Special Issue "Selected Papers from the 2019 42nd International Conference on Telecommunications and Signal Processing (TSP)"

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: closed (15 November 2019).

Special Issue Editors

Assoc. Prof. Norbert Herencsar
E-Mail Website
Guest Editor
Department of Telecommunications, Brno University of Technology, Technicka 3082/12, Brno, 616 00, Czech Republic
Interests: analog electronics; analog filters; circuit theory; current-mode circuits; fractional-order components & systems synthesis; MOS-only circuits
Special Issues and Collections in MDPI journals
Assoc. Prof. Francesco Benedetto
E-Mail Website
Guest Editor
Signal Processing for Telecommunications and Economics Laboratory (SP4TE), University of "Roma TRE", via Vito Volterra, 62 00146 Rome, Italy
Interests: ground penetrating radar; software and cognitive radio; digital signal and image processing for telecommunications and economics; code acquisition; synchronization for the 3G mobile communication systems and multimedia communication
Special Issues and Collections in MDPI journals
Assoc. Prof. Jorge Crichigno
E-Mail Website
Guest Editor
College of Engineering and Computing, University of South Carolina, Innovation Center, 550 Assembly Street, Suite 1300, Columbia, SC 29208, USA
Interests: wireless and optical networks; graph theory; mathematical optimization; network security
Special Issues and Collections in MDPI journals

Special Issue Information

Dear Colleagues,

The 2019 42nd International Conference on Telecommunications and Signal Processing (TSP - http://tsp.vutbr.cz/) is organized by seventeen universities from Czech Republic, Hungary, Turkey, Taiwan, Japan, Slovak Republic, Spain, Bulgaria, France, Slovenia, Croatia, Greece, and Poland, for academics, researchers, and developers, and it serves as a premier annual international forum to promote the exchange of the latest advances in telecommunication technology and signal processing. The aim of the conference is to bring together both novice and experienced scientists, developers, and specialists, to meet new colleagues, collect new ideas, and establish new cooperation between research groups from universities, research centers, and private sectors worldwide. Authors of selected high-quality research papers will be invited to submit their extended version for publishing in Special Issue "Selected Papers from the 2019 42nd International Conference on Telecommunications and Signal Processing (TSP)" in Applied Sciences.

Assoc. Prof. Norbert Herencsar
Assoc. Prof. Francesco Benedetto
Assoc. Prof. Jorge Crichigno
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1500 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Telecommunications
  • Information systems
  • Network services
  • Network technologies
  • Telecommunication systems
  • Simulation and measurement
  • Analog signal processing
  • Audio signal processing
  • Biomedical signal processing
  • Digital signal processing
  • Image and video signal processing
  • Speech and language processing

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
Availability and Fade Margin Calculations for 5G Microwave and Millimeter-Wave Anyhaul Links
Appl. Sci. 2019, 9(23), 5240; https://doi.org/10.3390/app9235240 - 02 Dec 2019
Abstract
The deployment of new radio access technologies always provides a good opportunity and timing to optimize the existing mobile front- and backhaul (commonly called “anyhaul”). The legacy systems (Long-Term Evolution (LTE), High-Speed Packet Access (HSPA), third-generation mobile (3G), second-generation mobile (2G)) already extensively [...] Read more.
The deployment of new radio access technologies always provides a good opportunity and timing to optimize the existing mobile front- and backhaul (commonly called “anyhaul”). The legacy systems (Long-Term Evolution (LTE), High-Speed Packet Access (HSPA), third-generation mobile (3G), second-generation mobile (2G)) already extensively utilize the transmission and transport capacities of the mobile anyhaul. With the current launch of 5G (fifth-generation mobile) and recent LTE-A (Advanced Long-Term Evolution), additional new transmission capacities are required again. Depending on the traffic and network topology, additional cell sites are built, and even more locations are connected with fiber optics. The existing microwave and millimeter-wave links are rotated toward those aggregation points that already have optical-fiber access. Due to the increased cell-site density, the average distance of the radio access links can be reduced by network and topology optimization. The reduced hop lengths combined with adaptive modulation and automatic power control bring an opportunity for capacity increase in shortened radio links. Links newly deployed for 5G find a wide spectrum in the millimetric V, E, W, and D frequency bands. This paper discusses the availability and hop-length targets of the anyhaul links that should be carefully kept by proper planning and monitoring. Full article
Show Figures

Figure 1

Open AccessArticle
A High Efficiency Multistage Coder for Lossless Audio Compression using OLS+ and CDCCR Method
Appl. Sci. 2019, 9(23), 5218; https://doi.org/10.3390/app9235218 - 30 Nov 2019
Abstract
In this paper, the improvement of the cascaded prediction method was presented. Three types of main predictor block with different levels of complexity were compared, including two complex prediction methods with backward adaptation, i.e., extension Active Level Classification Model (ALCM+) and extended Ordinary [...] Read more.
In this paper, the improvement of the cascaded prediction method was presented. Three types of main predictor block with different levels of complexity were compared, including two complex prediction methods with backward adaptation, i.e., extension Active Level Classification Model (ALCM+) and extended Ordinary Least Square (OLS+). Our own approach to implementation of the effective context-dependent constant component removal block is also presented. Additionally, the improved adaptive arithmetic coder with short, medium and long-term adaptation was presented, and the experiment was carried out comparing the results with other known lossless audio coders against which our method obtained the best efficiency. Full article
Show Figures

Figure 1

Open AccessArticle
A Tweak-Cube Color Image Encryption Scheme Jointly Manipulated by Chaos and Hyper-Chaos
Appl. Sci. 2019, 9(22), 4854; https://doi.org/10.3390/app9224854 - 13 Nov 2019
Abstract
This paper proposes a novel tweak-cube color image encryption scheme jointly manipulated by chaos and hyper-chaos. One-dimensional (1D) chaotic maps are effortless to operate, but the key space is relatively small. The hyperchaotic system has complex dynamics properties, which are capable of compensating [...] Read more.
This paper proposes a novel tweak-cube color image encryption scheme jointly manipulated by chaos and hyper-chaos. One-dimensional (1D) chaotic maps are effortless to operate, but the key space is relatively small. The hyperchaotic system has complex dynamics properties, which are capable of compensating for the defects of 1D chaotic maps. Thus, we first raise an improved 1D chaotic map with an increased key space. Then, we associate it with a four-dimensional (4D) hyperchaotic system to generate the key streams and further rotate and shift the rows and columns of each component of Red (R), Green (G), and Blue (B) for the color image. The permuting mode is to disturb the original position of the pixels by mimicking the way of twisting the Rubik’s cube. Moreover, the key stream updated by the plain images is also utilized for diffusion and scramble at the bit level. As a consequence, our cryptosystem enhances the security without at the expense of increasing time cost. Full article
Show Figures

Figure 1

Open AccessArticle
Pavement Distress Detection with Deep Learning Using the Orthoframes Acquired by a Mobile Mapping System
Appl. Sci. 2019, 9(22), 4829; https://doi.org/10.3390/app9224829 - 11 Nov 2019
Abstract
The subject matter of this research article is automatic detection of pavement distress on highway roads using computer vision algorithms. Specifically, deep learning convolutional neural network models are employed towards the implementation of the detector. Source data for training the detector come in [...] Read more.
The subject matter of this research article is automatic detection of pavement distress on highway roads using computer vision algorithms. Specifically, deep learning convolutional neural network models are employed towards the implementation of the detector. Source data for training the detector come in the form of orthoframes acquired by a mobile mapping system. Compared to our previous work, the orthoframes are generally of better quality, but more importantly, in this work, we introduce a manual preprocessing step: sets of orthoframes are carefully selected for training and manually digitized to ensure adequate performance of the detector. Pretrained convolutional neural networks are then fine-tuned for the problem of pavement distress detection. Corresponding experimental results are provided and analyzed and indicate a successful implementation of the detector. Full article
Show Figures

Figure 1

Open AccessArticle
New Security Improvements in Next-Generation Passive Optical Networks Stage 2
Appl. Sci. 2019, 9(20), 4430; https://doi.org/10.3390/app9204430 - 18 Oct 2019
Abstract
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is controlled by optical line termination (OLT). The broadcast [...] Read more.
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is controlled by optical line termination (OLT). The broadcast transmission method increases security vulnerability because the attacker is able to connect his/her modified optical network unit (ONU) to the free port of the splitter (commonly in the basement). We present the concept for the activation process of ONUs based on physical unclonable function (PUF) for next-generation passive optical networks stage 2 (NG-PON2). The use of PUF increases security in the NG-PON2. Furthermore, the registration identifier (ID) is not stored in a nonvolatile memory, in comparison with the common solution defined by the International Telecommunication Union (ITU) recommendation G.989.3. An attacker cannot perform a reverse engineering attack to obtain the registration ID. For this reason, the attacker cannot clone an ONU. We proposed security improvements that involve authentication, encryption, integrity protection, and data origin verification methods in the NG-PON2. Our model uses the standard implementation of the transmission convergence layer of NG-PON2 with the new physical layer operations, administration, and maintenance (PLOAM) messages. The recommendation G.989.3 allows specifying own PLOAM messages since not all IDs are used in the current specification. Full article
Show Figures

Figure 1

Back to TopTop