devices and the increasing need for low-latency and ... more The rapid growth of Internet of Things (IoT) devices and the increasing need for low-latency and high-throughput applications have led to the introduction of distributed edge computing. Flying fog computing is a promising solution that can be used to assist IoT networks. It leverages drones with computing capabilities (e.g., fog nodes), enabling data processing and storage closer to the network edge. This introduces various benefits to IoT networks compared to deploying traditional static edge computing paradigms, including coverage improvement, enabling dense deployment, and increasing availability and reliability. However, drones’ dynamic and mobile nature poses significant challenges in task offloading decisions to optimize resource utilization and overall network performance. This work presents a novel offloading model based on dynamic programming explicitly tailored for flying fog-based IoT networks. The proposed algorithm aims to intelligently determine the optimal task assign...
The Internet of Things (IoT) is an emerging technology that has recently gained significant inter... more The Internet of Things (IoT) is an emerging technology that has recently gained significant interest, especially with the dramatic increase in connected devices. However, IoT networks are not yet standardized, and the design of such networks faces many challenges, including scalability, flexibility, reliability, and availability of such networks. Routing is among the significant problems facing IoT network design because of the dramatic increase in connected devices and the network requirements regarding availability, reliability, latency, and flexibility. To this end, this work investigates deploying a multipath routing scheme for dense IoT networks. The proposed method selects a group of routes from all available routes to forward data at a maximum rate. The choice of data transmission routes is a complex problem for which numerical optimization methods can be used. A novel method for selecting the optimum group of routes and coefficients of traffic distribution along them is prop...
Unmanned aerial vehicle (UAV) networks offer a wide range of applications in an overload situatio... more Unmanned aerial vehicle (UAV) networks offer a wide range of applications in an overload situation, broadcasting and advertising, public safety, disaster management, etc. Providing robust communication services to mobile users (MUs) is a challenging task because of the dynamic characteristics of MUs. Resource allocation, including subchannels, transmit power, and serving users, is a critical transmission problem; further, it is also crucial to improve the coverage and energy efficacy of UAV-assisted transmission networks. This paper presents an Enhanced Slime Mould Optimization with Deep-Learning-based Resource Allocation Approach (ESMOML-RAA) in UAV-enabled wireless networks. The presented ESMOML-RAA technique aims to efficiently accomplish computationally and energy-effective decisions. In addition, the ESMOML-RAA technique considers a UAV as a learning agent with the formation of a resource assignment decision as an action and designs a reward function with the intention of the m...
The safeguarding of online services and prevention of unauthorized access by hackers rely heavily... more The safeguarding of online services and prevention of unauthorized access by hackers rely heavily on user authentication, which is considered a crucial aspect of security. Currently, multi-factor authentication is used by enterprises to enhance security by integrating multiple verification methods rather than relying on a single method of authentication, which is considered less secure. Keystroke dynamics is a behavioral characteristic used to evaluate an individual’s typing patterns to verify their legitimacy. This technique is preferred because the acquisition of such data is a simple process that does not require any additional user effort or equipment during the authentication process. This study proposes an optimized convolutional neural network that is designed to extract improved features by utilizing data synthesization and quantile transformation to maximize results. Additionally, an ensemble learning technique is used as the main algorithm for the training and testing phas...
In this article, a new multicast protocol is introduced at the session layer, which is based on n... more In this article, a new multicast protocol is introduced at the session layer, which is based on network coding and is called the Network Coding Datagram Protocol (NCDP). The NCDP protocol is specifically designed for content delivery systems that utilize multicast data transmission from multiple sources. The development of the NCDP packet and its operational logic takes into consideration the variability of the protocols used in conjunction with it, as well as the packet header processing algorithms for routing nodes-coders. Additionally, a virtual laboratory bench is proposed to facilitate research on the operation of the protocol. The article also includes the results of testing the NCDP protocol in networks with butterfly and diamond topologies, with a comparison between simple sequential multicast transmission and network coding transmission.
In smart cities, target detection is one of the major issues in order to avoid traffic congestion... more In smart cities, target detection is one of the major issues in order to avoid traffic congestion. It is also one of the key topics for military, traffic, civilian, sports, and numerous other applications. In daily life, target detection is one of the challenging and serious tasks in traffic congestion due to various factors such as background motion, small recipient size, unclear object characteristics, and drastic occlusion. For target examination, unmanned aerial vehicles (UAVs) are becoming an engaging solution due to their mobility, low cost, wide field of view, accessibility of trained manipulators, a low threat to people’s lives, and ease to use. Because of these benefits along with good tracking effectiveness and resolution, UAVs have received much attention in transportation technology for tracking and analyzing targets. However, objects in UAV images are usually small, so after a neural estimation, a large quantity of detailed knowledge about the objects may be missed, whi...
The main directions of scientific research in the field of communication networks for 2021–2024 a... more The main directions of scientific research in the field of communication networks for 2021–2024 are con-sidered, as well as the tasks visible today that require solutions for the successful implementation of new network technologies. The problem setting is based on the experience of research carried out by the au-thors in the last decade.
The Internet of Things (IoT) has radically transformed how patient information and healthcare mon... more The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human resources and with a low mistake probability. The Internet of Medical Things (IoMT) is a subsection of the Internet of things (IoT) that uses medical equipment as things or nodes to enable cost-effective and efficient patient monitoring and recording. The IoMT can cope with a wide range of problems, including observing patients in hospitals, monitoring patients in their homes, and assisting consulting physicians and nurses in monitoring health conditions at regular intervals and issuing warning signals if emergency care is necessary. EEG signals, electrocardiograms (ECGs), blood sugar levels, blood pressure levels, and other conditions can be examined. In crucial situations, quick and real-time analysis is essential, and failure to provide careful att...
2017 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SINKHROINFO)
The paper proposes to use a solution based on software-defined networks (SDN) to control traffic ... more The paper proposes to use a solution based on software-defined networks (SDN) to control traffic flows in wireless local area networks (Wi-Fi). The paper examines the testing methods for a software-configurable wireless local area network based on the model network of the St. Petersburg State University of Telecommunications. Classify traffic based on DSCP values in the IP-headers of packets. After classification, traffic will be given priority over the OpenFlow port of the switch. This method allows for end-to-end quality support and support for traffic classification when interworking. In the course of practical experiment, the interaction of access points (AP), which are emulated in Mininet with the SDN controller, is considered. When using the OpenDaylight controller, the network topology can be controlled through the user-friendly graphical interface (GUI) of the SDN. As a result, methods were examined using DSCP values for QoS management in SDN networks.
Reversible Data Hiding (RDH) should be secured as per requirements to protect content in open env... more Reversible Data Hiding (RDH) should be secured as per requirements to protect content in open environments such as the cloud and internet. Integrity and undetectability of steganographic images are amongst the main concerns in any RDH scheme. As steganographic encryption using linear prediction over bit-planes is challenging, so the security and embedding capacity of the existing RDH techniques could not be adequate. Therefore, a new steganographic technique is proposed which provides better security, higher embedding capacity and visual quality to the RDH scheme. In this technique, the cover image is divided into n-bit planes (nBPs) and linear prediction is applied to it. Next, the histogram of the residual nBPs image is taken, and secret data bits are encrypted using the RC4 cryptographic algorithm. To embed the encrypted secret data bits, the histogram shifting process is applied. This is achieved by using peak and zero pairs of residual nBPs images. This scheme provides security...
Although the Software-Defined Network (SDN) is a well-controlled and efficient network but the co... more Although the Software-Defined Network (SDN) is a well-controlled and efficient network but the complexity of open flow switches in SDN causes multiple issues. Many solutions have been proposed so far for the prevention of errors and mistakes in it but yet, there is still no smooth transmission of pockets from source to destination specifically when irregular movements follow the destination host in SDN, the errors include packet loss, data compromise etc. The accuracy of packets received at their desired destination is possible if networks for pockets and hosts are monitored instead of analysis of network snapshot statistically for the state, as these approaches with open flow switches, discover bugs after their occurrence. This article proposes a design to achieve the said objective by defining the Intelligent Transmission Control Layer (ITCL) layer. It monitors all the connections of end hosts at their specific locations and performs necessary settlements when the connection state changes for one or multiple hosts. The layer informs the controller regarding any state change at one period and controller collects information of end nodes reported via ITCL. Then, updates flow tables accordingly to accommodate a location-change scenario with a routechange policy. ICTL is organized on prototype-based implementation using the popular POX platform. In this paper, it has been discovered that ITCL produces efficient performance in the trafficking of packets and controlling different states of SDN for errors and packet loss.
In recent years, intelligent sensing has gained significant attention because of its autonomous d... more In recent years, intelligent sensing has gained significant attention because of its autonomous decision-making ability to solve complex problems. Today, smart sensors complement and enhance the capabilities of human beings and have been widely embraced in numerous application areas. Artificial intelligence (AI) has made astounding growth in domains of natural language processing, machine learning (ML), and computer vision. The methods based on AI enable a computer to learn and monitor activities by sensing the source of information in a real-time environment. The combination of these two technologies provides a promising solution in intelligent sensing. This survey provides a comprehensive summary of recent research on AI-based algorithms for intelligent sensing. This work also presents a comparative analysis of algorithms, models, influential parameters, available datasets, applications and projects in the area of intelligent sensing. Furthermore, we present a taxonomy of AI model...
2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
The growing interest in video-based applications has resulted in a rapid increase in wireless dat... more The growing interest in video-based applications has resulted in a rapid increase in wireless data traffic and meeting the stringent quality-of-experience (QoE) demands for such type of traffic poses a great challenge given the scarce spectrum. Millimeter waves suffers from the huge losses during the propagation in comparison with other communications. However, with smaller cell sizes, spectral efficiency increases, atmospheric absorption and rain do not yield additional losses on the track for cells of 200 m size. Therefore, mmWave communication is mainly used for the internal environment, as well as access to small cells and feedback of data with cell sizes of 200 m. To this end, this paper presents models for transmission of video traffic in 5G networks based on millimeter waves in conjunction with cloud units on RAN boundary to offload the underlaying network. The system achieves higher efficiency in terms of unloading, overloading, coverage and delay. The system is modeled in terms of the probability of blocking for three scenarios i.e. 1) Using mmWave radio interface 2) Using D2D technology 3) Without using D2D technology; each of them is a separate radio interface. The simulation results show that the worst-case scenario is to use a network without D2D and cloud layers.
2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), 2021
Presented work is fanalysis of how the microservices paradigm can be used to design and implement... more Presented work is fanalysis of how the microservices paradigm can be used to design and implement distributed edge services for Internet of Things (IoT) applications. Basically, IoT is a platform where integrated services are associated with the common network, thus all devices are able to gather and exchange data among each other. Typically, monolithic user mobility research services are developed for the unified ETSI MEC system reference architecture centers. ETSI MEC considers microservices as a tool for breaking monolithic applications into a set of loosely coupled distributed components. It is expected that this architecture will facilitate the dynamic adaptation during the application execution. However, increased modularity can also increase the burden on orchestration and system management. In MEC, user hardware is connected through gateways to microservices running on the edge host.There are three levels in each of the edge systems: 1) microservices perform a logical operation with components for motion track analysis, 2) movement foresight and 3) outcome visualization. The distributed service is realized with Docker containers and calculated on actual world adjustment with low capacity edge servers and real user mobility information. The results demonstrate the fact that the edge perspective of low latency may be encountered in this sort of implementation. The integration of a software creation technology with a standardized edge system supplies respectable basis for subsequent development. The paper considers the application of the boundary computing architecture and Kubernetes as an orchestration and management of network applications.
Machine-to-Machine (M2M) traffic is growing fast on the Internet, this trend is manifested in the... more Machine-to-Machine (M2M) traffic is growing fast on the Internet, this trend is manifested in the congestion of networks at different levels. The edge cloud unit is used for reducing number of intermediate nodes involved in the communication process and for offloading. The offloading can be seen as three parts. The first is the base station (BS) offloading, as the cloud unit helps the BS in some tasks related to call imitation such as resource allocations. The second is the workload passed from sensor nodes which represents the M2M traffic offloading and the third part is the cellular data offloading. In this paper, we propose an algorithm for offloading the core network using mobile edge computing, which allow devices to exchange traffic with the nearest mobile edge computing for improving QoS and offload channels in the core of the network.
With the increasing number of mobile devices and IoT devices across a wide range of real-life app... more With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. Task scheduling is one of the most demanding scopes after the trust computation inside the trustable nodes. The mobile devices and IoT devices transfer the resource-intensive tasks towards mobile cloud computing. Some tasks are resource-intensive and not trustable to allocate to the mobile cloud computing resources. This consequently gives rise to trust evaluation and data sync-up of devices joining and leaving the network. The resources are more intensive for cloud computing and mobile cloud computing. Time, energy, and resources are wasted due to the nontrustable nodes. This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments. We first calculate the t...
This paper focuses on the implementation of the concept of microservices, which can be used to de... more This paper focuses on the implementation of the concept of microservices, which can be used to design and implement distributed edge services for IoT applications. Basically, IoT is a platform where integrat-ed services are connected to a common network, so all devices are able to collect and exchange data with each other. Typically, monolithic user mobility services are developed for the core components of the ETSI MEC Unified Systems Reference Architecture. The ETSI MEC views microservices as a tool for separating monolithic applications into a set of loosely coupled distributed components, i.e. which provides an independent unit that implements a function. This architecture is expected to facilitate dynamic adaptation at runtime. However, increased modularity can also increase the load on orchestration and system management. In MEC, user equipment is connected through gate-ways to microservices running at the edge node. In the work, a distributed service is implemented using Dock...
Distributed Computer and Communication Networks, 2020
Internet of Things (IoT) technologies represent the future challenges of computing and communicat... more Internet of Things (IoT) technologies represent the future challenges of computing and communications. They can also be useful to improve traditional farming practices worldwide. Since the areas where agricultural land is located in remote places, there is a need for new technologies. These technologies must be suitable and reliable for communication over long distances and, at the same time, consume little energy. In particular, one of these relatively new technologies is the LoRa communication protocol, which uses long waves to work over long distances. This is extremely useful in agriculture, where the communicating areas are broad fields of crops and greenhouses. This study developed a greenhouse monitoring system based on LoRa technology, designed to work over long distances. The edge computing paradigms with a machine learning mechanism are proposed to analyze and control the state of the greenhouse, and in particular, to reduce the mount of data transmitted to the server.
Video traffic plays an increasingly important role in today’s telecommunication networks. Most se... more Video traffic plays an increasingly important role in today’s telecommunication networks. Most services are difficult to imagine without video stream transmission, and it is not only IPTV and OTT services, but also the services of augmented reality that are gaining popularity. At the same time, users’ requirements for quality of experience provision are constantly tightened. Therefore, operators need to look for new ways to deliver video content to the user, which will allow the transfer of large amounts of traffic with the appropriate quality of experience. In this article, the possibilities of using SDN networks for the transmission of video traffic are investigated. For this purpose, we have created a laboratory testbed, which consists of a multimedia complex for the delivery of IPTV content and a SDN segment of the network. To estimate the quality of experience of the transmitted video traffic, we used, in addition to the generally accepted parameters, such as delays, losses, throughput, also the Hurst parameter.
The rapid growth of Internet of Things (IoT) devices and the increasing need for low-latency and ... more The rapid growth of Internet of Things (IoT) devices and the increasing need for low-latency and high-throughput applications have led to the introduction of distributed edge computing. Flying fog computing is a promising solution that can be used to assist IoT networks. It leverages drones with computing capabilities (e.g., fog nodes), enabling data processing and storage closer to the network edge. This introduces various benefits to IoT networks compared to deploying traditional static edge computing paradigms, including coverage improvement, enabling dense deployment, and increasing availability and reliability. However, drones’ dynamic and mobile nature poses significant challenges in task offloading decisions to optimize resource utilization and overall network performance. This work presents a novel offloading model based on dynamic programming explicitly tailored for flying fog-based IoT networks. The proposed algorithm aims to intelligently determine the optimal task assign...
The Internet of Things (IoT) is an emerging technology that has recently gained significant inter... more The Internet of Things (IoT) is an emerging technology that has recently gained significant interest, especially with the dramatic increase in connected devices. However, IoT networks are not yet standardized, and the design of such networks faces many challenges, including scalability, flexibility, reliability, and availability of such networks. Routing is among the significant problems facing IoT network design because of the dramatic increase in connected devices and the network requirements regarding availability, reliability, latency, and flexibility. To this end, this work investigates deploying a multipath routing scheme for dense IoT networks. The proposed method selects a group of routes from all available routes to forward data at a maximum rate. The choice of data transmission routes is a complex problem for which numerical optimization methods can be used. A novel method for selecting the optimum group of routes and coefficients of traffic distribution along them is prop...
Unmanned aerial vehicle (UAV) networks offer a wide range of applications in an overload situatio... more Unmanned aerial vehicle (UAV) networks offer a wide range of applications in an overload situation, broadcasting and advertising, public safety, disaster management, etc. Providing robust communication services to mobile users (MUs) is a challenging task because of the dynamic characteristics of MUs. Resource allocation, including subchannels, transmit power, and serving users, is a critical transmission problem; further, it is also crucial to improve the coverage and energy efficacy of UAV-assisted transmission networks. This paper presents an Enhanced Slime Mould Optimization with Deep-Learning-based Resource Allocation Approach (ESMOML-RAA) in UAV-enabled wireless networks. The presented ESMOML-RAA technique aims to efficiently accomplish computationally and energy-effective decisions. In addition, the ESMOML-RAA technique considers a UAV as a learning agent with the formation of a resource assignment decision as an action and designs a reward function with the intention of the m...
The safeguarding of online services and prevention of unauthorized access by hackers rely heavily... more The safeguarding of online services and prevention of unauthorized access by hackers rely heavily on user authentication, which is considered a crucial aspect of security. Currently, multi-factor authentication is used by enterprises to enhance security by integrating multiple verification methods rather than relying on a single method of authentication, which is considered less secure. Keystroke dynamics is a behavioral characteristic used to evaluate an individual’s typing patterns to verify their legitimacy. This technique is preferred because the acquisition of such data is a simple process that does not require any additional user effort or equipment during the authentication process. This study proposes an optimized convolutional neural network that is designed to extract improved features by utilizing data synthesization and quantile transformation to maximize results. Additionally, an ensemble learning technique is used as the main algorithm for the training and testing phas...
In this article, a new multicast protocol is introduced at the session layer, which is based on n... more In this article, a new multicast protocol is introduced at the session layer, which is based on network coding and is called the Network Coding Datagram Protocol (NCDP). The NCDP protocol is specifically designed for content delivery systems that utilize multicast data transmission from multiple sources. The development of the NCDP packet and its operational logic takes into consideration the variability of the protocols used in conjunction with it, as well as the packet header processing algorithms for routing nodes-coders. Additionally, a virtual laboratory bench is proposed to facilitate research on the operation of the protocol. The article also includes the results of testing the NCDP protocol in networks with butterfly and diamond topologies, with a comparison between simple sequential multicast transmission and network coding transmission.
In smart cities, target detection is one of the major issues in order to avoid traffic congestion... more In smart cities, target detection is one of the major issues in order to avoid traffic congestion. It is also one of the key topics for military, traffic, civilian, sports, and numerous other applications. In daily life, target detection is one of the challenging and serious tasks in traffic congestion due to various factors such as background motion, small recipient size, unclear object characteristics, and drastic occlusion. For target examination, unmanned aerial vehicles (UAVs) are becoming an engaging solution due to their mobility, low cost, wide field of view, accessibility of trained manipulators, a low threat to people’s lives, and ease to use. Because of these benefits along with good tracking effectiveness and resolution, UAVs have received much attention in transportation technology for tracking and analyzing targets. However, objects in UAV images are usually small, so after a neural estimation, a large quantity of detailed knowledge about the objects may be missed, whi...
The main directions of scientific research in the field of communication networks for 2021–2024 a... more The main directions of scientific research in the field of communication networks for 2021–2024 are con-sidered, as well as the tasks visible today that require solutions for the successful implementation of new network technologies. The problem setting is based on the experience of research carried out by the au-thors in the last decade.
The Internet of Things (IoT) has radically transformed how patient information and healthcare mon... more The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human resources and with a low mistake probability. The Internet of Medical Things (IoMT) is a subsection of the Internet of things (IoT) that uses medical equipment as things or nodes to enable cost-effective and efficient patient monitoring and recording. The IoMT can cope with a wide range of problems, including observing patients in hospitals, monitoring patients in their homes, and assisting consulting physicians and nurses in monitoring health conditions at regular intervals and issuing warning signals if emergency care is necessary. EEG signals, electrocardiograms (ECGs), blood sugar levels, blood pressure levels, and other conditions can be examined. In crucial situations, quick and real-time analysis is essential, and failure to provide careful att...
2017 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SINKHROINFO)
The paper proposes to use a solution based on software-defined networks (SDN) to control traffic ... more The paper proposes to use a solution based on software-defined networks (SDN) to control traffic flows in wireless local area networks (Wi-Fi). The paper examines the testing methods for a software-configurable wireless local area network based on the model network of the St. Petersburg State University of Telecommunications. Classify traffic based on DSCP values in the IP-headers of packets. After classification, traffic will be given priority over the OpenFlow port of the switch. This method allows for end-to-end quality support and support for traffic classification when interworking. In the course of practical experiment, the interaction of access points (AP), which are emulated in Mininet with the SDN controller, is considered. When using the OpenDaylight controller, the network topology can be controlled through the user-friendly graphical interface (GUI) of the SDN. As a result, methods were examined using DSCP values for QoS management in SDN networks.
Reversible Data Hiding (RDH) should be secured as per requirements to protect content in open env... more Reversible Data Hiding (RDH) should be secured as per requirements to protect content in open environments such as the cloud and internet. Integrity and undetectability of steganographic images are amongst the main concerns in any RDH scheme. As steganographic encryption using linear prediction over bit-planes is challenging, so the security and embedding capacity of the existing RDH techniques could not be adequate. Therefore, a new steganographic technique is proposed which provides better security, higher embedding capacity and visual quality to the RDH scheme. In this technique, the cover image is divided into n-bit planes (nBPs) and linear prediction is applied to it. Next, the histogram of the residual nBPs image is taken, and secret data bits are encrypted using the RC4 cryptographic algorithm. To embed the encrypted secret data bits, the histogram shifting process is applied. This is achieved by using peak and zero pairs of residual nBPs images. This scheme provides security...
Although the Software-Defined Network (SDN) is a well-controlled and efficient network but the co... more Although the Software-Defined Network (SDN) is a well-controlled and efficient network but the complexity of open flow switches in SDN causes multiple issues. Many solutions have been proposed so far for the prevention of errors and mistakes in it but yet, there is still no smooth transmission of pockets from source to destination specifically when irregular movements follow the destination host in SDN, the errors include packet loss, data compromise etc. The accuracy of packets received at their desired destination is possible if networks for pockets and hosts are monitored instead of analysis of network snapshot statistically for the state, as these approaches with open flow switches, discover bugs after their occurrence. This article proposes a design to achieve the said objective by defining the Intelligent Transmission Control Layer (ITCL) layer. It monitors all the connections of end hosts at their specific locations and performs necessary settlements when the connection state changes for one or multiple hosts. The layer informs the controller regarding any state change at one period and controller collects information of end nodes reported via ITCL. Then, updates flow tables accordingly to accommodate a location-change scenario with a routechange policy. ICTL is organized on prototype-based implementation using the popular POX platform. In this paper, it has been discovered that ITCL produces efficient performance in the trafficking of packets and controlling different states of SDN for errors and packet loss.
In recent years, intelligent sensing has gained significant attention because of its autonomous d... more In recent years, intelligent sensing has gained significant attention because of its autonomous decision-making ability to solve complex problems. Today, smart sensors complement and enhance the capabilities of human beings and have been widely embraced in numerous application areas. Artificial intelligence (AI) has made astounding growth in domains of natural language processing, machine learning (ML), and computer vision. The methods based on AI enable a computer to learn and monitor activities by sensing the source of information in a real-time environment. The combination of these two technologies provides a promising solution in intelligent sensing. This survey provides a comprehensive summary of recent research on AI-based algorithms for intelligent sensing. This work also presents a comparative analysis of algorithms, models, influential parameters, available datasets, applications and projects in the area of intelligent sensing. Furthermore, we present a taxonomy of AI model...
2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)
The growing interest in video-based applications has resulted in a rapid increase in wireless dat... more The growing interest in video-based applications has resulted in a rapid increase in wireless data traffic and meeting the stringent quality-of-experience (QoE) demands for such type of traffic poses a great challenge given the scarce spectrum. Millimeter waves suffers from the huge losses during the propagation in comparison with other communications. However, with smaller cell sizes, spectral efficiency increases, atmospheric absorption and rain do not yield additional losses on the track for cells of 200 m size. Therefore, mmWave communication is mainly used for the internal environment, as well as access to small cells and feedback of data with cell sizes of 200 m. To this end, this paper presents models for transmission of video traffic in 5G networks based on millimeter waves in conjunction with cloud units on RAN boundary to offload the underlaying network. The system achieves higher efficiency in terms of unloading, overloading, coverage and delay. The system is modeled in terms of the probability of blocking for three scenarios i.e. 1) Using mmWave radio interface 2) Using D2D technology 3) Without using D2D technology; each of them is a separate radio interface. The simulation results show that the worst-case scenario is to use a network without D2D and cloud layers.
2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), 2021
Presented work is fanalysis of how the microservices paradigm can be used to design and implement... more Presented work is fanalysis of how the microservices paradigm can be used to design and implement distributed edge services for Internet of Things (IoT) applications. Basically, IoT is a platform where integrated services are associated with the common network, thus all devices are able to gather and exchange data among each other. Typically, monolithic user mobility research services are developed for the unified ETSI MEC system reference architecture centers. ETSI MEC considers microservices as a tool for breaking monolithic applications into a set of loosely coupled distributed components. It is expected that this architecture will facilitate the dynamic adaptation during the application execution. However, increased modularity can also increase the burden on orchestration and system management. In MEC, user hardware is connected through gateways to microservices running on the edge host.There are three levels in each of the edge systems: 1) microservices perform a logical operation with components for motion track analysis, 2) movement foresight and 3) outcome visualization. The distributed service is realized with Docker containers and calculated on actual world adjustment with low capacity edge servers and real user mobility information. The results demonstrate the fact that the edge perspective of low latency may be encountered in this sort of implementation. The integration of a software creation technology with a standardized edge system supplies respectable basis for subsequent development. The paper considers the application of the boundary computing architecture and Kubernetes as an orchestration and management of network applications.
Machine-to-Machine (M2M) traffic is growing fast on the Internet, this trend is manifested in the... more Machine-to-Machine (M2M) traffic is growing fast on the Internet, this trend is manifested in the congestion of networks at different levels. The edge cloud unit is used for reducing number of intermediate nodes involved in the communication process and for offloading. The offloading can be seen as three parts. The first is the base station (BS) offloading, as the cloud unit helps the BS in some tasks related to call imitation such as resource allocations. The second is the workload passed from sensor nodes which represents the M2M traffic offloading and the third part is the cellular data offloading. In this paper, we propose an algorithm for offloading the core network using mobile edge computing, which allow devices to exchange traffic with the nearest mobile edge computing for improving QoS and offload channels in the core of the network.
With the increasing number of mobile devices and IoT devices across a wide range of real-life app... more With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. Task scheduling is one of the most demanding scopes after the trust computation inside the trustable nodes. The mobile devices and IoT devices transfer the resource-intensive tasks towards mobile cloud computing. Some tasks are resource-intensive and not trustable to allocate to the mobile cloud computing resources. This consequently gives rise to trust evaluation and data sync-up of devices joining and leaving the network. The resources are more intensive for cloud computing and mobile cloud computing. Time, energy, and resources are wasted due to the nontrustable nodes. This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments. We first calculate the t...
This paper focuses on the implementation of the concept of microservices, which can be used to de... more This paper focuses on the implementation of the concept of microservices, which can be used to design and implement distributed edge services for IoT applications. Basically, IoT is a platform where integrat-ed services are connected to a common network, so all devices are able to collect and exchange data with each other. Typically, monolithic user mobility services are developed for the core components of the ETSI MEC Unified Systems Reference Architecture. The ETSI MEC views microservices as a tool for separating monolithic applications into a set of loosely coupled distributed components, i.e. which provides an independent unit that implements a function. This architecture is expected to facilitate dynamic adaptation at runtime. However, increased modularity can also increase the load on orchestration and system management. In MEC, user equipment is connected through gate-ways to microservices running at the edge node. In the work, a distributed service is implemented using Dock...
Distributed Computer and Communication Networks, 2020
Internet of Things (IoT) technologies represent the future challenges of computing and communicat... more Internet of Things (IoT) technologies represent the future challenges of computing and communications. They can also be useful to improve traditional farming practices worldwide. Since the areas where agricultural land is located in remote places, there is a need for new technologies. These technologies must be suitable and reliable for communication over long distances and, at the same time, consume little energy. In particular, one of these relatively new technologies is the LoRa communication protocol, which uses long waves to work over long distances. This is extremely useful in agriculture, where the communicating areas are broad fields of crops and greenhouses. This study developed a greenhouse monitoring system based on LoRa technology, designed to work over long distances. The edge computing paradigms with a machine learning mechanism are proposed to analyze and control the state of the greenhouse, and in particular, to reduce the mount of data transmitted to the server.
Video traffic plays an increasingly important role in today’s telecommunication networks. Most se... more Video traffic plays an increasingly important role in today’s telecommunication networks. Most services are difficult to imagine without video stream transmission, and it is not only IPTV and OTT services, but also the services of augmented reality that are gaining popularity. At the same time, users’ requirements for quality of experience provision are constantly tightened. Therefore, operators need to look for new ways to deliver video content to the user, which will allow the transfer of large amounts of traffic with the appropriate quality of experience. In this article, the possibilities of using SDN networks for the transmission of video traffic are investigated. For this purpose, we have created a laboratory testbed, which consists of a multimedia complex for the delivery of IPTV content and a SDN segment of the network. To estimate the quality of experience of the transmitted video traffic, we used, in addition to the generally accepted parameters, such as delays, losses, throughput, also the Hurst parameter.
Uploads
Papers by ammar muthanna