The document summarizes the evolution of mobile generations from 0G to 5G and discusses how cognitive radio can help enable 5G networks. It describes the key technologies and capabilities of each generation from 0G to 4G. 5G is proposed as a solution to efficiently handle the increasing number of smart devices. Cognitive radio is presented as the backbone of 5G networks, as it can dynamically allocate spectrum when the primary user is absent. The combination of 5G and cognitive radio can provide high quality of service, high data rates, flexibility and adaptability.
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
5G–“connect anytime, anywhere, anyhow” promising everywhere network access at high speed to the end users, has been a topic of great interest mainly for the wireless telecom industry. 5G seems to be the solution for the growing user necessities of wireless broadband access and the boundaries of the existing wireless communication system. The wireless industry is busy with the standardization of the 4th generation (4G) cellular networks. 4G wireless system cannot exist in today’s market without standardization. The 4G concept shave already moved to the standardization phase, we must begin to work on the structure blocks of the 5G wireless networks. The major difference, from a user point of view, between current generations and expected 5G techniques must be something else than increased maximum throughput; other requirements include low battery consumption, more secure. We refer to this goal as enabling the 4A’s paradigm i.e. Any rate, Anytime, Anywhere and Affordable. In particular, this paper focuses on the features such as broadband internet in mobile phones with a possibility to provide internet facility in the computer by just connecting the mobile and with a speed of 10Gbps and more. In 5G researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless World.
Energy efficient power control for device to device communication in 5G netw...IJECEIAES
Next generation cellular networks require high capacity, enhanced efficiency of energy and guaranteed quality of service (QoS). To reach these goals, device-to device (D2D) communication is a candidate technologie for future 5th Generation especially applications that require the reuse, the hop and the proximity gain. The present paper studies the energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) system composed of both regular cellular users and device-to-device (D2D) pairs. First, we analyze and model mathematically the prerequisites for D2D communications and classical cellular links in terms of minimum rate and maximum power requirement. Second, we use fractional programming in order to convert the initial problem into a concave one and we apply non-cooperative game theory in order to characterize the equilibrium. Then, we got the solution of the problem from the results of a water-filling power allocation. Moreover, we employ a distributed design for power allocation by means of three methods: a) Theory of fractional programming b) Closed form expression (the novelty is the use of Wright Omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are realized to demontrate the enhanced gain in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
A Survey on new generation of wireless networksEditor IJMTER
If you think that 4G and LTE is the best thing and it's in the process of solving every
communication needs we have today, think again! Yes, LTE is good, but it can be a lot better. In fact,
get ready for this: the wireless industry is already starting to think 5G (5th generation) wireless
technology.
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
5G–“connect anytime, anywhere, anyhow” promising everywhere network access at high speed to the end users, has been a topic of great interest mainly for the wireless telecom industry. 5G seems to be the solution for the growing user necessities of wireless broadband access and the boundaries of the existing wireless communication system. The wireless industry is busy with the standardization of the 4th generation (4G) cellular networks. 4G wireless system cannot exist in today’s market without standardization. The 4G concept shave already moved to the standardization phase, we must begin to work on the structure blocks of the 5G wireless networks. The major difference, from a user point of view, between current generations and expected 5G techniques must be something else than increased maximum throughput; other requirements include low battery consumption, more secure. We refer to this goal as enabling the 4A’s paradigm i.e. Any rate, Anytime, Anywhere and Affordable. In particular, this paper focuses on the features such as broadband internet in mobile phones with a possibility to provide internet facility in the computer by just connecting the mobile and with a speed of 10Gbps and more. In 5G researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless World.
Energy efficient power control for device to device communication in 5G netw...IJECEIAES
Next generation cellular networks require high capacity, enhanced efficiency of energy and guaranteed quality of service (QoS). To reach these goals, device-to device (D2D) communication is a candidate technologie for future 5th Generation especially applications that require the reuse, the hop and the proximity gain. The present paper studies the energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) system composed of both regular cellular users and device-to-device (D2D) pairs. First, we analyze and model mathematically the prerequisites for D2D communications and classical cellular links in terms of minimum rate and maximum power requirement. Second, we use fractional programming in order to convert the initial problem into a concave one and we apply non-cooperative game theory in order to characterize the equilibrium. Then, we got the solution of the problem from the results of a water-filling power allocation. Moreover, we employ a distributed design for power allocation by means of three methods: a) Theory of fractional programming b) Closed form expression (the novelty is the use of Wright Omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are realized to demontrate the enhanced gain in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
A Survey on new generation of wireless networksEditor IJMTER
If you think that 4G and LTE is the best thing and it's in the process of solving every
communication needs we have today, think again! Yes, LTE is good, but it can be a lot better. In fact,
get ready for this: the wireless industry is already starting to think 5G (5th generation) wireless
technology.
5G Wireless Technology- An overview of the current TrendsEditor IJCATR
5G Wireless technology networks or 5th Generation wireless systems which is used for videos and audios
communication announcement the next major time period of mobile telecommunications Criterions time the current next
Generation mobile networks confederated .in this paper we are studying different Technologies in 5G The handover of 5G the
Models of 5G its architecture, its different components and METIS Task Force Networks. 2-Day video recording is available. Its
components access/backhaul integration, direct device-to-device communication, flexible duplex, flexible spectrum usage multiantenna
transmission, ultra-lean design, user/control separation architecture of 5G is highly advanced, its network elements and
various terminals are characteristically upgraded to afford a new situation. Likewise, service providers can implement the advance
technology to adopt the value-added services easily.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Power Consumption Modeling and Analysis of Integrated Optical-Wireless Access...IJECEIAES
The integration of optical and wireless technologies at access networks are considered as a future solution which provide both high bandwidth and high mobility in an efficient way. GPON is a suitable candidate for optical backhaul due to the combination of higher data rates, greater split ratio and support for triple play services hence it offers maximum flexibility and cost advantages. On the other hand, recent developments of new radio access technologies and introduction of femtocell base stations provide the potential of offering broadband services and applications to everyone and everywhere. However, the power consumption of this network demands a particular attention because access networks are the largest contributor the network related electricity consumption. Therefore, in this paper we evaluate the power consumption of integrated optical-wireless access network which is based on independent ONU-BS architecture. We proposed a power consumption model for such network and the assessment has been done under different simulation scenarios. The constructed model will provide insight of the energy performance of the integrated access network so that in the network design process, focus can be done to the most energy saving strategies.
The relay stations are widely used in major wireless technologies such as WiMAX (Worldwide Interoperability for Microwave Access) and LTE (Long term evolution) which provide cost effective service to the operators and end users. It is quite challenging to provide guaranteed Quality of Service (QoS) in WiMAX networks in cost effective manner.
Abstract: With the expanding requests in the field of versatile and information interchanges, the sole point is to associate clients as quick as could be expected under the circumstances. 4G gives high portability fast information rates furthermore underpins high limit IP-based administrations and applications while it too keeps up full in reverse similarity. It is additionally in light of remote correspondence that is IP construct and is slated in light of Advanced MIMO innovation. WiMAX, LTE, Advanced LTE Technologies, and so forth are part of 4G. In this paper, we depict what the 4G innovation really is counting its Technical perspectives, Key Features, Challenges, and so forth and how simple it is to execute 4G demonstrating its Cost viability. A few suggestions has been made with a specific end goal to comprehend the best possible focal points and difficulties of 4G System for powerful usage, for e.g.: 4G Network access requires expansive number of Transmitters and Collectors in the Device which bring about substantial utilization of battery. This paper underscores on such obliges and its evacuation. Further, use of multimode programming is clarified by which diverse systems can be kept up. Another proposition of Coding Strategies for 4G Wireless Networks if there should be an occurrence of Video is specified in the paper. At last, a depiction of Future Technologies, for example, 5G, 6G and 7G has been given which has monstrous degree for creative examination and improvement.
Mobile technology g, e, 3 g, 3g +, h, h + or 4g _4g bd _ third and fourth gen...www.4g-bd.com
Those who use a smartphone ( especially those who do it for the first time ) at some time have wondered who those letters ( G, E, 3G, 3G +, H, H + or 4G ) displayed next to the time in top, which also shows other information such as call coverage, time, battery, etc ...
http://www.4g-bd.com/2014/09/mobile-technology-g-e-3g-h-4g.html#sthash.kDJLtxcq.dpbs
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...Rakesh Jha
In the near future, i.e., beyond 4G, some of the prime objectives or demands that need to
be addressed are increased capacity, improved data rate, decreased latency, and better quality of service.
To meet these demands, drastic improvements need to be made in cellular network architecture. This paper
presents the results of a detailed survey on the fth generation (5G) cellular network architecture and some
of the key emerging technologies that are helpful in improving the architecture and meeting the demands of
users. In this detailed survey, the prime focus is on the 5G cellular network architecture, massive multiple
input multiple output technology, and device-to-device communication (D2D). Along with this, some of the
emerging technologies that are addressed in this paper include interference management, spectrum sharing
with cognitive radio, ultra-dense networks, multi-radio access technology association, full duplex radios,
millimeter wave solutions for 5G cellular networks, and cloud technologies for 5G radio access networks
and software dened networks. In this paper, a general probable 5G cellular network architecture is proposed,
which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of
5G cellular network architecture. A detailed survey is included regarding current research projects being
conducted in different countries by research groups and institutions that are working on 5G technologies.
A national crisis the state of computer science and information technology in...NAFCareerAcads
This session will explore the trends in the workforce for computing specialists as defined
by the U.S. Department of Labor and look at the pipeline to fill the nearly one and a half
million positions that will become available over the next six to eight years. Participants
will learn the approaches and resources available to deal with this problem.
5G Wireless Technology- An overview of the current TrendsEditor IJCATR
5G Wireless technology networks or 5th Generation wireless systems which is used for videos and audios
communication announcement the next major time period of mobile telecommunications Criterions time the current next
Generation mobile networks confederated .in this paper we are studying different Technologies in 5G The handover of 5G the
Models of 5G its architecture, its different components and METIS Task Force Networks. 2-Day video recording is available. Its
components access/backhaul integration, direct device-to-device communication, flexible duplex, flexible spectrum usage multiantenna
transmission, ultra-lean design, user/control separation architecture of 5G is highly advanced, its network elements and
various terminals are characteristically upgraded to afford a new situation. Likewise, service providers can implement the advance
technology to adopt the value-added services easily.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Power Consumption Modeling and Analysis of Integrated Optical-Wireless Access...IJECEIAES
The integration of optical and wireless technologies at access networks are considered as a future solution which provide both high bandwidth and high mobility in an efficient way. GPON is a suitable candidate for optical backhaul due to the combination of higher data rates, greater split ratio and support for triple play services hence it offers maximum flexibility and cost advantages. On the other hand, recent developments of new radio access technologies and introduction of femtocell base stations provide the potential of offering broadband services and applications to everyone and everywhere. However, the power consumption of this network demands a particular attention because access networks are the largest contributor the network related electricity consumption. Therefore, in this paper we evaluate the power consumption of integrated optical-wireless access network which is based on independent ONU-BS architecture. We proposed a power consumption model for such network and the assessment has been done under different simulation scenarios. The constructed model will provide insight of the energy performance of the integrated access network so that in the network design process, focus can be done to the most energy saving strategies.
The relay stations are widely used in major wireless technologies such as WiMAX (Worldwide Interoperability for Microwave Access) and LTE (Long term evolution) which provide cost effective service to the operators and end users. It is quite challenging to provide guaranteed Quality of Service (QoS) in WiMAX networks in cost effective manner.
Abstract: With the expanding requests in the field of versatile and information interchanges, the sole point is to associate clients as quick as could be expected under the circumstances. 4G gives high portability fast information rates furthermore underpins high limit IP-based administrations and applications while it too keeps up full in reverse similarity. It is additionally in light of remote correspondence that is IP construct and is slated in light of Advanced MIMO innovation. WiMAX, LTE, Advanced LTE Technologies, and so forth are part of 4G. In this paper, we depict what the 4G innovation really is counting its Technical perspectives, Key Features, Challenges, and so forth and how simple it is to execute 4G demonstrating its Cost viability. A few suggestions has been made with a specific end goal to comprehend the best possible focal points and difficulties of 4G System for powerful usage, for e.g.: 4G Network access requires expansive number of Transmitters and Collectors in the Device which bring about substantial utilization of battery. This paper underscores on such obliges and its evacuation. Further, use of multimode programming is clarified by which diverse systems can be kept up. Another proposition of Coding Strategies for 4G Wireless Networks if there should be an occurrence of Video is specified in the paper. At last, a depiction of Future Technologies, for example, 5G, 6G and 7G has been given which has monstrous degree for creative examination and improvement.
Mobile technology g, e, 3 g, 3g +, h, h + or 4g _4g bd _ third and fourth gen...www.4g-bd.com
Those who use a smartphone ( especially those who do it for the first time ) at some time have wondered who those letters ( G, E, 3G, 3G +, H, H + or 4G ) displayed next to the time in top, which also shows other information such as call coverage, time, battery, etc ...
http://www.4g-bd.com/2014/09/mobile-technology-g-e-3g-h-4g.html#sthash.kDJLtxcq.dpbs
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...Rakesh Jha
In the near future, i.e., beyond 4G, some of the prime objectives or demands that need to
be addressed are increased capacity, improved data rate, decreased latency, and better quality of service.
To meet these demands, drastic improvements need to be made in cellular network architecture. This paper
presents the results of a detailed survey on the fth generation (5G) cellular network architecture and some
of the key emerging technologies that are helpful in improving the architecture and meeting the demands of
users. In this detailed survey, the prime focus is on the 5G cellular network architecture, massive multiple
input multiple output technology, and device-to-device communication (D2D). Along with this, some of the
emerging technologies that are addressed in this paper include interference management, spectrum sharing
with cognitive radio, ultra-dense networks, multi-radio access technology association, full duplex radios,
millimeter wave solutions for 5G cellular networks, and cloud technologies for 5G radio access networks
and software dened networks. In this paper, a general probable 5G cellular network architecture is proposed,
which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of
5G cellular network architecture. A detailed survey is included regarding current research projects being
conducted in different countries by research groups and institutions that are working on 5G technologies.
A national crisis the state of computer science and information technology in...NAFCareerAcads
This session will explore the trends in the workforce for computing specialists as defined
by the U.S. Department of Labor and look at the pipeline to fill the nearly one and a half
million positions that will become available over the next six to eight years. Participants
will learn the approaches and resources available to deal with this problem.
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
In this paper, a semi-blind watermarking technique of embedding the color watermark using curvelet
coefficient in RGB cover image has been proposed. The technique used the concept of HVS that the human
eyes are not much sensitive to blue color. So the blue color plane of the cover image is used as embedding
domain. A bit planes method is also used, the most significant bit (MSB) plane of watermark image is used
as embedding information. Selected scale and orientation of the curvelet coefficients of the blue channel in
the cover image has been used for embedding the watermark information. All other 0-7 bit planes are used
as a key at the time of extraction. The results of the watermarking scheme have been analyzed by different
quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index
Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of
watermark, quality of extracted watermark and robustness against different attacks.
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...ijfls
In this paper we introduce a new operation on alpha cut for a symmetric hexagonal fuzzy numbers. We
considered a transportation problem where the fuzzy demand and supply are in symmetric hexagonal fuzzy
numbers and the minimum optimal cost is arrived .Transportation problems have various purposes in
logistics and supply process for reducing the transportation cost’s The advantages of the proposed alpha
cut operations over existing methods is simpler and computationally more efficient in day to day
applications.
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer Science & Technology. Over the last decade, there has been an explosion in the field of computer science to solve various problems from mathematics to engineering. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
International Journal of Fuzzy Logic Systems (IJFLS) ijfls
International Journal of Fuzzy Logic Systems (IJFLS) is an open access peer-reviewed journal that covers all topics in theoretical, experimental and applied fuzzy techniques and systems. It is aimed to bring together researchers and developers from both academia and industry to discuss the latest scientific and theoretical advances in this field, and to demonstrate the state-of-the-art systems. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
Best Engineering Colleges of Computer science – GNIOTGniot group
The Department of computer science has well equipped laboratories with facilities such as servers, workstations, thin clients, mobile terminals, desktops, high speed internet and networking devices.
This presentation introduces the Basics of Cryptography and Network Security concepts. Heavily derived from content from William Stalling's book with the same title.
Delivered at the Network & Services Management Conference in Bonn, Germany on December 6th 2016. It comprises Deutsche Telekom's strategy and vision as it relates to real time network & services management and aggressive automation through AI and applied machine learning. It is fairly high-level but does include reference for further study and read-up, particular towards IETF and RTC publications.
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...josephjonse
No country wants to be left behind in the tech war as there may be far-reaching consequences in military, health, and well-being, industrial applications, technology, banking, financial services, urbanization, and other facets of private and national life. For an emergent country like Nigeria, the cost of being left behind is enormous and may mean the continuous peril of underdevelopment wrought by over-dependence on other nations for essential services. This paper provides perspectives on sectors where the deployment of the 5G telecommunication network could be a swift driver of an emergent Nigeria. It also highlights the particular challenges facing the deployment of the 5G technology in Nigeria. The study adopted the use of secondary sources to obtain relevant preexisting data to facilitate the research objectives. Restrictions in movement necessitated this approach to curtail the spread of the Coronavirus. The research findings revealed the enormous multi-sectorial benefits of deploying the 5G technology in an emergent Nigeria and the inherent challenges. It is envisaged that the ideas highlighted in the study findings would provide useful guidance for policy directors in the quest for a better emergent Nigeria.
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...josephjonse
No country wants to be left behind in the tech war as there may be far-reaching consequences in military, health, and well-being, industrial applications, technology, banking, financial services, urbanization, and other facets of private and national life. For an emergent country like Nigeria, the cost of being left behind is enormous and may mean the continuous peril of underdevelopment wrought by over-dependence on other nations for essential services. This paper provides perspectives on sectors where the deployment of the 5G telecommunication network could be a swift driver of an emergent Nigeria. It also highlights the particular challenges facing the deployment of the 5G technology in Nigeria. The study adopted the use of secondary sources to obtain relevant preexisting data to facilitate the research objectives. Restrictions in movement necessitated this approach to curtail the spread of the Coronavirus. The research findings revealed the enormous multi-sectorial benefits of deploying the 5G technology in an emergent Nigeria and the inherent challenges. It is envisaged that the ideas highlighted in the study findings would provide useful guidance for policy directors in the quest for a better emergent Nigeria.
This presentation will enlighten upcoming 5g technology.
covers about history and upcoming future of 5G technology. Describes its uses and impacts on society.
Performance analysis of smart optimization antenna for wireless networks IJECEIAES
Antenna design has significantly advanced as a result of the widespread need for wireless communications and data substitution through wireless devices. The research article's goal is to provide a conceptual framework, difficulties, and opportunities for a source as well as a general overview of the antenna used in wireless communications applications. In this proposed research, we will go over a variety of topics related to mobile communication and fifth generation (5G) technologies, including its pros and benefits. A thorough comparison between the expected properties of the antennas and each generation, from 1 st generation (1G) to 5G, is also included. This article also provides an overview of the investigated 5G technologies and various antenna designs.
Today wireless services are the most preferred services of the world. The rapid increase in
the service is due to the advancement of technology consecutively. As a subscriber becomes more
aware of the mobile phone technology, he/she will seek for an appropriate package all together, and
including all the advanced features of a cellular phone can have. Hence, the search for new
technology is always the main intention of the prime cell phone giants to out innovate their
competitors. In addition, the main purpose of the fifth generation wireless networks (5G Wireless
networks) is planned to design the best wireless world that is free from limitations and hindrance of
the previous generations. 5G technologies will change the way most high bandwidth users access
their Mobile Radio Communication (MRC). So, this paper represents, great evolution of 1G (First
Generation) to 4G yield 5G, introduction to 5G technologies, why there is a need for 5G, advantages
of 5G networks technology, exceptional applications, Quality of Service (QoS), 5G network
architecture.
A study of 5 g network structural design, challenges and promising technologi...IJARIIT
In the near prospect, beyond 4G has the major objectives or difficulty that need to be addressed are improved
capacity, better data rate, decreased latency, and enhanced quality of service. To meet these demands, radical improvements
need to be made in cellular network architecture. This paper presents the consequences of a detailed study on the fifth
generation (5G) cellular network structural design, challenges and some of the solution for promising technologies that are
supportive in improving the structural design and gathering the demands of users. In this comprehensive review focuses 5G
cellular network architecture, huge various input many output technologies, and device-to-device communication (D2D). Next,
to with this, some of the promising technologies that are addressed in this paper include intrusion supervision, variety sharing
with cognitive radio, ultra-dense networks, multi-radio access technology organization, full duplex radios, and millimeter wave
solutions for 5G cellular networks. In this paper, a universal possible 5G cellular set of connections architecture is proposed,
which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of 5G cellular network
architecture. A comprehensive study is integrated concerning present research projects being conducted in different countries
by research groups and institutions that are working on 5G technologies. Finally, this paper describes cloud technologies for 5G radio access networks and software defined networks.
Customer needs more from the innovation. The innovation which are use resemble TV, Clothes washer, cooler, Mobile Phones. The most needed element of web is acceptable execution and quicker access. The Cellular Subscriber pay extra for the moment include and the entrance of web on their telephones. To help such ground breaking framework we need fast remote network. A remote innovation is bow quick nowadays. An as of late wired system was expected to get on the web. These days, Mobile systems are progressed in last four decades. The cell idea which was present with 1G where G represents age organize. It has increments quicker from age to age, which are 1G,2G,3G, lastly come to 4G. Pradnya Pramod Mohite "5G System-Trends & Development" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30411.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-network/30411/5g-systemtrends-and-development/pradnya-pramod-mohite
This is the report part 2 of presentation. It talks about the basic functional architecture, 5G architecture, 5G network layers and the hardware & software components of 5G.
[email protected]Received December 4, 2019, accepted JanuaTatianaMajor22
[email protected]
Received December 4, 2019, accepted January 7, 2020, date of publication January 13, 2020, date of current version January 24, 2020.
Digital Object Identifier 10.1109/ACCESS.2020.2966271
5G Technology: Towards Dynamic Spectrum
Sharing Using Cognitive Radio Networks
W. S. H. M. W. AHMAD 1, N. A. M. RADZI 1,2, (Senior Member, IEEE), F. S. SAMIDI1,
A. ISMAIL 1,2, (Member, IEEE), F. ABDULLAH 1,2, (Senior Member, IEEE),
M. Z. JAMALUDIN1,2, (Senior Member, IEEE), AND M. N. ZAKARIA3
1Institute of Power Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
2Electrical and Electronics Engineering Department, College of Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
3Architecture and Governance, Tenaga Nasional Berhad Information and Communication Technology (TNB ICT), Kuala Lumpur 59200, Malaysia
Corresponding author: N. A. M. Radzi ([email protected])
This work was supported in part by UNITEN R & D Sdn Bhd through Tenaga Nasional Berhad Seed Fund under Grant U-TC-RD-19-04,
and in part by the Universiti Tenaga Nasional BOLD2025 under Grant 10436494/B/2019019.
ABSTRACT The explosive popularity of small-cell and Internet of Everything devices has tremendously
increased traffic loads. This increase has revolutionised the current network into 5G technology, which
demands increased capacity, high data rate and ultra-low latency. Two of the research focus areas for meeting
these demands are exploring the spectrum resource and maximising the utilisation of its bands. However,
the scarcity of the spectrum resource creates a serious challenge in achieving an efficient management
scheme. This work aims to conduct an in-depth survey on recent spectrum sharing (SS) technologies
towards 5G development and recent 5G-enabling technologies. SS techniques are classified, and SS surveys
and related studies on SS techniques relevant to 5G networks are reviewed. The surveys and studies are
categorised into one of the main SS techniques on the basis of network architecture, spectrum allocation
behaviour and spectrum access method. Moreover, a detailed survey on cognitive radio (CR) technology
in SS related to 5G implementation is performed. For a complete survey, discussions are conducted on the
issues and challenges in the current implementation of SS and CR, and the means to support efficient 5G
advancement are provided.
INDEX TERMS 5G, new radio, spectrum sharing, spectrum efficiency, cognitive radio, enabling
technologies.
I. INTRODUCTION
5G is the next-generation mobile communication technol-
ogy designed to provide greater capacity and higher data
speeds than the previous generation Long Term Evolution
(LTE). 5G technology, which is expected to be realised
by 2020 [1], [2], promises ultra-low latency and ultra-
high reliability, thus enabling innovative services across
different industry sectors [3]. 5G standards are currently
under development and will include the evolution of exist-
ing LTE and 5G New Radio (N ...
Novel evaluation framework for sensing spread spectrum in cognitive radioIJECEIAES
The cognitive radio network is designed to cater to the optimization demands of restricted spectrum availability. A review of existing literature on spectrum sensing shows that there is still a broader scope for its improvement. Therefore, this paper introduces an efficient computational framework capable of evaluating the effectiveness of the spread spectrum concept in the context of cognitive radio network in a more scalable and granular way. The proposed method introduces a dual hypothesis using a different set of dependable parameters to emphasize the detection of optimal energy for a low signal quality state over the noise. The proposed evaluation framework is benchmarked using a statistical analysis method not present in any existing approaches toward spread spectrum sensing. The simulated outcome of the study exhibits that the proposed system offers a significantly better probability of detection than the current system using a simplified evaluation scheme with multiple test parameters.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Digital Artifact 2 - Investigating Pavilion Designs
JOURNEY OF MOBILE GENERATION AND COGNITIVE RADIO TECHNOLOGY IN 5G
1. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
DOI : 10.5121/ijmnct.2016.6601 1
JOURNEY OF MOBILE GENERATION AND
COGNITIVE RADIO TECHNOLOGY IN 5G
Parnika De and Shailendra Singh
Department of Engineering and Application, National Institute of Technical Teacher
Training and Research, Bhopal, India.
ABSTRACT
The ever increasing number of smart network devices may reach up to 24 billion in year 2020 as stated in
the recent survey conducted by Forbes magazine. This may obsolete the current 4G technology for
handling smart bandwidth allocation to such a large number of devices. In order to cope the challenging
need for fast and efficient data transfer over these devices, demands next generation mobile network
technology. In literature 5G technology has been suggested that offers appropriate solution to the above
issues. 5G is a futuristic technology that would solve many problem of day to day life. By using 5G high
data rates can be achieved in the range of Gbps with minimal latency. But the question is how to make such
futuristic technology realistic. This can be done by efficiently utilizing the bandwidth in the allotted
spectrum. Despite numerous benefits, 5G may critically suffer from tedious implementation problems that
have been discussed in this paper. Cognitive radio (CR) is an intelligent radio that works on the principle
of dynamic spectrum allocation. Cognitive Radio is capable of learning and adapting to external
environment and reuses the frequency when primary user is absent. This paper combine the advantage of
two technology 5G terminal and Cognitive radio terminal where 5G provide quality of service and high
data rate whereas Cognitive radio give flexibility and adaptability to 5G.
KEYWORDS
5G, Cognitive Radio, Spectrum Sensing, Resource Allocation
1. INTRODUCTION
Inception of wireless technology happened in 1970s [1]. Technological advancement in mobile
wireless technology is classified into different generation. All of it started from 1G technology
soon followed by 2G technology in which analog signal communication is replaced with digital
signal communication. Data and voice simultaneous communication is allowed in 3G.4G
technology which provide ultra-broadband network and matches demand of new network
equipment. But in this era of networking, with increasing number of smart devices connecting to
the network every day, even coming 4G technology cannot handle the network load efficiently.
Solution of the problem for efficient and faster data transfer comes in the form of a new
generation network technology called as 5G mobile network. 5G is next generation mobile
Communication network which has been proposed to bring together the existing wireless and
wired communication into an all Internet protocol high performance worldwide network. The
fifth generation mobile network technology is based on cognitive radio (CR). CR act as backbone
for 5G network and provide very good solution to the spectrum utilization. CR is an intelligent
radio that works on principle of intelligent implementation of resources. Cognitive Radio is
capable of learning and adapting to external environment and reuses the frequency when primary
user is absent.
2. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
2
2. LITERATURE SURVEY
Major concern of research paper is to highlight about three major topic i.e. 5G, Cognitive Radio
and 5G using Cognitive Radio. Since the proposal of 5G and Cognitive Radio research
community has contributed a lot covering almost all major topics from both the domain. 5G using
Cognitive Radio is quite a newbie, so still there exist vast scope of research which includes
discovering areas for implementing CR in 5G, Suitable algorithm for 5G and many other areas
are yet waiting for discovery. Since there exist enormous amount of work done in the all the three
area, literature review only covers about recent and basic research work done. There exist no
clear history when it was proposed but some of the starting program for its implementation has
been started in year 2008 by NASA and south Korean agency [2]. After the proposal of 5G many
researcher started looking 5G as the solution all the futuristic mobile communication problem.
Hence in result many research proposal and paper came discovering various scope of the 5G
network. In [3]–[9] authors has discussed about different mobile generation, they also suggested
about use of 5G up to year 2013 and 2014 because of the data traffic. This survey paper is one of
the pioneer research paper suggesting about use of 5G in coming future. Like any other network
5G has its own features and requirements keeping this in mind many researchers has suggested
about features, requirement and kind of technologies adopted for fulfilling these requirements,
these topics were already discussed in the section 3 of paper. Based on earlier research papers
works three Indian researchers has proposed specific protocols for each of the OSI layer [7] ,
Table 1. Showing Stack Protocol and Services available at the Particular Layer
After this paper many protocols were proposed at each level, with major concern of the authors as
physical layer [10]–[13] and application layer as major concern some of the university thesis has
tried to suggest protocols and services at the physical layer, one such thesis is proposed [14]
which take care of smartest allocation of resources providing smartest bandwidth allocation
service.
Idea of Cognitive radio was proposed by Mitola in his paper [15] along with Gerald Q. Maguire
Jr. basic goal behind proposal is efficient utilization of resources. For maintaining proper
utilization of resources there must exist communication between different network devices for
that Mitola has proposed a new language called as RKRL (radio language representation
language), carrying forward the research work of Mitola, FingGe and et.al [16] has proposed a
new cognitive engine based method was suggested which collects data from different sensor and
tried to optimize the network. As explained in the section 6 one of the major cognitive radio
implementations is found in the spectrum sensing in literature also many researcher has used
cognitive radio for spectrum sensing and then spectrum allocation with the help of data collected
at the physical layer [16]–[18].After wide literature survey, we have concluded as par our
knowledge about CR using 5G, there exist not much work done in this area, in one of the paper
[19] researchers has tried to made bridge between both the concept with the help of similarities
between both the techniques and in another work researchers were discussing about effect of
3. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
using CR into 5G. They have done analysis of various architecture and trade
efficiency and energy efficiency
parts, comparison is shown in the table. Along with the cognitive radio in parallel, other were also
working to increase efficiency of network paradigm one such technology is smart antenna also
known from the name intelligent antenna, it is consider as on
radio. Smart antenna was firstly used in the 1980’s for military application up to 1990’s it is
available or the commercial application with basic principle explained as follows: “analysis of
signal directional with the help of signal processing and can adapt itself using beam forming
techniques” [21] . There is generally two type of smart antenna switched beam and adaptive array
[21]. Due to certain demerits it is not preferred over cognitiv
in detail the [22] such as expensive, larger in size, complex for implementation and adjustment of
location for optimal operation. Now a days
take advantages of both cognitive radio and smart antennas.
Table 2. Comparison between Licensed a
3. MOBILE GENERATIONS
Telephone remained most popular mode of communication until dawn of wireless
communication. Marconi known as father of wirel
late 19th
century [8]. Wireless technology is divided in to three periods accordi
technologies adopted.
Figure 1.
Other than zeroth generation of mobile technology all others belong to cellular era. Dawn of
cellular technology brought new revolution in wireless communication. Through cellular
technology re-allocation of frequency band is possible which in turn gives features of reusability
of frequencies and saves energy.
3.1 ZEROTH GENERATION (0G
Zeroth Generation Technology also know
analog signal for communication as a carrier of information and it is based on public switched
telephone network. Since cellular technology was not invented until time this system belongs to
pre cellular era. Zeroth Generation is based on following mobile Technologies
Pioneer Era
International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
using CR into 5G. They have done analysis of various architecture and trade-off between spectral
and energy efficiency [20]. In discussion of topic they divided radio resource into two
parts, comparison is shown in the table. Along with the cognitive radio in parallel, other were also
working to increase efficiency of network paradigm one such technology is smart antenna also
known from the name intelligent antenna, it is consider as one of the most close rival of cognitive
radio. Smart antenna was firstly used in the 1980’s for military application up to 1990’s it is
available or the commercial application with basic principle explained as follows: “analysis of
the help of signal processing and can adapt itself using beam forming
. There is generally two type of smart antenna switched beam and adaptive array
. Due to certain demerits it is not preferred over cognitive radio. Disadvantages are discussed
such as expensive, larger in size, complex for implementation and adjustment of
r optimal operation. Now a days researchers are trying to develop system which can
ges of both cognitive radio and smart antennas.
2. Comparison between Licensed and Cognitive RR
ENERATIONS
Telephone remained most popular mode of communication until dawn of wireless
communication. Marconi known as father of wireless communication suggested these ideas in
. Wireless technology is divided in to three periods accordi
1. Different Period in Wireless Communication.
Other than zeroth generation of mobile technology all others belong to cellular era. Dawn of
cellular technology brought new revolution in wireless communication. Through cellular
allocation of frequency band is possible which in turn gives features of reusability
of frequencies and saves energy.
G)
Generation Technology also know from the name Mobile Radio Telephone System, uses
ommunication as a carrier of information and it is based on public switched
telephone network. Since cellular technology was not invented until time this system belongs to
pre cellular era. Zeroth Generation is based on following mobile Technologies Device
Pioneer Era • Before 1920
Pre- Cellular
Era
• 1920-1979
Cellular Era • After 1979
International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
3
off between spectral
. In discussion of topic they divided radio resource into two
parts, comparison is shown in the table. Along with the cognitive radio in parallel, other were also
working to increase efficiency of network paradigm one such technology is smart antenna also
e of the most close rival of cognitive
radio. Smart antenna was firstly used in the 1980’s for military application up to 1990’s it is
available or the commercial application with basic principle explained as follows: “analysis of
the help of signal processing and can adapt itself using beam forming
. There is generally two type of smart antenna switched beam and adaptive array
e radio. Disadvantages are discussed
such as expensive, larger in size, complex for implementation and adjustment of
researchers are trying to develop system which can
Telephone remained most popular mode of communication until dawn of wireless
ess communication suggested these ideas in
. Wireless technology is divided in to three periods according to its
Other than zeroth generation of mobile technology all others belong to cellular era. Dawn of
cellular technology brought new revolution in wireless communication. Through cellular
allocation of frequency band is possible which in turn gives features of reusability
from the name Mobile Radio Telephone System, uses
ommunication as a carrier of information and it is based on public switched
telephone network. Since cellular technology was not invented until time this system belongs to
Device has two
4. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
4
components Transceiver and Head. Transceiver is mounted on the roof of the vehicle and head is
component through which communication take place contains display, receiver and dial. System
support only 25 channels in the range of 20 KMs, hence it support only limited amount of users.
Following are the reasons due to which researchers and users felt the need of new mobile
technology [7]:
• Half duplex in nature i.e. only one user should be in active state other in passive state.
• Analog in nature affected by noise.
• Huge in size, so cumbersome to handle device.
• Roaming facilities is not supported Technologies
• Advance Mobile Telephone
• Mobile Telephone System (MTS)
• Mobile Telephone System D (MTSD)
• Land Mobile TeleFoni (OLT)
• Push to Talk (PTT)
• Improved Mobile Telephone Service (IMTS)
3.2 ZERO POINT FIVE GENERATION (0.5G)
Cellular technology was firstly deployed in 0.5G mobile technology with network divided in to
multiple zones, each zone is a cell of size 30 KMs leaving all other features almost same as that
of the 0G, because of limitations like bulky and expensive in nature. Autotel came into existence
also known as PALM (Public Automated Land Mobile) which uses digital signals for call set up,
channel allocation and ringing, still voice signal is transmitted through analog waveform. Instead
of using cellular architecture PALM uses VHF.
3.3 FIRST GENERATION MOBILE TECHNOLOGY (1G)
1G was introduced in the year 1980, based on cellular technology which follows analog
technology for making calls [8]. Dawn of cellular technology solve the problem of limited
number of users for particular frequency band, that means same frequency can be used by number
of users which in turn enhances throughput of network. All allotment of frequency take place at
base station. To solve single way transmission i.e. half duplex problem, every call has pair of
dedicated channels. Packet switched network is responsible for data transmission in 1G. In
different geographical location various standards were followed like Advance Mobile Phone
Service, Nordic Mobile Telephone (NMT) and Total access Communication System (TACS) [8].
Considering ill effect of analog communication such as security and noise gave inspiration to
researcher for next generation mobile communication.
Figure 2 Showing Cellular Architecture of 1G [8]
5. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
5
3.4 SECOND GENERATION MOBILE TECHNOLOGY (2G)
Mobile generation is introduced in year 1991, many countries are still using this generation for
communication. Communication is based on digital signals irrespective of its ancestor’s approach
of analog signals. Digital signals brought removes many shortcomings of predecessor generations
such as earlier channels suffers from noise where as digital signals are less prone to noise and
security was also big problem which can be solved with the help of digital encryption.
Figure 3 Shows Technologies Available in 2nd
Generation Mobile Technology
Other than voice calling 2G also support various other application like SMS (short messaging
service, first time introduce to utilize vacant band and send message from receiver to sender),
data transmission service with the help of GPRS( General Packet Radio Service).
3.4.1. MARKETING SUCCESSOR OF 2G
A. 2.5G (GSM or GPRS)
In 2.5G instead of following circuit switch domain between sender and receiver, it is also based
on packet switched domain i.e. In reality it do not follow any of the switching method instead a
hybrid approach where a single circuit is shared among many users and each user is charged
according to number of data packets transferred.
Application supported by 2.5G are MMS (multimedia messaging service) and one of the most
important service provided by 2.5G is WAP which enabled browsing on the mobile phone earlier
due to weak hardware configuration of mobile, browsers were not supported on mobile.
B. 2.75G (EDGE)
2.75G is pre- 3G technology which is standardized by 3Gpp with the goal of higher data rate per
channel which is achieved with the help of coding and transmitting data. This new technology
introduce new technique of modulation and protocol enhancement method for transmitting
packet. It uses nine modulation scheme with coding schemes where four are based on GMSK and
five are based on 8PSK modulation [8]. It is also known with the name EDGE (Enhanced data
rates for GSM evolution). Most important benefit of using EDGE is that it does not need any
network architectural change instead it works on GSM architecture.
3.5 THIRD GENERATION (3G)
Inception of 3G is for providing users mobile broadband, it can support various applications like
video calling, live streaming, mobile internet access and IPTv for supporting these application it
is based on any of the three technologies such as CDMA 2000, TD-SCDMA and W-CDMA.
6. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
6
According to some researchers they do not consider 3G as a mobile technology instead of that
they have view it as a set of network protocol [8].
3.5.1 MARKETING SUCCESSORS OF 3G
A. 3.5G
3.5G is combination of two protocols HSDPA and HSUPA which follow all the standards and
rules of WCDMA. Basic purpose of HSPA is to reduce latency with help of technological
improvement and able to reduce latency up to 5 times
HSDPA
This protocol is more suitable for data centric applications where greater speed of download is
required in comparison to up speed.
Technologies:
• Modulation: Instead of using QPSK 16-QAM scheme is used.
• FastHARQ: Hybrid Automatic Repeat Request is implemented with multi code operation.
So that all receivers will get equal data rate irrespective of its distance from Base Station.
• Scheduling: Allocating even smaller slot of time to users and handling data traffic at the
Base Station intelligently.
• Scheduling: Additional channels allow more users to access network concurrently.
• HSUPA
• This technology is applied for uplink at the user end. Almost all the technologies used
here is same as that of the HSDPA
Characteristics:
• Data Rate: Increased Data rate up to 5.74 Mbps
• Latency: Lower latency having TTI value of 2ms
• System Capacity: Improved system capacity with higher number of users
• Modulation: 64-Qam scheme is used.
• Hybrid ARQ
• Fast Packet Scheduling
A.3.75G (HSPA+ or Evolved HSPA)
Benefit of HSPA+ over HSPA is that it support higher data transfer rate, reduces latency and
backhaul is addressed. Major features and technologies used in 3.75G is as follows:
• MIMO: If signal strength is high higher modulation is used to increase through put.
• PacketConnectivity: For transmitting data rapidly reconfiguration of HS-DSCH and
EODCH channels is done.
• CELL_FACHoperation: It keeps active packet connectivity in ideal period.
• Layer 2 Protocol: MAC-hs protocol has been introduce to take full advantage of HS-
DSCH
• It is clear from above table statistically HSPA+ seems to be better choice than general
LTE Technology, still LTE is considered over it because:
7. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
7
• LTE support wider Bandwidth.
• OFDM modulation enable data to send through multi resilient path and propagation
effects.
Table 3. Shows Comparison between HSPA+ and LTE [14]
3.6.FOURTH GENERATION (4G)
It is design to support all the modern application of today’s world like mobile web access, IP
telephony, gaming services, high definition mobile TV, Video conferencing and 3D television
which cannot be supported by previous mobile generation. For supporting these much
applications 4G need to modify architecture of mobile technology from its base i.e. from the
Physical layer: MIMO- multiple antennas and multi user MIMO system is used for utilizing
spectrum efficiently.
• Downlink utilize multi carrier frequency and for uplink single carrier frequency domain
equalization (SC-FDE).
• Advance antenna system: there are two type of antenna systems spatial multiplexing and
closed loop multiple antenna technologies.
• Software defined Radio
• For providing services based on 4G vendors follow one of these format: WiMax and
LTE.
4. FIFTH GENERATION MOBILE TECHNOLOGY (5G)
5G is futuristic mobile technology which will be a successor of 4G network technology. Aim and
purpose of 5G is very much different than its predecessor which is to introduce mobile
broadband. Goals of 5G cannot be achieved with the help of current infrastructure and
architecture of network technology, for that everything in current mobile generation has to either
redefine or built it from scratch. There are various issues regarding shifting from 4G to 5G which
are listed below [3], [5]–[9], [23]:
Table 4. Shows Comparison between Different Generations of Mobile
8. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
8
a) Infrastructure of Network
In 5G network both voice and IP based system would be embedded into single unit to
maintain end to end quality services
b) Encryption
Encryption means changing data into unreadable format so that third party will not be able to
understand. Maintaining data encryption in 5G will be big challenge because of new
infrastructure and architecture proposed for network. Encryption may follow LTE principle
because no problem has been noticed until yet regarding encryption. Question arises where to
apply encryption? It may be applied for user and device authentication and identification
c) Personification
In 5G environment where trillions of devices are active detecting true sender of signals will
be very difficult. Third party can send signal on behalf of others very easily and there may be
a chance of Denial of service attack in 5G scenario
d) Attack at Topmost Layer of Network Architecture
Final purpose of any generation of network is to provide better service to consumer for that
network is divided into different layers. Uppermost layer is always in touch with user, and its
performance effect all other layers as well as overall network. For proper functioning of 5G
application layer must be bug free.
e) Payment Issues
5G network may consist of multiple networks and various services each one has its own
charges, maintaining and billing all the details would be a tedious task in the network.
4.1 REQUIREMENT OF 5G
a) Data Rate
Data rate is the amount of data transfer per second per unit area. Considering 5G’s scenario it
would be 1000 times more than current 4G network.
b) Latency
4G has latency up to 15ms, due to future demand of services like online gaming and virtual
reality, latency in 5G network should not exceed 1ms.
c) Energy and Cost
It is stated by researcher in 5G network cost and energy consumption will reduce. Energy and
cost is measured in network with Joules/bit and cost/bit will fall by 100 folds in 5G network.
d) Battery
Conserving battery life is the main concern of 5G network consumption of battery life will reduce
by 10 times than in existing 4G network.
9. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
9
Table 5. Shows Requirement for 5G Mobile Network
4.2 ENABLING TECHNOLOGY FOR 5G
To fulfil the above mentioned requirements of 5G, this can offer more reliable, accurate, secure
and fast network to the user. A lot of modification is needed in current technologies, some of
them is suggested in below [3], [5]–[9], [23]:
a) Densification of Network
Densification of network is done through deployment of large number of small cells; decreasing
cell size is a big challenge for researchers. Most recent development is in Japan where cell
spacing is reduce to 1/10th of square kilometre.
b) Massive MIMO
MIMO was introduced in year 2006. It considers spatial dimensions of communication, if
multiple antennas are available at the Base Station. This technique harnesses the multiplexing
feature to get better results. Multi user-MIMO is included into 3GPP LTE- advanced standard,
still higher capacity is yet to achieve. In VLM-MIMO, number of antennas per cell is larger than
number of user, resulting in many desirable features.
c) Millimeter (Mm-Wave) Signals
In search of free frequency band researchers found 30-300 GHz are freely available bandwidths.
Total available spectrum in this range is 200 times greater than current used frequency i.e. 3GHz.
d) Direct Device to Device (D2D)
It is exchange of data between mobile devices without base station in between, it reduces load in
network devices which has to handle hundreds and thousands of requests simultaneously. It has to
deal with heterogeneity of network, to support heterogeneity multiple protocols has been decided.
e) Full Duplex Wireless
Full duplex enable both side to transmit data simultaneously in same frequency band, it has
numerous benefit it increases physical layer capacity up to twice and also improves latency and
security at physical layer.
5. COGNITIVE RADIO
Cognitive Radio was defined as follows:
10. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
10
Cognitive Radio was proposed by Joseph Mitola at a conference in year 1999, in general sense
cognitive radio can be defined as it is an intelligent radio, where transceivers are reconfigurable
are able to adapt itself according to new network condition [15] . In many parts of world,
Cognitive Radio basically covers two main areas of working they are Full Cognitive Radio which
takes care of all the network parameters change taking place, it modify those parameters
wherever change is required to optimize the network and other is spectrum sensing, spectrum is
underutilized because researchers has observed that it is time and location which is important
factor for percent utilization of available spectrum. For detecting and allocation of vacant
spectrum, Cognitive Radio would be the best choice. This concept is known as Dynamic
Spectrum Access. After detection of presence of vacant band cognitive Radio will adopt policy
called Spectrum Pooling Policy where free bands are immediately filled with OFDMA sub bands.
5.1 KEY TERMS IN THE COGNITIVE RADIO
a) Spectrum Sensing
Cognitive Terminal switches from one available frequency to best available frequency band.
b) Spectrum Sharing
Sharing of resource occupied by licensed user especially, spectrum band without affecting
neighbour licensed users.
c) Sensing Based Spectrum
In this approach cognitive methods are implemented to get whether licensed user is licensed user
is using then CR user transmit its data otherwise Cognitive Radio user lower its Transmitting
Power.
5.2 COGNITIVE CYCLE
Figure 4 Showing Cognitive Cycle[24]
5.3 COGNITIVE RADIO ARCHITECTURE
Before suggesting design of the CR researcher were handling two basic problems in it i.e. in CR
devices can change its transmission mode any time which may lead to the ambiguity for the CR
algorithms? And another problem faced by researcher was change in bandwidth i.e. users have
mobility that they can move from one location to another location having different Bandwidth
11. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
11
range in this case adjustment has to be done. Keeping above mentioned problems in scenario
researcher suggested architecture of cognitive radio, it has three basic sub systems mentioned
below:
• Cognitive unit for making decision which totally based on input provided.
• SDR unit whose operating software provide operating environment.
• Another component for determining signal and user characteristics.
Figure 5 Shows Architecture of Cognitive Radio [25]
5.4 TECHNIQUES FOR COGNITIVE ENGINE
Figure 6 Showing Techniques Used to Implement Cognitive Engine
Mitola in his introductory paper of CR, suggested functional model of ideal CE that contain
different phases like observe, orient, plan, decide, act and learn. Looping generally starts from
observe passing response to another stage in sequence. In the below mentioned figure there is
presence of two loops sequences in one loop known as sensing and adaptation loop, following is
the sequence:
Observe, Orient, plan, Decide and Act
In another loop called as learning loop, sequence is process of finding (Decide), forming (Plan),
using (Act) and accumulating Knowledge (Learn).
12. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
12
5.5 FUNCTIONAL MODEL OF COGNITIVE ENGINE
Figure 7 Shows Cognitive Loop at Two Levels[26]
There are some building blocks of CE, which can do the work in cognitive loop when together.
a) Modelling System
Modelling part take care of observe stage of cognitive loop and sensing function. System is
capable of handling in form of user domain, wireless domain and policy domain, then it perform
identification, integration and abstraction of input information and prior knowledge to make
machine under stable model.
b) Knowledge Base
It consist of knowledge collected from prior experience and temporary network condition feed in
two way manually and by gathering information from different network devices.
c) Reasoning Engine
Most important component and also known as brain of CE which help in simulation of orient,
plan, decide and act belonging to adaptation loop with the help of KB.
d) Learning Engine
It is also known as futuristic brain of CE. It accumulate feedback of action taken by CE and stores
effect of result, store it as knowledge into knowledge base.
Figure 8 Showing Basic Components of Cognitive Engine
13. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
13
5.6 KEY ADVANTAGES OF COGNITIVE RADIO
Cognitive Radio some Key benefits over other competitor methods in reference to frequency,
time, space, modulation, power and other parameters
a) Spectrum Efficiency
Increasing spectrum efficiency will satisfy future demand of user which is one of the basic goal of
cognitive radio.
b) Higher Bandwidth
When demand is required CR can support higher bandwidth services.
c) Avoiding sudden drop of services
When network condition is not proper instead of sudden drop of services there is grace full
degradation of services.
d) Better Quality of Services
Quality of services is provided by govern by features like latency, data rate, cost and other
parameters which in turn improves availability and reliability of wireless sensor network.
e) Hardware platform independence
CR supports hardware capable of handling support soft wares of various type.
6. SPECTRUM SENSING TECHNIQUES USING COGNITIVE RADIO
Spectrum is valuable resource in network, so proper and effective utilization is recommended. In
network, users are generally of two type licensed and unlicensed. Licensed user own rights over
spectrum but it was found in survey that approximately 85% of spectrum is used even in the peak
period of use and it may reduce to less than 15% in free periods [27] hindering basic goal of the
network i.e. proper utilization of all the available resources due to this reason spectrum sharing
between licensed and unlicensed user without interference in services of licensed user was
proposed by researchers. Spectrum sharing is a complex problem which involve various sub
process, one of the major sub process is spectrum sensing where unlicensed user has to sense for
free bandwidth of licensed user. These free bandwidth slot is called as spectrum holes and
unlicensed user has to transmit its signal in this very duration, there are two major type of
spectrum holes temporal and spatial. Temporal spectrum hole is time dependent and spatial is
geographical area dependent which requires complex signal processing. Presence and absence of
spectrum holes is shown in the figure. Spectrum holes is also categorize in to three categories
based on interference produced by signals these are black space, grey space and white space.
Black space is totally dominated by low power interference, grey is partially dominated by
interference and white is completely free from any kind of RF interference except white Gaussian
noise. CR helps with its in build feature of intelligence to find out vacant band intelligently for
that various algorithm were proposed some of the major algorithms are explained below
14. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
14
6.1 ENERGY DETECTION BASED
Energy detection based approach is simple it works on detection of energy in the channel if it is
below threshold then there is absence of primary User and above it means Primary User is active.
Time and frequency domains are analyzed with the help of Fast Fourier Transform to find out
exact calculation of vacant Bandwidth [17].
6.1.1 TIME DOMAIN ENERGY DETECTION
Based on Research work proposed by Urleowitch detection of priory measured signal and noise
variance can be measured in AWGN [17]
A.BPF
Input signal y(t) is passed through BPF with central frequency f0 and Bandwidth w with the
transfer function.
=
| − | ≤
, | − | >
(1)
Where N0 is one sided noise power spectral density. It helps in normalizing false alarm and
detection problem in above mentioned formula.
Squaring Device
After BPF signals get squared
Integration
Then signals are integrated in period of slot ‘T’, in comparison with received signal λ
H0 is no signal transmitted and H1 is signal transmitted. X(t) is unknown deterministic transmitted
signal and w(t)is AWGN with zero mean and variance is equal to = and SNR is
expressed as = whereσs
2
variance of signal and σn
2
is noise variance. Construction of noise
signal is done with the help of Shannon’s sampling formula
Figure 9 Showing Components of Time Domain Energy Detector [26][17]
= ! "#$ − !
%&
!' (&
(3)
)
: + , = ,
-: + , = . , + ,
(2)
15. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
15
Wheresin 3 =
456 78
78
is normalized sin function an d9: = 9
:
;
is ith
noise sample and test
sample is calculated as
< = = $ , >, ≈
-
$#
@
#'-
@
(4)
Figure 10 Shows Flow of Working In Energy Detection Based Sensing [24]
6.2 WAVEFORM BASED SENSING
Basis of working in this method is to know patterns. There exist various type of patterns like
preambles, midambles, regularly transmitted pilot pattern, spreading sequence and other are used
to sense whether received signal is copy of itself [17]. Using some derivation explained below we
can find out Primary User:
+ $ = $ + " $ (5)
Where s(n) is the signal to be detected, w(n) is additive white Gaussian Noise sample and n is
sample index. Decision metric for the energy detector is written as:
A = |+ $ |
$'B
(6)
Where N is size of observation vector
A = CDE+ $ " ∗ $ G (7)
Where * is a conjugation operation.
In the absence of primary user metric value is
A = CDH $ " ∗ $
$
$'-
I (8)
In the presence of Primary User
16. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
16
A = |" $ | + CD H $ " ∗ $
$
$'-
I
$'-
(9)
Comparing values of M with the threshold value called λE then detect the presence and absence of
Primary user. From experiment result stated in [17] waveform based sensing can outperform
energy based sensing in reliability, convergence time and performance will keep on increasing as
known signal pattern increases
6.3 CYCLOSTATIONARY BASED SENSING
Cyclostationary is a feature possessed by signal due to statistical value like mean and
autocorrelation or periodicity so they are used for vacant band detection of primary user and
differentiate between noise and Primary user signal because there exist difference in the property
of noise and primary user signal i.e. noise has no co-relation between there signals whereas in
primary user signals are possessing periodicity property.
Figure 11 Shows Working Model of Cyclostationary based Sensing [24]
6.4 RADIO IDENTIFICATION BASED SENSING
All properties of primary user stored in advance this is done to predict presence of primary user
accurately. Two major techniques were adopted for it i.e. feature extraction and classification
[17]. Goal of these techniques are just to identify the transmission device and technology, so that
optimal result could be achieved. For purposes of feature extraction two major method are initial
mode identification (IMI) and alternative mode identification (AMI)[17]. After achieving
different features about network classification algorithms are used, purposes of this is to extract
proper device and technology.
6.5 MATCHED FILTERING
This is most optimal method of primary user when transmitted signal is known, this is because
time complexity of decoding false alarm and distraction from original signal is very small but
implementation time complexity is very large. There are certain constraints for implementation of
this method, some parameters has to be known in advance like bandwidth, operating frequency,
modulation type, pulse shaping and frame format [17][24].
6.6 HYBRID TECHNIQUE: COHERENT / ENERGY DETECTION BASED SENSING
As the name suggest hybrid approach mixes best features of coherent and energy detection
method with the goal to remove all the loop holes in the given method. Energy detection based
sensing does not requires any prior knowledge of primary users’ transmitted signal, but
performance degrades for low SNR value. Coherent sensing require the primary user to transmit
known bit stream but offers more reliable performance at low SNR value.
Paper proposed by Moghini et al. [24] hybrid approach was discussed in which signal has pilot
symbols for synchronization purposes and at the receivers end pilot position was known in prior.
In this experiment authors has found that all the previous loop holes of both the methods were
removed but with dear cost of time complexity.
17. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
17
Table 6 Shows Comparison between Different Spectrum Sensing Algorithms [28]
In early stage of mobile generation Network architecture is centralize and with the new
generation of mobile technology it started shifting towards cluster approach of mobile network
and hence need to work in both cluster and integrated form. When discussion on 5G mobile
technology based on Cognitive Radio that means it support both integrated and cluster
architecture as well, this similarities between 5g and CR [19] which inspire researchers to use
both of them together. Transmitting and receiving node in the mobile technology is known as
terminal. 5G is combination of many heterogeneous mobile network, hence it has to support all
technology at its various technology without affecting quality of service. Cognitive Radio
provides flexibility in configuration of radio which switches between many mobile technologies.
According to literature Cognitive Radio technology in 5G is generally based on Cognitive Engine
design which is using different techniques like Genetic Algorithm, statistical model and nature
inspired algorithms. Cognitive Radio is implemented in 5G for managing resources and
adaptation.
Resource management is a major challenge because achieving better resource management is one
of the goal of 5G system which cannot be achieved without help of cognitive radio, it induces
intelligent system capability for taking real time decision in the network resulting in better
allocation of resources in the network. Researcher has divided cognitive radio resources into in to
three major categories radio resources, computing resources and application resources [19].
Another major application of cognitive radio is adaptation which means selecting proper value of
cognitive radio parameter
18. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
18
7. CONCLUSION
In this paper we have seen detailed survey on both 5G and CR technologies, as stated in the
introduction part CR act as backbone of 5G network technology in the later part of paper we were
trying to prove it. Since we know that 5G suffer from some implementations complexities we
have also seen each problem in its detail and how to rectify those ones. We have also gone
through many CR algorithms purpose of it is to know about scope of each spectrum sensing
algorithm. Finally in literature survey along with contribution of researchers, a quick look on
smart antenna is done. In future we would overcome the existing problem for 5G using cognitive
radio like detection of primary user using less amount of energy, removing interference so that
primary user and noise can be differentiated easily and better allocation of bandwidth.
REFERENCES
[1] F. Boccardi, T. L. Marzetta, and B. Labs, “Five Disruptive Technology Directions for 5G,” no.
February, pp. 74–80, 2014.
[2] T. Next, G. Mobile, N. Alliance, T. Next, G. Mobile, N. Alliance, A. S. Engineering, T. Federal, C.
Commission, T. Federal, and C. Commission, “For other uses, see 5G (disambiguation).”
[3] J. G. Andrews, S. Buzzi, W. Choi, S. V. S. V. Hanly, A. Lozano, A. C. K. A. C. K. Soong, and J. C. J.
C. Zhang, “What will 5G be?,” IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065–1082, 2014.
[4] P. Banelli, S. Buzzi, G. Colavolpe, A. Modenini, F. Rusek, and A. Ugolini, “5G Networks : Who
Will,” no. October, pp. 80–93, 2014.
[5] S. Chen and J. Zhao, “The Requirements , Challenges , and Technologies for 5G of Terrestrial Mobile
Telecommunication,” no. May, pp. 36–43, 2014.
[6] C. S. Engineering, “5G Technology of Mobile Communication,” pp. 1265–1275, 1956.
[7] A. Gohil, H. Modi, and S. K. Patel, “5G Technology of Mobile Communication : A Survey,” pp. 288–
292, 2013.
[8] C. Paper, “5G technology of mobile communication : A survey 5G Technology of Mobile
Communication : A Survey,” no. October, 2015.
[9] R. S. Yarrabothu, “A Survey Paper On 5G Cellular Technologies - Technical & Social Challenges,”
vol. 11, no. June, pp. 98–100, 2015.
[10] C. X. Mavromoustakis and C. D. Dimitriou, “Joint Energy and Delay-aware Scheme for 5G Mobile
Cognitive Radio Networks,” pp. 2624–2630, 2014.
[11] N. For, “Enhanced Multi-Parameter Cognitive Architecture for Future Wireless Communications,”
no. July, pp. 86–92, 2015.
[12] X. Zhang, W. Cheng, and H. Zhang, “Heterogeneous Statistical QoS Provisioning Over 5G Mobile
Wireless Networks,” no. December, pp. 46–53, 2014.
[13] M. Bellanger, D. Mattera, M. Tanda, and D. Ingegneria, “Lapped-OFDM as an alternative to CP-
OFDM for 5G asynchronous access and cognitive radio,” no. 2, pp. 5–9, 2015.
[14] C. Technology, R. Gandhi, P. Vishwavidyalaya, and P. De, “Resource Allocation in 5G using
Modified Random Forest Algorithm,” 2016.
[15] “Cognitive Radio : Making Software Radios More Personal.”
[16] F. Ge, Q. Chen, Y. Wang, C. W. Bostian, T. W. Rondeau, and B. Le, “Cognitive Radio : From
Spectrum Sharing to Adaptive Learning and Reconfiguration,” 2008.
[17] I. C. Surveys, “A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications,” vol. 11,
no. 1, pp. 116–130, 2009.
[18] K. M. Thilina, N. Saquib, and E. Hossain, “Machine Learning Techniques for Cooperative Spectrum
Sensing in Cognitive Radio Networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 11, pp. 2209–2221,
2013.
[19] C.-I. Badoi, N. Prasad, V. Croitoru, and R. Prasad, “5G Based on Cognitive Radio,” Wirel. Pers.
Commun., vol. 57, no. 3, pp. 441–464, 2011.
[20] X. Hong and J. Wang, “Cognitive Radio in 5G : A Perspective on Energy-Spectral Efficiency Trade-
off,” no. July, pp. 46–53, 2014.
[21] S. Antennaspropagation, “8 MEMs Mic Array Matrix Creator is the first mic array.”
[22] S. Antenna, “4G Communication Smart Antenna Advantages of Smart Antenna : Disadvantages of
Smart Antenna :”
19. International Journal Of Mobile Network Communications & Telematics (IJMNCT) Vol. 6, No.4/5/6, December 2016
19
[23] “Functional Architecture for 5G Mobile Networks,” no. October, 2015.
[24] C. Engineering, “Spectrum Sensing Methods In Cognitive Radio,” 2011.
[25] D. Xu, L. I. Ying, and W. E. I. Shengqun, “Design and implementation of a cognitive engine
functional,” vol. 57, no. 28, pp. 3698–3704, 2012.
[26] M. A. Abdulsattar and Z. A. Hussein, “Energy Detection Technique For Spectrum Sensing In
Cognitive Radio : A Survey,” vol. 4, no. 5, pp. 223–242, 2012.
[27] A. D. Katre and K. R. Desai, “Cooperative Spectrum Sensing with Weighted Clustered Architecture,”
vol. 1, no. 2, pp. 40–44, 2013.
[28] S. Parsons, “Literature Review of Cognitive Radio Spectrum Sensing EE 359 Project,” 2014.
AUTHORS
Parnika De obtained the B.Tech. Degree in Electronics and Communication Engineering
from Lovely Professional University, India, in 2012 and the M.Tech. Degree from the
National Institute of Technical Teachers’ Training and Research, Bhopal, India in 2016.
Currently, she has presented her Research Proposals in some of the pioneer institutes for
admission in Ph.D. degree in the field of “Intelligent Techniques for Resource Allocation in
5G”. Miss. De has attended numerous seminars on wireless communication, 5G, Cognitive
Radio and Machine Learning and she also had experience of working in Software development industry.
Her areas of research include Next Generation Cellular Networks and Cognitive Radio Networks.
Shailendra Singh received his bachelor degree in Computer Science and Engineering from
AMIE, India in 1994 and master’s degree and Ph.D. deSree from Rajiv Gandhi
ProudyogkiVishwavidlaya, Bhopal, India in 2004 and 2010 respectively. He is currently
working as professor in Department of Computer Engineering and Application, National
Institute of Technical Teachers’ Training and Research, Bhopal, India. His research
interests include development of classification algorithms for cyber-attack detection system
using machine learning technique like support vector machine. He received best paper award for “Improved
Support Vector Machine for Cyber-Attack Detection”, proceeding in world congress on Engineering and
Computer Science (WCECS) 2011, October 19-21, 2011, San Francisco, USA. He is member s of various
technical societies like IEEE, IACSIT (Singapore), ISTE (New Delhi), Microsoft Corporation (USA), and
Institute of Engineers (India). He also chaired technical session of many conferences both national and
international. He has published more than 3o research papers in the international journals and conferences.
His research interest also include finger print matching. hailendra Singh received his bachelor degree in
Computer Science and Engineering from AMIE, India in 1994 and master’s degree and Ph.D. degree from
Rajiv Gandhi ProudyogkiVishwavidlaya, Bhopal, India in 2004 and 2010 respectively. He is currently
working as professor in Department of Computer Engineering and Application, National Institute of
Technical Teachers’ Training and Research, Bhopal, India. His research interests include development of
classification algorithms for cyber-attack detection system using machine learning technique like support
vector machine. He received best paper award for “Improved Support Vector Machine for Cyber-Attack
Detection”, proceeding in world congress on Engineering and Computer Science (WCECS) 2011, October
19-21, 2011, San Francisco, USA. He is member s of various technical societies like IEEE, IACSIT
(Singapore), ISTE (New Delhi), Microsoft Corporation (USA), and Institute of Engineers (India). He also
chaired technical session of many conferences both national and international. He has published more than
3o research papers in the international journals and conferences. His research interest also include finger
print matching.