Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedings
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018. The 64 revised full papers presented were carefully reviewed and selected from 186 submissions. The papers of NEW2AN focus on advanced wireless networking and applications; lower-layer communication enablers; novel and innovative approaches to performance and efficiency analysis of ad-hoc and machine-type systems; employed game-theoretical formulations, Markov chain models, and advanced queuing theory; grapheme and other emerging material, photonics and optics; generation and processing of signals; and business aspects. The ruSMART papers deal with fully-customized applications and services.
The paper discusses the problem of defining the characteristics of processes related to development and implementation of telecommunication technologies. These characteristics must reflect an adequate assessment of expectations for the implementation of new technologies and be a basis for correct and relevant decision-making, which should lead to key competitive advantages, both for an individual enterprise and the economy of the country as a whole. The above circumstances have predetermined the topicality of the research study, whose aim at this stage is to assess the adequacy of the analytical model, which is developed on the basis of Gartner’s hype cycle model and reflects the dependence of expectations for the technology on a time factor. The results of analytical modeling have been obtained on the example of the commonly used telecommunication technology Bluetooth. The source data included a number of articles on the relevant subject from Scopus database. Based on the obtained results, it has been concluded on the working capacity of the used model and recommendations have been given on its possible improvement.
A significant interest recently emerged in the field of secure computations. Many systems were developed aiming at executing the summation and multiplication operation in a hidden way. Importantly, the cryptosystems enabling the execution of all four arithmetic operations are not yet present. This paper proposes a system for achieving this goal. The main benefit of its utilization is the possibility to continuous computation with no need for repetitive encryption of data.