{"title":"Millimeter Wave Cellular Communication Performances and Challenges: A Survey","authors":"Arebu Dejen, M. Ridwan, J. Anguera, J. Jayasinghe","doi":"10.4108/eetmca.v7i21.2424","DOIUrl":"https://doi.org/10.4108/eetmca.v7i21.2424","url":null,"abstract":"The demand for high data rates, combined with the exponential growth of mobile data trafficking, and has prompted the use of millimeter-wave (mm-wave) spectrum for 5G mobile communication. So, for constructive assessment, this study employed various research publications, institutional reports, and other materials given at the conference. This survey article investigates the features of the mm-wave propagation channel and highlights the main challenges, solutions, and benefits associated with their utilization, as well as an analysis of their performance. The researchers observed that by reducing the difficulties and significant losses with various strategies, mm-wave cellular communication may extend up to 200m in a single cell and densification is essential for vast area coverage. The article also examines the right technical implementation approach, as well as the economic benefits and existing and predicted market situation of mm-wave cellular communication from the operator’s perspective. The outcome will be useful information for any operator or stakeholder in mm-wave communication.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Churn Prediction System for Telecommunication Company Using Random Forest and Convolution Neural Network Algorithms","authors":"S. O. Abdulsalam, J. Ajao, B. Balogun, M. Arowolo","doi":"10.4108/eetmca.v6i21.2181","DOIUrl":"https://doi.org/10.4108/eetmca.v6i21.2181","url":null,"abstract":"INTRODUCTION: Customer churn is a severe problem of migrating from one service provider to another. Due to the direct influence on the company's sales, companies are attempting to promote strategies to identify the churn of prospective consumers. Hence it is necessary to examine issues that influence customer churn to yield effective solutions to minimize churn.\u0000OBJECTIVES: The major purpose of this work is to create a model of churn prediction that assists telecom operatives to envisage clients that are more probably to be prone to churn.\u0000METHODS: The experimental strategy for this study leverages the machine learning techniques on the telecom churn dataset, employing an improved Relief-F feature selection algorithm to extract related features from the enormous dataset.\u0000RESULTS: The result demonstrates that CNN has a high prediction capability of 94 percent compared to the 91 percent Random Forest classifier.\u0000CONCLUSION: The results are of enormous relevance to the telecommunication business in improving churners and loyal clients.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129460915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BER Performance of NOMA Downlink for AWGN and Rayleigh Fading Channels in (SIC)","authors":"Mohamed Hassan, Manwinder Singh, K. Hamid","doi":"10.4108/eai.20-6-2022.174227","DOIUrl":"https://doi.org/10.4108/eai.20-6-2022.174227","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is a great option for an upcoming radio access network due to its ability to provide enormous connections and high spectral efficiency. However, NOMA's primary issue is the error with successive interference cancellation (SIC). This paper aims to examine bit error rate (BER) downlink (DL) NOMA power domain (PD) for various SNR levels in additive white Gaussian noise (AWGN) as well as in Rayleigh fading channels utilizing Quadrature Phase Shift Keying (QPSK) for three different scenarios, to clearly differentiate the more effect of distance, bandwidth (BW), and power location coefficients factors using the MATLAB simulation software program. The BER versus SNR results were obtained in terms of charts for different BWs, distances, and power location coefficients. According to the findings, the BW parameter has the strongest effect on BER DL NOMA PD when compared to the distance, and power location coefficient parameters.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on D2D Resource Scheduling and Power Control Techniques: State-of-art and Challenges","authors":"A. Dejen, Y. Wondie, Anna Förster","doi":"10.4108/eai.4-5-2022.173977","DOIUrl":"https://doi.org/10.4108/eai.4-5-2022.173977","url":null,"abstract":"Device to Device (D2D) communication has emerged as the most promising paradigm for optimizing spectral and energy e ffi ciency, reliability as well as increasing network throughput in the emerging cellular generation. D2D resource optimization scheme has been thoroughly investigated in the literature to manage interference and enable its smooth integration into the future cellular network in recent years as an increasing number of papers are published each year. We believe systematic categorization of literature in the area will help readers to comprehend the strengths, weaknesses, and trends of the solution approach. However, a survey that discusses all aspects, requirements, and challenges of D2D resource optimization is largely missing. Hence, in this paper, we aim to develop a comprehensive survey that fills the gaps found in the previous literature. Based on the surveyed papers, it will figure out ideas that have been thoroughly explored and those that assume the potential for further research.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124595681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realistic Human Mobility Model for Opportunistic Networks","authors":"A. Greede","doi":"10.4108/eai.2-5-2022.173976","DOIUrl":"https://doi.org/10.4108/eai.2-5-2022.173976","url":null,"abstract":"Within the opportunistic wireless network research community, the evaluation of a new network protocol depends almost entirely on simulation. Using simulation enables a researcher to test a wide variety of scenarios at a low cost compared to using a real system. In opportunistic networks, the mobility of users plays a key role in data delivery; therefore, the value of the validation of a data forwarding protocol is highly dependent on the mobility models used in the simulation. In this paper, popular mobility models are assessed. Based on this analysis, a novel mobility model “Realistic Human Mobility Model” (RHMM) is proposed. The performance of the RHMM is evaluated and compared with real traces. The results show that RHMM generates mobility patterns that present characteristics similar to real ones and it has the same statistical properties identified in the real human mobility patterns.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Marker-based Tangible Interfaces for Smartphone-based Virtual Reality","authors":"Jorge C. S. Cardoso, Jorge Ribeiro","doi":"10.4108/eai.11-4-2022.173802","DOIUrl":"https://doi.org/10.4108/eai.11-4-2022.173802","url":null,"abstract":"In this work, we describe an approach for tangible interaction for smartphone-based VR using visual markers. Smartphone-based VR represents a low barrier to entry given that many people nowadays own a smartphone device and that VR headsets for these devices are a ff ordable and quick to set up when compared to desktop-based VR. Tangible interaction in smartphone-based VR has not been much explored, despite the fact that it can result in easy to use and engaging experiences. We explore a marker-based solution to object tracking that allows tangibles to be created in an easy and cheap way, maintaining the overall system accessible. We describe several types of interactions that can be created with visual markers and we present three prototypes of the Tangible VR Book: a tangible with a book form-factor that we designed for architectural heritage exploration. We also present user feedback on their expectations regarding the interaction with the Tangible VR Book.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology characterizing using packet forwarding distance dissimilarity in multi-greedy geographic routing","authors":"G. Oladeji-Atanda, Dimane Mpoeleng","doi":"10.4108/eai.11-1-2022.172815","DOIUrl":"https://doi.org/10.4108/eai.11-1-2022.172815","url":null,"abstract":"Characterizing the topology of MANETs provides the means for packet routing protocols to perform adaptively and efficiently in the particular environments. We show that the geographic routing’s greedy packet forwarding distance dissimilarity distributions in relation to node size characterizes MANET topologies and supports efficient multi-greedy forwarding. The models we described, based on the average greedy packet forwarding distance measures, showed distinct distribution patterns of the dissimilarity indices when applied to the example multi-greedy routing environment consisting of the ELLIPSOID and the GREEDY forwarding metrics. The scheme demonstrates the potential for adaptive forwarding performance to improve successful packets delivery in environments of high node-size variations such as VANETs.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116602126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of RACODSR Protocol in Smart Grayhole Attacks on VANets","authors":"Kaoutar Ourouss, N. Naja, A. Jamali","doi":"10.4108/eai.1-6-2022.174088","DOIUrl":"https://doi.org/10.4108/eai.1-6-2022.174088","url":null,"abstract":"As a subclass of Mobile Adhoc Networks (MANets), Vehicular Ad Hoc Network (VANET) is a set of interconnecting vehicles that aim to provide a wide spectrum of encouraging road services, such as safety and tra ffi c management. This key component of Intelligent Transportation Systems (ITS), is impacted by the vehicle’s mobility and su ff ers from frequent link disruptions caused voluntarily or intentionally by malicious attackers, which make the security issue more challenging and even life-threatening when critical attacks occurred. This work focuses on analyzing the smart grayhole attacks within VANets environments and evaluating the Reputation-based Ant Colony Optimization Dynamic Source Routing (RACODSR) and Dynamic Source Routing (DSR) protocols performances under two di ff erent scenarios. For this purpose, VANets mobility models with and without collisions are generated using OpenStreetMap and Simulation of Urban Mobility (SUMO) tools and simulated in Network Simulator NS2 to assess the e ff ectiveness of the compared protocols using the Drop rate, Packet Delivery Ratio, Throughput, Jitter, End-to-End delay, and consumed energy metrics.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124502336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outage Performance of Underlay Multihop Cognitive Relay Networks with the use of the highest Power Beacon among Power Beacons","authors":"N. Danh","doi":"10.4108/eai.5-11-2021.171999","DOIUrl":"https://doi.org/10.4108/eai.5-11-2021.171999","url":null,"abstract":"This paper studies the outage performance of multihop cognitive relay networks with energy harvesting in underlay paradigms, wherein the secondary users are powered by a dedicated power beacon (PB) have the highest energy level among their power beacons and the interference constrain from the primary user. The author derived the exact outage probability for Rayleigh block fading and prove that the outage probability is monotonically decreasing with respect to the transmit power of PB. Furthermore, the author drew conclusions when the author compared the outage performance of the system in 3 cases: the system without using the beacon, the system using a power beacon, using a beacon with the highest energy level among power beacons. Simulation results validate the theoretical results.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123375908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs","authors":"Haythem Hayouni","doi":"10.4108/eai.29-9-2021.171189","DOIUrl":"https://doi.org/10.4108/eai.29-9-2021.171189","url":null,"abstract":"The main goal of Network Coding (NC) is to find an optimal transmission of data in a network. NC presents an advantage for wireless sensor networks (WSNs) in term of network lifetime. However, the Network Coding-enabled WSNs are affected by various attacks, such as pollution attacks. Many HMAC schemes have been proposed in the literature to secure packets against pollution attacks. In 2015, Esfahani et al. proposed a dual-homomorphic MAC scheme based to the construction of two different MACs to ensure the integrity of coded packets. Their solution has many weaknesses in terms of security against tag pollution attacks. In this paper, we improve their scheme by proposing a novel HMAC scheme for NC enabled WSNs, called E-HMAC, based on multi-linear space to check the integrity of coded packets. The simulation results demonstrate the ability of our proposed scheme to secure the coded packets with a low key storage overhead and communication overhead, compared to Esfahani et al.’s scheme.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134171036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}