Int. J. Pervasive Comput. Commun.最新文献

筛选
英文 中文
A novel OTP based tripartite authentication scheme 一种新的基于OTP的三方认证方案
Int. J. Pervasive Comput. Commun. Pub Date : 2021-08-19 DOI: 10.1108/ijpcc-04-2021-0097
S. A. Lone, A. H. Mir
{"title":"A novel OTP based tripartite authentication scheme","authors":"S. A. Lone, A. H. Mir","doi":"10.1108/ijpcc-04-2021-0097","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0097","url":null,"abstract":"\u0000Purpose\u0000Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication.\u0000\u0000\u0000Design/methodology/approach\u0000The proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and fingerprint) are used as a secret key between the client and the server. The current scheme adopts application-based authentication and guarantees data confidentiality and improved security because of the integration of biometrics with other factors and each time new challenge value by the server to client for OTP generation.\u0000\u0000\u0000Findings\u0000The proposed authentication scheme is implemented on real android-based mobile devices, tested on real users; experimental results show that the proposed authentication scheme attains improved performance. Furthermore, usability evaluation proves that proposed authentication is effective, efficient and convenient for users in mobile environments.\u0000\u0000\u0000Originality/value\u0000The proposed authentication scheme can be adapted as an effective authentication scheme to accessing critical information using android smartphones.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A survey on various handover technologies in 5G network using the modular handover modules 基于模块化切换模块的5G网络中各种切换技术综述
Int. J. Pervasive Comput. Commun. Pub Date : 2021-08-19 DOI: 10.1108/ijpcc-11-2020-0205
Sanjay Sudhir Kulkarni, A. Bavarva
{"title":"A survey on various handover technologies in 5G network using the modular handover modules","authors":"Sanjay Sudhir Kulkarni, A. Bavarva","doi":"10.1108/ijpcc-11-2020-0205","DOIUrl":"https://doi.org/10.1108/ijpcc-11-2020-0205","url":null,"abstract":"\u0000Purpose\u0000Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and small cell deployments. Handover management is one of the main problems in the heterogeneous network. Also, handover satisfies the needs of ultra-reliable communications along with very high reliability and availability in 5G networks. Handover management deals with every active connection of a user’s device, which moves the connection between the user’s device and the counterparty from one network point to another. Thus, the handover decision determines the best access network and also decides whether the handover is performed or not.\u0000\u0000\u0000Design/methodology/approach\u0000The main intention of this survey is to review several existing handover technologies in 5G. Using the categories of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods and used in the research works. Furthermore, the handover rate is considered for performance evaluation for the handover techniques in 5G. The drawbacks present in the existing review papers are elaborated in research gaps and issues division.\u0000\u0000\u0000Findings\u0000Through the detailed analysis and discussion, it can be summarized that the widely concerned evaluation metric for the performance evaluation is the handover rate. It is exploited that the handover rate within the range of 91%–99% is achieved by three research papers.\u0000\u0000\u0000Originality/value\u0000A survey on the various handover mechanisms in 5G networks is expected in this study. The research papers used in this survey are gathered from different sources such as Google Scholar and IEEE. Also, this survey suggests a further extension for the handover mechanism in 5G networks by considering various research gaps and issues.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research perspective on energy-efficient protocols in IoT: emerging development of green IoT 物联网节能协议研究展望:绿色物联网的新兴发展
Int. J. Pervasive Comput. Commun. Pub Date : 2021-08-16 DOI: 10.1108/ijpcc-10-2019-0079
Umakant L Tupe, S. Babar, Sonali P. Kadam, P. Mahalle
{"title":"Research perspective on energy-efficient protocols in IoT: emerging development of green IoT","authors":"Umakant L Tupe, S. Babar, Sonali P. Kadam, P. Mahalle","doi":"10.1108/ijpcc-10-2019-0079","DOIUrl":"https://doi.org/10.1108/ijpcc-10-2019-0079","url":null,"abstract":"\u0000Purpose\u0000Internet of Things (IoT) is an up-and-coming conception that intends to link multiple devices with each other. The aim of this study is to provide a significant analysis of Green IoT. The IoT devices sense, gather and send out significant data from their ambiance. This exchange of huge data among billions of devices demands enormous energy. Green IoT visualizes the concept of minimizing the energy consumption of IoT devices and keeping the environment safe.\u0000\u0000\u0000Design/methodology/approach\u0000This paper attempts to analyze diverse techniques associated with energy-efficient protocols in green IoT pertaining to machine-to-machine (M2M) communication. Here, it reviews 73 research papers and states a significant analysis. Initially, the analysis focuses on different contributions related to green energy constraints, especially energy efficiency, and different hierarchical routing protocols. Moreover, the contributions of different optimization algorithms in different state-of-the-art works are also observed and reviewed. Later the performance measures computed in entire contributions along with the energy constraints are also checked to validate the effectiveness of entire contributions. As the number of contributions to energy-efficient protocols in IoT is low, the research gap will focus on the development of intelligent energy-efficient protocols to build up green IoT.\u0000\u0000\u0000Findings\u0000The analysis was mainly focused on the green energy constraints and the different robust protocols and also gives information on a few powerful optimization algorithms. The parameters considered by the previous research works for improving the performance were also analyzed in this paper to get an idea for future works. Finally, the paper gives some brief description of the research gaps and challenges for future consideration that helps during the development of an energy-efficient green IoT pertaining to M2M communication.\u0000\u0000\u0000Originality/value\u0000To the best of the authors’ knowledge, this is the first work that reviews 65 research papers and states the significant analysis of green IoT.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Context-aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment 上下文感知辅助驾驶:在实时驾驶环境中减轻驾驶员风险的技术概述
Int. J. Pervasive Comput. Commun. Pub Date : 2021-08-16 DOI: 10.1108/ijpcc-11-2020-0192
S. Gite, K. Kotecha, G. Ghinea
{"title":"Context-aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment","authors":"S. Gite, K. Kotecha, G. Ghinea","doi":"10.1108/ijpcc-11-2020-0192","DOIUrl":"https://doi.org/10.1108/ijpcc-11-2020-0192","url":null,"abstract":"\u0000Purpose\u0000This study aims to analyze driver risks in the driving environment. A complete analysis of context aware assistive driving techniques. Context awareness in assistive driving by probabilistic modeling techniques. Advanced techniques using Spatio-temporal techniques, computer vision and deep learning techniques.\u0000\u0000\u0000Design/methodology/approach\u0000Autonomous vehicles have been aimed to increase driver safety by introducing vehicle control from the driver to Advanced Driver Assistance Systems (ADAS). The core objective of these systems is to cut down on road accidents by helping the user in various ways. Early anticipation of a particular action would give a prior benefit to the driver to successfully handle the dangers on the road. In this paper, the advancements that have taken place in the use of multi-modal machine learning for assistive driving systems are surveyed. The aim is to help elucidate the recent progress and techniques in the field while also identifying the scope for further research and improvement. The authors take an overview of context-aware driver assistance systems that alert drivers in case of maneuvers by taking advantage of multi-modal human processing to better safety and drivability.\u0000\u0000\u0000Findings\u0000There has been a huge improvement and investment in ADAS being a key concept for road safety. In such applications, data is processed and information is extracted from multiple data sources, thus requiring training of machine learning algorithms in a multi-modal style. The domain is fast gaining traction owing to its applications across multiple disciplines with crucial gains.\u0000\u0000\u0000Research limitations/implications\u0000The research is focused on deep learning and computer vision-based techniques to generate a context for assistive driving and it would definitely adopt by the ADAS manufacturers.\u0000\u0000\u0000Social implications\u0000As context-aware assistive driving would work in real-time and it would save the lives of many drivers, pedestrians.\u0000\u0000\u0000Originality/value\u0000This paper provides an understanding of context-aware deep learning frameworks for assistive driving. The research is mainly focused on deep learning and computer vision-based techniques to generate a context for assistive driving. It incorporates the latest state-of-the-art techniques using suitable driving context and the driver is alerted. Many automobile manufacturing companies and researchers would refer to this study for their enhancements.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authentication-based access control approach for enhancing security in pervasive computing environments 一种增强普适计算环境安全性的基于身份验证的访问控制方法
Int. J. Pervasive Comput. Commun. Pub Date : 2021-08-09 DOI: 10.1108/ijpcc-02-2021-0044
R. GnaneshwariG., M. Hema, S. Lingareddy
{"title":"Authentication-based access control approach for enhancing security in pervasive computing environments","authors":"R. GnaneshwariG., M. Hema, S. Lingareddy","doi":"10.1108/ijpcc-02-2021-0044","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2021-0044","url":null,"abstract":"\u0000Purpose\u0000Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.\u0000\u0000\u0000Design/methodology/approach\u0000This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.\u0000\u0000\u0000Findings\u0000The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.\u0000\u0000\u0000Originality/value\u0000The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of pervasive DA based FIR filter and feeder register based multiplier for software definedradio networks 软件无线网络中基于普适数据的FIR滤波器和基于馈线寄存器的乘法器的设计与实现
Int. J. Pervasive Comput. Commun. Pub Date : 2021-08-09 DOI: 10.1108/ijpcc-04-2021-0086
B. M. Kumar, H. Rangaraju
{"title":"Design and implementation of pervasive DA based FIR filter and feeder register based multiplier for software definedradio networks","authors":"B. M. Kumar, H. Rangaraju","doi":"10.1108/ijpcc-04-2021-0086","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0086","url":null,"abstract":"\u0000Purpose\u0000Digital signal processing (DSP) applications such as finite impulse response (FIR) filter, infinite impulse response and wavelet transformation functions are mainly constructed using multipliers and adders. The performance of any digital applications is dependent on larger size multipliers, area and power dissipation. To optimize power and area, an efficient zero product and feeder register-based multiplier (ZP and FRBM) is proposed. Another challenging task in multipliers is summation of partial products (PP), results in more delay. To address this issue, the modified parallel prefix adder (PPA) is incorporated in multiplier design. In this work, different methods are studied and analyzed for designing FIR filter, optimized with respect to area, power dissipation, speed, throughput, latency and hardware utilization.\u0000\u0000\u0000Design/methodology/approach\u0000The distributed arithmetic (DA)-based reconfigurable FIR design is found to be suitable filter for software-defined radio (SDR) applications. The performance of adder and multipliers in DA-FIR filter restricts the area and power dissipation due to their complexity in terms of generation of sum and carry bits. The hardware implementation time of an adder can be reduced by using PPA which is based on Ling equation. The MDA-RFIR filter is designed for higher filter length (N), i.e. N = 64 with 64 taps and this design is developed using Verilog hardware description language (HDL) and implemented on field-programmable gate array. The design is validated for SDR channel equalizer; both RFIR and SDR are integrated as single system and implemented on Artix-7 development board of part name XC7A100tCSG324.\u0000\u0000\u0000Findings\u0000The MDA-RFIR for N = 64 is optimized about 33% in terms of area-delay, power-speed product and energy efficiency. The theoretical and practical comparisons have been done, and the practically obtained results are compared with existing DA-RFIR designs in terms of throughput, latency, area-delay, power-speed product and energy efficiency are better about 3.5 times, 31, 45 and 29%, respectively.\u0000\u0000\u0000Originality/value\u0000The MDA-RFIR for N = 64 is optimized about 33% in terms of area-delay, power-speed product and energy efficiency.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized scheduling techniques focused on powerful heuristics leveraging cloud services soft computing 优化调度技术侧重于利用云服务软计算的强大启发式方法
Int. J. Pervasive Comput. Commun. Pub Date : 2021-08-05 DOI: 10.1108/ijpcc-04-2021-0087
P. Veerendra, T. Rao
{"title":"Optimized scheduling techniques focused on powerful heuristics leveraging cloud services soft computing","authors":"P. Veerendra, T. Rao","doi":"10.1108/ijpcc-04-2021-0087","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0087","url":null,"abstract":"\u0000Purpose\u0000Determining the roles of multiple CSPs is important because it affects job costs and time off. The primary objective of this work is to ensure an efficient and complex distribution of resources in cloud-based computing. Workflow study of various algorithms such as ant colony optimization (ACO), differential evolution algorithm, genetic algorithm, particle swarm optimization (PSO), hybridization of the above algorithms (ADGP). For research, CSP’s tools are put all over the world.\u0000\u0000\u0000Design/methodology/approach\u0000The main objective of this study is to effectively introduce cloud-based computing in CSPs. The algorithm minimizes resource response time and overall workflow tasks. It seeks to improve load balancing by modifying the algorithm to support load balancing. In the proposed multipurpose scheduling methods, the ADGP algorithm performs better than any other proposed algorithm during the resource response. This algorithm was found to be superior to the selected 200 sources and thousands of tasks. It reduces resource response time by copying service nodes through several sites. As this algorithm moves faster to the best solution, the response time of the resource is reduced compared to other algorithms.\u0000\u0000\u0000Findings\u0000Hybrid ACOs perform best when it comes to resource management when workloads are uniformly spread across multiple virtual machines. However, hybrids PSOs are better suited to choosing the best options to minimize costs. Overall, an optimal cloud-based scheduling solution can be successfully simulated using CloudSim in CSP to share resources between end-users to support consumers and users effectively.\u0000\u0000\u0000Originality/value\u0000Hybrid ACOs perform best when it comes to resource management when workloads are uniformly spread across multiple virtual machines. However, hybrids PSOs are better suited to choosing the best options to minimize costs. Overall, an optimal cloud-based scheduling solution can be successfully simulated using CloudSim in CSP to share resources between end-users to support consumers and users effectively.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved two factor fuzzy commitment scheme for securing IoT device 改进的物联网设备安全双因素模糊承诺方案
Int. J. Pervasive Comput. Commun. Pub Date : 2021-07-31 DOI: 10.1108/ijpcc-01-2021-0009
T. Yuvarani, R. ArunachalamA.
{"title":"Improved two factor fuzzy commitment scheme for securing IoT device","authors":"T. Yuvarani, R. ArunachalamA.","doi":"10.1108/ijpcc-01-2021-0009","DOIUrl":"https://doi.org/10.1108/ijpcc-01-2021-0009","url":null,"abstract":"\u0000Purpose\u0000Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.\u0000\u0000\u0000Design/methodology/approach\u0000This paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.\u0000\u0000\u0000Findings\u0000Moreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).\u0000\u0000\u0000Originality/value\u0000Thus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new imputation-based incomplete data-driven fuzzy modeling for accuracy improvement in ubiquitous computing applications 一种新的基于不完全数据驱动的模糊模型,用于提高普适计算应用的精度
Int. J. Pervasive Comput. Commun. Pub Date : 2021-07-27 DOI: 10.1108/ijpcc-03-2021-0069
S. Goel, M. Tushir
{"title":"A new imputation-based incomplete data-driven fuzzy modeling for accuracy improvement in ubiquitous computing applications","authors":"S. Goel, M. Tushir","doi":"10.1108/ijpcc-03-2021-0069","DOIUrl":"https://doi.org/10.1108/ijpcc-03-2021-0069","url":null,"abstract":"\u0000Purpose\u0000In real-world decision-making, high accuracy data analysis is essential in a ubiquitous environment. However, we encounter missing data while collecting user-related data information because of various privacy concerns on account of a user. This paper aims to deal with incomplete data for fuzzy model identification, a new method of parameter estimation of a Takagi–Sugeno model in the presence of missing features.\u0000\u0000\u0000Design/methodology/approach\u0000In this work, authors proposed a three-fold approach for fuzzy model identification in which imputation-based linear interpolation technique is used to estimate missing features of the data, and then fuzzy c-means clustering is used for determining optimal number of rules and for the determination of parameters of membership functions of the fuzzy model. Finally, the optimization of the all antecedent and consequent parameters along with the width of the antecedent (Gaussian) membership function is done by gradient descent algorithm based on the minimization of root mean square error.\u0000\u0000\u0000Findings\u0000The proposed method is tested on two well-known simulation examples as well as on a real data set, and the performance is compared with some traditional methods. The result analysis and statistical analysis show that the proposed model has achieved a considerable improvement in accuracy in the presence of varying degree of data incompleteness.\u0000\u0000\u0000Originality/value\u0000The proposed method works well for fuzzy model identification method, a new method of parameter estimation of a Takagi–Sugeno model in the presence of missing features with varying degree of missing data as compared to some well-known methods.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125868170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced optimization assisted interference mitigation with vertical beamforming in 3D MIMO-OFDMA for 5G wireless communication network 面向5G无线通信网络的3D MIMO-OFDMA垂直波束成形增强优化辅助干扰抑制
Int. J. Pervasive Comput. Commun. Pub Date : 2021-07-22 DOI: 10.1108/IJPCC-01-2021-0024
Ranjeeta Yadav, Ashutosh Tripathi
{"title":"Enhanced optimization assisted interference mitigation with vertical beamforming in 3D MIMO-OFDMA for 5G wireless communication network","authors":"Ranjeeta Yadav, Ashutosh Tripathi","doi":"10.1108/IJPCC-01-2021-0024","DOIUrl":"https://doi.org/10.1108/IJPCC-01-2021-0024","url":null,"abstract":"\u0000Purpose\u0000Multiple input multiple-output (MIMO) has emerged as one among the many noteworthy technologies in recent wireless applications because of its powerful ability to improve bandwidth efficiency and performance, i.e. through developing its unique spatial multiplexing capability and spatial diversity gain. For carrying out an enhanced communication in next-generation networks, the MIMO and orthogonal frequency division multiple systems were combined that facilitate the spatial multiplexing on resource blocks (RBs) based on time-frequency. This paper aims to propose a novel approach for maximizing the throughput of cell-edge users and cell-center users.\u0000\u0000\u0000Design/methodology/approach\u0000In this work, the specified multi-objective function is defined as the single objective function, which is solved by the introduction of a new improved algorithm as well. This optimization problem can be resolved by the fine-tuning of certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation. The fine-tuning of parameters is attained by a new improved Lion algorithm (LA), termed as Lion with new cub generation (LA-NCG) model. Finally, the betterment of the presented approach is validated over the existing models in terms of signal to interference plus noise ratio, throughput and so on.\u0000\u0000\u0000Findings\u0000On examining the outputs, the adopted LA-NCG model for 4BS was 66.67%, 66.67% and 20% superior to existing joint processing coordinated multiple point-based dual decomposition method (JC-DDM), fractional programming (FP) and LA models. In addition, the throughput of conventional JC-DDM, FP and LA models lie at a range of 10, 45 and 35, respectively, at the 100th iteration. However, the presented LA-NCG scheme accomplishes a higher throughput of 58. Similarly, the throughput of the adopted scheme observed for 8BS was 59.68%, 44.19% and 9.68% superior to existing JC-DDM, FP and LA models. Thus, the enhancement of the adopted LA-NCG model has been validated effectively from the attained outcomes.\u0000\u0000\u0000Originality/value\u0000This paper adopts the latest optimization algorithm called LA-NCG to establish a novel approach for maximizing the throughput of cell-edge users and cell-center users. This is the first that work uses LA-NCG-based optimization that assists in fine-tuning certain parameters such as assigned power for RB, cell-center user, cell-edge user and RB allocation.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信