Abstract is missing.
- Priority-based Coexistence of eMBB and URLLC Traffic in Industrial 5G NR DeploymentsEkaterina Markoval, Dmitri Moltchanov, Rustam Pirmagomedov, Daria Ivanova, Yevgeni Koucheryavy, Konstantin E. Samouylov. 1-6 [doi]
- Handover-based Load Balancing Algorithm for 5G and Beyond Heterogeneous NetworksAbdussamet Hatipoglu, Mehmet Basaran, Mehmet Akif Yazici, Lütfiye Durak Ata. 7-12 [doi]
- Pitfalls of LPWA Power Consumption: Hands-On Design of Current ProbeRadek Mozny, Pavel Masek, Martin Stusek, Michal Mikulasek, Aleksandr Ometov, Jiri Hosek. 13-19 [doi]
- Tuning Channel Access to Enable Real-Time Applications in Wi-Fi 7Dmitry Bankov, Kirill Chemrov, Evgeny M. Khorov. 20-25 [doi]
- Learning-Aided Multi-RAT Operation for Battery Lifetime Extension in LPWAN SystemsMartin Stusek, Dmitri Moltchanov, Pavel Masek, Jiri Hosek, Sergey Andreev 0001, Yevgeni Koucheryavy. 26-32 [doi]
- Integrated diagnostic system for winding fault detection of the three-phase PMSMLukás Otava, Ludek Buchta. 33-40 [doi]
- Human action recognition using an image-based temporal and spatial representationVinícius Silva, Filomena O. Soares, João Sena Esteves, Gianni Viardo Vercelli. 41-46 [doi]
- SCADA-based Message Generator for Multi-Vendor Smart Grids: Integration and Verification of TASE.2Petr Ilgner, Martin Stusek, Petr Cika, Marek Sikora. 47-51 [doi]
- Computer Simulation and Analysis of A Doubly Fed Induction Generator with A One Side Directly Connected to The GridNguyen Huu Nam, Tran Xuan Trung. 52-57 [doi]
- An Empirical Study of Fatigue-Induced Electrical Impedance Models of Biceps TissuesNorbert Herencsar. 58-61 [doi]
- On the generation of Pulse OFDM signalsMikhail Bakulin, Vitaly Kreyndelin, Dmitry Petrov, Sergei Melnik. 62-66 [doi]
- On the performance slope of short LDPC codesLuiza R. Medova, Pavel S. Rybin, Igor E. Sidorenko. 67-72 [doi]
- Performance of Combinational Cooperative Detection Method Under Realistic ConditionsRameez Ahmed Samo, Mehmet Basaran, Serhat Erküçük. 73-77 [doi]
- Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined RadioJirí Pokorný, Radek Fujdiak, Martin Kovanda, Martin Strajt, Jiri Hosek. 78-81 [doi]
- Application for an Early Detection of Transmission Parameters Degradation of Point-to-Point Microwave LinksMilan Bubniak, Petr Musil, Petr Mlynek. 82-86 [doi]
- Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained DevicesJan Hajny, Petr Dzurenda, Raul Casanova Marques, Lukas Malina. 87-92 [doi]
- Development of a Pseudo-Random Sequence Generation Function Based on the Cryptographic Algorithm "Kuznechik"Vladimir Grozov, Alexei Guirik, Marina Budko, Mikhail Budko. 93-98 [doi]
- Design of Advanced Slow Denial of Service Attack GeneratorMarek Sikora, Andrej Krivulcik, Radek Fujdiak, Petr Blazek. 99-104 [doi]
- Review and Analysis of the Classical and Post-Quantum Ring Signature AlgorithmsAnton Leevik, Vladislav Beliaev, Boris Stasenko, Vadim Davydov, Sergey Bezzateev. 105-112 [doi]
- Detection of wireless fake access pointsNorbert Lovinger, Tomas Gerlich, Zdenek Martinasek, Lukas Malina. 113-118 [doi]
- Applying Machine Learning to LTE Traffic Prediction: Comparison of Bagging, Random Forest, and SVMNikolai Stepanov, Daria Alekseeva, Aleksandr Ometov, Elena Simona Lohan. 119-123 [doi]
- Parkinson's Disease Detection based on Changes of Emotions during SpeechJustyna Skibinska, Radim Burget. 124-130 [doi]
- Hardware Utilization of Models of Genetic AlgorithmsVladislav Skorpil, Václav Oujezský, Martin Tuleja. 131-135 [doi]
- Deep Recurrent Architecture based Scene Description Generator for Visually ImpairedAviral Chharia, Rahul Upadhyay. 136-141 [doi]
- Gender Differentiated Convolutional Neural Networks for Speech Emotion RecognitionPuneet Mishra, Ruchir Sharma. 142-148 [doi]
- Field Sensor Network for Microclimatological MeasurementsRadovan Juran, Ales Povalac. 149-153 [doi]
- Comparison of application dynamics in two types of CLOUD solutionsStefan Pocarovsky, Milos Orgon. 154-158 [doi]
- Broadband Power Line Module Integrated into Power Plug for Smart BuildingsMartin Rusz, Petr Mlynek. 159-162 [doi]
- Common noise sources and their impact on OFDM highspeed HomePlug PLC networksRoman Duriga, Martin Koppl, Stefan Pocarovsky, Milos Orgon. 163-167 [doi]
- Impact of household electrical appliances on transmission speed in PLC networksRoman Duriga, Martin Koppl, Stefan Pocarovsky, Milos Orgon. 168-172 [doi]
- Network asymmetries and pricing in 5G telecommunicationsSergey Vasilyev, Igor Levichev, Daniel Peres Acosta. 173-178 [doi]
- Computational Geometry Data Structures in Logistics and Navigation TasksMilos Seda, Pavel Seda. 179-184 [doi]
- Quantum mechanics with non-negative distribution and measurementsAlexandre V. Zorin, Nikolay Tretyakov. 185-188 [doi]
- Mathematical Model for Reliability Analysis of a Heterogeneous Redundant Data Transmission SystemH. G. K. Houankpo, Dmitry V. Kozyrev, E. Nibasumba, M. N. B. Mouale. 189-194 [doi]
- RSS Fingerprinting Dataset Size Reduction Using Feature-Wise Adaptive k-Means ClusteringLucie Klus, Darwin Quezada-Gaibor, Joaquín Torres-Sospedra, Elena Simona Lohan, Carlos Granell, Jari Nurmi. 195-200 [doi]
- Cellular-enabled Wearables in Public Safety Networks: State of the Art and Performance EvaluationSalwa Saafi, Jiri Hosek, Aneta Kolackova. 201-207 [doi]
- Improving DBSCAN for Indoor Positioning Using Wi-Fi Radio Maps in Wearable and IoT DevicesDarwin Quezada-Gaibor, Lucie Klus, Joaquín Torres-Sospedra, Elena Simona Lohan, Jari Nurmi, Joaquín Huerta. 208-213 [doi]
- HTC Vive as a Ground-Truth System for Anchor-Based Indoor LocalizationLaura Flueratoru, Elena Simona Lohan, Jari Nurmi, Dragos Niculescu. 214-221 [doi]
- Managing COVID-19 Global Pandemic With High-Tech Consumer Wearables: A Comprehensive ReviewAsma Channa, Nirvana Popescu, Najeeb Ur Rehman Malik. 222-228 [doi]
- Technical Perspectives of Contact-Tracing Applications on Wearables for COVID-19 ControlViktoriia Shubina, Aleksandr Ometov, Elena Simona Lohan. 229-235 [doi]
- ARDefense: DDoS detection and prevention using NFV and SDNAman Kumar Singh, Raj K. Jaiswal, Abdukodir Khakimov, Ammar Muthanna. 236-241 [doi]
- Approaches to Modeling Blockchain SystemsAnastasia V. Spirkina, Elizaveta A. Aptrieva, Vasiliy S. Elagin, Artem A. Shvidkiy, Anastasiia A. Savelieva. 242-247 [doi]
- Evaluation of the impact the hyper-converged infrastructure storage subsystem synchronization on the overall performanceArtem A. Shvidkiy, Anastasia V. Spirkina, Anastasiia A. Savelieva, Aleksey V. Tarlykov. 248-252 [doi]
- Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermarkA. V. Krasov, S. I. Shterenberg. 253-257 [doi]
- A Technique for Analyzing Bytecode in a Java Project for the Purpose of an Automated Assessment of the Possibility and Effectiveness of the Hidden Investment of Information and its Volumes in a Java ProjectKrasov Andrey, Sharikov Pavel. 258-263 [doi]
- Machine Learning Based Predicting Student Academic SuccessKhalfan Al Mayahi, Mahmood Al-Bahri. 264-268 [doi]
- Intelligent System Architecture for Smart City and its Applications Based Edge ComputingMehdhar Al-gaashani, Mohammed Saleh Ali Muthanna, Abdukodir Khakimov, Ammar Muthanna, Ruslan Kirichek. 269-274 [doi]
- Delay prediction in IoT using Machine Learning ApproachAli R. Abdellah, Omar Abdulkareem Mahmood, Andrey Koucheryavy. 275-279 [doi]
- Search for Coordinates of WSN Nodes using Multidimensional Scaling MethodIlya Grishin, Van-Dai Pham, Darina Okuneva, Ruslan Kirichek. 280-284 [doi]
- Guidelines for Using Machine Learning Technology to Ensure Information SecurityKovtsur Maxim Mikhailovich, Mikhailova Anastasia Valerievna, Potemkin Pavel Andreevich, Ushakov Igor Alexandrovich, Krasov Andrey Vladimirovich. 285-290 [doi]
- The method and methodology of efficiency assessment of protection system of distributed information systemsMinyaev A. Andrey, Krasov V. Andrey, Saharov V. Dmitriy. 291-295 [doi]
- Practical retrospective of 5-year evolution of the IEEE 802.11 client device capabilitiesAnton Vikulov, Alexander Paramonov. 296-300 [doi]
- Clustering algorithms for UAV placement in 5G and Beyond NetworksVadim Kovalenko, Abbas Alzaghir, Artem Volkov, Ammar Muthanna, Andrey Koucheryavy. 301-307 [doi]
- Methods for correcting positions of tethered UAVs in adverse weather conditionsIlya Grishin, Vladimir Vishnevsky, Truong Duy Dinh, Anastasia Vybornova, Ruslan Kirichek. 308-312 [doi]
- SDN-assisted Unmanned Aerial System for Monitoring Sensor DataVladimir Vishnevsky, Van-Dai Pham, Ruslan Kirichek, Vasiliy Elagin, Andrei Vladyko, Alexander Shestakov. 313-317 [doi]
- Multi-Level Edge Computing System Architecture For V2X TechnologyMahmood Al-Bahri, Ammar Muthanna, Ravindra R. Dharamshi, Naeem Al-shukail, Dmitriy Sazonov, Salim Al-Wardi. 318-324 [doi]
- Data Updating Models for Priority VehiclesAlexander V. Shestakov, Yaroslav A. Pletnev, Kristina A. Frolova. 325-330 [doi]