Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538359
Sumayya Banna
this study explores knowledge management within an Australian healthcare arena. The healthcare sector is the knowledge-based profession. It is an immature arena of researchand hence needs to be researched by empirical research and theoretical constructs. Given the multifaceted arena of the healthcare sector, there is still an escalating obstacle of understanding the mode of knowledge management in the healthcare arena. The paper explains the application of Q method as a cohesive and applied method to the knowledgecreation, sharing and storing within organizational health arena. The study proposed knowledge management as a theoretical construct to implement the knowledge-based approach to improve the decision-making process.
{"title":"Knowledge Management in Health: An Australian Viewpoint","authors":"Sumayya Banna","doi":"10.1109/ICSCEE.2018.8538359","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538359","url":null,"abstract":"this study explores knowledge management within an Australian healthcare arena. The healthcare sector is the knowledge-based profession. It is an immature arena of researchand hence needs to be researched by empirical research and theoretical constructs. Given the multifaceted arena of the healthcare sector, there is still an escalating obstacle of understanding the mode of knowledge management in the healthcare arena. The paper explains the application of Q method as a cohesive and applied method to the knowledgecreation, sharing and storing within organizational health arena. The study proposed knowledge management as a theoretical construct to implement the knowledge-based approach to improve the decision-making process.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123928773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538398
M. Appiah, Rita Cudjoe
Mobile Ad Hoc Network (MANET) consists of wireless nodes that are placed randomly and dynamically which results in the rapid change between the nodes. In any given situation on MANET, the choice of a routing protocol should be considered and by doing so, factors such as the mobility model, mobility of nodes, the network size and packet size should be taken into consideration because the routing protocols configured with the mobility model can highly affect the performance of MANET. This paper analysed the impact of two different routing protocols (i.e. Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR)) on the performance of Manet_Down_Left (MDL) mobility model. The simulated results indicated that Manet_Down_Left (MDL) configured with OLSR protocol performed better than MDL configured with DSR protocol.
{"title":"A Comparative Study of Reactive and Proactive Routing Protocols on a Mobility Model in Mobile Ad Hoc Network (MANET)","authors":"M. Appiah, Rita Cudjoe","doi":"10.1109/ICSCEE.2018.8538398","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538398","url":null,"abstract":"Mobile Ad Hoc Network (MANET) consists of wireless nodes that are placed randomly and dynamically which results in the rapid change between the nodes. In any given situation on MANET, the choice of a routing protocol should be considered and by doing so, factors such as the mobility model, mobility of nodes, the network size and packet size should be taken into consideration because the routing protocols configured with the mobility model can highly affect the performance of MANET. This paper analysed the impact of two different routing protocols (i.e. Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR)) on the performance of Manet_Down_Left (MDL) mobility model. The simulated results indicated that Manet_Down_Left (MDL) configured with OLSR protocol performed better than MDL configured with DSR protocol.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538373
M. Al-Khasawneh, S. Shamsuddin, S. Hasan, A. Bakar
Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. In past works, chaos-based cryptosystems applied the chaotic dynamical system with the linkage to the harmonization of two chaotic systems and controls. Good performances have resulted but there were several downsides pertaining to the single rule usage by each, impacting security, privacy and dependability of the techniques mentioned. Serious problems were also documented in their usage in satellite imagery. As a possible solution, a novel chaos-based symmetric method of key cryptosystem is proposed in this paper. This method employs external secret key that Logistic, Henon and Gauss iterated maps have previously expanded. For creating the secret key matrix for image encryption, these maps are merged. Here, simple logical XOR and multiple key generation processes were applied. Assessment to the method is performed on the satellite images dataset, and security is evaluated through the experimental analysis. As evidenced, the chaos-based satellite image cryptosystem demonstrates appropriateness for satellite image encryption and decryption in the preservation of security and dependability of the storage and transmission process.
{"title":"An Improved Chaotic Image Encryption Algorithm","authors":"M. Al-Khasawneh, S. Shamsuddin, S. Hasan, A. Bakar","doi":"10.1109/ICSCEE.2018.8538373","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538373","url":null,"abstract":"Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. In past works, chaos-based cryptosystems applied the chaotic dynamical system with the linkage to the harmonization of two chaotic systems and controls. Good performances have resulted but there were several downsides pertaining to the single rule usage by each, impacting security, privacy and dependability of the techniques mentioned. Serious problems were also documented in their usage in satellite imagery. As a possible solution, a novel chaos-based symmetric method of key cryptosystem is proposed in this paper. This method employs external secret key that Logistic, Henon and Gauss iterated maps have previously expanded. For creating the secret key matrix for image encryption, these maps are merged. Here, simple logical XOR and multiple key generation processes were applied. Assessment to the method is performed on the satellite images dataset, and security is evaluated through the experimental analysis. As evidenced, the chaos-based satellite image cryptosystem demonstrates appropriateness for satellite image encryption and decryption in the preservation of security and dependability of the storage and transmission process.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538407
Febrina Sari, F. Damayanti, Atma Hadiansa, Elisa Hafrida
Early Warning System (EWS) is an SMS Gateway based early warning system built to maintain the continuous use of Injectable Contraception. This system will provide an early injection schedule warning, in order for the acceptor to do periodic injections according to the schedule of injecting types used, EWS is also equipped with information about family planning programs (KB) and various other contraceptives. With the development of Early Warning System (EWS), acceptor can get the information of the injection schedule in accordance with the prescribed period by cellular phone such as smartphone and tablet computer that they have, so the acceptors can do periodic injections on time and no longer need to record regularly schedule their syringes on the calendar or see the manual control cards they have. Early Warning System can maintain the continuous use of injectable contraception, so that the purpose of Family Planning Program in suppressing population growth can be achieved.
{"title":"Early Warning System For The Continuouse Use Of Injectable Contraception, Using SMS Gateway In The Success Of Family Planning Programs","authors":"Febrina Sari, F. Damayanti, Atma Hadiansa, Elisa Hafrida","doi":"10.1109/ICSCEE.2018.8538407","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538407","url":null,"abstract":"Early Warning System (EWS) is an SMS Gateway based early warning system built to maintain the continuous use of Injectable Contraception. This system will provide an early injection schedule warning, in order for the acceptor to do periodic injections according to the schedule of injecting types used, EWS is also equipped with information about family planning programs (KB) and various other contraceptives. With the development of Early Warning System (EWS), acceptor can get the information of the injection schedule in accordance with the prescribed period by cellular phone such as smartphone and tablet computer that they have, so the acceptors can do periodic injections on time and no longer need to record regularly schedule their syringes on the calendar or see the manual control cards they have. Early Warning System can maintain the continuous use of injectable contraception, so that the purpose of Family Planning Program in suppressing population growth can be achieved.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129871548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538428
Rami Muqbel Al-Sumaty, I. Umar
Cloud Computing Technology provides computing centers, providing an infrastructure for services [4]. services over Internet Protocol (IP), such as virtual private However, it is not necessary to incur administrative and networks (VPN), servers, storage, applications and hosting maintenance costs while moving the IT infrastructure into services needed by organizations and educational institutions. the Cloud computing [5]. Furthermore, today, there is In educational and learning institutions, this technology helps users (i.e., students, instructors, researchers, and administrators) to perform their tasks effectively with less cost and utilize the services that available by cloud-based applications offered by cloud service providers. This study is aimed to develop and evaluate a Student Data Management System (SDMS) in terms of system usability based on cloud database as a service (DaaS) to provide the necessary information to improve educational performance management in Yemen. This pilot study was conducted in five Language and Computer Institutes in Aden city of Yemen. The usability testing of this system was carried out on 45 teachers andadministrative staff as the participants of this study. The results showed that 95.8 % of the participants agree to use SDMS frequently, 95.5% agree that SDMS was easy to learn and 95.6% participants agree that SDMS was easy to use. In the final result of SDMS usability evaluation, a mean usability score of 83.6 was reported, this score indicates an excellent evaluation from the respondents based on the SUS score evaluation by Bangor et al. (2008), In other words there was a significant success of using cloud computing technology in terms of managing and storing of student’s data to improve educational performance management in developing countries that facing severe strains on the national economy such as Yemen.
{"title":"Design and Evaluation of Cloud-Based Students Data Management System Usability","authors":"Rami Muqbel Al-Sumaty, I. Umar","doi":"10.1109/ICSCEE.2018.8538428","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538428","url":null,"abstract":"Cloud Computing Technology provides computing centers, providing an infrastructure for services [4]. services over Internet Protocol (IP), such as virtual private However, it is not necessary to incur administrative and networks (VPN), servers, storage, applications and hosting maintenance costs while moving the IT infrastructure into services needed by organizations and educational institutions. the Cloud computing [5]. Furthermore, today, there is In educational and learning institutions, this technology helps users (i.e., students, instructors, researchers, and administrators) to perform their tasks effectively with less cost and utilize the services that available by cloud-based applications offered by cloud service providers. This study is aimed to develop and evaluate a Student Data Management System (SDMS) in terms of system usability based on cloud database as a service (DaaS) to provide the necessary information to improve educational performance management in Yemen. This pilot study was conducted in five Language and Computer Institutes in Aden city of Yemen. The usability testing of this system was carried out on 45 teachers andadministrative staff as the participants of this study. The results showed that 95.8 % of the participants agree to use SDMS frequently, 95.5% agree that SDMS was easy to learn and 95.6% participants agree that SDMS was easy to use. In the final result of SDMS usability evaluation, a mean usability score of 83.6 was reported, this score indicates an excellent evaluation from the respondents based on the SUS score evaluation by Bangor et al. (2008), In other words there was a significant success of using cloud computing technology in terms of managing and storing of student’s data to improve educational performance management in developing countries that facing severe strains on the national economy such as Yemen.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128365546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The defect evaluation is an important research topic in the risk control fields of industry regulation, safety monitoring and information system. In view of the difficulty of quantifying language description, the subjectivity of assessment process and the single data source in the vehicle defects assessment, this paper presents the vehicle defects assessment approach upon multi-source data. It gives the defect assessment indicators based on multi-source data and uses fuzzy membership function to convert language description into numerical value. It also uses Analytic Hierarchy Process to determine the indicators ‘weights. Furthermore, it proposes five defects’ levels based on the Audit method and completes the assessment of vehicle defects. This paper uses China’s data as a study case to assess vehicles’ defects and the result verifies the effectiveness of the proposed approach.
{"title":"An Approach of Vehicle Defects Assessment upon Multi - source Data","authors":"Jundian Song, Bingrong Dai, Fengyuan Liu, Rui Zhang","doi":"10.1109/ICSCEE.2018.8538422","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538422","url":null,"abstract":"The defect evaluation is an important research topic in the risk control fields of industry regulation, safety monitoring and information system. In view of the difficulty of quantifying language description, the subjectivity of assessment process and the single data source in the vehicle defects assessment, this paper presents the vehicle defects assessment approach upon multi-source data. It gives the defect assessment indicators based on multi-source data and uses fuzzy membership function to convert language description into numerical value. It also uses Analytic Hierarchy Process to determine the indicators ‘weights. Furthermore, it proposes five defects’ levels based on the Audit method and completes the assessment of vehicle defects. This paper uses China’s data as a study case to assess vehicles’ defects and the result verifies the effectiveness of the proposed approach.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126726413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538412
A. Khan, A. Al-Badi
Nowadays desktop-based application are continuously evolving into pervasive or ubiquitous applications. There are millions of ubiquitous applications developed and used, but the testing of these applications are very complex tasks due to diversity in ubiquitous devices. Cloud computing is the future which has brought cost reduction, improved business, and processes in organizations through minimum management efforts. Software testing is a process to make sure the software is of acceptable quality. The traditional testing processes are incompatible with the changing technology and environment such as in ubiquitous applications. The availability of 5G network has reduced the data streaming dependence on the network. Thus under the presence of 5 G network cloud based testing can be successfully carried out for ubiquitous applications. Therefore, this research proposes a testing process for ubiquitous applications on cloud consisting of five steps. The testing on cloud would include stress testing, performance testing, compatibility testing, functional testing, web browser testing, load testing, and latency testing etc. The research mainly relate to ubiquitous application testing.
{"title":"Ubiquitous Application Testing on Cloud","authors":"A. Khan, A. Al-Badi","doi":"10.1109/ICSCEE.2018.8538412","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538412","url":null,"abstract":"Nowadays desktop-based application are continuously evolving into pervasive or ubiquitous applications. There are millions of ubiquitous applications developed and used, but the testing of these applications are very complex tasks due to diversity in ubiquitous devices. Cloud computing is the future which has brought cost reduction, improved business, and processes in organizations through minimum management efforts. Software testing is a process to make sure the software is of acceptable quality. The traditional testing processes are incompatible with the changing technology and environment such as in ubiquitous applications. The availability of 5G network has reduced the data streaming dependence on the network. Thus under the presence of 5 G network cloud based testing can be successfully carried out for ubiquitous applications. Therefore, this research proposes a testing process for ubiquitous applications on cloud consisting of five steps. The testing on cloud would include stress testing, performance testing, compatibility testing, functional testing, web browser testing, load testing, and latency testing etc. The research mainly relate to ubiquitous application testing.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538415
Esyin Chew, Pei Lee Lee, Weng Han Ho
There is a major issue in medical centres in Malaysia: the shared responsibility and communication between nurses at the bedside care and conversation with the physicians after-hours. Inexperience nurses may, sometimes, overlook patients’ critical symptoms that indicate immediate medical care and cause the circumstance deteriorate. Therefore, mutual blaming practices are common if there is a medical error. The design of hands-free assessment and feedback with wearable technologies is welcomed in healthcare sector. Hence, the paper presents a pilot design that investigates how a wearable technology can help in daily patient care in an innovative way that enhance the nurses and physicians’ communication. The paper reviewed the current practices and technologies, followed by the design of the transformed flow, hardware and apps used with technical limitations, pilot evaluation and future work.
{"title":"Enhancing Seamless Nurses-Physician Communication After-Hours with Google Glass","authors":"Esyin Chew, Pei Lee Lee, Weng Han Ho","doi":"10.1109/ICSCEE.2018.8538415","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538415","url":null,"abstract":"There is a major issue in medical centres in Malaysia: the shared responsibility and communication between nurses at the bedside care and conversation with the physicians after-hours. Inexperience nurses may, sometimes, overlook patients’ critical symptoms that indicate immediate medical care and cause the circumstance deteriorate. Therefore, mutual blaming practices are common if there is a medical error. The design of hands-free assessment and feedback with wearable technologies is welcomed in healthcare sector. Hence, the paper presents a pilot design that investigates how a wearable technology can help in daily patient care in an innovative way that enhance the nurses and physicians’ communication. The paper reviewed the current practices and technologies, followed by the design of the transformed flow, hardware and apps used with technical limitations, pilot evaluation and future work.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538420
Sanket Agrawal, Aditya Das, Amit Gaikwad, Sudhir Dhage
Customer churn refers to when a customer ceases their relationship with a company. A churn rate, used to estimate growth, is now considered as important a metric as financial profit. With growing competition in the market, companies are desperate to keep the churn rate as low as possible. Thus, churn prediction has gained critical importance, not just for existing customers, but also for predicting trends of future customers. This paper demonstrates prediction of churn on a Telco dataset using a Deep Learning Approach. A multilayered Neural Network was designed to build a non-linear classification model. The churn prediction model works on customer features, support features, usage features and contextual features. The possibility of churn as well as the determining factors are predicted. The trained model then applies the final weights on these features and predict the possibility of churn for that customer. An accuracy of 80.03% was achieved. Since the model also provides the churn factors, it can be used by companies to analyze the reasons for these factors and take steps to eliminate them.
{"title":"Customer Churn Prediction Modelling Based on Behavioural Patterns Analysis using Deep Learning","authors":"Sanket Agrawal, Aditya Das, Amit Gaikwad, Sudhir Dhage","doi":"10.1109/ICSCEE.2018.8538420","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538420","url":null,"abstract":"Customer churn refers to when a customer ceases their relationship with a company. A churn rate, used to estimate growth, is now considered as important a metric as financial profit. With growing competition in the market, companies are desperate to keep the churn rate as low as possible. Thus, churn prediction has gained critical importance, not just for existing customers, but also for predicting trends of future customers. This paper demonstrates prediction of churn on a Telco dataset using a Deep Learning Approach. A multilayered Neural Network was designed to build a non-linear classification model. The churn prediction model works on customer features, support features, usage features and contextual features. The possibility of churn as well as the determining factors are predicted. The trained model then applies the final weights on these features and predict the possibility of churn for that customer. An accuracy of 80.03% was achieved. Since the model also provides the churn factors, it can be used by companies to analyze the reasons for these factors and take steps to eliminate them.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133075097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCEE.2018.8538433
Mubashar Iqbal, Wahab Khan, Asim Altaf Shah, Junaid Imtiaz
Cognitive Radio Networks (CRNs) help in effective utilization of the spectrum of licensed user by allocating the spectrum to cognitive user (CU) when it is vacant. In a cooperative environment, individual CU senses the spectrum and report the sensed result to a centralized controller of CRN which makes a global decision regarding the spectrum. Two important performance metrics defines a CRN; probability of detection and probability of false alarm. At the centralized controller various fusion rules can be used to make global probabilities of detection and false alarm from the individual sensed result reported by CU. Practically as the number of sensed results reports at centralized controller increases, the loss probability of sensed reports also increases. This paper proposes reporting contributions for CU based on reporting channel condition. The proposed technique Reporting Channel Base Contribution (RCBC) limits the number of CU’s contributions for the final global probability of detection and false alarm based on various fusion rules. Detailed analytical and numerical analysis are covered in this paper. Simulation results show a great improvement in the global results when RCBC technique is compared with Reporting loss.
认知无线网络(Cognitive Radio network, crn)通过在频谱空闲时将频谱分配给认知用户(Cognitive user, CU),从而有效地利用已授权用户的频谱。在协作环境中,单个CU感知频谱并将感知结果报告给CRN的集中控制器,后者对频谱做出全局决策。两个重要的性能指标定义了CRN;探测概率和虚警概率。在集中控制器上,可以使用各种融合规则从CU报告的单个感知结果中得到检测和虚警的全局概率。实际上,随着中央控制器的传感结果报告数量的增加,传感报告的丢失概率也随之增加。本文提出了基于报告通道条件的CU报告贡献。提出的报告信道基础贡献(RCBC)技术限制了基于各种融合规则的最终全局检测概率和虚警概率的CU贡献数量。本文进行了详细的分析和数值分析。仿真结果表明,与报告丢失相比,RCBC技术在全局结果上有很大改善。
{"title":"Effect on Detection and False Alarm Probabilities by Reporting Channel Based Contribution (RCBC)","authors":"Mubashar Iqbal, Wahab Khan, Asim Altaf Shah, Junaid Imtiaz","doi":"10.1109/ICSCEE.2018.8538433","DOIUrl":"https://doi.org/10.1109/ICSCEE.2018.8538433","url":null,"abstract":"Cognitive Radio Networks (CRNs) help in effective utilization of the spectrum of licensed user by allocating the spectrum to cognitive user (CU) when it is vacant. In a cooperative environment, individual CU senses the spectrum and report the sensed result to a centralized controller of CRN which makes a global decision regarding the spectrum. Two important performance metrics defines a CRN; probability of detection and probability of false alarm. At the centralized controller various fusion rules can be used to make global probabilities of detection and false alarm from the individual sensed result reported by CU. Practically as the number of sensed results reports at centralized controller increases, the loss probability of sensed reports also increases. This paper proposes reporting contributions for CU based on reporting channel condition. The proposed technique Reporting Channel Base Contribution (RCBC) limits the number of CU’s contributions for the final global probability of detection and false alarm based on various fusion rules. Detailed analytical and numerical analysis are covered in this paper. Simulation results show a great improvement in the global results when RCBC technique is compared with Reporting loss.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132512624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}