Abstract is missing.
- Understanding the Performance of Task Offloading for Wearables in a Two-Tier Edge ArchitectureWaleed Bin Qaim, Aleksandr Ometov, Claudia Campolo, Antonella Molinaro, Elena Simona Lohan, Jari Nurmi. 1-9 [doi]
- Mathematical Modelling of Group Polling Method in Structured Wireless Sensor Networks for Very Rare Events DetectingIvan I. Tsitovich. 10-15 [doi]
- On the Uplink Traffic Distribution in Time for Duty-cycle Constrained LoRaWAN NetworksKonstantin Mikhaylov. 16-21 [doi]
- Application of a Mobile LoRaWAN System in a Container Terminal to Collect Sensory DataSergej Jakovlev, Mindaugas Jusis, Tomas Eglynas, Miroslav Voznák, Jaromir Tovarek, Pavol Partila. 22-26 [doi]
- On the Effect of Cellular-Connected Drones on Terrestrial Users: Field TrialsSamira Homayouni, Mario Paier, Christian Benischek, Gerhard Pernjak, Markus Leinwather, Matthias Reichelt, Christoph Fuchsjäger. 27-31 [doi]
- Using NOMA Scheme for the Management of Interference and the Improvement of Performance in 5G NetworksChristos Bouras, Vasileios Kokkinos, Georgios Tzioumanis. 32-37 [doi]
- Experimental Verification of Segment Routing Methods in 5G+ Mobile Transport NetworksAneta Kolackova, Jiri Hosek, Jan Jerabek, Pavel Masek. 38-43 [doi]
- Mobile Localization in Random NLOS Settings Using Improved Particle FilteringTan-Jan Ho, Meng-Hxien Wu, Wei-Chung Lin. 44-49 [doi]
- Intelligent Hierarchical Intrusion Detection System for VANETsFábio Gonçalves, Joaquim Macedo, Alexandre J. T. Santos. 50-59 [doi]
- Fruit-CNN: An Efficient Deep learning-based Fruit Classification and Quality Assessment for Precision AgricultureArnav Kumar, Rakesh Chandra Joshi, Malay Kishore Dutta, Martin Jonak, Radim Burget. 60-65 [doi]
- Deep learning-based defect detection of metal parts: evaluating current methods in complex conditionsStepan Jezek, Martin Jonak, Radim Burget, Pavel Dvorak, Milos Skotak. 66-71 [doi]
- Comparison of Machine Learning Algorithms for Priority-Based Network Slicing in 5G SystemsAnna Gaydamaka, Natalia Yarkina, Viktoriia Khalina, Dmitri Moltchanov. 72-77 [doi]
- Syslog Anomaly Detection Using Supervised Machine Learning ModelsElham Younesian, Miroslav Siklosi, Nabhan Khatib, Jiri Hosek. 78-84 [doi]
- Dynamic pricing model for 5G/6G telecommunicationsSergey Vasilyev, Igor Levichev, Daniel Peres Acosta. 85-90 [doi]
- Single-server Queuing Systems With Exponential Service Times and Threshold-based RenovationViana C. C. Hilquias, Ivan S. Zaryadov. 91-97 [doi]
- On stationary characteristics of a multiserver exponential queuing system with reordering of requestsSergey Matyushenko, Anna Ermolayeva. 98-103 [doi]
- Queueing Model of Hysteretic Congestion Control for Cloud Wireless Sensor NetworksAliyu Bashir, Egor Machnev, Evgeniy Mokrov. 104-108 [doi]
- Risk tree as an assistant tool for the decision-makerVladimir Rykov, Nika M. Ivanova, Dmitry Kozyrev. 109-114 [doi]
- Research of wireless network traffic analysis using big data processing technologyMaxim Mikhailovich Kovtsur, Anton Kistruga, Mikhailova Anastasiya, Pavel Andreevich Potemkin, Vladimir Volkogonov. 115-121 [doi]
- Analysis of IEEE 802.11 signal propagation in different use casesAnton Vikulov, Alexander Paramonov. 122-130 [doi]
- Topology Search Using Dilution of Precision Criterion for Enhanced 5G Positioning Service AreaGrigoriy Fokin, Vladimir Sevidov. 131-136 [doi]
- Vehicles Tracking in 5G-V2X UDN using Range, Bearing and Inertial MeasurementsGrigoriy Fokin, Andrei Vladyko. 137-142 [doi]
- Performance evaluation of software defined networking based on openflow protocolMarina Buranova, Ammar Muthanna. 143-148 [doi]
- Hardware-based Cryptographic Accelerator for Post Quantum EraLukas Malina, Peter Cíbik, Petr Jedlicka, David Smekal, Sara Ricci, Jakub Hrabovsky. 149-155 [doi]
- Construction of a Cryptographically Secure Pseudorandom Sequence Generator Based on the Blender AlgorithmVladimir Grozov, Alexei Guirik, Marina Budko, Mikhail Budko. 156-161 [doi]
- Modern McEliece Cryptosystem Using Generalized ($L, G$)-CodesIvan K. Noskov, Sergei V. Bezzateev. 162-166 [doi]
- The Security Testbed for the Purposes of the ITS-G5 Communication Attacks PreventionJirí Pokorný, Pavel Seda, Jan Dvorak, Lukas Malina, Zdenek Martinasek. 167-173 [doi]
- Optimizing the Switching Speed of the Current Probe Utilizing the FPGA for Input Signal ProcessingMichal Mikulasek, Pavel Masek, Martin Stusek, Lukás Novák, Radek Mozny, Jiri Hosek. 174-181 [doi]
- FGIC44 - Fully Controllable Immittance Converter: Chip Performance EvaluationJan Dvorak, David Kubánek, Jaroslav Koton. 182-187 [doi]
- A Combined Attack Scenario to Exploit the Join Procedure of LoRaWANDuc Tran Le, Truong Duy Dinh, Van-Dai Pham, Ruslan Kirichek, Egor Filin, Alexander Shestakov. 188-193 [doi]
- An Efficient Feature Extraction Method for Attack Classification in IoT NetworksPhuc Hao Do, Truong Duy Dinh, Duc Tran Le, Van-Dai Pham, Lyudmila Myrova, Ruslan Kirichek. 194-199 [doi]
- Model of Adaptive Data Transmission SystemDmitry Kukunin, Alexander Berezkin, Alina Zadorozhnyaya, Evgeny Karelin, Alexander Shestakov. 200-205 [doi]
- Improving the SNBWAN Efficiency based on the Improvement of Signal-Code ConstructionsVadim Bobrovsky, Anatoly Sartakov, Ruslan Kirichek, Van-Dai Pham, Leonid Semakov, Evgeny Zhuravel. 206-213 [doi]
- Analysis of fault tolerance improvement in distributed over network data storageArtem A. Shvidkiy, Anastasiia A. Savelieva, Anton A. Zarubin. 214-218 [doi]
- A Technique for Detecting the Substitution of a Java-Module of an Information System Prone to Pharming with Using a Hidden Embedding of a Digital Watermark Resistant to DecompilationPavel I. Sharikov, Audrey Krasov, Artem Gelf, Ernest Birikh. 219-223 [doi]
- Optimization of Fan-Beam Radiation Pattern of Cylindrical Phased ArrayEvgeniy Glushankov, Konstantin Korovin, Ilya Gorobtsov, Igor Boyko, Dmitriy Kirik. 224-229 [doi]
- Models and Methods for Decoding of Error-Correcting Codes based on a Neural NetworkAleksandr Berezkin, Alina Zadorozhnyaya, Dmitry Kukunin, Daniil Matveev, Ekaterina Kraeva. 230-235 [doi]
- Virtualization of Control Systems in IoT using Neural NetworksAleksey Slepnev, Evgenii Karelin, Ivan Luksha, Ruslan Kirichek, Alina Zadorozhnyaya, Eugene Makarov. 236-240 [doi]
- Machine Learning and Quality of Customer Experience in Leading Telecom Providers of Bosnia and HerzegovinaAnis Maslo, Mujo Hodzic, Edvin Skaljo, Aljo Mujcic. 241-245 [doi]
- Regulatory Impact Analysis for XGS-PON Standardization Development in IndonesiaNomarhinta Solihah, Muhammad Imam Nashiruddin, Erna S. Sugesti. 246-252 [doi]
- Several Perspectives Of Broadband Home Networking Based On Optical TechnologiesKimio Oguchi. 253-258 [doi]
- Design and Development of FPGA-based Card for Data Acquisition and Processing for Use in Fiber Optics Perimeter Security SystemsPetr Dejdar, Sobeslav Valach, Petr Munster. 259-262 [doi]
- Quantum Key Distribution PolygonOndrej Klicnik, Petr Munster, Tomás Horváth, Jan Hajny, Lukas Malina. 263-266 [doi]
- Comparison of image edge detection methods for intruder detection in a phase-sensitive OTDR systemPavel Záviska, Petr Dejdar, Petr Münster. 267-270 [doi]
- Leakage of Information Through Passive Components in Optical Fiber InfrastructuresVladimir Spurny, Petr Munster, Tomás Horváth, Edvin Skaljo. 271-273 [doi]
- Analysis of signal extinction ratio and minimum mean launch power trade-off for type-A ONU 10G transmitterAdebayo Emmanuel Abejide, Carla Rodrigues, Sushma Pandey, Madhava Reddy Kota, Mário J. N. Lima, António Luis Jesus Teixeira. 274-277 [doi]
- 54-Gbit/s PAM-8 Transmission in Next-Generation Passive Optical Networks using Directly Modulated Lasers with Machine Learning TechniquesAhmed Galib Reza, Marcos Troncoso Costas, Liam P. Barry, Colm Browning. 278-281 [doi]
- Impact of the receiver and transmitter bandwidth on the performance of high-speed OFDM signal in Radio-over-Fiber Communication SystemsInna Kurbatska, Armands Ostrovskis, Sandis Spolitis, Vjaceslavs Bobrovs. 282-288 [doi]