EAI Endorsed Trans. Mob. Commun. Appl.最新文献

筛选
英文 中文
Millimeter Wave Cellular Communication Performances and Challenges: A Survey 毫米波蜂窝通信性能与挑战:综述
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-08-08 DOI: 10.4108/eetmca.v7i21.2424
Arebu Dejen, M. Ridwan, J. Anguera, J. Jayasinghe
{"title":"Millimeter Wave Cellular Communication Performances and Challenges: A Survey","authors":"Arebu Dejen, M. Ridwan, J. Anguera, J. Jayasinghe","doi":"10.4108/eetmca.v7i21.2424","DOIUrl":"https://doi.org/10.4108/eetmca.v7i21.2424","url":null,"abstract":"The demand for high data rates, combined with the exponential growth of mobile data trafficking, and has prompted the use of millimeter-wave (mm-wave) spectrum for 5G mobile communication. So, for constructive assessment, this study employed various research publications, institutional reports, and other materials given at the conference. This survey article investigates the features of the mm-wave propagation channel and highlights the main challenges, solutions, and benefits associated with their utilization, as well as an analysis of their performance. The researchers observed that by reducing the difficulties and significant losses with various strategies, mm-wave cellular communication may extend up to 200m in a single cell and densification is essential for vast area coverage. The article also examines the right technical implementation approach, as well as the economic benefits and existing and predicted market situation of mm-wave cellular communication from the operator’s perspective. The outcome will be useful information for any operator or stakeholder in mm-wave communication.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Churn Prediction System for Telecommunication Company Using Random Forest and Convolution Neural Network Algorithms 基于随机森林和卷积神经网络算法的电信公司客户流失预测系统
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-07-27 DOI: 10.4108/eetmca.v6i21.2181
S. O. Abdulsalam, J. Ajao, B. Balogun, M. Arowolo
{"title":"A Churn Prediction System for Telecommunication Company Using Random Forest and Convolution Neural Network Algorithms","authors":"S. O. Abdulsalam, J. Ajao, B. Balogun, M. Arowolo","doi":"10.4108/eetmca.v6i21.2181","DOIUrl":"https://doi.org/10.4108/eetmca.v6i21.2181","url":null,"abstract":"INTRODUCTION: Customer churn is a severe problem of migrating from one service provider to another. Due to the direct influence on the company's sales, companies are attempting to promote strategies to identify the churn of prospective consumers. Hence it is necessary to examine issues that influence customer churn to yield effective solutions to minimize churn.\u0000OBJECTIVES: The major purpose of this work is to create a model of churn prediction that assists telecom operatives to envisage clients that are more probably to be prone to churn.\u0000METHODS: The experimental strategy for this study leverages the machine learning techniques on the telecom churn dataset, employing an improved Relief-F feature selection algorithm to extract related features from the enormous dataset.\u0000RESULTS: The result demonstrates that CNN has a high prediction capability of 94 percent compared to the 91 percent Random Forest classifier.\u0000CONCLUSION: The results are of enormous relevance to the telecommunication business in improving churners and loyal clients.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129460915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BER Performance of NOMA Downlink for AWGN and Rayleigh Fading Channels in (SIC) (SIC) AWGN和瑞利衰落信道下NOMA下行误码率性能研究
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-06-20 DOI: 10.4108/eai.20-6-2022.174227
Mohamed Hassan, Manwinder Singh, K. Hamid
{"title":"BER Performance of NOMA Downlink for AWGN and Rayleigh Fading Channels in (SIC)","authors":"Mohamed Hassan, Manwinder Singh, K. Hamid","doi":"10.4108/eai.20-6-2022.174227","DOIUrl":"https://doi.org/10.4108/eai.20-6-2022.174227","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is a great option for an upcoming radio access network due to its ability to provide enormous connections and high spectral efficiency. However, NOMA's primary issue is the error with successive interference cancellation (SIC). This paper aims to examine bit error rate (BER) downlink (DL) NOMA power domain (PD) for various SNR levels in additive white Gaussian noise (AWGN) as well as in Rayleigh fading channels utilizing Quadrature Phase Shift Keying (QPSK) for three different scenarios, to clearly differentiate the more effect of distance, bandwidth (BW), and power location coefficients factors using the MATLAB simulation software program. The BER versus SNR results were obtained in terms of charts for different BWs, distances, and power location coefficients. According to the findings, the BW parameter has the strongest effect on BER DL NOMA PD when compared to the distance, and power location coefficient parameters.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on D2D Resource Scheduling and Power Control Techniques: State-of-art and Challenges D2D资源调度与功率控制技术综述:现状与挑战
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-05-04 DOI: 10.4108/eai.4-5-2022.173977
A. Dejen, Y. Wondie, Anna Förster
{"title":"Survey on D2D Resource Scheduling and Power Control Techniques: State-of-art and Challenges","authors":"A. Dejen, Y. Wondie, Anna Förster","doi":"10.4108/eai.4-5-2022.173977","DOIUrl":"https://doi.org/10.4108/eai.4-5-2022.173977","url":null,"abstract":"Device to Device (D2D) communication has emerged as the most promising paradigm for optimizing spectral and energy e ffi ciency, reliability as well as increasing network throughput in the emerging cellular generation. D2D resource optimization scheme has been thoroughly investigated in the literature to manage interference and enable its smooth integration into the future cellular network in recent years as an increasing number of papers are published each year. We believe systematic categorization of literature in the area will help readers to comprehend the strengths, weaknesses, and trends of the solution approach. However, a survey that discusses all aspects, requirements, and challenges of D2D resource optimization is largely missing. Hence, in this paper, we aim to develop a comprehensive survey that fills the gaps found in the previous literature. Based on the surveyed papers, it will figure out ideas that have been thoroughly explored and those that assume the potential for further research.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124595681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Realistic Human Mobility Model for Opportunistic Networks 机会主义网络的现实人类流动模型
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-05-02 DOI: 10.4108/eai.2-5-2022.173976
A. Greede
{"title":"Realistic Human Mobility Model for Opportunistic Networks","authors":"A. Greede","doi":"10.4108/eai.2-5-2022.173976","DOIUrl":"https://doi.org/10.4108/eai.2-5-2022.173976","url":null,"abstract":"Within the opportunistic wireless network research community, the evaluation of a new network protocol depends almost entirely on simulation. Using simulation enables a researcher to test a wide variety of scenarios at a low cost compared to using a real system. In opportunistic networks, the mobility of users plays a key role in data delivery; therefore, the value of the validation of a data forwarding protocol is highly dependent on the mobility models used in the simulation. In this paper, popular mobility models are assessed. Based on this analysis, a novel mobility model “Realistic Human Mobility Model” (RHMM) is proposed. The performance of the RHMM is evaluated and compared with real traces. The results show that RHMM generates mobility patterns that present characteristics similar to real ones and it has the same statistical properties identified in the real human mobility patterns.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Marker-based Tangible Interfaces for Smartphone-based Virtual Reality 基于智能手机的虚拟现实的基于标记的有形界面
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-04-11 DOI: 10.4108/eai.11-4-2022.173802
Jorge C. S. Cardoso, Jorge Ribeiro
{"title":"Marker-based Tangible Interfaces for Smartphone-based Virtual Reality","authors":"Jorge C. S. Cardoso, Jorge Ribeiro","doi":"10.4108/eai.11-4-2022.173802","DOIUrl":"https://doi.org/10.4108/eai.11-4-2022.173802","url":null,"abstract":"In this work, we describe an approach for tangible interaction for smartphone-based VR using visual markers. Smartphone-based VR represents a low barrier to entry given that many people nowadays own a smartphone device and that VR headsets for these devices are a ff ordable and quick to set up when compared to desktop-based VR. Tangible interaction in smartphone-based VR has not been much explored, despite the fact that it can result in easy to use and engaging experiences. We explore a marker-based solution to object tracking that allows tangibles to be created in an easy and cheap way, maintaining the overall system accessible. We describe several types of interactions that can be created with visual markers and we present three prototypes of the Tangible VR Book: a tangible with a book form-factor that we designed for architectural heritage exploration. We also present user feedback on their expectations regarding the interaction with the Tangible VR Book.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Topology characterizing using packet forwarding distance dissimilarity in multi-greedy geographic routing 多贪婪地理路由中基于分组转发距离不相似性的拓扑表征
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-01-11 DOI: 10.4108/eai.11-1-2022.172815
G. Oladeji-Atanda, Dimane Mpoeleng
{"title":"Topology characterizing using packet forwarding distance dissimilarity in multi-greedy geographic routing","authors":"G. Oladeji-Atanda, Dimane Mpoeleng","doi":"10.4108/eai.11-1-2022.172815","DOIUrl":"https://doi.org/10.4108/eai.11-1-2022.172815","url":null,"abstract":"Characterizing the topology of MANETs provides the means for packet routing protocols to perform adaptively and efficiently in the particular environments. We show that the geographic routing’s greedy packet forwarding distance dissimilarity distributions in relation to node size characterizes MANET topologies and supports efficient multi-greedy forwarding. The models we described, based on the average greedy packet forwarding distance measures, showed distinct distribution patterns of the dissimilarity indices when applied to the example multi-greedy routing environment consisting of the ELLIPSOID and the GREEDY forwarding metrics. The scheme demonstrates the potential for adaptive forwarding performance to improve successful packets delivery in environments of high node-size variations such as VANETs.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116602126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of RACODSR Protocol in Smart Grayhole Attacks on VANets RACODSR协议在智能灰洞攻击中的性能分析
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2022-01-06 DOI: 10.4108/eai.1-6-2022.174088
Kaoutar Ourouss, N. Naja, A. Jamali
{"title":"Performance Analysis of RACODSR Protocol in Smart Grayhole Attacks on VANets","authors":"Kaoutar Ourouss, N. Naja, A. Jamali","doi":"10.4108/eai.1-6-2022.174088","DOIUrl":"https://doi.org/10.4108/eai.1-6-2022.174088","url":null,"abstract":"As a subclass of Mobile Adhoc Networks (MANets), Vehicular Ad Hoc Network (VANET) is a set of interconnecting vehicles that aim to provide a wide spectrum of encouraging road services, such as safety and tra ffi c management. This key component of Intelligent Transportation Systems (ITS), is impacted by the vehicle’s mobility and su ff ers from frequent link disruptions caused voluntarily or intentionally by malicious attackers, which make the security issue more challenging and even life-threatening when critical attacks occurred. This work focuses on analyzing the smart grayhole attacks within VANets environments and evaluating the Reputation-based Ant Colony Optimization Dynamic Source Routing (RACODSR) and Dynamic Source Routing (DSR) protocols performances under two di ff erent scenarios. For this purpose, VANets mobility models with and without collisions are generated using OpenStreetMap and Simulation of Urban Mobility (SUMO) tools and simulated in Network Simulator NS2 to assess the e ff ectiveness of the compared protocols using the Drop rate, Packet Delivery Ratio, Throughput, Jitter, End-to-End delay, and consumed energy metrics.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124502336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outage Performance of Underlay Multihop Cognitive Relay Networks with the use of the highest Power Beacon among Power Beacons 使用功率信标中最高功率信标的底层多跳认知中继网络的中断性能
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2021-11-05 DOI: 10.4108/eai.5-11-2021.171999
N. Danh
{"title":"Outage Performance of Underlay Multihop Cognitive Relay Networks with the use of the highest Power Beacon among Power Beacons","authors":"N. Danh","doi":"10.4108/eai.5-11-2021.171999","DOIUrl":"https://doi.org/10.4108/eai.5-11-2021.171999","url":null,"abstract":"This paper studies the outage performance of multihop cognitive relay networks with energy harvesting in underlay paradigms, wherein the secondary users are powered by a dedicated power beacon (PB) have the highest energy level among their power beacons and the interference constrain from the primary user. The author derived the exact outage probability for Rayleigh block fading and prove that the outage probability is monotonically decreasing with respect to the transmit power of PB. Furthermore, the author drew conclusions when the author compared the outage performance of the system in 3 cases: the system without using the beacon, the system using a power beacon, using a beacon with the highest energy level among power beacons. Simulation results validate the theoretical results.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123375908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs E-HMAC:一种有效的安全同态MAC方案
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2021-09-29 DOI: 10.4108/eai.29-9-2021.171189
Haythem Hayouni
{"title":"E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs","authors":"Haythem Hayouni","doi":"10.4108/eai.29-9-2021.171189","DOIUrl":"https://doi.org/10.4108/eai.29-9-2021.171189","url":null,"abstract":"The main goal of Network Coding (NC) is to find an optimal transmission of data in a network. NC presents an advantage for wireless sensor networks (WSNs) in term of network lifetime. However, the Network Coding-enabled WSNs are affected by various attacks, such as pollution attacks. Many HMAC schemes have been proposed in the literature to secure packets against pollution attacks. In 2015, Esfahani et al. proposed a dual-homomorphic MAC scheme based to the construction of two different MACs to ensure the integrity of coded packets. Their solution has many weaknesses in terms of security against tag pollution attacks. In this paper, we improve their scheme by proposing a novel HMAC scheme for NC enabled WSNs, called E-HMAC, based on multi-linear space to check the integrity of coded packets. The simulation results demonstrate the ability of our proposed scheme to secure the coded packets with a low key storage overhead and communication overhead, compared to Esfahani et al.’s scheme.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134171036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信