Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994378
D. Supriyadi, Purwanto, B. Warsito
Everyone has their own characteristics and personality. The questionnaire instrument used to measure a person's personality was developed by Costa and McCrae in 1992, known as the Big-Five Personality model. This instrument consists of 50 statement items using a 5-point Likert scale rating. The purpose of this study is to analyze the performance of each Machine Learning algorithm such as Support Vector Machine (SVM), Random Forest (RF), and Neural Network (NN) for student personality classification based on the OCEAN big five personality models consisting of Openness (O), Conscientiousness (C), Extraversion (E), Agreeableness (A), and Emotional Stability or Neuroticism (N). The results showed that the Neural Network method was able to produce the best accuracy value of 76% and was followed by the Random Forest and SVM methods with an accuracy value of 56% and 40%. Recognizing the personality of oneself and others can determine the pattern of interactions and reactions carried out, including patterns of interaction in learning activities between teachers and students. Furthermore, it can be investigated the ability of machine learning algorithms to predict student academic performance based on their character and personality.
{"title":"Performance Comparison of Machine Learning Algorithms for Student Personality Classification","authors":"D. Supriyadi, Purwanto, B. Warsito","doi":"10.1109/COMNETSAT56033.2022.9994378","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994378","url":null,"abstract":"Everyone has their own characteristics and personality. The questionnaire instrument used to measure a person's personality was developed by Costa and McCrae in 1992, known as the Big-Five Personality model. This instrument consists of 50 statement items using a 5-point Likert scale rating. The purpose of this study is to analyze the performance of each Machine Learning algorithm such as Support Vector Machine (SVM), Random Forest (RF), and Neural Network (NN) for student personality classification based on the OCEAN big five personality models consisting of Openness (O), Conscientiousness (C), Extraversion (E), Agreeableness (A), and Emotional Stability or Neuroticism (N). The results showed that the Neural Network method was able to produce the best accuracy value of 76% and was followed by the Random Forest and SVM methods with an accuracy value of 56% and 40%. Recognizing the personality of oneself and others can determine the pattern of interactions and reactions carried out, including patterns of interaction in learning activities between teachers and students. Furthermore, it can be investigated the ability of machine learning algorithms to predict student academic performance based on their character and personality.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994541
A. Afdhal, Ahmadiar Ahmadiar, Ramzi Adriman
The V2X system is a vehicular communication network developed for ITS based-on information technology. The ITS-V2X system can enable the provision of reliable and real-time information flow to increase traffic efficiency, driving comfort, and safety while also enabling internet connectivity in vehicles. However, the ITS-V2X system is very vulnerable to attacks, infiltration, and sabotage from various irresponsible individuals. A Sybil attack is a type of malicious attack that uses a structured, systematic, and massive force to disrupt a communication system. This attack works by replicating and multiplying fake nodes with multiple identities according to the attacker's goals. Sybil's nodes will be acting as a group of vehicles with other vehicles in the transmission area. These nodes are not only visible but also capable of sending fake messages to their neighbors. This work proposes an approach allowing the detection of Sybil attacks using a realistic traffic model-based approach. This approach considers the benefits of real vehicle movement and the degree of freedom of vehicle mobility based on several attributes and parameters of the road network topology. The results show this approach can detect and classify vehicles that are Sybil's nodes or real cars by comparing the current speed prevalence of each vehicle with the estimated approximate vehicle speed generated from a realistic traffic model. The other finding result shows this approach is also able to discover the attack detection loads based on the level of traffic density.
{"title":"Sybil Attack Detection on ITS-V2X System using a Realistic Traffic Model-based Approach","authors":"A. Afdhal, Ahmadiar Ahmadiar, Ramzi Adriman","doi":"10.1109/COMNETSAT56033.2022.9994541","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994541","url":null,"abstract":"The V2X system is a vehicular communication network developed for ITS based-on information technology. The ITS-V2X system can enable the provision of reliable and real-time information flow to increase traffic efficiency, driving comfort, and safety while also enabling internet connectivity in vehicles. However, the ITS-V2X system is very vulnerable to attacks, infiltration, and sabotage from various irresponsible individuals. A Sybil attack is a type of malicious attack that uses a structured, systematic, and massive force to disrupt a communication system. This attack works by replicating and multiplying fake nodes with multiple identities according to the attacker's goals. Sybil's nodes will be acting as a group of vehicles with other vehicles in the transmission area. These nodes are not only visible but also capable of sending fake messages to their neighbors. This work proposes an approach allowing the detection of Sybil attacks using a realistic traffic model-based approach. This approach considers the benefits of real vehicle movement and the degree of freedom of vehicle mobility based on several attributes and parameters of the road network topology. The results show this approach can detect and classify vehicles that are Sybil's nodes or real cars by comparing the current speed prevalence of each vehicle with the estimated approximate vehicle speed generated from a realistic traffic model. The other finding result shows this approach is also able to discover the attack detection loads based on the level of traffic density.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994560
A. P. Aji, H. Satoh, C. Apriono, E. Rahardjo, H. Inokawa
We report the terahertz bolometric detection by antenna-coupled microbolometer that consists of a titanium (Ti) meander thermistor, and a Ti heater coupled to the antenna. In this study, we investigate the impact of high resistance heater to the microbolometer performances. Two antenna models of folded and halfwave dipoles are investigated to capture 1 THz radiation and transfer the energy to the 586Ω and 91Ω resistance heaters, respectively. A minimum noise equivalent power (NEP) of 39 pW/Hz1/2 and 66 pW/Hz1/2 are obtained for folded and halfwave dipole antenna-coupled microbolometer, respectively. The results confirm the usefulness of the higher heater resistance and proper impedance matching to the antenna for microbolometer performance improvement.
{"title":"Terahertz Antenna-coupled Microbolometer: Impact of High Heater Resistance","authors":"A. P. Aji, H. Satoh, C. Apriono, E. Rahardjo, H. Inokawa","doi":"10.1109/COMNETSAT56033.2022.9994560","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994560","url":null,"abstract":"We report the terahertz bolometric detection by antenna-coupled microbolometer that consists of a titanium (Ti) meander thermistor, and a Ti heater coupled to the antenna. In this study, we investigate the impact of high resistance heater to the microbolometer performances. Two antenna models of folded and halfwave dipoles are investigated to capture 1 THz radiation and transfer the energy to the 586Ω and 91Ω resistance heaters, respectively. A minimum noise equivalent power (NEP) of 39 pW/Hz1/2 and 66 pW/Hz1/2 are obtained for folded and halfwave dipole antenna-coupled microbolometer, respectively. The results confirm the usefulness of the higher heater resistance and proper impedance matching to the antenna for microbolometer performance improvement.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124028351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994482
Naga Manoj Makkena, P. Ubaidulla
This paper proposes a buffer-assisted amplify-and-forward (AF) unmanned aerial vehicle (UAV) relay for communication between two ground nodes without a direct link. These communications are essential in disaster rescue areas where fairness plays a significant role. To achieve fairness, we aim to maximize the minimum information rate. The traditional way of prefixed scheduling the time slots to transfer and receive at the UAV does not guarantee that the communication system uses high signal-to-noise ratio (SNR) communication links instead of low SNR links. Therefore, we choose to employ a buffer at the UAV to store the information and transfer it to the destination nodes in the high SNR links. The pairing of time slots is necessary here since we are using a buffer, and we do not know in which time slot data is transmitted to the destination node after it is received at the UAV. Consequently, we formulate a fairness maximization problem by jointly optimizing the trajectory and power control. Unfortunately, this formulation results in a non-convex problem. We propose a solution based on the principles of the minorize-maximize (MM) algorithm and linear programming relaxation techniques to solve the fairness problem and pairing of time slots. Numerical results demonstrate that the trajectory, power control, and paired slots favor the UAV and ground nodes to communicate in the high SNR channel links, thus maintaining fairness.
{"title":"Trajectory and Power Optimization for Buffer-Assisted Amplify-and-Forward UAV Relay","authors":"Naga Manoj Makkena, P. Ubaidulla","doi":"10.1109/COMNETSAT56033.2022.9994482","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994482","url":null,"abstract":"This paper proposes a buffer-assisted amplify-and-forward (AF) unmanned aerial vehicle (UAV) relay for communication between two ground nodes without a direct link. These communications are essential in disaster rescue areas where fairness plays a significant role. To achieve fairness, we aim to maximize the minimum information rate. The traditional way of prefixed scheduling the time slots to transfer and receive at the UAV does not guarantee that the communication system uses high signal-to-noise ratio (SNR) communication links instead of low SNR links. Therefore, we choose to employ a buffer at the UAV to store the information and transfer it to the destination nodes in the high SNR links. The pairing of time slots is necessary here since we are using a buffer, and we do not know in which time slot data is transmitted to the destination node after it is received at the UAV. Consequently, we formulate a fairness maximization problem by jointly optimizing the trajectory and power control. Unfortunately, this formulation results in a non-convex problem. We propose a solution based on the principles of the minorize-maximize (MM) algorithm and linear programming relaxation techniques to solve the fairness problem and pairing of time slots. Numerical results demonstrate that the trajectory, power control, and paired slots favor the UAV and ground nodes to communicate in the high SNR channel links, thus maintaining fairness.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125699175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994437
Quoc-Nam Nguyen, Chau-Thang Phan, Van-Nguyen Dinh, Bao-Khanh P. Truong, Thuy-Hong T. Dang, Trong-Hop Do
Urban living benefits greatly from weather forecasting since it may lower weather-related losses, safeguard public health and safety and promote both economic growth also quality of life. The main goal of this work is to develop a small-scale temperature forecasting system employing a cutting-edge time series model. In order to do so, data on Ho Chi Minh City's temperature is gathered. The performance of several time series models based on machine learning and deep learning is then evaluated for input data of various lengths. To create a small-scale temperature forecasting system, the best model is chosen. The suggested approach is particularly well suited for a smart agricultural indoor temperature forecasting system, which cannot be accomplished with any large-scale temperature forecasting systems.
{"title":"A Small-Scale Temperature Forecasting System using Time Series Models Applied in Ho Chi Minh City","authors":"Quoc-Nam Nguyen, Chau-Thang Phan, Van-Nguyen Dinh, Bao-Khanh P. Truong, Thuy-Hong T. Dang, Trong-Hop Do","doi":"10.1109/COMNETSAT56033.2022.9994437","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994437","url":null,"abstract":"Urban living benefits greatly from weather forecasting since it may lower weather-related losses, safeguard public health and safety and promote both economic growth also quality of life. The main goal of this work is to develop a small-scale temperature forecasting system employing a cutting-edge time series model. In order to do so, data on Ho Chi Minh City's temperature is gathered. The performance of several time series models based on machine learning and deep learning is then evaluated for input data of various lengths. To create a small-scale temperature forecasting system, the best model is chosen. The suggested approach is particularly well suited for a smart agricultural indoor temperature forecasting system, which cannot be accomplished with any large-scale temperature forecasting systems.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994309
Q. Ngo, Khoa T. Phan, Abdun Mahmood, Wei Xiang
In this paper, a secure multiuser MISO satellite downlink communication system is considered with the assist of a hybrid reconfigurable intelligent surface (RIS). A robust satellite and RIS beamforming joint design is formulated to maximize the overall system secrecy rate. The RIS active and passive elements are optimized considering practical models of the outdated channel state information and power consumption. Deep reinforcement learning is leveraged to solve the highly dynamic and multidimensional beamforming design problem. Simulation results confirm the beamforming design effectiveness and the performance gains when exploiting hybrid-RIS over conventional passive RIS.
{"title":"DRL-Based Secure Beamforming for Hybrid-RIS Aided Satellite Downlink Communications","authors":"Q. Ngo, Khoa T. Phan, Abdun Mahmood, Wei Xiang","doi":"10.1109/COMNETSAT56033.2022.9994309","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994309","url":null,"abstract":"In this paper, a secure multiuser MISO satellite downlink communication system is considered with the assist of a hybrid reconfigurable intelligent surface (RIS). A robust satellite and RIS beamforming joint design is formulated to maximize the overall system secrecy rate. The RIS active and passive elements are optimized considering practical models of the outdated channel state information and power consumption. Deep reinforcement learning is leveraged to solve the highly dynamic and multidimensional beamforming design problem. Simulation results confirm the beamforming design effectiveness and the performance gains when exploiting hybrid-RIS over conventional passive RIS.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129511668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994344
Titis Cahya Pertiwi, F. Akbar, G. Hendrantoro, L. Ligthart
A phased array design method with a wide scanning angle composed of several integrated subarrays to mitigate scan loss (SL) and side lobe level (SLL) problems has been previously reported in the literature. This paper discusses the robustness of the overlapped subarray, one of the subarrays for SL and suppressing SLL in the phased array if one of the elements or the feeder is damaged. Such a damage potentially causes changes in the directivity pattern of the subarray and the full array. Robustness analysis in the paper needs to be carried out for four cases. In the first case, one of the two edge elements, namely elements 1 and 5, is damaged, while in the second case, one of the elements 2 and 4 is damaged. Because element three is overlapped and is supplied by two suppliers, in the third case, the analysis needs to be carried out in conditions where element three is damaged or in case four if one of the suppliers is disconnected. The decrease in reliability of the subarray overlap design under poor conditions affects the range of angles of the scan direction, which increases in magnitude to close to 6 dBi.
{"title":"Robustness Analysis of 5-Element Overlapped Linear Subarrays for Wide Angular Scanning Applications","authors":"Titis Cahya Pertiwi, F. Akbar, G. Hendrantoro, L. Ligthart","doi":"10.1109/COMNETSAT56033.2022.9994344","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994344","url":null,"abstract":"A phased array design method with a wide scanning angle composed of several integrated subarrays to mitigate scan loss (SL) and side lobe level (SLL) problems has been previously reported in the literature. This paper discusses the robustness of the overlapped subarray, one of the subarrays for SL and suppressing SLL in the phased array if one of the elements or the feeder is damaged. Such a damage potentially causes changes in the directivity pattern of the subarray and the full array. Robustness analysis in the paper needs to be carried out for four cases. In the first case, one of the two edge elements, namely elements 1 and 5, is damaged, while in the second case, one of the elements 2 and 4 is damaged. Because element three is overlapped and is supplied by two suppliers, in the third case, the analysis needs to be carried out in conditions where element three is damaged or in case four if one of the suppliers is disconnected. The decrease in reliability of the subarray overlap design under poor conditions affects the range of angles of the scan direction, which increases in magnitude to close to 6 dBi.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994549
N. Sevani, Hendrik Tampubolon, Jeremy Wijaya, Lukas Cuvianto, Albert Salomo
Timely and precise cataract detection is crucial to managing the risk and preventing blindness for cataract's patients. This paper proposed a framework for automatic cataract detection consisting of the K-Means clustering-based segmentation (KMSeg) and Convolutional Neural Network (CNN). At first, data pre-processing was performed. Then, KMSeg is responsible for characterizing the input images into a subgroup of color. Lastly, three CNN were employed based on DCNN, ResNet18, and ResNet50 backbones for feature learning and classification task. An extensive study was examined on Fundus and Front Eye datasets with numerous experimental settings. The result shows that the proposed KMSeg-CNN is able to maintain accuracy yet provides a faster training and testing execution time across the dataset.
{"title":"A Study of Convolution Neural Network Based Cataract Detection with Image Segmentation","authors":"N. Sevani, Hendrik Tampubolon, Jeremy Wijaya, Lukas Cuvianto, Albert Salomo","doi":"10.1109/COMNETSAT56033.2022.9994549","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994549","url":null,"abstract":"Timely and precise cataract detection is crucial to managing the risk and preventing blindness for cataract's patients. This paper proposed a framework for automatic cataract detection consisting of the K-Means clustering-based segmentation (KMSeg) and Convolutional Neural Network (CNN). At first, data pre-processing was performed. Then, KMSeg is responsible for characterizing the input images into a subgroup of color. Lastly, three CNN were employed based on DCNN, ResNet18, and ResNet50 backbones for feature learning and classification task. An extensive study was examined on Fundus and Front Eye datasets with numerous experimental settings. The result shows that the proposed KMSeg-CNN is able to maintain accuracy yet provides a faster training and testing execution time across the dataset.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994537
Kaiwei Wang, Shuo Wang
We design an energy efficient cooperative strategy over LEO satellite IoT network. We construct a queueing model to describe UEs' data flow and formulate a long-term optimization problem. With Lyapunov optimization approach, we convert the problem into an instantaneous one that can be easily solved with real-time satellite channel states and queue backlog information. We then divide the instantaneous optimization problem into two parts: admission control and beamforming optimization, and solve them with liner programming and WMMSE method separately. The simulation results suggest that we may achieve varied trade-offs between energy efficiency and data traffic latency using a control parameter, which is compatible with the theoretical analysis.
{"title":"Energy Efficient Cooperative Strategy over LEO Satellite Internet of Things","authors":"Kaiwei Wang, Shuo Wang","doi":"10.1109/COMNETSAT56033.2022.9994537","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994537","url":null,"abstract":"We design an energy efficient cooperative strategy over LEO satellite IoT network. We construct a queueing model to describe UEs' data flow and formulate a long-term optimization problem. With Lyapunov optimization approach, we convert the problem into an instantaneous one that can be easily solved with real-time satellite channel states and queue backlog information. We then divide the instantaneous optimization problem into two parts: admission control and beamforming optimization, and solve them with liner programming and WMMSE method separately. The simulation results suggest that we may achieve varied trade-offs between energy efficiency and data traffic latency using a control parameter, which is compatible with the theoretical analysis.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994400
R. Muhima, M. Kurniawan, S. R. Wardhana, A. Yudhana, Sunardi
This study aims to explain the effect of variations in the number of individuals mated with father (n-mating) on the performance of Genetic Algorithm Polygamy (GAP) clustering. GAP clustering is clustering method based genetic algorithm. The steps of this method are same as GA clustering steps, but the crossover process is done with polygamy. One selected father is mated with more than one mother. We evaluate the performance of GA-based clustering for hotspot data with three clustering evaluations, namely Sum Square Error, Davies-Bouldin Index, and Silhouette Coefficient. Based on experimental result, GA Polygamy clustering outperforms GA clustering based on Sum Square Error (SSE) evaluation and Silhouette Coefficient (SC) evaluation. The n-mating in the crossover process of GAP clustering affects GAP clustering performance also performance of time to convergence of GAP clustering.
{"title":"n-Mating Effect on Genetic Algorithm-Based Clustering Performance for Hotspots Data","authors":"R. Muhima, M. Kurniawan, S. R. Wardhana, A. Yudhana, Sunardi","doi":"10.1109/COMNETSAT56033.2022.9994400","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994400","url":null,"abstract":"This study aims to explain the effect of variations in the number of individuals mated with father (n-mating) on the performance of Genetic Algorithm Polygamy (GAP) clustering. GAP clustering is clustering method based genetic algorithm. The steps of this method are same as GA clustering steps, but the crossover process is done with polygamy. One selected father is mated with more than one mother. We evaluate the performance of GA-based clustering for hotspot data with three clustering evaluations, namely Sum Square Error, Davies-Bouldin Index, and Silhouette Coefficient. Based on experimental result, GA Polygamy clustering outperforms GA clustering based on Sum Square Error (SSE) evaluation and Silhouette Coefficient (SC) evaluation. The n-mating in the crossover process of GAP clustering affects GAP clustering performance also performance of time to convergence of GAP clustering.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}