This document provides an overview of 5G wireless cellular technologies. It discusses the evolution of wireless technologies from 1G to 5G, comparing key aspects like data bandwidth, switching, and core networks. 5G is expected to offer speeds over 1Gbps, fully packetized networks, and be based on an all-IP platform. 5G architecture will utilize cloud computing and allow access to applications from any internet-connected device. 5G will provide improved quality of service for applications like video and offer globally accessible high-speed connectivity and services.
Mobile Communication has been developed rapidly since last few decades. The growth of the wireless broadband technologies in the modern years was the answer of increasing demand for mobile Internet and wireless multimedia application such as live TV, live Movies, video conferencing etc. Mobile communication plays a vital role in telecommunication industry. During a common wide area radio access technology and supple network architecture WiMAX and LTE has facilitate convergence of mobile and fixed broadband network S. Atchaya | S. Selvanayaki | S. Deepika"4G Wireless Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10712.pdf http://www.ijtsrd.com/computer-science/computer-network/10712/4g-wireless-technology/s-atchaya
5G Technology stands for the 5th Generation Mobile technology. 5G is a next major phase of mobile telecommunications standards beyond the 4G standards. 5G is expected to provide speed upto 10Gbit/s, wider frequency band,
high increased peak bit rate, high system spectral efficiency, ubiquitous connectivity and a significant increase in QoS as
compared to current 4G technology. Evolution of mobile communication technology to 5G is discussed in this review, followed by protocol stack and 5G architecture. A wide comparison is given between the various generations so as to compare why 5G technology is better and needed.
5G has been fully commercialized, and human communication technology has once again embarked on a period of rapid development. With the development of rocket recovery, low-orbit satellites, and 6G satellite network technology, sci-fi communication methods are not far away from us.
In 2019, the Ministry of Industry and Information Technology established a 6G research group to promote 6G-related work. In April of the same year, the University of Oulu hosted the world's first 6G summit. 6G is expected to achieve further technical indicators. The air interface delay is less than 0.1ms, the network depth coverage rate reaches 100%, millimeter-level sensing, and positioning, unit power consumption is greatly reduced, transmission bandwidth will reach TB level, and the density of connected hundreds of devices will reach per cubic meter.
On April 20, 2020, the China Development and Reform Commission clarified the scope of new infrastructure for the first time and included satellite Internet into the scope of communication network infrastructure. At present, many domestic enterprises have begun to actively deploy the satellite Internet industry.
Cellular Connectivity: Changing the Landscape of the Cellular Backhaul Market...ST Engineering iDirect
The demand for connectivity is surging worldwide. Today more than ever, more people in more places are connecting for work, entertainment, social communications, and education. Increasingly, they’re using smartphones, tablets, and other easy-to-carry devices. And in many underdeveloped parts of the world, smartphones are often the only Internet access technology that’s both affordable and available.
As a result, mobile networks are poised to become the primary way in which we connect. According to the 2018 Ericsson Mobility Report, there will be 7.2 billion smartphone subscriptions by 2023. Total data traffic has surged by 400% from 2013 to today and is projected to explode another 500% by 2023.
Mobile Communication has been developed rapidly since last few decades. The growth of the wireless broadband technologies in the modern years was the answer of increasing demand for mobile Internet and wireless multimedia application such as live TV, live Movies, video conferencing etc. Mobile communication plays a vital role in telecommunication industry. During a common wide area radio access technology and supple network architecture WiMAX and LTE has facilitate convergence of mobile and fixed broadband network S. Atchaya | S. Selvanayaki | S. Deepika"4G Wireless Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10712.pdf http://www.ijtsrd.com/computer-science/computer-network/10712/4g-wireless-technology/s-atchaya
5G Technology stands for the 5th Generation Mobile technology. 5G is a next major phase of mobile telecommunications standards beyond the 4G standards. 5G is expected to provide speed upto 10Gbit/s, wider frequency band,
high increased peak bit rate, high system spectral efficiency, ubiquitous connectivity and a significant increase in QoS as
compared to current 4G technology. Evolution of mobile communication technology to 5G is discussed in this review, followed by protocol stack and 5G architecture. A wide comparison is given between the various generations so as to compare why 5G technology is better and needed.
5G has been fully commercialized, and human communication technology has once again embarked on a period of rapid development. With the development of rocket recovery, low-orbit satellites, and 6G satellite network technology, sci-fi communication methods are not far away from us.
In 2019, the Ministry of Industry and Information Technology established a 6G research group to promote 6G-related work. In April of the same year, the University of Oulu hosted the world's first 6G summit. 6G is expected to achieve further technical indicators. The air interface delay is less than 0.1ms, the network depth coverage rate reaches 100%, millimeter-level sensing, and positioning, unit power consumption is greatly reduced, transmission bandwidth will reach TB level, and the density of connected hundreds of devices will reach per cubic meter.
On April 20, 2020, the China Development and Reform Commission clarified the scope of new infrastructure for the first time and included satellite Internet into the scope of communication network infrastructure. At present, many domestic enterprises have begun to actively deploy the satellite Internet industry.
Cellular Connectivity: Changing the Landscape of the Cellular Backhaul Market...ST Engineering iDirect
The demand for connectivity is surging worldwide. Today more than ever, more people in more places are connecting for work, entertainment, social communications, and education. Increasingly, they’re using smartphones, tablets, and other easy-to-carry devices. And in many underdeveloped parts of the world, smartphones are often the only Internet access technology that’s both affordable and available.
As a result, mobile networks are poised to become the primary way in which we connect. According to the 2018 Ericsson Mobility Report, there will be 7.2 billion smartphone subscriptions by 2023. Total data traffic has surged by 400% from 2013 to today and is projected to explode another 500% by 2023.
A survey on multiple access technologies beyond fourth generation wireless co...ijceronline
The future of mobile wireless communication networks will include existing 3rd generation, 4th generation 5th generation,6th generation (with very high data rates Quality of Service (QoS) and service applications) and 7th generation (with space roaming). Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-ondemand, video conferencing system and many more applications. This paper is focused on the specifications of future generations and latest technologies to be used in future wireless mobile communication networks like MIMO, OFDM, OFDMA, Massive MIMO, LTE, LTE-A.
The following paper tells us about the literature reviewed of 5g technology, its requirements , its Artictecture , QoS , Advantages , Disadvantages and what are the challenges that we are going to face in implementing the technology and focusing on its future scope and implementation.
5G technologies will change the way most high-bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. Recently apple has produced shivers all around the electronic world by launching its new handset, the I-phone. Features that are getting embedded in such a small piece of electronics are huge.
Nowadays mobile phones have become a must for almost all people from all over the world. An opportunity to stay in touch with friends and family members, access to email and business associates are just a few of reasons for the boosting importance of cell phones. Mobile telephony is the provision of telephone services to phones which may move around freely rather than stay fixed in one location. Today mobile phones are the best way to stay connected with others as well as provide the user with a sense of security. A conceptual study have been made to briefly discus what mobile telephony is, how it emerges and what technologies it use.
Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband access wherever they go, Out of 5.8 billion people who will have broadband by 2017. It should surprise no one that the Smartphone revolution is fueling this growth, and by 2017, half of all mobile devices in the world will be smart phones. The key to keeping users happy is network performance and good value for the money. From the looks of it, we are on track to seeing continued network performance improvements and increasingly easier access to smart phones as developing markets hop on the bandwagon.
(3G) Technology, one of the leading Technologies in today’s wireless technology. NTT DoCoMo of Japan on October 1, 2001 is the first one to commercially launch this service. It was first implemented on CDMA phones. Now this service is coming with GSM. Third Generation (3G) mobile devices and services will transform wireless communications into on-line, real-time connectivity. 3G wireless technology will allow an individual to have immediate access to location-specific services that offer information on demand.
5G–“connect anytime, anywhere, anyhow” promising everywhere network access at high speed to the end users, has been a topic of great interest mainly for the wireless telecom industry. 5G seems to be the solution for the growing user necessities of wireless broadband access and the boundaries of the existing wireless communication system. The wireless industry is busy with the standardization of the 4th generation (4G) cellular networks. 4G wireless system cannot exist in today’s market without standardization. The 4G concept shave already moved to the standardization phase, we must begin to work on the structure blocks of the 5G wireless networks. The major difference, from a user point of view, between current generations and expected 5G techniques must be something else than increased maximum throughput; other requirements include low battery consumption, more secure. We refer to this goal as enabling the 4A’s paradigm i.e. Any rate, Anytime, Anywhere and Affordable. In particular, this paper focuses on the features such as broadband internet in mobile phones with a possibility to provide internet facility in the computer by just connecting the mobile and with a speed of 10Gbps and more. In 5G researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless World.
A survey on multiple access technologies beyond fourth generation wireless co...ijceronline
The future of mobile wireless communication networks will include existing 3rd generation, 4th generation 5th generation,6th generation (with very high data rates Quality of Service (QoS) and service applications) and 7th generation (with space roaming). Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-ondemand, video conferencing system and many more applications. This paper is focused on the specifications of future generations and latest technologies to be used in future wireless mobile communication networks like MIMO, OFDM, OFDMA, Massive MIMO, LTE, LTE-A.
The following paper tells us about the literature reviewed of 5g technology, its requirements , its Artictecture , QoS , Advantages , Disadvantages and what are the challenges that we are going to face in implementing the technology and focusing on its future scope and implementation.
5G technologies will change the way most high-bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. Recently apple has produced shivers all around the electronic world by launching its new handset, the I-phone. Features that are getting embedded in such a small piece of electronics are huge.
Nowadays mobile phones have become a must for almost all people from all over the world. An opportunity to stay in touch with friends and family members, access to email and business associates are just a few of reasons for the boosting importance of cell phones. Mobile telephony is the provision of telephone services to phones which may move around freely rather than stay fixed in one location. Today mobile phones are the best way to stay connected with others as well as provide the user with a sense of security. A conceptual study have been made to briefly discus what mobile telephony is, how it emerges and what technologies it use.
Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband access wherever they go, Out of 5.8 billion people who will have broadband by 2017. It should surprise no one that the Smartphone revolution is fueling this growth, and by 2017, half of all mobile devices in the world will be smart phones. The key to keeping users happy is network performance and good value for the money. From the looks of it, we are on track to seeing continued network performance improvements and increasingly easier access to smart phones as developing markets hop on the bandwagon.
(3G) Technology, one of the leading Technologies in today’s wireless technology. NTT DoCoMo of Japan on October 1, 2001 is the first one to commercially launch this service. It was first implemented on CDMA phones. Now this service is coming with GSM. Third Generation (3G) mobile devices and services will transform wireless communications into on-line, real-time connectivity. 3G wireless technology will allow an individual to have immediate access to location-specific services that offer information on demand.
5G–“connect anytime, anywhere, anyhow” promising everywhere network access at high speed to the end users, has been a topic of great interest mainly for the wireless telecom industry. 5G seems to be the solution for the growing user necessities of wireless broadband access and the boundaries of the existing wireless communication system. The wireless industry is busy with the standardization of the 4th generation (4G) cellular networks. 4G wireless system cannot exist in today’s market without standardization. The 4G concept shave already moved to the standardization phase, we must begin to work on the structure blocks of the 5G wireless networks. The major difference, from a user point of view, between current generations and expected 5G techniques must be something else than increased maximum throughput; other requirements include low battery consumption, more secure. We refer to this goal as enabling the 4A’s paradigm i.e. Any rate, Anytime, Anywhere and Affordable. In particular, this paper focuses on the features such as broadband internet in mobile phones with a possibility to provide internet facility in the computer by just connecting the mobile and with a speed of 10Gbps and more. In 5G researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless World.
Today wireless services are the most preferred services of the world. The rapid increase in
the service is due to the advancement of technology consecutively. As a subscriber becomes more
aware of the mobile phone technology, he/she will seek for an appropriate package all together, and
including all the advanced features of a cellular phone can have. Hence, the search for new
technology is always the main intention of the prime cell phone giants to out innovate their
competitors. In addition, the main purpose of the fifth generation wireless networks (5G Wireless
networks) is planned to design the best wireless world that is free from limitations and hindrance of
the previous generations. 5G technologies will change the way most high bandwidth users access
their Mobile Radio Communication (MRC). So, this paper represents, great evolution of 1G (First
Generation) to 4G yield 5G, introduction to 5G technologies, why there is a need for 5G, advantages
of 5G networks technology, exceptional applications, Quality of Service (QoS), 5G network
architecture.
5 G SYSTEMS IS THE FUTURE WILL BE FAST WITH UNIMAGINABLE SPEED AND WITH LOTS OF SERVICES.Though 5G is still in development stage it has lots of promising features that will definitely change our future. For this data hungry and speed loving generation 5G will definitely be the hottest technology and it will certainly make our future really exciting. In this article we will see how the mobile networks have evolved and what will be the future of mobile network and of course about 5G network.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
Evolution of Wireless Communication TechnologiesAkhil Bansal
This report comprises of detailed analysis how the wireless communication developed from 1G to 4G LTE to improve data services for the end user.The future ahead i.e. 5G is also discussed.
Feel free to discuss, would be happy to help.
5 G Mobile Technology PPT by N Krishna Chandunkrishnachandu
5G technologies will change the way most high-bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e-transactions) etc.
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...Rakesh Jha
In the near future, i.e., beyond 4G, some of the prime objectives or demands that need to
be addressed are increased capacity, improved data rate, decreased latency, and better quality of service.
To meet these demands, drastic improvements need to be made in cellular network architecture. This paper
presents the results of a detailed survey on the fth generation (5G) cellular network architecture and some
of the key emerging technologies that are helpful in improving the architecture and meeting the demands of
users. In this detailed survey, the prime focus is on the 5G cellular network architecture, massive multiple
input multiple output technology, and device-to-device communication (D2D). Along with this, some of the
emerging technologies that are addressed in this paper include interference management, spectrum sharing
with cognitive radio, ultra-dense networks, multi-radio access technology association, full duplex radios,
millimeter wave solutions for 5G cellular networks, and cloud technologies for 5G radio access networks
and software dened networks. In this paper, a general probable 5G cellular network architecture is proposed,
which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of
5G cellular network architecture. A detailed survey is included regarding current research projects being
conducted in different countries by research groups and institutions that are working on 5G technologies.
This is my final report that i made in my course information communication technology about cell phone system technology
it include all generation of 1g-5g help students to take idea from it thank you happy learning
The
creation and entry of 5G technology into the mobile marketplace will launch a new
revolution in the way international cellular plans are offered. The global mobile
phone is upon the cell phone market. Just around the corner, the newest 5G
technologies will hit the mobile market with phones used in China being able to
access and call locally phones in Germany.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
An Overview of 5G Wireless Cellular Technologies
1. International Journal of Science and Engineering Applications
Volume 5 Issue 5, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 284
An Overview of 5G Wireless Cellular Technologies
Waqas Ali1*
, Bilal1
, Amna Mehmood1
, Usman1
, Farhan Ullah1
Department of Computer Science, Abdul Wali Khan University Mardan
Abstract- 5G technology stands for fifth Generation Mobile technology. From generation 1G to 2G and from 3G to 5G this
world has revolutionized by improvements of wireless network. This revolution brought up some drastic changes in our social
life .This paper also focuses on all preceding generations of mobile communication along with fifth generation technology. Fifth
generation network provide cost-effective broadband wireless connectivity (very high speed), which will be probably 1gigbit per
second Speed. The paper throws light on network architecture of fifth generation technology. Currently 5G term is not
officially used. Fifth generation negotiate on (Voice over IP) VOIP-enabled devices that user will get a high level of call volume
and data transmission. Fifth generation technology will be done all the requirements of customers who always want advanced
features in cellular phones. The main features in 5G mobile network is that user connect to the multiple wireless technologies at
the same time and can switch between them. This forthcoming mobile technology will support IPv6 and flat IP. Fifth generation
technology will offer the services like Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. Index
Terms— 5G, 5G Architecture, Evolution from 1G to 5G, Comparison of all Generations.
Key Words: Wireless Communication, Cellular Networks, 5G.
I. INTRODUCTION
Wireless communication has started in early 1970s. In next
four decades, a mobile wireless technology has evolved
from 1G to 5G generations [1-3]. Fifth generation
encompasses high speed standard and protocols where a
user never experienced before. The Fifth generation
technologies offer various new advanced features which
makes it most powerful and in huge demand in the future.
Presently the planet is driven by 4G (UMTS-Universal
Mobile Telecommunication System, cdma2000), LTE
(Long Term Evolution), Wi-Fi (IEEE 802.11 wireless
networks), WiMAX (IEEE 802.16 wireless and mobile
networks),as well as sensor networks, or personal area
networks (e.g. Bluetooth, ZigBee) [4-8]. Mobile terminals
include variety of interfaces like GSM which are based on
circuit switching. All wireless and mobile networks
implements all- IP principle, that means all data and
signaling will be transferred via IP (Internet Protocol) on
network layer. Fifth generation technology will have
support like camera, MP3 recording, video player, large
phone memory, audio player etc. that user never imagine
and for children rocking fun with Bluetooth technology and
Pico nets. The fifth generation wireless mobile multimedia
internet networks can be completely wireless
communication without limitation, which makes perfect
wireless real world – World Wide Wireless Web
(WWWW). Fifth generation is based on 4G technologies.
The 5th wireless mobile internet networks are real wireless
world which shall be supported by LAS- CDMA(Large
Area Synchronized Code Division Multiple Access),OFDM
(Orthogonal frequency-division multiplexing), MCCDMA
(Multi-Carrier Code Division Multiple Access),UWB
(Ultra-wideband), Network-LMDS (Local Multipoint
Distribution Service), and IPv6 [9]. Fifth generation
technologies offers tremendous data capabilities and
unrestricted call volumes and infinite data broadcast
together within latest mobile operating system. Fifth
generation should make an important difference and add
more services and benefits to the world over 4G [10]. Fifth
generation should be more intelligent technology that
interconnects the entire world without limits. This
generation is expected to be released around 2020. World
of universal, uninterrupted access to information,
entertainment and communication will open new dimension
to our lives and change our life style significantly.
II. EVOLUTION OF WIRELESS
TECHNOLOGIES
Mobile communication has become more popular in last
few years due to fast revolution in mobile technology [11].
2. International Journal of Science and Engineering Applications
Volume 5 Issue 5, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 285
This revolution is due to very high increase in telecoms
customers. This revolution is from 1G- the first
generation, 2G- the second generation, 3G- the third
generation, and then the 4G- the fourth generation,5G-the
fifth second generation.
A. First Generation (1G) 1G emerged in 1980s. It contains
Analog System and popularly known as cell phones. It
introduces mobile technologies such as Mobile Telephone
System (MTS), Advanced Mobile Telephone System
(AMTS), Improved Mobile Telephone Service (IMTS), and
Push to Talk (PTT). It uses analog radio signal which have
frequency 150 MHz, voice call modulation is done using a
technique called Frequency-Division Multiple Access
(FDMA) [12]. It has low capacity, unreliable handoff, poor
voice links, and no security at all since voice calls were
played back in radio towers, making these calls susceptible
to unwanted eavesdropping by third parties.
B. Second Generation (2G) 2G emerged in late 1980s. It
uses digital signals for voice transmission and has speed of
64 kbps. It provides facility of SMS (Short Message
Service) and use the bandwidth of 30 to 200 KHz. Next to
2G, 2.5G system uses packet switched and circuit switched
domain and provide data rate up to 144 kbps. E.g. GPRS,
CDMA and EDGE [13-16].
C. Third Generation (3G) it uses Wide Brand Wireless
Network with which clarity is increased. The data are sent
through the technology called Packet Switching. Voice
calls are interpreted through Circuit Switching. Along with
verbal communication it includes data services, access to
television/video, new services like Global Roaming. It
operates at a range of 2100MHz and has a bandwidth
of 15-20MHz used for High-speed internet service, video
chatting.3G uses Wide Band Voice Channel that is by this
the world has been contracted to a little village because a
person can contact with other person located in any part of
the world and can even send messages too.
D. Fourth Generation(4G) 4G offers a downloading speed
of 100Mbps.4G provides same feature as 3G and additional
services like Multi-Media Newspapers, to watch T.V
programs with more clarity and send Data much faster than
previous generations. LTE (Long Term Evolution) is
considered as 4G technology. 4G is being developed to
accommodate the QoS and rate requirements set by
forthcoming applications like wireless broadband access,
Multimedia Messaging Service (MMS), video chat, mobile
TV, HDTV content, Digital Video Broadcasting (DVB),
minimal services like voice and data, and other services
that utilize bandwidth.
III.COMPARISION OF 1G TO 5G
Various generations are compared in Table 1 in terms of
data bandwidth, multiplexing, switching and core network.
Table 1: Comparison of Generations.
Contents 1G 2G 3G 4G 5G
START 1970 1990 2004 NOW 2020
DATA
BW
2kbps 64kb
ps
2Mbp
s
1Gbps >1Gpbs
MULTIP
LEX
FDM
A
TDM
A
CDM
A
CDMA CDMA
SWITHC
ING
CIRC
UIT
CIR
UIT
PACK
ET
ALL
PACKE
T
ALL
PACKE
T
CORE
NETWO
RK
PSTN PST
N
PACK
ET
N/W
INTER
NET
INTER
NET
IV.5G ARCHITECTURE
Fifth generation mobile systems model is all-IP based
model for wireless and mobile networks interoperability
The All-IP Network (AIPN) is capable to fulfill increasing
demands of the cellular communications market. It is a
common platform for all radio access technologies [12].
The AIPN uses packet switching and its continuous
evolution provides optimized performance and cost. In fifth
generation Network Architecture consist of a user terminal
(which has a crucial role in the new architecture) and a
number of independent, autonomous radio access
technologies (RAT) [13]. In 5G network Architecture, all
IP based mobile applications and services such as Mobile
portals, Mobile commerce, Mobile health care, Mobile
government, Mobile banking and others, are offered via
Cloud Computing Resources (CCR). Cloud computing is a
model for convenient on-demand network access to
configurable computing resources (e.g., networks, servers,
storage, applications, and services) [14-19]. Cloud
computing allows consumers to use applications without
installation and access their personal data at any computer
with internet access. CCR links the ReconfigurableMulti
Technology Core (RMTC) with remote reconfiguration
data from RRD attached to Reconfiguration Data models
(RDM). The main challenge for a RMTC is to deal with
increasing different radio access technologies. The core is a
convergence of the nanotechnology, cloud computing and
3. International Journal of Science and Engineering Applications
Volume 5 Issue 5, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 286
radio, and based on All IP Platform as shown in Figure 1.
Core changes its communication functions depending on
status of the network and/or user demands. RMTC is
connected to different radio access technologies ranging
from 2G/GERAN to 3G/UTRAN and 4G/EUTRAN in
addition to 802.11x WLAN and 802.16x WMAN. Other
standards are also enabled such as IS/95, EV- DO,
CDMA2000...etc. Interoperability process-criteria and
mechanisms enable both terminal and RMTC to select from
heterogeneous access systems.
Figure 1: Basic Architecture of 5G
V. CLOUD COMPUTING
Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers,
storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort
or service provider interaction” a definition from. Hence,
cloud computing is a technology that uses the internet and
central remote server to maintain data and applications. In
5G networks this central remote server could be a content
provider. Cloud computing allows consumers and business
to use applications without installation and access their
personal files at any computer with internet access. The
same concept is going to be used in multi -core technology
where the user tries to access his private account form a
global content provider through cloud computing.
Figure 2: Active-idle Cell Range
VI. QUALITY OF SERVICE
Next Generation Networks (NGN) consists of support
functionalities for data transport, and control transport,
as well as functionalities for support of latency, error
rate and uptime. Quality of service also involves
controlling and managing network resources by setting
priorities for specific types of data (video, audio, files)
on the network. QoS is exclusively applied to network
traffic generated for video on demand, VoIP,
streaming media, videoconferencing and online
gaming. The primary goal of quality of service is to
provide priority to networks, including dedicated
bandwidth, controlled jitter, low latency and improved
loss characteristics. Its technologies supply the
elemental building blocks that will be used for future
business applications in campus, wide area
networks and service provider networks. There are
three fundamental components for basic QoS
implementation:
Identification and marking techniques for
coordinating QoS from end to end between
network elements.
QoS within a single network element.
QoS policy, management, and accounting
functions to control and administer end-to-
end traffic across a network. The internet of
Things covers these aspect as shown in
Figure 3 [20-25]
4. International Journal of Science and Engineering Applications
Volume 5 Issue 5, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 287
.
Figure 3: User Experience-Internet of Things
VII. WHY 5G?
Very High speed, high capacity, and low cost per bit.
It supports interactive multimedia, voice, video,
Internet, and other broadband services, more
effective and more attractive, and have Bi-
directional, accurate traffic statistics. 5G technology
offers Global access and service portability. It offers
the high quality services due to high error tolerance.
It is providing large broadcasting capacity up to
Gigabit which supporting almost 65,000 connections
at a time [26-38]. More applications combined with
artificial intelligent (AI) as human life will be
surrounded by artificial sensors which could be
communicating with mobile phones. 5G technology
use remote management that user can get better and
fast solution. The uploading and downloading
speed of 5Gtechnology is very high. • 5G
technology offer high resolution for crazy cell phone
user and bi-directional large bandwidth shaping. •
5G technology offer transporter class gateway with
unparalleled consistency.
VIII. CONCLUSION
The development of the mobile and wireless networks
is going towards higher data rates and all-IP principle.
Mobile terminals are obtaining each year more
processing power, more memory on board, and longer
battery life for the same applications. 5G include latest
technologies such as cognitive radio, SDR,
nanotechnology, cloud computing and based on All IP
Platform. It is expected that the initial Internet
philosophy of keeping the network simple as possible,
and giving more functionalities to the end nodes, will
become reality in the future generation of mobile
networks, here referred to as 5G.
REFERENCES
[1]. Khan, F., & Nakagawa, K. (2013). Comparative
study of spectrum sensing techniques in cognitive
radio networks. In Computer and Information
Technology (WCCIT), 2013 World Congress on (pp.
1-8). IEEE.
[2]. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual
head clustering scheme in wireless sensor networks.
In Emerging Technologies (ICET), 2012
International Conference on (pp. 1-5). IEEE.
[3]. Khan, F., Kamal, S. A., & Arif, F. (2013). Fairness
improvement in long chain multihop wireless ad hoc
networks. In 2013 International Conference on
Connected Vehicles and Expo (ICCVE) (pp. 556-
561). IEEE.
[4]. Khan, F. (2014). Secure communication and routing
architecture in wireless sensor networks. In 2014
IEEE 3rd Global Conference on Consumer
Electronics (GCCE) (pp. 647-650). IEEE.
[5]. M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC:
Priority-based application-specific congestion control
clustering protocol” Computer Networks, Vol. 74,
PP-92-102, 2014.
[6]. Khan, S., & Khan, F. (2015). Delay and Throughput
Improvement in Wireless Sensor and Actor
Networks. In 5th National Symposium on Information
Technology: Towards New Smart World
(NSITNSW) (pp. 1-8).
[7]. Khan, F., Jan, S. R., Tahir, M., Khan, S., & Ullah, F.
(2016). Survey: Dealing Non-Functional
Requirements at Architecture Level. VFAST
Transactions on Software Engineering, 9(2), 7-13.
[8]. Khan, F., & Nakagawa, K. (2012). Performance
Improvement in Cognitive Radio Sensor
Networks. the IEICE Japan.
[9]. Khan, F., Khan, S., & Khan, S. A. (2015, October).
Performance improvement in wireless sensor and
actor networks based on actor repositioning. In 2015
International Conference on Connected Vehicles and
Expo (ICCVE) (pp. 134-139). IEEE.
[10]. M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil
Attack Detection Scheme for a Centralized
Clustering-based Hierarchical Network” in
Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325,
2015, IEEE.
[11]. Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016).
Performance Improvement in Multihop Wireless
Mobile Adhoc Networks. the Journal Applied,
Environmental, and Biological Sciences
(JAEBS), 6(4S), 82-92.
[12]. Khan, F. (2014, May). Fairness and throughput
improvement in multihop wireless ad hoc networks.
5. International Journal of Science and Engineering Applications
Volume 5 Issue 5, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 288
In Electrical and Computer Engineering (CCECE),
2014 IEEE 27th Canadian Conference on (pp. 1-6).
IEEE.
[13]. Khan, S., Khan, F., Arif, F., Q., Jan, M. A., & Khan,
S. A. (2016). Performance Improvement in Wireless
Sensor and Actor Networks. Journal of Applied
Environmental and Biological Sciences, 6(4S), 191-
200.
[14]. Khan, F., & Nakagawa, K. (2012). B-8-10
Cooperative Spectrum Sensing Techniques in
Cognitive Radio
Networks. 電子情報通信学会ソサイエティ大会講
演論文集, 2012(2), 152.
[15]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A
Lightweight Mutual Authentication Scheme for IoT
Objects,” Elsevier Future Generation Computer
Systems (FGCS), “Submitted”, 2016.
[16]. Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015,
October). Applications, limitations, and
improvements in visible light communication
systems. In2015 International Conference on
Connected Vehicles and Expo (ICCVE)(pp. 259-262).
IEEE.
[17]. Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S.
R., & Ullah, F. (2016). A Survey: Embedded Systems
Supporting By Different Operating Systems.
International Journal of Scientific Research in
Science, Engineering and Technology (IJSRSET),
Print ISSN, 2395-1990.
[18]. Jan, S. R., Ullah, F., Ali, H., & Khan, F. (2016).
Enhanced and Effective Learning through Mobile
Learning an Insight into Students Perception of
Mobile Learning at University Level. International
Journal of Scientific Research in Science,
Engineering and Technology (IJSRSET), Print ISSN,
2395-1990.
[19]. Jan, S. R., Khan, F., & Zaman, A. The perception of
students about mobile learning at University level.
[20]. M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A Sybil
Attack Detection Scheme for a Forest Wildfire
Monitoring Application,” Elsevier Future Generation
Computer Systems (FGCS), “Accepted”, 2016.
[21]. Jan, S. R., Shah, S. T. U., Johar, Z. U., Shah, Y., &
Khan, F. (2016). An Innovative Approach to
Investigate Various Software Testing Techniques and
Strategies. International Journal of Scientific
Research in Science, Engineering and Technology
(IJSRSET), Print ISSN, 2395-1990.
[22]. Khan, I. A., Safdar, M., Ullah, F., Jan, S. R., Khan,
F., & Shah, S. (2016). Request-Response Interaction
Model in Constrained Networks. In International
Journal of Advance Research and Innovative Ideas in
Education, Online ISSN-2395-4396
[23]. Azeem, N., Ahmad, I., Jan, S. R., Tahir, M., Ullah,
F., & Khan, F. (2016). A New Robust Video
Watermarking Technique Using H. 264/AAC Codec
Luma Components Based On DCT. In International
Journal of Advance Research and Innovative Ideas in
Education, Online ISSN-2395-4396
[24]. Drira, Wassim, Deepak Puthal, and Fethi Filali.
"ADCS: An adaptive data collection scheme in
vehicular networks using 3G/LTE." In 2014
International Conference on Connected Vehicles and
Expo (ICCVE), pp. 753-758. IEEE, 2014.
[25]. Jan, S. R., Khan, F., Ullah, F., Azim, N., & Tahir, M.
(2016). Using CoAP Protocol for Resource
Observation in IoT. International Journal of
Emerging Technology in Computer Science &
Electronics, ISSN: 0976-1353
[26]. Azim, N., Majid, A., Khan, F., Jan, S. R., Tahir, M.,
& Jabeen, Q. (2016). People Factors in Agile
Software Development and Project Management. In
International Journal of Emerging Technology in
Computer Science & Electronics (IJETCSE) ISSN:
0976-1353
[27]. Azim, N., Majid, A., Khan, F., Tahir, M., Safdar, M.,
& Jabeen, Q. (2016). Routing of Mobile Hosts in
Adhoc Networks. In International Journal of
Emerging Technology in Computer Science &
Electronics (IJETCSE) ISSN: 0976-1353.
[28]. Azim, N., Khan, A., Khan, F., Majid, A., Jan, S. R., &
Tahir, M. (2016) Offsite 2-Way Data Replication
toward Improving Data Refresh Performance. In
International Journal of Engineering Trends and
Applications, ISSN: 2393 – 9516
[29]. Tahir, M., Khan, F., Jan, S. R., Azim, N., Khan, I. A.,
& Ullah, F. (2016) EEC: Evaluation of Energy
Consumption in Wireless Sensor Networks. . In
International Journal of Engineering Trends and
Applications, ISSN: 2393 – 9516
[30]. Puthal, Deepak, B. P. S. Sahoo, Sambit Mishra, and
Satyabrata Swain. "Cloud computing features, issues,
and challenges: a big picture." InComputational
Intelligence and Networks (CINE), 2015
International Conference on, pp. 116-123. IEEE,
2015.
[31]. M. A. Jan, P. Nanda, M. Usman, and X. He, “PAWN:
A Payload-based mutual Authentication scheme for
Wireless Sensor Networks,” Concurrency and
Computation: Practice and Experience, “accepted”,
2016.
[32]. Azim, N., Qureshi, Y., Khan, F., Tahir, M., Jan, S. R.,
& Majid, A. (2016) Offsite One Way Data
Replication towards Improving Data Refresh
Performance. In International Journal of Computer
Science Trends and Technology, ISSN: 2347-8578
[33]. Safdar, M., Khan, I. A., Ullah, F., Khan, F., & Jan, S.
R. (2016) Comparative Study of Routing Protocols in
Mobile Adhoc Networks. In International Journal of
Computer Science Trends and Technology, ISSN:
2347-8578
[34]. Tahir, M., Khan, F., Babar, M., Arif, F., Khan, F.,
(2016) Framework for Better Reusability in
Component Based Software Engineering. In the
Journal of Applied Environmental and Biological
6. International Journal of Science and Engineering Applications
Volume 5 Issue 5, 2016, ISSN-2319-7560 (Online)
www.ijsea.com 289
Sciences (JAEBS), 6(4S), 77-81.
[35]. Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M.
(2016). Collaboration Methodology for Integrating
Non-Functional Requirements in Architecture. In the
Journal of Applied Environmental and Biological
Sciences (JAEBS), 6(4S), 63-67
[36]. Puthal, Deepak, Zeeshan Hameed Mir, Fethi Filali,
and Hamid Menouar. "Cross-layer architecture for
congestion control in Vehicular Ad-hoc Networks."
In 2013 International Conference on Connected
Vehicles and Expo (ICCVE), pp. 887-892. IEEE,
2013.
[37]. Jan, S.R., Ullah, F., Khan, F., Azim, N., Tahir, M.,
Khan, S., Safdar, M. (2016). Applications and
Challenges Faced by Internet of Things- A Survey. In
the International Journal of Engineering Trends and
Applications, ISSN: 2393 – 9516
[38]. Tahir, M., Khan, F., Jan, S.R., Khan, I.A., Azim, N.
(2016). Inter-Relationship between Energy Efficient
Routing and Secure Communication in WSN. In
International Journal of Emerging Technology in
Computer Science & Electronics (IJETCSE) ISSN:
0976-1353.