This document summarizes a review and analysis of telecommunication network infrastructure in Nigeria's Northwest province. It discusses problems with the existing 3G network infrastructure and proposes upgrading to 4G as a solution to increase data bandwidth and internet penetration in the region. The paper analyzes the current mobile market, infrastructure parameters, network providers and quality of services. It conducts a comparative analysis of 3G versus 4G networks and concludes by recommending developing an implementation plan for a full 4G network in the Northwest province to boost its social and economic development.
A Survey on Call Admission Control Schemes in LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc.has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes.
Top Read Articles in Computer Science and Engineering Survey (IJCSES)IJCSES Journal
International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering.
This document discusses the role of cognitive radio technology in 4G communications. It begins with an abstract that introduces cognitive radio as the key enabling technology for next generation networks. It then reviews research being done on cognitive radio and 4G technologies. The main possibilities of implementing cognitive radios in 4G communication systems are surveyed, including how networks like IEEE 802.22 and WiMAX extensions can enhance 4G performance using cognitive technologies.
This document reviews the Security and QoS Aware Dynamic Clustering (SQADC) Routing protocol for cognitive radio networks (CRNs). It first discusses existing routing protocols for CRNs and identifies gaps, including that most focus on improving quality of service but few address security issues. It then outlines the objectives of designing a new routing protocol to achieve a tradeoff between QoS performance and security performance for CRNs. The proposed SQADC protocol will use dynamic clustering based on ant colony optimization for cluster head selection and re-clustering to optimize spectrum allocation and quality of service while introducing a lightweight trust-based mechanism for detecting malicious nodes.
1) The document discusses reducing vertical handover latency in heterogeneous networks consisting of WLAN and 3G to improve quality of service for voice and video streaming.
2) It proposes using an enhanced hybrid scheme combining bidirectional Stream Control Transmission Protocol (Bi-mSCTP) with Mobile IP to further reduce handover latency and packet loss during handovers.
3) This approach aims to allow users to receive services continuously with minimal packet loss, analyzing the performance of the Bi-mSCTP hybrid scheme for real-time traffic like voice and video.
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Performance Prediction of 5G : The Next Generation of Mobile Communication ijngnjournal
The 5G standard is a mobile communication of the 5th generation, which presupposes an increase of the
information exchange speed up to 10 Gbit/s. It is 30 times quicker than the speed of 4G network. It is a new
stage in the development of technologies connecting society. This standard will provide an unlimited access
to the network for individual users and devices. When developing the 5G standard, the advanced
opportunities of LTE and HSPA, as well as other technologies of a radio access focused on the solution of
specific objectives are considered. The main advantage of the mass introduction of the 5G communication
development represents the so-called Internet of Things (IoT). There the devices and not people will be the
main consumers of traffic. The functional requirements of5G networks, their speed, and its traffic
parameters for HD video services and massifs of M2M-devices are analyzed in the paper. They will have
been the most demandedones by 2020.
A Survey on Call Admission Control Schemes in LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc.has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes.
Top Read Articles in Computer Science and Engineering Survey (IJCSES)IJCSES Journal
International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering.
This document discusses the role of cognitive radio technology in 4G communications. It begins with an abstract that introduces cognitive radio as the key enabling technology for next generation networks. It then reviews research being done on cognitive radio and 4G technologies. The main possibilities of implementing cognitive radios in 4G communication systems are surveyed, including how networks like IEEE 802.22 and WiMAX extensions can enhance 4G performance using cognitive technologies.
This document reviews the Security and QoS Aware Dynamic Clustering (SQADC) Routing protocol for cognitive radio networks (CRNs). It first discusses existing routing protocols for CRNs and identifies gaps, including that most focus on improving quality of service but few address security issues. It then outlines the objectives of designing a new routing protocol to achieve a tradeoff between QoS performance and security performance for CRNs. The proposed SQADC protocol will use dynamic clustering based on ant colony optimization for cluster head selection and re-clustering to optimize spectrum allocation and quality of service while introducing a lightweight trust-based mechanism for detecting malicious nodes.
1) The document discusses reducing vertical handover latency in heterogeneous networks consisting of WLAN and 3G to improve quality of service for voice and video streaming.
2) It proposes using an enhanced hybrid scheme combining bidirectional Stream Control Transmission Protocol (Bi-mSCTP) with Mobile IP to further reduce handover latency and packet loss during handovers.
3) This approach aims to allow users to receive services continuously with minimal packet loss, analyzing the performance of the Bi-mSCTP hybrid scheme for real-time traffic like voice and video.
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Performance Prediction of 5G : The Next Generation of Mobile Communication ijngnjournal
The 5G standard is a mobile communication of the 5th generation, which presupposes an increase of the
information exchange speed up to 10 Gbit/s. It is 30 times quicker than the speed of 4G network. It is a new
stage in the development of technologies connecting society. This standard will provide an unlimited access
to the network for individual users and devices. When developing the 5G standard, the advanced
opportunities of LTE and HSPA, as well as other technologies of a radio access focused on the solution of
specific objectives are considered. The main advantage of the mass introduction of the 5G communication
development represents the so-called Internet of Things (IoT). There the devices and not people will be the
main consumers of traffic. The functional requirements of5G networks, their speed, and its traffic
parameters for HD video services and massifs of M2M-devices are analyzed in the paper. They will have
been the most demandedones by 2020.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...IRJET Journal
This document discusses network selection and spectrum handoff in cognitive wireless networks using adaptive weights. It proposes using a particle swarm optimization technique to minimize handoff delay and increase throughput. The technique allows secondary users to utilize unused licensed spectrum. Simulation results show the proposed PSO-based algorithm, called PHSCR, performs better than other methods in terms of handoff delay and throughput. The document also discusses using multiple attribute decision making methods like the grey relational analysis method to help cognitive radios select the optimal network for spectral handoff.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
This document discusses performance evaluations of heterogeneous wireless networks (HWNs) using the OPNET simulator. It implemented WLAN, WiMAX, and UMTS networks with applications like FTP, video conferencing, and VoIP. Handoff management between the networks was also evaluated. Simulation results showed WiMAX throughput was over 30% higher than WLAN and UMTS. Vertical handoff between WLAN-WiMAX and WLAN-UMTS was difficult without carefully engineering the WLAN network due to differences between the networks. Key metrics like delay, throughput, and received traffic were analyzed and WiMAX generally had superior performance.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
The quality of service of the deployed LTE technology by mobile network opera...IJECEIAES
In this study, the real-world performance analysis of four Nigerian mobile network operators (MNOs), namely MTN, GLO, Airtel, and 9Mobile longterm evolution (LTE) cellular network, were analyzed and compared. The Nigerian MNOs utilize 5 MHz, 10 MH, and 20 MHz channel bandwidths based on third-generation partnership project’s (3 GPPs) recommendation. The presented analysis shows the uplink (UL), and downlink (DL) throughputs gaps in mobility condition as well as other LTE’s system quality of service (QoS) key performance indicators (KPI’s) of: Connection drop rate, connection failure rate, peak physical downlink throughput, minimum radio link control (RLC) downlink throughput threshold and latency are not strictly followed. The reason may be due to a lack of regulatory oversight enforcement. The comparative studies showed that MTN provides the best QoS. The introduction of novel LTE QoS metrics herein referred to as national independent wireless broadband quality reporting (NIWBQR) is the significant contribution of this study. The goal of this study is to show the quality of the network as it affects the user's experience. Important observation showed that all the MNOs are not adhering to the 3 GPPs specified user plane latency of 30 ms and control plane latency of 100 ms, respectively, which makes video streaming and low latency communication a near-impossible task.
5G Wireless Technology- An overview of the current TrendsEditor IJCATR
5G Wireless technology networks or 5th Generation wireless systems which is used for videos and audios
communication announcement the next major time period of mobile telecommunications Criterions time the current next
Generation mobile networks confederated .in this paper we are studying different Technologies in 5G The handover of 5G the
Models of 5G its architecture, its different components and METIS Task Force Networks. 2-Day video recording is available. Its
components access/backhaul integration, direct device-to-device communication, flexible duplex, flexible spectrum usage multiantenna
transmission, ultra-lean design, user/control separation architecture of 5G is highly advanced, its network elements and
various terminals are characteristically upgraded to afford a new situation. Likewise, service providers can implement the advance
technology to adopt the value-added services easily.
JOURNEY OF MOBILE GENERATION AND COGNITIVE RADIO TECHNOLOGY IN 5Gijmnct
The document summarizes the evolution of mobile generations from 0G to 5G and discusses how cognitive radio can help enable 5G networks. It describes the key technologies and capabilities of each generation from 0G to 4G. 5G is proposed as a solution to efficiently handle the increasing number of smart devices. Cognitive radio is presented as the backbone of 5G networks, as it can dynamically allocate spectrum when the primary user is absent. The combination of 5G and cognitive radio can provide high quality of service, high data rates, flexibility and adaptability.
Journey of mobile generation and cognititve radio technology in 5 gijmnct
The ever increasing number of smart network devices may reach up to 24 billion in year 2020 as stated in the recent survey conducted by Forbes magazine. This may obsolete the current 4G technology for handling smart bandwidth allocation to such a large number of devices. In order to cope the challenging
need for fast and efficient data transfer over these devices, demands next generation mobile network technology. In literature 5G technology has been suggested that offers appropriate solution to the above issues. 5G is a futuristic technology that would solve many problem of day to day life. By using 5G high data rates can be achieved in the range of Gbps with minimal latency. But the question is how to make such
futuristic technology realistic. This can be done by efficiently utilizing the bandwidth in the allotted spectrum. Despite numerous benefits, 5G may critically suffer from tedious implementation problems that have been discussed in this paper. Cognitive radio (CR) is an intelligent radio that works on the principle of dynamic spectrum allocation. Cognitive Radio is capable of learning and adapting to external environment and reuses the frequency when primary user is absent. This paper combine the advantage of two technology 5G terminal and Cognitive radio terminal where 5G provide quality of service and high data rate whereas Cognitive radio give flexibility and adaptability to 5G.
Energy efficient power control for device to device communication in 5G netw...IJECEIAES
Next generation cellular networks require high capacity, enhanced efficiency of energy and guaranteed quality of service (QoS). To reach these goals, device-to device (D2D) communication is a candidate technologie for future 5th Generation especially applications that require the reuse, the hop and the proximity gain. The present paper studies the energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) system composed of both regular cellular users and device-to-device (D2D) pairs. First, we analyze and model mathematically the prerequisites for D2D communications and classical cellular links in terms of minimum rate and maximum power requirement. Second, we use fractional programming in order to convert the initial problem into a concave one and we apply non-cooperative game theory in order to characterize the equilibrium. Then, we got the solution of the problem from the results of a water-filling power allocation. Moreover, we employ a distributed design for power allocation by means of three methods: a) Theory of fractional programming b) Closed form expression (the novelty is the use of Wright Omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are realized to demontrate the enhanced gain in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
The 5G system will not only be based on mobile communication itself but will also penetrate into various fields of the future society. The integration with traditional manufacturing and service industries will lead to a new form of “Internet +” and build a user-centric and comprehensive information ecosystem. To change people's production and lifestyle, and bring vitality to the development of China's economy and society today.
This document is a training report submitted by Jatin Kumar, a student at B.S. Anangpuria Institute of Technology and Management, in partial fulfillment of the requirements for a Bachelor of Technology degree in Electronics and Communication Engineering. The report provides an overview of the student's training at Electronics Niketan, under the Ministry of Communication and Information Technology, Government of India. It includes acknowledgments, a table of contents, and sections on the company profile, an introduction to cognitive radio and dynamic spectrum access, the history and background leading to cognitive radio, basic concepts of cognitive radio, and future applications.
The document discusses wireless network technologies and vertical handoffs. It introduces the motivation for intelligent vertical handoff techniques using artificial intelligence. Key points include:
1) Heterogeneous wireless networks integrate different technologies like WiFi, WiMAX and UMTS to provide seamless mobility but handoff decision making is challenging due to many parameters.
2) The document proposes using fuzzy logic for intelligent handoff necessity estimation and target network selection to maximize user satisfaction based on multiple criteria.
3) IEEE 802.16 standards including 802.16m, 802.16e, and 802.16j are discussed which focus on data rates up to 100Mbps for mobile and 1Gbps for fixed
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communication–based vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicle’s start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...IRJET Journal
This document provides an overview of the evolution of 5G networks and technologies, security schemes, and multiple access schemes used in mobile communications. It discusses the challenges faced by existing 4G networks in handling increased data usage and more devices. 5G is presented as the next generation technology aimed to support data rates up to 10Gbps, latency of 1ms, widespread coverage and availability, and reduced energy consumption. The document reviews key 5G concepts and radio network evolution. It also summarizes two security protocols - EPS-AKA and J-PAKE - and compares multiple access schemes such as OFDMA and SC-FDMA used for uplink transmission. In concluding, the document states that 5G will revolutionize mobile communication
Performance comparison of umts and lte on the basis of data ratesIAEME Publication
This document compares the 3G and 4G mobile communication technologies of UMTS and LTE. UMTS (3G) uses WCDMA technology and has a maximum theoretical downlink speed of 42Mbps, while LTE (4G) uses OFDM and more advanced MIMO schemes, providing much higher maximum theoretical downlink speeds of 100Mbps with the ability to reach 1Gbps. The document outlines the network architectures and standards of UMTS and LTE. It also lists the objectives of 4G networks in providing improved quality of service, mobility, bandwidth and a fully IP-based network compared to 3G technologies.
A survey on multiple access technologies beyond fourth generation wireless co...ijceronline
The future of mobile wireless communication networks will include existing 3rd generation, 4th generation 5th generation,6th generation (with very high data rates Quality of Service (QoS) and service applications) and 7th generation (with space roaming). Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-ondemand, video conferencing system and many more applications. This paper is focused on the specifications of future generations and latest technologies to be used in future wireless mobile communication networks like MIMO, OFDM, OFDMA, Massive MIMO, LTE, LTE-A.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
[email protected]Received December 4, 2019, accepted JanuaTatianaMajor22
[email protected]
Received December 4, 2019, accepted January 7, 2020, date of publication January 13, 2020, date of current version January 24, 2020.
Digital Object Identifier 10.1109/ACCESS.2020.2966271
5G Technology: Towards Dynamic Spectrum
Sharing Using Cognitive Radio Networks
W. S. H. M. W. AHMAD 1, N. A. M. RADZI 1,2, (Senior Member, IEEE), F. S. SAMIDI1,
A. ISMAIL 1,2, (Member, IEEE), F. ABDULLAH 1,2, (Senior Member, IEEE),
M. Z. JAMALUDIN1,2, (Senior Member, IEEE), AND M. N. ZAKARIA3
1Institute of Power Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
2Electrical and Electronics Engineering Department, College of Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
3Architecture and Governance, Tenaga Nasional Berhad Information and Communication Technology (TNB ICT), Kuala Lumpur 59200, Malaysia
Corresponding author: N. A. M. Radzi ([email protected])
This work was supported in part by UNITEN R & D Sdn Bhd through Tenaga Nasional Berhad Seed Fund under Grant U-TC-RD-19-04,
and in part by the Universiti Tenaga Nasional BOLD2025 under Grant 10436494/B/2019019.
ABSTRACT The explosive popularity of small-cell and Internet of Everything devices has tremendously
increased traffic loads. This increase has revolutionised the current network into 5G technology, which
demands increased capacity, high data rate and ultra-low latency. Two of the research focus areas for meeting
these demands are exploring the spectrum resource and maximising the utilisation of its bands. However,
the scarcity of the spectrum resource creates a serious challenge in achieving an efficient management
scheme. This work aims to conduct an in-depth survey on recent spectrum sharing (SS) technologies
towards 5G development and recent 5G-enabling technologies. SS techniques are classified, and SS surveys
and related studies on SS techniques relevant to 5G networks are reviewed. The surveys and studies are
categorised into one of the main SS techniques on the basis of network architecture, spectrum allocation
behaviour and spectrum access method. Moreover, a detailed survey on cognitive radio (CR) technology
in SS related to 5G implementation is performed. For a complete survey, discussions are conducted on the
issues and challenges in the current implementation of SS and CR, and the means to support efficient 5G
advancement are provided.
INDEX TERMS 5G, new radio, spectrum sharing, spectrum efficiency, cognitive radio, enabling
technologies.
I. INTRODUCTION
5G is the next-generation mobile communication technol-
ogy designed to provide greater capacity and higher data
speeds than the previous generation Long Term Evolution
(LTE). 5G technology, which is expected to be realised
by 2020 [1], [2], promises ultra-low latency and ultra-
high reliability, thus enabling innovative services across
different industry sectors [3]. 5G standards are currently
under development and will include the evolution of exist-
ing LTE and 5G New Radio (N ...
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
This document summarizes a research paper that proposes a technique to improve the detection of false report attacks in wireless sensor networks (WSNs) using machine learning and a neural network. The technique evaluates report information gathered from base stations to identify invalid data and detect false report attacks, even when MAC information is compromised. This is an improvement over existing security protocols that rely on MAC-dependent validation, which cannot defend against extreme false report attacks. The proposed method uses a machine learning-based prediction model and evaluation function to verify false report attacks based on analyzing reports from the base station. This intelligent approach aims to help WSNs better defend against evolving attacks.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
This document summarizes and compares three IPv6 mobility management schemes for multimedia services over LTE-A wireless networks: Mobile IPv6, IPv6-MPLS, and IPv6-GMPLS. It first provides background on these schemes and the LTE-A network architecture. It then discusses using OPNET simulations to evaluate and compare the schemes' performance based on metrics like throughput, delay, coverage area, and bandwidth. The document concludes that IPv6-GMPLS provides the best performance and is the best choice for improving multimedia quality of service over LTE-A networks.
IRJET - Network Selection and Spectrum Handoff based on Adaptive Weights in C...IRJET Journal
This document discusses network selection and spectrum handoff in cognitive wireless networks using adaptive weights. It proposes using a particle swarm optimization technique to minimize handoff delay and increase throughput. The technique allows secondary users to utilize unused licensed spectrum. Simulation results show the proposed PSO-based algorithm, called PHSCR, performs better than other methods in terms of handoff delay and throughput. The document also discusses using multiple attribute decision making methods like the grey relational analysis method to help cognitive radios select the optimal network for spectral handoff.
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
This document presents a system for internet video streaming service for social networks. It aims to improve quality of service for video streaming on mobile devices by developing an adaptive streaming method using a Markov Decision Process. The system uses Dynamic Adaptive Streaming over HTTP (DASH) to store multiple compressed video versions at different resolutions and qualities in segments. It formulates the multi-link video streaming as a reinforcement learning task and models it as a finite state Markov Decision Process. An algorithm is proposed to find near-optimal solutions in real-time to select the best video quality based on factors like bandwidth, buffer occupancy, and device resolution to improve streaming performance metrics while saving network bandwidth and costs. The system was tested using an Android emulator and Scalable Video
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
This document discusses performance evaluations of heterogeneous wireless networks (HWNs) using the OPNET simulator. It implemented WLAN, WiMAX, and UMTS networks with applications like FTP, video conferencing, and VoIP. Handoff management between the networks was also evaluated. Simulation results showed WiMAX throughput was over 30% higher than WLAN and UMTS. Vertical handoff between WLAN-WiMAX and WLAN-UMTS was difficult without carefully engineering the WLAN network due to differences between the networks. Key metrics like delay, throughput, and received traffic were analyzed and WiMAX generally had superior performance.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
The quality of service of the deployed LTE technology by mobile network opera...IJECEIAES
In this study, the real-world performance analysis of four Nigerian mobile network operators (MNOs), namely MTN, GLO, Airtel, and 9Mobile longterm evolution (LTE) cellular network, were analyzed and compared. The Nigerian MNOs utilize 5 MHz, 10 MH, and 20 MHz channel bandwidths based on third-generation partnership project’s (3 GPPs) recommendation. The presented analysis shows the uplink (UL), and downlink (DL) throughputs gaps in mobility condition as well as other LTE’s system quality of service (QoS) key performance indicators (KPI’s) of: Connection drop rate, connection failure rate, peak physical downlink throughput, minimum radio link control (RLC) downlink throughput threshold and latency are not strictly followed. The reason may be due to a lack of regulatory oversight enforcement. The comparative studies showed that MTN provides the best QoS. The introduction of novel LTE QoS metrics herein referred to as national independent wireless broadband quality reporting (NIWBQR) is the significant contribution of this study. The goal of this study is to show the quality of the network as it affects the user's experience. Important observation showed that all the MNOs are not adhering to the 3 GPPs specified user plane latency of 30 ms and control plane latency of 100 ms, respectively, which makes video streaming and low latency communication a near-impossible task.
5G Wireless Technology- An overview of the current TrendsEditor IJCATR
5G Wireless technology networks or 5th Generation wireless systems which is used for videos and audios
communication announcement the next major time period of mobile telecommunications Criterions time the current next
Generation mobile networks confederated .in this paper we are studying different Technologies in 5G The handover of 5G the
Models of 5G its architecture, its different components and METIS Task Force Networks. 2-Day video recording is available. Its
components access/backhaul integration, direct device-to-device communication, flexible duplex, flexible spectrum usage multiantenna
transmission, ultra-lean design, user/control separation architecture of 5G is highly advanced, its network elements and
various terminals are characteristically upgraded to afford a new situation. Likewise, service providers can implement the advance
technology to adopt the value-added services easily.
JOURNEY OF MOBILE GENERATION AND COGNITIVE RADIO TECHNOLOGY IN 5Gijmnct
The document summarizes the evolution of mobile generations from 0G to 5G and discusses how cognitive radio can help enable 5G networks. It describes the key technologies and capabilities of each generation from 0G to 4G. 5G is proposed as a solution to efficiently handle the increasing number of smart devices. Cognitive radio is presented as the backbone of 5G networks, as it can dynamically allocate spectrum when the primary user is absent. The combination of 5G and cognitive radio can provide high quality of service, high data rates, flexibility and adaptability.
Journey of mobile generation and cognititve radio technology in 5 gijmnct
The ever increasing number of smart network devices may reach up to 24 billion in year 2020 as stated in the recent survey conducted by Forbes magazine. This may obsolete the current 4G technology for handling smart bandwidth allocation to such a large number of devices. In order to cope the challenging
need for fast and efficient data transfer over these devices, demands next generation mobile network technology. In literature 5G technology has been suggested that offers appropriate solution to the above issues. 5G is a futuristic technology that would solve many problem of day to day life. By using 5G high data rates can be achieved in the range of Gbps with minimal latency. But the question is how to make such
futuristic technology realistic. This can be done by efficiently utilizing the bandwidth in the allotted spectrum. Despite numerous benefits, 5G may critically suffer from tedious implementation problems that have been discussed in this paper. Cognitive radio (CR) is an intelligent radio that works on the principle of dynamic spectrum allocation. Cognitive Radio is capable of learning and adapting to external environment and reuses the frequency when primary user is absent. This paper combine the advantage of two technology 5G terminal and Cognitive radio terminal where 5G provide quality of service and high data rate whereas Cognitive radio give flexibility and adaptability to 5G.
Energy efficient power control for device to device communication in 5G netw...IJECEIAES
Next generation cellular networks require high capacity, enhanced efficiency of energy and guaranteed quality of service (QoS). To reach these goals, device-to device (D2D) communication is a candidate technologie for future 5th Generation especially applications that require the reuse, the hop and the proximity gain. The present paper studies the energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) system composed of both regular cellular users and device-to-device (D2D) pairs. First, we analyze and model mathematically the prerequisites for D2D communications and classical cellular links in terms of minimum rate and maximum power requirement. Second, we use fractional programming in order to convert the initial problem into a concave one and we apply non-cooperative game theory in order to characterize the equilibrium. Then, we got the solution of the problem from the results of a water-filling power allocation. Moreover, we employ a distributed design for power allocation by means of three methods: a) Theory of fractional programming b) Closed form expression (the novelty is the use of Wright Omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are realized to demontrate the enhanced gain in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
The 5G system will not only be based on mobile communication itself but will also penetrate into various fields of the future society. The integration with traditional manufacturing and service industries will lead to a new form of “Internet +” and build a user-centric and comprehensive information ecosystem. To change people's production and lifestyle, and bring vitality to the development of China's economy and society today.
This document is a training report submitted by Jatin Kumar, a student at B.S. Anangpuria Institute of Technology and Management, in partial fulfillment of the requirements for a Bachelor of Technology degree in Electronics and Communication Engineering. The report provides an overview of the student's training at Electronics Niketan, under the Ministry of Communication and Information Technology, Government of India. It includes acknowledgments, a table of contents, and sections on the company profile, an introduction to cognitive radio and dynamic spectrum access, the history and background leading to cognitive radio, basic concepts of cognitive radio, and future applications.
The document discusses wireless network technologies and vertical handoffs. It introduces the motivation for intelligent vertical handoff techniques using artificial intelligence. Key points include:
1) Heterogeneous wireless networks integrate different technologies like WiFi, WiMAX and UMTS to provide seamless mobility but handoff decision making is challenging due to many parameters.
2) The document proposes using fuzzy logic for intelligent handoff necessity estimation and target network selection to maximize user satisfaction based on multiple criteria.
3) IEEE 802.16 standards including 802.16m, 802.16e, and 802.16j are discussed which focus on data rates up to 100Mbps for mobile and 1Gbps for fixed
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communication–based vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicle’s start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...IRJET Journal
This document provides an overview of the evolution of 5G networks and technologies, security schemes, and multiple access schemes used in mobile communications. It discusses the challenges faced by existing 4G networks in handling increased data usage and more devices. 5G is presented as the next generation technology aimed to support data rates up to 10Gbps, latency of 1ms, widespread coverage and availability, and reduced energy consumption. The document reviews key 5G concepts and radio network evolution. It also summarizes two security protocols - EPS-AKA and J-PAKE - and compares multiple access schemes such as OFDMA and SC-FDMA used for uplink transmission. In concluding, the document states that 5G will revolutionize mobile communication
Performance comparison of umts and lte on the basis of data ratesIAEME Publication
This document compares the 3G and 4G mobile communication technologies of UMTS and LTE. UMTS (3G) uses WCDMA technology and has a maximum theoretical downlink speed of 42Mbps, while LTE (4G) uses OFDM and more advanced MIMO schemes, providing much higher maximum theoretical downlink speeds of 100Mbps with the ability to reach 1Gbps. The document outlines the network architectures and standards of UMTS and LTE. It also lists the objectives of 4G networks in providing improved quality of service, mobility, bandwidth and a fully IP-based network compared to 3G technologies.
A survey on multiple access technologies beyond fourth generation wireless co...ijceronline
The future of mobile wireless communication networks will include existing 3rd generation, 4th generation 5th generation,6th generation (with very high data rates Quality of Service (QoS) and service applications) and 7th generation (with space roaming). Mobile and wireless networks have made tremendous growth in the last fifteen years. The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-ondemand, video conferencing system and many more applications. This paper is focused on the specifications of future generations and latest technologies to be used in future wireless mobile communication networks like MIMO, OFDM, OFDMA, Massive MIMO, LTE, LTE-A.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
[email protected]Received December 4, 2019, accepted JanuaTatianaMajor22
[email protected]
Received December 4, 2019, accepted January 7, 2020, date of publication January 13, 2020, date of current version January 24, 2020.
Digital Object Identifier 10.1109/ACCESS.2020.2966271
5G Technology: Towards Dynamic Spectrum
Sharing Using Cognitive Radio Networks
W. S. H. M. W. AHMAD 1, N. A. M. RADZI 1,2, (Senior Member, IEEE), F. S. SAMIDI1,
A. ISMAIL 1,2, (Member, IEEE), F. ABDULLAH 1,2, (Senior Member, IEEE),
M. Z. JAMALUDIN1,2, (Senior Member, IEEE), AND M. N. ZAKARIA3
1Institute of Power Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
2Electrical and Electronics Engineering Department, College of Engineering, Universiti Tenaga Nasional, Kajang 43000, Malaysia
3Architecture and Governance, Tenaga Nasional Berhad Information and Communication Technology (TNB ICT), Kuala Lumpur 59200, Malaysia
Corresponding author: N. A. M. Radzi ([email protected])
This work was supported in part by UNITEN R & D Sdn Bhd through Tenaga Nasional Berhad Seed Fund under Grant U-TC-RD-19-04,
and in part by the Universiti Tenaga Nasional BOLD2025 under Grant 10436494/B/2019019.
ABSTRACT The explosive popularity of small-cell and Internet of Everything devices has tremendously
increased traffic loads. This increase has revolutionised the current network into 5G technology, which
demands increased capacity, high data rate and ultra-low latency. Two of the research focus areas for meeting
these demands are exploring the spectrum resource and maximising the utilisation of its bands. However,
the scarcity of the spectrum resource creates a serious challenge in achieving an efficient management
scheme. This work aims to conduct an in-depth survey on recent spectrum sharing (SS) technologies
towards 5G development and recent 5G-enabling technologies. SS techniques are classified, and SS surveys
and related studies on SS techniques relevant to 5G networks are reviewed. The surveys and studies are
categorised into one of the main SS techniques on the basis of network architecture, spectrum allocation
behaviour and spectrum access method. Moreover, a detailed survey on cognitive radio (CR) technology
in SS related to 5G implementation is performed. For a complete survey, discussions are conducted on the
issues and challenges in the current implementation of SS and CR, and the means to support efficient 5G
advancement are provided.
INDEX TERMS 5G, new radio, spectrum sharing, spectrum efficiency, cognitive radio, enabling
technologies.
I. INTRODUCTION
5G is the next-generation mobile communication technol-
ogy designed to provide greater capacity and higher data
speeds than the previous generation Long Term Evolution
(LTE). 5G technology, which is expected to be realised
by 2020 [1], [2], promises ultra-low latency and ultra-
high reliability, thus enabling innovative services across
different industry sectors [3]. 5G standards are currently
under development and will include the evolution of exist-
ing LTE and 5G New Radio (N ...
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
This document summarizes a research paper that proposes a technique to improve the detection of false report attacks in wireless sensor networks (WSNs) using machine learning and a neural network. The technique evaluates report information gathered from base stations to identify invalid data and detect false report attacks, even when MAC information is compromised. This is an improvement over existing security protocols that rely on MAC-dependent validation, which cannot defend against extreme false report attacks. The proposed method uses a machine learning-based prediction model and evaluation function to verify false report attacks based on analyzing reports from the base station. This intelligent approach aims to help WSNs better defend against evolving attacks.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Brief Review on: Evolution of Communication Technologies Radha Mahalle
The document summarizes the evolution of communication technologies from wired to wireless and the development of machine-to-machine (M2M) communication and the Internet of Things (IoT). It discusses wired and wireless communication technologies and compares their characteristics. It then explains M2M technology and how it enables direct device connections. Next, it describes how IoT expanded upon M2M by connecting physical devices and sensors over the internet. It provides an overview of IoT architecture, protocols, applications and algorithms. Finally, it discusses future trends in IoT including low power sensing, efficient connectivity and reliable communication.
Review and Analysis of WiMAX Technology using different Modulation scheme wit...ijtsrd
The last few decades, there has been a incredible growth in the wireless communication technology. The growing demand of multimedia services and the growth of Internet related contents lead to increasing interest to high speed communications. The Wireless communication technology, affordable wireless service has become a reality. In wireless communication, radio propagation refers to the behavior of radio waves when they are propagated from transmitter to receiver. In the course of propagation, radio waves are mainly affected by three different modes of physical phenomena: reflection, diffraction, and scattering. In this paper, we analysis of MIMO-OFDM system employing different Modulation scheme is analysed using AWGN channel. The Simulation results show that this is a novel technique for next generation wireless systems using MATLAB toll R2013a. Arvind Yadav | Er. Praveen Kumar Patidar"Review and Analysis of WiMAX Technology using different Modulation scheme with AWGN Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11662.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11662/review-and-analysis-of-wimax-technology-using-different-modulation-scheme-with-awgn-channel/arvind-yadav
Optical network is an emerging technology for data communication
inworldwide. The information is transmitted from the source to destination
through the fiber optics. All optical network (AON) provides good
transmission transparency, good expandability, large bandwidth, lower bit
error rate (BER), and high processing speed. Link failure and node failure
haveconsistently occurred in the traditional methods. In order to overcome
the above mentioned issues, this paper proposes a robust software defined
switching enabled fault localization framework (SDSFLF) to monitor the
node and link failure in an AON. In this work, a novel faulty node
localization (FNL) algorithm is exploited to locate the faulty node. Then, the
software defined faulty link detection (SDFLD) algorithm that addresses the
problem of link failure. The failures are localized in multi traffic stream
(MTS) and multi agent system (MAS). Thus, the throughput is improved in
SDSFLF compared than other existing methods like traditional routing and
wavelength assignment (RWA), simulated annealing (SA) algorithm, attackaware RWA (A-RWA) convex, longest path first (LPF) ordering, and
biggest source-destination node degree (BND) ordering. The performance of
the proposed algorithm is evaluated in terms of network load, wavelength
utilization, packet loss rate, and burst loss rate. Hence, proposed SDSFLF
assures that high performance is achieved than other traditional techniques.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
This document compares emerging wireless technologies for the Internet of Things (IoT), including ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and various versions of Wi-Fi such as 802.11ah. It evaluates the capabilities of each technology in terms of data range and rate, network size, frequency channels, bandwidth, and power consumption. The document concludes that a multifaceted approach is needed to enable interoperable and secure communication in IoT applications using different wireless technologies and standards.
Application and growth of long-range communications technology in vehicular c...IJECEIAES
Long range communications technology (LoRa) has been widely used in a variety of applications and researched in different domains to exploit its full potential. Its openness makes it ideal for a variety of internet of things (IoT) installations which further allows opportunities for viable solutions in vehicular communications. Hence, a bibliometric analysis was performed to distinguish the application and growth of the technology specifically in vehicular communications. The scoping review processes from Arksey and O’Malley was applied to guide the review process. The selected scholarly works adhered to the PRISMA-Sc framework where 385 articles from two main electronic databases, i.e., Scopus and Science Direct which discussed LoRa in vehicular communications contexts were assessed. This study aims to examine how LoRa’s research has grown from year 2010 to 2021 among the scholars and determine key areas discussed in LoRa’s vehicular communications research. Findings from 70 studies in the final analysis indicated that LoRa has been widely studied based on application, theoretical or protocol and performance. However, it has not been widely explored in vehicular context. Hence, our findings support the global research community in this context.
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
Wireless communications, nowadays, becomes a vital element of people’s daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities, enabling technologies, and challenges from the perspective of the
integrated wireless systems. This paper aims to drive a comprehensive and comparative study on terrestrial-aerial platforms- satellite wireless communications systems, includes their characteristics and unravelling challenges. The comparison focuses on issues that reportedly can evaluate any wireless
systems for temporary events. These issues are altitude and coverage, Radio Frequency (RF) propagation, interference, handover, power supply constraints, deployment and maintenance challenges, reliability on special events or disaster relief, cost-effectiveness and environmental impact. Last, Quality of service (QoS) performance is analysed for the four wireless communication systems from the temporary events
perspective using the OPNET Modeller simulation tool. Results infer that space-based wireless systems outperform terrestrial ones.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...ijtsrd
The wireless communications is one of the most active areas of technology development of our time. Recently, orthogonal frequency division multiplexing has been regarded as one of the core technologies for various wireless communication systems. The BER level is depend on the modulation type, SNR value and channel behavior. The Modulation schemes that we have used in this thesis are 4 QAM, 8 QAM, 16 QAM and 64 QAM which further improved using forward error correction codes FEC . A comparison is made between the diversity gain of MIMO systems in terms of BER for high QAM modulation scheme. This work presents, by a simulation toll MATLAB R2013a used for model implemented using fading channel to the performance analysis of Bit Error rate BER V S Signal to Noise ratio SNR . Mona Ranjan | Praven K Patidar "Performance Analysis of MIMO System on Different Modulation Scheme over Rician Channel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31730.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31730/performance-analysis-of-mimo-system-on-different-modulation-scheme-over-rician-channel/mona-ranjan
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes
articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all
technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts
and establishing new collaborations in these areas.
The document summarizes planning and optimization of an LTE radio access network for an urban area in Taiz City, Yemen. It involved using simulation software to plan the network, including determining the number and locations of base stations. The network was then optimized using techniques like Automatic Cell Planning and Automatic Frequency Planning. This improved coverage from 90% to 98%, CINR from 65% to 77%, and increased total network traffic by 30%. The optimization reduced overlapping between sectors and interference, and increased throughput and coverage area.
Forwarding Strategy Performance in NDN Network : Case Study of Palapa Ring To...Syaiful Ahdan
NDN is one of five project funded by the National Science Fondation under its future internet Architecture Program. NDN has its roots in an erlier project, Conten-Centric
Networking (CCN), which Van Jacobson first publicly presented in 2006. NDN has changed the paradigm of the communication network for sending a packet to the destination address by identifyng by name. NDN emphasizes content by making it directly addressable and routable. Endpoints communicate based on named data instead of IP addresses.
Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...IJECEIAES
Millimeter wave bands have been introduced as one of the most promising solutions to alleviate the spectrum secrecy in the upcoming future cellular technology (5G) due the enormous amount of raw bandwidth available in these bands. However, the inherent propagation characteristics of mmWave frequencies could impose new challenges i.e. higher path loss, atmospheric absorption, and rain attenuation which in turn increase the outage probability and hence, degrading the overall system performance. Therefore, in this paper, a novel flexible scheme is proposed namely Adaptive Multi-State MmWave Cell Selection (AMSMCS) through adopting three classes of mmWave base stations, able to operate at various mmWave carrier frequencies (73, 38 and 28 GHz). Two mmWave cellular Grid-Based cell deployment scenarios have been implemented with two inter-site-distances 200 m and 300 m, corresponding to target area of (2.1 km2) and (2.2 km2). The maximum SINR value at the user equipment (UE) is taken in to consideration to enrich the mobile user experience. Numerical results show an improvement of overall system performance, where the outage probability reduced significantly to zero while maintaining an acceptable performance of the 5G systems with approximately more than 50% of the mobile stations with more than 1Gbps data rate.
This document compares the next-generation mobile broadband technologies LTE and WiMAX. It describes their quality of service (QoS) structures and how they are designed to support current and future QoS needs to sustain various application requirements. The document provides details on LTE and WiMAX standards, architectures, and QoS support through different bearer types and service flows.
Similar to Top 5 paper - International Journal of Computer Science and Engineering Survey (IJCSES) (20)
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Top 5 paper - International Journal of Computer Science and Engineering Survey (IJCSES)
1. Top 5 Most View Articles From
Academia in 2019
http://airccse.org/journal/ijcses/current2019.html
International Journal of Computer Science and
Engineering Survey (IJCSES)
ISSN : 0976-2760 ; 0976-3252
http://airccse.org/journal/ijcses/index.html
2. A SURVEY ON CALL ADMISSION CONTROL
SCHEMES IN LTE
Solomon Orduen Yese, Abdulhakeem Abdulazeez, Aminu
Mohammed, Maniru Malami Umar and Zaharadden Yusuf Yeldu
Department of Mathematics, Usmanu Danfodiyo University, Sokoto, Nigeria
ABSTRACT
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing
etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS)
requirements of these applications. Over the years, several CAC schemes have been proposed to
either accept or reject service requests. This paper presents a survey of these schemes under four
different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR
and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation
procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a
comparative analysis of these schemes is also presented. The analysis provides insight into the
challenges in the design of CAC by highlighting open research issues for future directions.
KEYWORDS
Call Admission Control, LTE, bandwidth degradation, bandwidth reservation, survey, CAC
For More Details : http://aircconline.com/ijcses/V10N5/10519ijcses01.pdf
Volume Link : http://airccse.org/journal/ijcses/current2019.html
3. REFERENCES
[1] Lee Y, Chuah T, Loo J, Vinel A. Recent advances in radio resource management for heterogeneous
LTE/LTE-A networks. IEEE Communications Surveys & Tutorials 2014; 16(4): 2142–2180.
[2] Mohammed A, Solomon Y, Isah B, Saidu I. A dynamic QoS-aware call admission control algorithm for
mobile broadband networks. IEEE International Conference on Computing Networking and Informatics
(ICCNI) 2017; 1(1): 1-6.
[3] 3GPP. Evolved universal terrestrial radio access (UTRA) and universal terrestrial radio access network
(UTRAN) radio interface protocol aspects. Third generation partnership project 2005; TR25.813(v.8.7.0):
1– 20.
[4] Zander J. Radio resource management in future wireless networks: requirements and limitations IEEE
Communications magazine 1997; 35(8): 30–36.
[5] 3GPP. LTE; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial
Radio Access Network (E-UTRAN); Overall description; Stage 2. Third generation partnership project
2009; TS 36.300(v.8.7.0): 1–148.
[6] Saidu I, Subramaniam S, Jaafar A, Zukarnain Z. A QoS-aware CAC with bandwidth reservation and
degradation scheme in IEEE 802.16e networks. Wireless Personal Communications 2015; 82(4): 2673–
2693.
[7] Navita A. A survey on quality of service in LTE network. International Journal of Science and Research
2015; 4(5): 370–375.
[8] Antonopoulos A, Kartsakli E, Alonso L, Verikoukis C. Dealing with VoIP Calls During “Busy Hour” in
LTE. Recent Advances in Wireless Communications and Networks 2011: 345–360.
[9] 3GPP. LTE; Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial
Radio Access Network (E-UTRAN); Overall description; Stage 2. Third generation partnership project
2010; TS 36.300(v9.4.0): 1–178.
[10] 3GPP. Policy and Charging Control Architecture (Release 11); Evolved Universal Terrestrial Radio Access
(E- UTRA) and Evolved Universal Terrestrial Radio Access (E-UTRAN). Third generation partnership
project 2011; TS 23.203(v. 11.0.1): 1–194.
[11] 3GPP. Technical specification group services and system aspects; Policy and charging control architecture.
Third generation partnership project 2014; TS 23.203(V9.14.0): 1–124.
[12] Mamman M, Hanapi ZM, Abdullah A, Muhammed A. Quality of Service Class Identifier (QCI) radio
resource allocation algorithm for LTE downlink. PloS one 2019; 14(1): 1–2.
[13] Hong D, Rappaport S. Traffic model and performance analysis for cellular mobile radio telephone systems
with prioritized and nonprioritized handoff procedures. IEEE transactions on Vehicular Technology 1986;
35(3): 77–92.
[14] Ramjee R, Towsley D, Nagarajan R. On optimal call admission control in cellular networks. wireless
networks 1997; 3(1): 29–41.
[15] Trifan R, R L, Y. LH. Mirroring LTE Scheduler Performance with an Adaptive Simulation Model. In: 2015
IEEE 81st Vehicular Technology Conference (VTC Spring). 2015; pp. 1-5
4. [16] Fang Y, Zhang Y. Call admission control schemes and performance analysis in wireless mobile networks.
IEEE Transactions on vehicular technology 2002; 51(2): 371–382.
[17] Khabazian M, Kubbar O, Hassanein H. Call admission control with resource reservation for multiservice
OFDM networks. In: IEEE International Conference on Computing, Networking and Communications
(ICNC); 2012: 781–785.
[18] Cruz-Perez FA, Lara-Rodriguez D, Lara M. Fractional channel reservation in mobile communication
systems. Electronics Letters 1999; 35(23): 2000–2002.
[19] AlQahtani SA. Delay aware and users categorizing-based call admission control for multi-services LTE-A
networks. Journal of King Saud University-Computer and Information Sciences 2017; 29(1):103–115.
[20] Guerin R. Queueing-blocking system with two arrival streams and guard channels. IEEE Transactions on
Communications 1988; 36(2): 153–163.
[21] Sallabi FM, Shuaib K. Downlink call admission control algorithm with look-ahead calls for 3GPP LTE
mobile networks. In: ACM; 2009: 712–715.
[22] Imre S, Lendvai K, Szabo S. Ring Based Call Admission Control Scheme for Future Mobile Networks. In:
IEEE 73rd Vehicular Technology Conference (VTC Spring); 2011: 1–5.
[23] Chowdhury MZ, Jang YM, Haas ZJ. Call admission control based on adaptive bandwidth allocation for
wireless networks. Journal of Communications and Networks 2013; 15(1): 15–24.
[24] Ramraj R, Habibi D, Ahmad I. Call Admission Control in 3GPP LTE Systems at High Vehicular
Communications. International Journal of Scientific & Engineering Research 2014; 5(3): 1146– 1153.
[25] Lei H, Yu M, Zhao A, Chang Y, Yang D. Adaptive connection admission control algorithm for LTE
systems. VTC Spring 2008-IEEE Vehicular Technology Conference 2008: 2336–2340.
[26] Rejeb SB, Nasser N, Tabbane S. A novel resource allocation scheme for LTE network in the presence of
mobility. Journal of Network and Computer Applications 2014; 46: 352–361.
[27] Khabazian M, Kubbar O, Hassanein H. A fairness-based preemption algorithm for LTE-Advanced. IEEE
Global Communications Conference (GLOBECOM) 2012: 5320–5325.
[28] Chadchan S, Akki C. Priority-Scaled Preemption of Radio Resources for 3GPPLTE Networks.
International Journal of Computer Theory and Engineering 2011; 3(6): 743–749.
[29] Qian M, Huang Y, Shi J, Yuan Y, Tian L, Dutkiewicz E. A novel radio admission control scheme for
multiclass services in LTE systems. In: IEEE Global Telecommunications Conference; 2009: 1– 6.
[30] Franklin V, Paramasivam K. Persistent Scheduler Based Call Admission Control for Long Term Evolution
(3GPP) Networks. The International Arab Conference on Information Technology (ACIT) 2013: 1-6.
[31] FRANKLIN VJ, Paramasivam K. Utility Based Scheduling and Call Admission Control for LTE (3GPP)
Networks. Journal of Information Technology and Software Engineering 2012; 2(5): 1–5.
[32] Franklin JV, others. Extensive DBA-CAC mechanism for maximizing efficiency in 3GPP: LTE networks.
International Conference on Recent Advances in Computing and Software Systems 2012:233–237.
5. [33] Furqan F, Hoang DB, Collings IB. LTE-Advanced fair intelligent admission control LTE-FIAC. In:
Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.;
2014: 1–4.
[34] Jadhav VS, Kolekar UD. Fuzzy-based decisive approach for call admission control in the LTE networks.
Evolutionary Intelligence. 2019:1-8.
[35] Khitem BA, Zarai F, Kamoun L. Reducing handoff dropping probability in 3GPP LTE Network. In: IEEE.;
2010: 1–8.
[36] Priya S, Franklin J. Dynamic bandwidth adaptation supported adaptive call admission control mechanism
for 3GPP: LTE networks. International Journal of Communications and Engineering 2012; 6(2): 53–57.
[37] Zarai F, Ali KB, Obaidat MS, Kamoun L. Adaptive call admission control in 3GPP LTE networks.
International Journal of Communication Systems 2014; 27(10): 1522–1534.
[38] Belghith A, Turki N, Cousin B, Obaidat MS. Flexible call admission control with preemption in LTE
networks. In: IEEE International Conference on Communications (ICC); 2016: 1–7.
[39] Wang J, Qiu Y. A new call admission control strategy for LTE femtocell networks. In: 2nd
International
Conference on Advances in Computer Science and Engineering (CSE); 2013: 334–338.
[40] Franklin J, Paramasivam K. Efficient channel state-based call admission control for non real time traffic in
LTE (3GPP) networks. International Journal of Computer Science Issues (IJCSI) 2012; 9(2): 231–237.
[41] Ali KB, Obaidat MS, Zarai F, Kamoun L. Markov model-based adaptive CAC scheme for 3GPP LTE
femtocell networks. In: IEEE International Conference on Communications (ICC); 2015:6924–6928.
[42] Mamman M, Hanapi ZM, Abdullah A, Muhammed A. An adaptive call admission control with bandwidth
reservation for downlink LTE networks. IEEE Access 2017; 5: 10986–10994.
[43] Bae SJ, Lee JJ, Choi BG, Kwon S, Chung MY. A resource-estimated call admission control algorithm in
3GPP LTE system. In: International Conference on Computational Science and Its Applications; 2009:
250–260.
[44] Bojović B, Quer G, Baldo N, Rao RR. Bayesian and neural network schemes for call admission control in
lte systems. In: IEEE Global Communications Conference (GLOBECOM); 2013: 1246– 1252.
[45] Ovengalt CT, Djouani K, Kurien A. A fuzzy approach for call admission control in LTE networks. Procedia
Computer Science 2014; 32: 237–244.
[46] Franklin JV, Paramasivam K. Hybrid Adaptive Call Admission Control Mechanism for Ensuring QoS in
3GPP: LTE Networks. International Journal of Computer Applications 2012; 42(21): 36–41.
[47] Bae SJ, Choi MY, Lee JJ, Kwon S. Delay-aware Call Admission Control Algorithm in 3GPP LTE System.
In: TENCON IEEE Region 10 Conference; 2009: 1–6.
[48] Olariu C, Fitzpatrick J, Perry P, Murphy L. A QoS based call admission control and resource allocation
mechanism for LTE femtocell deployment. In: Arabian Journal for Science and Engineering; 2012: 884–
888.
[49] AlQahtani, S.A. Delay aware and users categorizing-based call admission control for multi-services LTE-A
networks. Arabian Journal for Science and Engineering, 41(9), 2016; 3631-3644.
6. Authors
Solomon Orduen Yese obtained a B.Sc. degree in Mathematics/Computer Science from University
of Agriculture Makurdi and recently obtained his MSc, degree in Computer Science from Usmanu
Danfodiyo University Sokoto. His research interests include; Quality of Service and Resource
Management in Wireless Networks, performance evaluation of wireless networks and emerging
wireless network technologies.
A. Abdulazeez received a BSc. degree in Computer Science from Usmanu Danfodiyo University
Sokoto (UDUS), Nigeria, in 2008. He recently obtained a M.Sc. degree in Computer Science at
UDUS, Nigeria. His research interest includes Resource Management in Wireless Networks.
A. Mohammed graduated with a BSc. degree in Mathematics from Usmanu Danfodiyo University
Sokoto, Nigeria in 1990. He obtained an MSc degree in Computer Science (distributed computing)
from University Putra Malaysia in 2003.He was awarded the Ph.D. in 2009 from University of
Glasgow, UK. He is currently With the Department of Mathematics (Computer Science Unit) of
Usmanu Danfodiyo University Sokoto, Nigeria. His current research interests include performance
modeling and evaluation of wired/wireless networks protocols, high- performancenetworks, and
distributed systems.
Maniru Malami Umar received B.Sc. degree in Computer Science from Usmanu Danfodiyo
University Sokoto, Nigeria, in the year 2013. He is currently pursuing MSc degree in Computer
Science at Usmanu Danfodiyo University Sokoto. His research interests include radio resource
management (RRM) techniques and Quality of Service (QoS) provisioning in wireless networks.
Zaharadeen Yusuf Yeldu obtained B.Sc. degree in Computer Science from Usmanu Danfodiyo
University Sokoto, Nigeria, in the year 2013. He is currently an Sc student in Computer Science at
Usmanu Danfodiyo University Sokoto. His research interests include radio resource management
(RRM), broadband technologies and power saving techniques in wireless networks.
7. REVIEW AND ANALYSIS ON TELECOMMUNICATION
NETWORKS INFRASTRUCTURE IN THE NORTHWEST
PROVINCE OF NIGERIA FOR OPTIMISATION:
PROBLEMS AND SOLUTIONS
Sanusi Mohammed Bunu1
, Murtala Muhammad2
and Hamid Abubakar Adamu3
,
1
Adamawa State Polytechnic, Nigeria,2
Adamawa State University Mubi, Nigeria and 3
Adamawa
State University Mubi, Nigeria
ABSTRACT
Telecommunication network infrastructure determines the strength of a country for
successful communication with other parts of the world. Due to the rapid increase of
internet usage and mobile communication in every part of the world, specifically the third
world countries, Nigeria is among the countries that is advancing in the used of
telecommunication contraptions. The Nigerian Telecommunication Industries play a vital
role in boosting the social and economic infrastructure of the country. This paper is aimed
at investigating the Telecommunication Network infrastructure in the Northwestern part of
Nigerian and propose some technologies that increase data bandwidth and internet
penetration in the region. Problems and future solutions to the existing network
infrastructure in the province were discussed and basic analysis is conducted to justify the
importance of the study. Mobile market analysis, current infrastructure, parameters
evaluation and the way forward to the problems are discussed. Comparative analysis
between the existing network infrastructure that is 3G networks and the proffer solution to
the existing standard which is 4G network is also conducted. This paper also conducts an
analysis on the existing Network providers in the region with their draw backs and the
quality of services they provide to the customers within the region. The paper concludes
with a future plan of coming up with an analytical solution in order to study the
implementation process of a full 4G network in the Northwest region of Nigeria and to use
a simulated environment to test the proposed model for viability.
KEYWORDS
Telecommunication, 3G networks, 4G Networks, Northwest Nigeria
For More Details: http://aircconline.com/ijcses/V10N1/10119ijcses01.pdf
Volume Link: http://airccse.org/journal/ijcses/current2019.html
8. REFERENCES
[1] N. C. Commission, "Subscriber statistics," Retrieved on 2nd February, 2018.
[2] H. Gruber and P. Koutroumpis, "Mobile telecommunications and the impact on economic development,"
Economic Policy, vol. 26, no. 67, pp. 387-426, 2011.
[3] K. M. Reilly and M. L. Smith, "The emergence of open development in a network society," Open
development: Networked innovations in international development, pp. 15-50, 2013.
[4] T. T. Alabar, O. Egena, and R. I. Gbande, "Service quality and customer satisfaction in Nigerian
mobile telephony," International Proceedings of Economics Development and Research, vol. 82, p.108,
2014.
[5] G. Intelligence, "Sub-Saharan Africa Mobile Economy 2013," See
http://www.gsmamobileeconomyafrica. com/Sub-Saharan% 20Africa_ME_Report_English_2013. pdf
(last checked 19 September 2014), 2013.
[6] J. Adewoye and T. Akanbi, "Role of Information and Communication Technology Investment on the
Profitability of Small Medium Scale Industries-A Case of Sachet Water Companies in Oyo State,
Nigeria," Journal of Emerging Trends in Economics and Management Sciences, vol. 3, no. 1, p. 64,2012.
[7] E. Agwu and A.-L. Carter, "Mobile phone banking in Nigeria: benefits, problems and prospects,"2018.
[8] A. Milek, C. Stork, and A. Gillwald, "Engendering communication: a perspective on ICT access and usage
in Africa," info, vol. 13, no. 3, pp. 125-141, 2011.
[9] K. Kumaravel, "Comparative study of 3G and 4G in mobile technology," International Journal of
Computer Science Issues (IJCSI), vol. 8, no. 5, p. 256, 2011.
[10] K. Kumar, J. Liu, Y.-H. Lu, and B. Bhargava, "A survey of computation offloading for mobile
systems," Mobile Networks and Applications, vol. 18, no. 1, pp. 129-140, 2013.
[11] A. K. Mogal, "Wireless mobile communication-a study of 3G technology," International Journal of
Advanced Networking and Applications, vol. 3, no. 5, p. 1, 2012.
[12] P. Gigis, V. Kotronis, E. Aben, S. D. Strowes, and X. Dimitropoulos, "Characterizing User-to-User
Connectivity with RIPE Atlas," in Proceedings of the Applied Networking Research Workshop,
2017,pp. 4-6: ACM.
[13] J.-Y. Le Boudec and P. Thiran, Network calculus: a theory of deterministic queuing systems for the
internet. Springer Science & Business Media, 2001.
[14] B. Palanisamy and L. Liu, "Attack-resilient mix-zones over road networks: architecture and
algorithms," IEEE Transactions on Mobile Computing, vol. 14, no. 3, pp. 495-508, 2015.
[15] D. F. Mojisola and K. Gbolahan, "Participatory Analysis of Cellular Network Quality of Service,"
International Journal of Computing & ICT Research, vol. 9, no. 1, 2015.
[16] R. Brenner et al., "Development of Wireless Techniques in Data and Power Transmission-Application
for Particle Physics Detectors," arXiv preprint arXiv:1511.05807, 2015.
[17] M. Poblet, "Affordable telecommunications," Australian Journal of Telecommunications and the Digital
Economy, vol. 1, no. 1, 2013.
[18] K.-D. Chang, C.-Y. Chang, H.-M. Liao, J.-L. Chen, and H.-C. Chao, "A Framework for IoT objects
management based on future internet IoT-IMS communication platform," in Innovative Mobile and
Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on, 2013, pp.
558-562: IEEE.
9. [19] F. Ibikunle, O. Jakpa, and D. Ike, "Broadband Wireless Access Deployment Approach to Rural
Communities," Journal of Computer Networks, vol. 1, no. 3, pp. 38-45, 2013.
[20] W.-H. Sheen, S.-J. Lin, and C.-C. Huang, "Downlink optimization and performance of relay-assisted
cellular networks in multicell environments," IEEE Transactions on Vehicular Technology, vol. 59,no. 5,
pp. 2529-2542, 2010.
[21] K. Santhi and G. S. Kumaran, "WIMAX WITH WI-FI: OPENING NEW FRONTIERS IN
EDUCATION."
[22] J. Lambo, "Telecommunications-Nigeria," 2013.
[23] S.-j. Kim, H. Lee, and M. Lee, "A Study of 4G Network for Security System," The International Journal of
Advanced Culture Technology, vol. 3, no. 2, pp. 77-86, 2015.
[24] A. Rusan and R. Vasiu, "Emulation of backhaul packet loss on the LTE S1-U interface and impact on
end user throughput," in Intelligent Computer Communication and Processing (ICCP), 2015 IEEE
International Conference on, 2015, pp. 529-536: IEEE.
[25] X. Zhang et al., "DSPP mutation in dentinogenesis imperfecta Shields type II," Nature genetics, vol.27, no.
2, p. 151, 2001.
[26] A. K. Salkintzis, "Wireless IP with GPRS: Fundamental operational aspects," in 4th Int. Symp.Wireless
Personal Multimedia Communications, 2001, pp. 7-15.
10. Automatic Facial Expression Analysis A Survey
C. P. Sumathi1, T. Santhanam2 and M. Mahadevi1,
1SDNB Vaishnav College for Women, India and 2DG Vaishnav College for Men, India
ABSTRACT
The Automatic Facial Expression Recognition has been one of the latest research topic since
1990’s.There have been recent advances in detecting face, facial expression recognition and
classification. There are multiple methods devised for facial feature extraction which helps in
identifying face and facial expressions. This paper surveys some of the published work since 2003 till
date. Various methods are analysed to identify the Facial expression. The Paper also discusses about
the facial parameterization using Facial Action Coding System(FACS) action units and the methods
which recognizes the action units parameters using facial expression data that are extracted. Various
kinds of facial expressions are present in human face which can be identified based on their geometric
features, appearance features and hybrid features . The two basic concepts of extracting features are
based on facial deformation and facial motion. This article also identifies the techniques based on the
characteristics of expressions and classifies the suitable methods that can be implemented.
KEYWORDS
Facial Expression, FACS, Geometric Features, Appearance Features, Deformation, Facial Motion.
For More Details: http://airccse.org/journal/ijcses/papers/3612ijcses04.pdf
Volume Link: http://airccse.org/journal/ijcses/current2012.html
11. REFERENCES
[1] G.Donato, M.S.Barlett, J.C.Hager, P.Keman, T.JSejnowski, ”Classifying Facial actions”, IEEE
Trans.Pattern Analysis and Machine Intelligence,Vol.21 No.10 PP.974-989 ,1999.
[2] P.Ekman and W.V.Friesen.”Facial Action Coding System” .Consulting Pshychologists Press Inc.,577
College Avenue,Palo Alto,California 94306,1978.
[3] A.Mehrabian ,”Communication without Words,” Psychology Today ,Vol.2,no.4 ,pp.53-56,1968.
[4] P. Dulguerov, F. Marchal, D. Wang, C. Gysin, P. Gidley, B.Gantz, J. Rubinstein, S. Sei7, L.Poon, K. Lun,
Y. Ng, “Review Of objective topographic facial nerve evaluation methods”, Am.J.Otol. 20 (5) (1999)
672–678.
[5] J.Ostermann,“Animation of synthetic faces in Mpeg-4”, Computer Animation, pp. 49-51,Philadelphia,
Pennsylvania,June 8-10, 1998
[6] B. Fasel,Juergen Luettin,”Automatic facial expression analysis: a survey, Pattern Recognition(2003)
259 – 275.
[7] Maja Pantic, Student Member, IEEE, and Leon J.M. Rothkrantz, “Automatic Analysis of Facial
Expressions:The State of the Art”, IEEE Transactions on Pattern Analysis and Machine Intelligence,
Vol. 22, No. 12, December 2000
[8] Vinay Kumar Bettadapura, “Face Expression Recognition and Analysis:The State of the Art”. College
of Computing, Georgia Institute of Technology.
[9] P.Ekman and W.V.Friesen , “Manual for the facial action coding system,”Consulting Psychologists
Press,1977.
[10] P. Ekman, W.V. Friesen, J.C. Hager, “Facial Action Coding System Investigator’s Guide,” A Human
Face, Salt Lake City, UT, 2002.Consultant Pschologists Press
[11] Yingli Tian, Takeo Kanade and Jeffrey F. Cohn,” Recognizing Upper Face Action Units for Facial
Expression Analysis”. Consultant Pschologists Press
[12] Ying-li Tian , Takeo Kanade, Jeffrey F.Cohn,” Recognizing Lower Face Action Units for Facial
Expression Analysis”. Consultant Pschologists Press
[13] Anastasios C. Koutlas, Dimitrios I. Fotiadis “A Region Based Methodology for facial expression
recognition.” Systems, Man and Cybernetics, 2008. SMC 2008.
[14] Ahmed Bilal Ashraf, Simon Lucey, Jeffrey F. Cohn, Tsuhan Chen, Zara Ambadar, Kenneth M.
Prkachin,Patricia E. Solomon”The painful face – Pain expression recognition using active appearance
models”, Image and Vision Computing 27 (2009) 1788–1796
[15] Maja Pantic,Ioannsi Patras , “Dynamics of facial expression and their temporal segments from face
profile image sequences”. IEEE Transactions on Systems,Man ande Cybernetics .
[16] Jacob Whitehill ,Gwen Littlewort ,Ian Fasel,Marian Bartlett, Member IEEE,Javier Movellan. “Toward
Practical Smile Detection” , IEEE Transactions on Pattern Analysis and Machine Intelligence , Vol
31.No11. November 2009.
[17] Marian Stewart Bartlett,Gwen C.Littlewort , Mark.G.Frank,Claudia Lainscsek,Ian R.Fasel,Javier
Movellan,”Automatic Recognition of facial actions in spontaneous expressions”,Journal of Multimedia
Vol 1,No.6 September 2006.
12. [18] M.S.Bartlett,G.Littlewort,I.Fasel,J.R.Movellan, “Real time face detection and expression
recognition:Development and application to human-computer interaction,Proceedings” .CVPR
Worshop on computer vision and Pattern recognition for human-computer interaction
[19] H.Rowley, S.Baluja, T.Kanade “Neural Network based face detection” ,IEEE Trans.Pattern Analysis and
Machine Intelligence,Vol.20,no.1pp 23-28.
[20] K.K.Sung & T.Poggio “Example based learning for view based human face detection”.IEEE
Transactions Pattern analysis and machine intelligence,Vol.20,No.1 pp: 39-51
[21] P.Viola,M.Jones .”Robust real time face detection”,Computer vision 2004,vol.57 no.2 pp 137- 154
[22] P.Wang , Q.Ji “Multiview face detection under complex scene based on combined SVMs”,Proceedings
IEEE International conference on Pattern recognition 2004,vol.4pp174-182
[23] Mohammed Yeasin,Senior Member IEEE,Baptiste Bullot,Rajeev Sharma,Member IEEE “Recognition of
Facial Expressions and Measurement of Levels of Interest from video”.IEEE Transactions on
Multimedia Vol.8 No.3,June 2006
[24] Yan Tong ,Yang Wang,Zhiwei Zhu,Qiang Ji ,”Robust Facial Feature Tracking under varying face pose
and facial expression”,Pattern Recognition (40) 2007.
[25] L. Wiskott, J.M. Fellous, N. Krüger, C.V. der Malsburg, “Face recognition by elastic bunch graph
matching”, IEEE Trans. Pattern Anal. Mach. Intell. 19 (7) (1997) 775–779
[26] Iodanis Mpiperis,Soteris Malassiotis and Michael G. Strintzis , “Bilinear Models for 3D face and facial
expression recognition”.IEEE transactions on Information forensics and security.
[27] Jun Wang,Lijun Yin,Xialozhou Wei and Yi sun, “3D facial expression recognition based on primitive
surface feature distribution.” Department of Computer Science State University of New York at
Binghamton
[28] Tian, Y.-L., Brown, L., Hampapur, A., Pankanti, S., Senior, A., Bolle, R.: “Real world realtime
automatic recognition of facial expressions”. In: Proceedings of IEEE Workshop on Performance
Evaluation of Tracking and Surveillance, Graz, Austria (2003)
[29] Maja Pantic,Leon J.M Rothkrantz ,”Facial Action Recognition for Facial Expression Analysis from
static face Images” IEEE Transactions on System and Cybernetics Vol 34.No.3 2004.
[30] Irane Kotsia and Ioannis Patras,Senior Member IEEE .” Facial Expression Recognition in Image
Sequences using Geometric Deformation Features and SVM”, IEEE Transactions on Image Processing
Vol16.No.1 January 2007.
[31] Hong-Bo Deng ,Lian – Wen Jin ,Li-Xin Zhen, Jian –Cheng Huang, “A New Facial Expression
Recognition Method based on Local Gabor Filter Bank and PCA plus LDA” . International Journal of
Information Technology Vol. 11 No. 11 2005
[32] S. Lucey, A. Ashraf, and J. Cohn, “Investigating Spontaneous Facial Action Recognition through
AAM Representations of the Face,” Face Recognition, K. Delac and M. Grgic, eds., pp.275-286, I-Tech
Education and Publishing, 2007.
[33] C. Huang, Y, Huang,”Facial expression recognition using model-based feature extraction and action
parameters classification”, J. Visual Commun. Image Representation 8 (3)1997.
[34] Gabriele Fanelli, Angela Yao, Pierre-Luc Noel, Juergen Gall, and Luc Van Gool, “Hough Forest-based
Facial Expression Recognition from Video Sequences”. International Workshop on Sign, Gesture and
Activity (SGA) 2010, in conjunction with ECCV 2010.September 2010.
13. [35] Pooja Sharma, Feature Based Method for “Human Facial Emotion Detection using optical Flow Based
Analysis”, International Journal of Research in Computer Science eISSN 2249-8265 Volume 1 Issue 1
(2011) pp. 31-38
[36] Sander Koelstra, Student Member, IEEE, Maja Pantic, Senior Member, IEEE, and Ioannis (Yiannis)
Patras, Member, IEEE, “A Dynamic Texture-Based Approach to Recognition of Facial Actions and
Their Temporal Models”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 32, No.
11, November 2010
[37] Devi Arumugam, Dr.S.Purushothaman, “Emotion Classification using Facial Expression” International
Journal of Advanced Computer Science and Applications Vol.2 No.7, 2011
[38] Shishir Bashyal,Ganesh k.Venayagamoorthy “Recognizing facial expressions using gabor wavelets and
vector quantization”.Engineering Application of Artificial Intelligence(21) 2008.
[39] Petar S.Aleksic,Member IEEE.Aggelos K.Katsaggelos,Fellow Member,IEEE,” Animation Parameters and
Multistream HMM’s,IEEE Transactions on Information Forensics and Security”,Vol.1 No.1 March 2006.
[40] Marian Stewart Bartlett, Gwen Littlewort , Mark Frank , Claudia Laincsek ,Ian Fasel ,Javier
Movellan.”Recognizing Facial Expression:Machine Learningand Application to Spontaneous
Behavior “Computer Vision and Pattern Recognition 2005
[41] Peng Yang,Qingshan Liu,DimitrisN.Metaxas ,”Boosting Encoded dynamic features for facial Expression
recognition”,Pattern Recognition Letters(30)2009.
[42] Moriyama, T., Kanade, T., Cohn, J., Xiao, J., Ambadar, Z., Gao, J., Imanura, M.: “Automatic recognition
of eye blinking in spontaneously occurring behaviour”. In: Proceedings of the 16th International
Conference on Pattern Recognition (ICPR ’2002), vol. 4, pp. 78–81 (2002)
[43] Xiao, J., Moriyama, T., Kanade, T., Cohn, J.: “Robust full-motion recovery of head by dynamic
templates and re-registration techniques”. Int. J. Imaging Syst. Technol. (2003)
[44] Le Hoang Thai, Nguyen Do Thai Nguyen and Tran Son Hai,member,IACSIT, “A Facial Expression
Classification System Integrating Canny, Principal Component Analysis and Artificial Neural
Network”,International Journal of Machine Learning and Computing, Vol. 1, No. 4, October 2011.
[45] L. Ma and K. Khorasani “Facial Expression Recognition Using Constructive Feedforward Neural
Networks”, IEEE Transactions on systems, man,and Cybernetics-Part B: Cybernetics, Vol. 34, No. 3,
June 2004
[46] Amir Jamshidnezhad, Md jan Nordin , “ A Classifier Model based on the Features Quantitative
Analysis for Facial Expression Recognition” , Proceeding of the International Conference on Advanced
Science, Engineering and Information Technology 2011
[47] Maja Pantic and Ioannis Patras, “Detecting Facial Actions and their Temporal Segments in Nearly
Frontal-View Face Image Sequences”, 2005 IEEE International Conference on Systems, Man and
Cybernetics Waikoloa, Hawaii October 10-12, 2005
[48] Yunfeng Zhu, Fernando De la Torre, Jeffrey F. Cohn, Associate Member, IEEE,and Yu-Jin Zhang, Senior
Member, IEEE”Dynamic Cascades with Bidirectional Bootstrapping for Action Unit Detection in
Spontaneous Facial Behavior”, Journal of LATEX Class Files, October 2010 .
[49] Gwen C. Littlewort, Marian Stewart Bartlett, Kang Lee, “Faces of Pain: Automated Measurement of
Spontaneous Facial Expressions of Genuine and Posed Pain”, ICMI’07, November 12–15, 2007,
Nagoya, Aichi, Japan.
14. The Implication of Statistical Analysis and Feature
Engineering for Model Building Using Machine
Learning Algorithms
Swayanshu Shanti Pragnya and Shashwat Priyadarshi, Accenture, India
ABSTRACT
Scrutiny for presage is the era of advance statistics where accuracy matter the most. Commensurate
between algorithms with statistical implementation provides better consequence in terms of accurate
prediction by using data sets. Prolific usage of algorithms lead towards the simplification of
mathematical models, which provide less manual calculations. Presage is the essence of data science
and machine learning requisitions that impart control over situations. Implementation of any dogmas
require proper feature extraction which helps in the proper model building that assist in precision.
This paper is predominantly based on different statistical analysis which includes correlation
significance and proper categorical data distribution using feature engineering technique that unravel
accuracy of different models of machine learning algorithms.
KEYWORDS
Correlation, Feature engineering, Feature selection, PCA, K nearest neighbour, logistic regression,
RFE
For More Details: http://aircconline.com/ijcses/V10N3/10319ijcses01.pdf
Volume Link: http://airccse.org/journal/ijcses/current2019.html
15. REFERENCES
[1] GE, “Flight Quest Challenge,” Kaggle.com. [Online]. Available: https://www.kaggle.com/c/flight2-final.
[Accessed: 2-Jun-2017].
[2] “Titanic: Machine Learning from Disaster,” Kaggle.com. [Online]. Available:
https://www.kaggle.com/c/titanic. [Accessed: 2-Jun-2017].
[3] Wiki, “Titanic.” [Online]. Available: https://en.wikipedia.org/wiki/Titanic.. [Accessed: 2-Jun-2017].
[4] Kaggle, Data Science Community, [Online]. Available: http://www.kaggle.com/ [Accessed: 2-Jun2017].
[5] Multiple Regression, [Online] Available: https://statistics.laerd.com/spss-tutorials/multipleregression-
usingspss-statistics.php [Accessed: 2-Jun-2017].
[6] Logistic Regression, [Online] Available: https://en.wikipedia.org/wiki/Logistic_regression [Accessed:
2-Jun2017].
[7] Consumer Preferences to Specific Features in Mobile Phones: A Comparative Study [Online] Available:
http://ermt.net/docs/papers/Volume_6/5_May2017/V6N5-107.pdf.
[8] Multiple Linear Regression, [Online] Available http://www.statisticssolutions.com/assumptions-
ofmultiplelinear-regression/ [Accessed: 3-Jun-2017]
[9] Prediction of Survivors in Titanic Dataset: A Comparative Study using Machine Learning Algorithms
Tryambak Chatterjee* Department of Management Studies, NIT Trichy, Tiruchirappalli, Tamilnadu, India
16. A Survey on Internal Validity Measure for
Cluster Validation
L.Jegatha Deborah, R.Baskaran and A.Kannan ,
Anna University – Chennai
ABSTRACT
Data Clustering is a technique of finding similar characteristics among the data set which are always
hidden in nature and grouping them into groups, called as clusters. Different clustering algorithms
exhibit different results, since they are very sensitive to the characteristics of original data set
especially noise and dimension. The quality of such clustering process determines the purity of cluster
and hence it is very important to evaluate the results of the clustering algorithm. Due to this, Cluster
validation activity had been a major and challenging task. The major factor which influences cluster
validation is the internal cluster validity measure of choosing the optimal number of clusters. The
main objective of this article is to present a detailed description of the mathematical working of few
cluster validity indices and not all, to classify these indices and to explore the ideas for the future
promotion of the work in the domain of cluster validation. In addition to this, a maximization
objective function is defined assuming to provide a cluster validation activity.
KEYWORDS
Data clustering, cluster, cluster purity, cluster analysis, cluster validation, cluster validity indices.
For More Details: http://airccse.org/journal/ijcses/papers/1110ijcses07.pdf
Volume Link: http://airccse.org/journal/ijcses/currentissue.html
17. REFERENCES
1. James C. Bezdek, Fellow, IEEE, and Nikhil R. Pal, (1998) “Some New Indexes of Cluster Validity”, IEEE
transactions on Systems, Man, and Cybernetics—Part b: Cybernetics, vol. 28, no. 3.
2. http://en.wikipedia.org/wiki/Convex_hull.
3. J. C. Bezdek, W. Q. Li, Y. Attikiouzel, and M. Windham,(1997) “A geometric approach to cluster validity
for normal mixtures,” Journal on Soft Computing – A Fusion of Foundations, Methodologies and
Applications, vol. 1, no.4, 166–179.
4. A. Jain and R. Dubes, (1998) “Algorithms for Clustering Data”, Englewood Cliffs, NJ: Prentice Hall.
5. Maria Halkidi Michalis Vazirgiannis, (2001) “Clustering Validity Assessment: Finding the optimal
partitioning of a data set”, First IEEE International Conference on Data Mining (ICDM'01).
6. Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, Prabhakar Raghavan,(1998) "Automatic
Subspace Clustering of High Dimensional Data for Data Mining Applications". Proceedings of ACM
SIGMOD, vol. 27, Issue 2.
7. Alexander Hinneburg, Daniel Keim, (1998) "An Efficient Approach to Clustering in Large Multimedia
Databases with Noise". Proceeding of KDD '98.
8. Ujjwal Maulik, Sanghamitra Bandyopadhyay, (2002) “Performance Evaluation of Some Clustering
Algorithms and Validity Indices”, IEEE Transactions on Pattern Analysis And Machine Intelligence,
Vol. 24, No. 12.
9. L.O. Hall, I.B. Ozyurt, and J. C. Bezdek, (1999) “Clustering with a Genetically Optimized Approach,”
IEEE Transactions on Evolutionary Computation, vol. 3, no. 2,103-112.
10. R.B. Calinski and J. Harabasz, (1974) “A Dendrite Method for Cluster Analysis,” Communication in
Statistics – Simulation and Computation, Vol. 3, Issue 1, 1-27.
11. Minho Kim, R.S. Ramakrishna, (2005) “New indices for cluster validity assessment”, Elsevier Journal on
Pattern Recognition Letters 26, 2353–2363.
12. Berry, M.J.A., Linoff, G., (1997) “Data Mining Techniques: For Marketing, Sales, and Customer
Support”, John Wiley & Sons, Berlin.
13. Kadim Tas¸demir and Erzs´ebet Mer´enyi, (2007) “A new cluster validity index for prototype based
clustering algorithms based on inter- and intra-cluster density”, In Proceedings of International Joint
Conference on Neural Networks, 2007 (IJCNN 2007), Orlando, FL.
14. K.L Wu, and M.S. Yang, "A cluster validity index for fuzzy clustering,(2005) "ElSevier Journal on
Pattern Recognition Letters, vol. 26, Issue 9, 1275–1291.
15. U. Maulik, and S. Bandyopadhyay, (2002) "Performance evaluation of some clustering algorithms and
validity indices," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 12.
16. X.L. Xie, and G. Beni, (1991) "A validity measure for fuzzy clustering," IEEE Transactions on Pattern
Analysis and Machine Intelligence, Vol.13, no.8, pp.841–847.
17. Chang Wook Ahn and R.S. Ramakrishna, (2002) “A Genetic Algorithm for Shortest Path Routing
Problem and the Sizing of Populations”, IEEE Transactions on Evolutionary Computation, Vol.6, No.6.
18. Sanghoun Oh, Chang Wook Ahn, Moongu Jeon, (2008), “An Evolutionary Cluster Validation Index”,
Proceedings of 3rd International Conference on Bio- Inspired Computing: Theories and Applications,
BICTA 2008, 83-88.
18. 19. Nam Hyun Park, Chang Wook Ahn, and R.S. Ramakrishna, (2005) “Adaptive Clustering Technique Using
Genetic Algorithms”, IEICE Transactions on Information and System, Vol.E88-D. No.12.
20. C.-H Chou, M.-C. Su, and E. Lai, (2006) “A new cluster validity measure and its application to image
Compression Sergios Theodoridis”, Pattern Recogniton (Third Edition), Academic Press, Inc. Orlando, FL,
USA.
21. Sriparna Saha and Sanghamitra Bandyopadhyay, (2009) “A Validity Index Based on Connectivity”,Seventh
International Conference on Advances in Pattern Recognition.
22. C. H. Chou, M. C. Su, and E. Lai, (2004) “A new cluster validity measure and its application to image
compression,” ACM Journal on Pattern Analysis and Applications, vol. 7, Issue 2, 205–220.
23. S. Bandyopadhyay and S. Saha, (2008) “A point symmetry based clustering technique for automatic
evolution of clusters,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 11, 1–17.
24. S. Saha and S. Bandyopadhyay, (2008) “Application of a new symmetry based cluster validity index for
satellite image segmentation,” IEEE Geoscience and Remote Sensing Letters, vol. 5, no. 2, 166–170.
25. Deng Ying,Yang Shuangyuan ,and Liu Han, (2009) “A Subtractive Based Subspace Clustering Algorithm on
High Dimensional Data”, Proceedings of the 1st International Conference on Information Science and
Engineering (ICISE2009).
26. H. Sun and M. Sun, (2006) “Trail-and-error approach for determining the number of clusters”[J]. ICMLC
2005, LNAI 3930, vol. 3930, 229 – 238.
27. Lifei Chen, Qingshan Jiang, Shengrui Wang, (2008) “Cluster validation for subspace clustering on high
dimensional data” [C], Proceeding of the 2008 IEEE Asia Pacific Conference on Circuits and Systems,
Macao:China.
28. L.Jing, M.K.Ng and J.Z.Huang, (2007) “An entropy weighting k-means algorithm for subspace clustering of
high-dimensional sparse data”[J]. IEEE Transactions on Knowledge and Data Engineering, vol.19, no.8, 1-16.
29. C.Domeniconi, D.Gunopulos, et al. (2007) “Locally adaptive metrics for clustering high dimensional data”,
ACM Journal on Data Mining and Knowledge Discovery, vol 14, Issue 1.
30. Zhiling Hong, Qingshan Jiang,Huailin Dong and Shengrui Wang. (2008) “A new cluster validity index for
fuzzy clustering”, Elsevier Journal on Information Sciences, vol. 178, Issue 4.
31. S.M. Pan and K.-S. Cheng, (2007) “Evolution-based tabu search approach to automatic clustering,” IEEE
Transactions on Systems, Man, and Cybernetics. C, Appl. Rev., vol. 37, no. 5, 827–838.
32. E. Hruschka, R. J. G. B. Campello, A. A. Freitas, and A. C. Ponce Leon F. de Carvalho, (2009) “A survey of
evolutionary algorithms for clustering,” IEEE Transactions on Systems, Man, and Cybernetics. C, Appl.
Rev., vol. 39, no. 2, 133–155.
33. U.Maulik, (2008) “Hierarchical pattern discovery in graphs,” IEEE Transactions on Systems, Man, and
Cybernetics C, Appl. Rev., vol. 38, no. 6, 867–872 .