Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The book features original papers by active researchers presented at the International Conference on Mobile Radio Communications and 5G Networks. It includes recent advances and upcoming technologies in the field of cellular systems, 2G/2.5G/3G/4G/5G and beyond, LTE, WiMAX, WMAN, and other emerging broadband wireless networks, WLAN, WPAN, and various home/personal networking technologies, pervasive and wearable computing and networking, small cells and femtocell networks, wireless mesh networks, vehicular wireless networks, cognitive radio networks and their applications, wireless multimedia networks, green wireless networks, standardization of emerging wireless technologies, power management and energy conservation techniques.

Author(s): Nikhil Marriwala, C.C. Tripathi, Dinesh Kumar, Shruti Jain
Series: Lecture Notes in Networks and Systems, 140
Publisher: Springer Singapore
Year: 2020

Language: English
Pages: 866
City: Singapore

Preface
Contents
Editors and Contributors
Analysis and Application of Vehicular Ad hoc Network as Intelligent Transportation System
1 Introduction
2 Related Works
3 Comparative Analysis
4 Research Challenges
5 Conclusion
References
Comprehensive Study on Internet of Things (IoT) and Design Considerations of Various Microstrip Patch Antennas for IoT Applications
1 Introduction
2 Applications of IoT for Microstrip Patch Antenna
3 Conclusion
References
Nonclassicality Used as Quantum Information Processing in Nonlinear Optical Systems
1 Introduction
2 Condition of Nonclassicality of a Nonlinear Optical System
2.1 Condition of Normal Squeezing
2.2 Condition of Photon Statistics
2.3 Condition of Higher Order Antibunching (HOA) of Photons
3 Seven-Wave Mixing Process in Pump Mode
3.1 Squeezing in Seven-Wave Mixing Process
3.2 Sub-Poissonian Photon Statistics in Seven-Wave Mixing Process
3.3 Antibunching of Photons in Seven-Wave Mixing Process
4 Result
5 Conclusion
References
Investigation of SNR in VLC-Based Intelligent Transportation System Under Environmental Disturbances
1 Introduction
2 Topology
3 Methodology
3.1 Simulation and Formulations
4 Results and Analysis
5 Conclusion
References
An Algorithm for Target Detection, Identification, Tracking and Estimation of Motion for Passive Homing Missile Autopilot Guidance
1 Introduction
2 Proposed Algorithm to Detect Object
3 Results and Discussion
4 Motion Estimation and Tracking
5 Conclusion
References
Community Discovery and Behavior Prediction in Online Social Networks Employing Node Centrality
1 Introduction
2 The Proposed Algorithm
2.1 Objective Tasks
2.2 Objective Tasks Employing Count of Detected Clusters
2.3 Mutation
2.4 Crossover
2.5 Crossover on the Basis of Objective Task
3 Experimentation Results
4 Conclusion
References
IoT–Blockchain Integration-Based Applications Challenges and Opportunities
1 Introduction
2 Blockchain
2.1 Challenges
3 IoT and Blockchain Integration
3.1 Advantages of IoT and Blockchain Integration
3.2 Integration Schemes for IoT and Blockchain
3.3 Challenges in Blockchain IoT Integration
4 IoT–Blockchain-Based Platforms and Applications
4.1 Smart Contract
4.2 Hyperledger
4.3 Lisk Framework
4.4 Quorum
5 Experimental Analysis of Various Smart Contracts Used in IoT
6 Conclusion and Future Work
References
Analysis on Detection of Shilling Attack in Recommendation System
1 Introduction
2 Shilling Attack
3 Categorization of Shilling Attack
3.1 Intent Based
3.2 Based on Knowledge
4 Related Work
5 Detection Attributes
5.1 Generic Attributes
5.2 Model Specific Attributes
6 Evaluation Metrics
6.1 Prediction Shift
6.2 Recall
6.3 Precision
6.4 F1 Measure
6.5 Mean Absolute Error
7 Conclusion and Future Work
References
A Comparative Analysis of Improvements in Leach Protocol: A Survey
1 Introduction
2 LEACH Protocols with Single-Hop Communication
3 LEACH Protocols with Multi-Hop Communication
4 Conclusion and Future Directions
References
Deep Learning in Health Care: Automatic Cervix Image Classification Using Convolutional Neural Network
1 Introduction
2 Cervix Taxonomy
3 Literature Survey
4 Dataset
5 Proposed Methodology
5.1 Convolutional Neural Network(ConvNet)
5.2 Pooling Layer
6 Result and Discussion
7 Conclusion and Future Work
References
Review Paper on Leaf Diseases Detection and Classification Using Various CNN Techniques
1 Introduction
2 Literature Survey
3 Conclusion
References
Artificial Intelligence and Virtual Assistant—Working Model
1 Introduction
1.1 Difference Between Virtual Assistant and Chatbots
2 Training Automation
3 Analytics
4 Related Work
5 Future Work
6 Conclusion
References
Data Security in Wireless Sensor Networks: Attacks and Countermeasures
1 Introduction
2 Attacks in WSN
3 Security Requirements in WSN
3.1 Security Service
4 Cryptographic Techniques
4.1 Secret Key Cryptography
5 Attacks on Cryptosystem
5.1 Types of Active Attacks
6 Existing Methods
6.1 Application Based Methods
6.2 Technique Based Methods
7 Proposed Solution
8 Conclusion
References
Emerging Next-Generation TWDM-PON with Suitable Modulation Format
1 Introduction
2 TWDM-PON Architecture for Different Modulation Formats
2.1 Downstream System Design
2.2 Upstream System Design
2.3 Different Modulation Formats
3 Results and Discussion
3.1 Comparative Analysis for Downstream Transmission
3.2 Comparative Analysis for Upstream Transmission
4 Conclusion
References
Big Data and Analytics in Higher Educational Institutions
1 Introduction
2 Evolution of Big Data
2.1 Data Collection
2.2 Data Analysis
2.3 Data Visualization
3 Big Data and Analytics in Higher Education
3.1 Institutional Analytics
3.2 Information Technology (IT) Analytics
3.3 Academic Analytics
3.4 Learning Analytics
4 Opportunities
5 Challenges of Implementation
6 Conclusion
References
A Hybrid Channel Access Method to Optimize Congested Switched Network
1 Introduction
2 Related Work
3 Contributions
4 Design Philosophy
4.1 Network Parametric Analysis
4.2 HMCC Procedure
4.3 Exponential Back-Off Algorithm
5 Findings
6 Conclusions
References
Automated Object Detection System in Marine Environment
1 Introduction
2 Proposed Methodology
3 Experimental Results and Discussion
4 Conclusion and Future Work
References
Passive Authentication Image Forgery Detection Using Multilayer CNN
1 Introduction
1.1 Types of Image Forgery
1.2 Passive Image Forgery Attacks
2 Related Work
3 Proposed Model
3.1 Architecture of Model
3.2 Preprocessing
3.3 Convolution Layer
3.4 Polling Layer
3.5 Dense Layer
3.6 Dropout Layer
3.7 Completing the Network
3.8 Database Specification
4 Results
5 Conclusion
References
Contiki Cooja Security Solution (CCSS) with IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things Applications
1 Introduction
2 Literature Review
3 Methodology
4 Result and Analysis
5 Conclusions and Future Scope
References
Characterization of Thimbles Based upon Different Sensors
1 Introduction
2 Architecture of the Thimbles
3 Methods
4 Data Recording
5 Data Analysis
6 Results
7 Discussion
References
Application of the Optimization Technique in Analytical and Electrochemistry for the Anticorrosive and Complexing Activity of 2,4-Dihydroxyacetophenone Benzoylhydrazone
1 Introduction
2 Experimental
2.1 Preparation of 2,4-Dihydroxyacetophenone Benzoylhydrazone (DHABH)
2.2 Materials Required for Anti-corrosion Potential
2.3 Instrumentation and Materials Required for Spectrophotometric Determination of Tungsten (VI)
3 Result and Discussion
3.1 Anticorrosive Behaviour
3.2 Electrochemical Measurements
3.3 Adsorption Isotherms
3.4 Quantum Chemical Parameters
3.5 Spectrophotometric Determination of W(VI) Using DHABH as Complexing Agents
3.6 Procedure Recommended for Extraction and Determination of Tungsten (VI)
3.7 Stoichiometry of the Complex
4 Computational Studies for Structural Elucidation
5 Conclusions
References
A Comprehensive Overview of Sentiment Analysis and Fake Review Detection
1 Introduction to Sentiment Analysis
1.1 Levels of Sentiment Analysis (SA)
1.2 Architecture of Sentiment Analysis
2 Fake Review
3 Literature Review
4 Approaches Used for Sentiment Analysis
5 Real-Life Applications of Sentiment Analysis
6 Conclusion
References
Information Security in Software-Defined Network
1 Introduction
2 Virtualized Network Functions and Software-Defined Networks
3 Related Work
4 Proposed Work
4.1 Requirement Specification
4.2 Methodology
5 Experimental Results
5.1 Screenshots
6 Conclusion
6.1 Proposed Work Achievement
6.2 Findings
6.3 Advantages
7 Future Scope
References
Emotions Recognition Based on Wrist Pulse Analysis
1 Introduction
2 Methodology
2.1 Data Acquisition
2.2 Preprocessing
2.3 Feature Extraction
3 Result
4 Conclusion
References
Trace Determination of Zirconium (IV) as its 3-Hydroxy-2-[2′-(5′-Methylthienyl)]-4H-Chromen-4-One Complex and Structural Elucidation by Quantization Technique
1 Introduction
2 Experimental
2.1 Equipments, Reagents and Solutions
2.2 Synthetic and Technical Samples
2.3 Procedure for Extraction and Determination
3 Results and discussion
3.1 Effect of Anions/Complexing Agents and Cations
3.2 Spectral Characteristics
3.3 Stoichiometry of Zr (IV)-HMTC Complex
3.4 Structural Elucidation by Optimization Technique
3.5 Analytical Applications
4 Conclusion
References
Barriers Which Impede the Implementation of an Effective Deep Web Data Extraction in VBPS
1 Introduction
1.1 The Recent Trends
1.2 The Working Architecture
2 Objectives
3 Research Background
4 Vision-Based Page Segmentation (VBPS)
4.1 Deep Web Data Extraction in VBPS
4.2 Barriers for Deep Web Data Extraction in VBPS
5 Conclusions and Recommendations
References
The Prediction of Stock Market Trends Using the Hybrid Model SVM-ICA-GA
1 Introduction
2 Literature Review
3 Overview of  SVM
4 SVM with ICA and GA
5 Proposed Methodology
6 Results and Discussions
7 Conclusion
References
Bone Fractured Detection Using Machine Learning and Digital Geometry
1 Introduction
2 Literature Review
3 Methodology
4 The Model
5 Result
6 Conclusion
References
Assessment of Microgrid Communication Network Performance for Medium-Scale IEEE Bus Systems Using Multi-Agent System
1 Introduction
2 Materials and Methods
2.1 Multi-Agent System
2.2 IEEE Bus Systems for Microgrid
2.3 Network Performance
2.4 Protocol and Algorithm Description
3 Performance Metrics
4 Results and Discussion
References
Optimum Digital Filter Design for Removal of Different Noises from Biomedical Signals
1 Introduction
2 Methodology
3 Results and Discussion
4 Conclusion
References
5G Inset Feed Antenna Array for 28 GHz Wireless Communication
1 Introduction
2 Antenna Design
3 Result and Discussion
3.1 Resonant Frequency
3.2 Gain
3.3 Radiation Pattern
4 Conclusion
References
Comparison of Various Attacks on WSN Layers—Based on the Site of the Attacker and Access Level
1 Introduction
2 WSN Architecture
2.1 Organization of Wireless Sensor Network
3 Limitations of Wireless Sensor Networks
4 Security in WSN
5 Classification of Attacks in WSN
5.1 Based on the Site of the Attacker
5.2 Attacks Based on Access Level
5.3 Attacks Based on Network Layer
6 Conclusion
References
Non-conventional Energy Source-Based Home Automation System
1 Introduction
2 System Model
3 System Design
3.1 Logic Circuit
3.2 Inverter Circuit
3.3 Microcontroller Connections
4 Results
5 Conclusion
References
Resource Scheduling on Basis of Cost-Effectiveness in Cloud Computing Environment
1 Introduction
2 Related Work
3 Resource Scheduling
3.1 Resource Scheduling Algorithms Based on Energy Conservation in Cloud Computing
3.2 Resource Scheduling Algorithms Based on Virtualization in Cloud Computing
3.3 Resource Scheduling Algorithms Based on Service-Level Agreement (SLA) in Cloud Computing
3.4 Resource Scheduling Algorithms Based on Cost in Cloud Computing
4 Directed Acyclic Graph
5 Conclusion
References
Optimized Multi-level Data Aggregation Scheme (OMDA) for Wireless Sensor Networks
1 Introduction
1.1 Requirements of Data Aggregation Over WSN
1.2 Constraints for Data Aggregation Over WSN
2 Existing Solutions for Data Aggregation Over WSN
3 Optimized Multi-level Data Aggregation Scheme (OMDA) for WSN
4 Simulation Scenario
5 Simulation Results and Performance Analysis
5.1 Throughput
5.2 End-To-End Delay
5.3 Energy Consumption
5.4 Number of Alive Sensors Using TD-DA and OMDA
6 Conclusion
References
Potentiality of Nanotechnology in Development of Biosensors
1 Introduction
2 Intertwining Nanotechnology in Biosensors
3 Different Components of Nanotechnology
3.1 Nanotubes
3.2 Nanoparticles
3.3 Nanocrystals
3.4 Nanowires
3.5 Nanorods
4 Conclusion
References
Microstrip Patch Antenna for Future 5G Applications
1 Introduction
2 Antenna Structure and Dimensions
3 Simulation Results
3.1 Plot of Return Loss
3.2 Plot of VSWR
3.3 Gain Plot
3.4 Radiation Pattern
4 Conclusion
References
Multilayer Perceptron and Genetic Algorithm-Based Intrusion Detection Framework for Cloud Environment
1 Introduction
1.1 Cloud Computing Environment
2 Literature Review
3 Methodologies Used
3.1 Multilayer Perceptron
4 The Proposed System
4.1 Workflow of the Proposed System
5 Experimentation and Results
5.1 Experimental Dataset
6 Conclusions and Future Work
References
Position Falsification Misbehavior Detection in VANETs
1 Introduction
2 Related Work
3 Methodology
3.1 Statistical Approach
3.2 Machine Learning Approach
4 Results
5 Conclusion
References
Artificial Intelligence Fuelling the Health Care
1 Introduction and Impact of AI
2 Scenario of AI with Health Care
3 AI is the Future of Health Care
4 Conclusion
References
A Systematic Review of Risk Factors and Risk Assessment Models for Breast Cancer
1 Introduction
1.1 Overview of Breast Cancer Risk
1.2 Significance of Risk Assessment
1.3 Risk Assessment Modeling
2 Risk Factors for Breast Cancer
2.1 Risk Factors
2.2 Lifestyle-Related Risk Factors
2.3 Other Risk Factors
3 Risk Factor Incorporation in Models for Risk Estimation
4 Comparative Analysis of Model Accuracy
5 Machine Learning in Breast Cancer Prediction
6 Conclusion
References
Reflection of Plane Harmonic Wave in Transversely Isotropic Magneto-thermoelastic with Two Temperature, Rotation and Multi-dual-Phase Lag Heat Transfer
1 Introduction
2 Basic Equations
3 Formulation and Solution of the Problem
4 Plane Wave Propagation
4.1 Phase Velocity
4.2 Attenuation Coefficient
4.3 Specific Loss
4.4 Penetration Depth
5 Reflection at the Boundary Surfaces
6 Boundary Conditions
7 Numerical Results and Discussion
7.1 Amplitude Ratios
7.2 Energy Ratios
7.3 Phase Velocity
7.4 Attenuation Coefficients
7.5 Specific Loss
7.6 Penetration Depth
8 Conclusions
References
Deformation in Generalized Transversely Isotropic Magneto-Thermoelastic Rotating Solid Due to Inclined Load and Thermal Laser Pulse
1 Introduction
2 Basic Equations
3 Formulation and Solution of the Problem
4 Boundary Conditions
5 Applications
6 Special Cases
6.1 Concentrated Force
6.2 Uniformly Distributed Force
6.3 Linearly Distributed Force
7 Inversion of the Transformation
8 Particular Cases
9 Numerical Results and Discussion
9.1 Concentrated Force Due to Inclined Load and with Laser Pulse
10 Conclusions
References
Impact of Integration of Wind Turbine on Dynamics of a Power System
1 Introduction
2 Problem Formulation
3 System Model
4 Wind Energy Source
5 ANFIS
6 Simulation Results
7 Conclusion
References
Hybrid Version of Apriori Using MapReduce
1 Introduction
2 Literature Review
3 The Proposed Model
4 Result
5 Conclusion and Future Work
References
A New Time Varying Adaptive Filtering System (TVAFS) for Ambulatory ECG Signals
1 Introduction
2 Adaptive Filtering System
3 Proposed TVAFS Algorithm
4 Experiments and Results
5 Conclusion
References
Ultrathin Compact Triple-Band Polarization-Insensitive Metamaterial Microwave Absorber
1 Introduction
2 Design and Simulation
2.1 Design
2.2 Simulation
2.3 Absorption Mechanism
3 Experimental Measurements
4 Conclusion
References
Optical Wireless Channel Characterization Based on OOK Modulation for Indoor Optical Wireless Communication System Using WT-ANN
1 Introduction
2 Indoor Optical Wireless Communication
3 Wavelet Transform
3.1 Discrete Wavelet Transform
3.2 Stationary Wavelet Transform
4 System Design
5 Simulations
6 Results and Discussions
6.1 SNR Versus BER
6.2 Efficiency
6.3 NOPR Versus Data Rate
7 Conclusion
References
Indoor Optical Wireless Communication System Using Wavelet Transform and Neural Network Based on Pulse Position Modulation Intended for Optical Wireless Channel Characterization
1 Introduction
2 Indoor Optical Wireless Communication
3 Discrete Wavelet Transform
4 Stationary Wavelet Transform
5 System Design
6 Simulations
7 Results and Discussions
7.1 SNR Versus BER
7.2 Efficiency
8 Conclusion
References
GDH Key Exchange Protocol for Group Security Among Hypercube Deployed IoT Devices
1 Introduction
2 Literature Survey
3 Proposed Work to Preserve Group Security Among Hypercube Deployed IoT Devices
4 Conclusion and Future Scope
References
Depression Detection in Cancer Communities Using Affect Analysis
1 Introduction
2 Related Work
3 Proposed Work
4 Result and Analysis
5 Conclusions and Future Work
References
Triple-Band Polarization-Insensitive Wide Angle Ultrathin Hexagonal Circumscribed Metamaterial Absorber
1 Introduction
2 Unit Cell Design
3 Simulation
4 Absorption Mechanism
5 Experimental Measurements
6 Conclusion
References
An Effective Fusion of a Color and Texture Descriptor for an Image Retrieval System: An Exploratory Analysis
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Color Feature Extraction
3.2 Texture Feature Extraction
3.3 Combination Techniques
4 Experimental Setup and Results
4.1 Experimental Setup
4.2 Results
5 Conclusion and Future Trends
References
Power Consumption Reduction in IoT Devices Through Field-Programmable Gate Array with Nanobridge Switch
1 Introduction
1.1 Field-Programmable Gate Arrays (FPGA)
2 Literature Survey
3 Nanobridge Technology
3.1 Performance Analysis of Nanobridge-FPGA
4 Conclusion
References
Li-Fi Technology—A Study on a Modernistic Way of Communication
1 Introduction
2 Li-Fi Design and Working
2.1 How Does Li-Fi Work?
3 Performance of Li-Fi
3.1 Advantages of Li-Fi Over Wi-Fi
4 Li-Fi Strengths and Weaknesses
5 Applications of Li-Fi
References
A 28 GHz Corporate Series-Fed Taper Antenna Array for Fifth-Generation Wireless Communication
1 Introduction
2 Antenna Design
3 Result and Discussion
3.1 Resonant Frequency
3.2 Gain
3.3 Radiation Pattern
4 Conclusion
References
Design and Analysis of Gain Enhancement THz Microstrip Curvature Patch PBG Antenna with Inset Feed
1 Introduction
2 Antenna Design
3 Result and Discussion
3.1 Resonant Frequency
3.2 Gain
3.3 Effect of Radius of Curvature on the Proposed Antenna
3.4 Effect of Photonic Band Gap Hole Size on the Proposed Antenna
3.5 Effect of Separation Distance Between the Photonic Crystals on the Proposed Antenna
3.6 Radiation Pattern
4 Conclusion
References
Performance Analysis of Classification Methods in the Diagnosis of Heart Disease
1 Introduction
2 Research Methodology
2.1 The Datasets
2.2 The Software Tool
2.3 The Performance Indicators
3 Results and Discussion
3.1 Cleveland Dataset
3.2 Hungarian Dataset
3.3 Switzerland Dataset
3.4 VA Long Beach Dataset
4 Conclusion
References
A Critical Evaluation of Mathematical Modeling Approaches in the Scientific Research
1 Introduction
2 Theoretical Approach
3 Qualitative Approach
4 Dimensional Analysis Approach
5 Specific Quantitative Approach
6 General Quantitative Approach (Statistical Approach)
7 Conclusion
References
Cloud Load Balancing Using Optimization Techniques
1 Introduction
1.1 Load Balancing in Cloud Computing
1.2 Load Balancing Optimization Algorithms
2 Comparison and Important Findings
3 Conclusion
References
QoS Sensible Coalition-Based Radio Resource Management Scheme for 4G Mobile Networks
1 Introduction
2 Literature Survey
3 Proposed Work
4 Result and Discussion
5 Conclusion
References
Reliable and Energy-Efficient Data Transfer Routing in Wireless Body Area Networks
1 Introduction
2 Wireless Sensor Node
3 Wireless Sensor Network
4 Literature Review
5 Problem Formulation
6 Methodology
7 Implementation and Results
8 Radio Model
9 Network Parameter
10 Discussion
11 Conclusion
References
A Model on IoT Security Method and Protocols for IoT Security Layers
1 Introduction
2 Security Challenges in IoT
2.1 Data Integrity
2.2 Encryption and Decryption Capabilities
2.3 Privacy Issues
2.4 Common Framework
2.5 Automation
2.6 Updations
3 Literature Review
4 Proposed Model of IoT Security
4.1 Implementation of Proposed Model
4.2 Flowchart of Proposed Model
5 Conclusion
References
Structural Health Monitoring System for Bridges Using Internet of Things
1 Introduction
2 Related Work
3 Problem Formulation
4 Problem Statement
5 Proposed Solution
6 Iot Platform for Shm
7 Challenges
8 Conclusion and Future Scope
References
Author Index