Pub Date : 2023-01-01DOI: 10.24138/jcomss-2023-0056
Olimpjon Shurdi, Alban Rakipi, Algenti Lala
—The evolution of mobile technology and computation systems enables User Equipment (UE) to manage tremendous amounts of data transmission. As a result of current 5G technology, several types of wireless traffic in millimeter wave bands can be transmitted at high data rates with ultra-reliable and small latency communications. The 5G networks rely on directional beamforming and mmWave uses to overcome propagation and losses during penetration. To align the best beam pairs and achieve high data rates, beam-search operations are used in 5G. This combined with multibeam reception and high-order modulation techniques deteriorates the battery power of the UE. In the previous 4G radio mobile system, Discontinuous Reception (DRX) techniques were successfully used to save energy. To reduce the energy consumption and latency of multiple-beam 5G radio communications, we will propose in this paper the DRX Beam Measurement technique (DRX-BM). Based on the power-saving factor analysis and the delayed response, we will model DRX-BM into a semi-Markov process to reduce the tracking time. Simulations in MATLAB are used to assess the effectiveness of the proposed model and avoid unnecessary time spent on beam search. Furthermore, the simulation indicates that our proposed technique makes an improvement and saves 14% on energy with a minimum delay.
{"title":"Power Saving Techniques in 5G Technology for Multiple-Beam Communications","authors":"Olimpjon Shurdi, Alban Rakipi, Algenti Lala","doi":"10.24138/jcomss-2023-0056","DOIUrl":"https://doi.org/10.24138/jcomss-2023-0056","url":null,"abstract":"—The evolution of mobile technology and computation systems enables User Equipment (UE) to manage tremendous amounts of data transmission. As a result of current 5G technology, several types of wireless traffic in millimeter wave bands can be transmitted at high data rates with ultra-reliable and small latency communications. The 5G networks rely on directional beamforming and mmWave uses to overcome propagation and losses during penetration. To align the best beam pairs and achieve high data rates, beam-search operations are used in 5G. This combined with multibeam reception and high-order modulation techniques deteriorates the battery power of the UE. In the previous 4G radio mobile system, Discontinuous Reception (DRX) techniques were successfully used to save energy. To reduce the energy consumption and latency of multiple-beam 5G radio communications, we will propose in this paper the DRX Beam Measurement technique (DRX-BM). Based on the power-saving factor analysis and the delayed response, we will model DRX-BM into a semi-Markov process to reduce the tracking time. Simulations in MATLAB are used to assess the effectiveness of the proposed model and avoid unnecessary time spent on beam search. Furthermore, the simulation indicates that our proposed technique makes an improvement and saves 14% on energy with a minimum delay.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0074
Sid Ahmed Hadri, Abdelkrim Bouramoul
{"title":"Friendy: A Deep Learning based Framework for Assisting in Young Autistic Children Psychotherapy Interventions","authors":"Sid Ahmed Hadri, Abdelkrim Bouramoul","doi":"10.24138/jcomss-2022-0074","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0074","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69099226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0089
Naaman Omar
{"title":"Ensemble of Local Texture Descriptor for Accurate Breast Cancer Detection from Histopathologic Images","authors":"Naaman Omar","doi":"10.24138/jcomss-2022-0089","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0089","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"39 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69099551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0141
Homayun Kabir, Mau-Luen Tham, Yoong Choon Chang
{"title":"Twin Delayed DDPG based Dynamic Power Allocation for Mobility in IoRT","authors":"Homayun Kabir, Mau-Luen Tham, Yoong Choon Chang","doi":"10.24138/jcomss-2022-0141","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0141","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0151
J. Mary, A. Aloysius
{"title":"Task Scheduling with Altered Grey Wolf Optimization (AGWO) in Mobile Cloud Computing using Cloudlet","authors":"J. Mary, A. Aloysius","doi":"10.24138/jcomss-2022-0151","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0151","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0166
A. A. Hussein, Dhari Ali Mahmood
— In the last decade, user demand has been increasing exponentially based on modern communication systems. One of these new technologies is known as mobile ad-hoc networking (MANET). One part of MANET is called a vehicular ad-hoc network (VANET). It has different types such as vehicle-to-vehicle (V2V), vehicular delay-tolerant networks, and vehicle-to-infrastructure (V2I). To provide sufficient quality of communication service in the Vehicular Delay-Tolerant Network (VDTN), it is important to present a comprehensive survey that shows the challenges and limitations of VANET. In this paper, we focus on one type of VANET, which is known as VDTNs. To investigate realistic communication systems based on VANET, we considered intelligent transportation systems (ITSs) and the possibility of replacing the roadside unit with VDTN. Many factors can affect the message propagation delay. When road-side units (RSUs) are present, which leads to an increase in the message delivery efficiency since RSUs can collaborate with vehicles on the road to increase the throughput of the network, we propose new methods based on environment and vehicle traffic and present a comprehensive evaluation of the newly suggested VDTN routing method. Furthermore, challenges and prospects are presented to stimulate interest in the scientific community.
{"title":"Connectivity Analysis in Vehicular Ad-hoc Network based on VDTN","authors":"A. A. Hussein, Dhari Ali Mahmood","doi":"10.24138/jcomss-2022-0166","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0166","url":null,"abstract":"— In the last decade, user demand has been increasing exponentially based on modern communication systems. One of these new technologies is known as mobile ad-hoc networking (MANET). One part of MANET is called a vehicular ad-hoc network (VANET). It has different types such as vehicle-to-vehicle (V2V), vehicular delay-tolerant networks, and vehicle-to-infrastructure (V2I). To provide sufficient quality of communication service in the Vehicular Delay-Tolerant Network (VDTN), it is important to present a comprehensive survey that shows the challenges and limitations of VANET. In this paper, we focus on one type of VANET, which is known as VDTNs. To investigate realistic communication systems based on VANET, we considered intelligent transportation systems (ITSs) and the possibility of replacing the roadside unit with VDTN. Many factors can affect the message propagation delay. When road-side units (RSUs) are present, which leads to an increase in the message delivery efficiency since RSUs can collaborate with vehicles on the road to increase the throughput of the network, we propose new methods based on environment and vehicle traffic and present a comprehensive evaluation of the newly suggested VDTN routing method. Furthermore, challenges and prospects are presented to stimulate interest in the scientific community.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2023-0102
Ajay Kumar
Accurate prediction of real estate prices is an essential task for establishing real estate policies. Even though various regression models for real estate price prediction have been developed so far, selecting the most suitable regression model is a challenging task since the performance of different regression models varies for different accuracy measures. This paper aims to recommend the most suitable regression model for real estate price prediction, considering various performance measures altogether using multi-criteria decision making (MCDM). The evaluation of regression models involves a number of competing accuracy measures; hence, choosing the best regression model for predicting real estate price is modeled as the MCDM problem in the proposed approach. An experimental study is designed using 22 regression models, three MCDM methods, six performance measures, and three real estate price datasets to validate the proposed approach. Experimental outcomes show that Gradient Boosting, Random Forest, and Ridge Regression are recommended as the best regression models based on MCDM ranking. The results of the experimental study show that the proposed MCDM-based strategy can be utilized effectively in real estate industries to choose the best regression model for predicting real estate prices by optimizing several competing accuracy measures.
{"title":"Recommendation of Regression Models for Real Estate Price Prediction using Multi-Criteria Decision Making","authors":"Ajay Kumar","doi":"10.24138/jcomss-2023-0102","DOIUrl":"https://doi.org/10.24138/jcomss-2023-0102","url":null,"abstract":"Accurate prediction of real estate prices is an essential task for establishing real estate policies. Even though various regression models for real estate price prediction have been developed so far, selecting the most suitable regression model is a challenging task since the performance of different regression models varies for different accuracy measures. This paper aims to recommend the most suitable regression model for real estate price prediction, considering various performance measures altogether using multi-criteria decision making (MCDM). The evaluation of regression models involves a number of competing accuracy measures; hence, choosing the best regression model for predicting real estate price is modeled as the MCDM problem in the proposed approach. An experimental study is designed using 22 regression models, three MCDM methods, six performance measures, and three real estate price datasets to validate the proposed approach. Experimental outcomes show that Gradient Boosting, Random Forest, and Ridge Regression are recommended as the best regression models based on MCDM ranking. The results of the experimental study show that the proposed MCDM-based strategy can be utilized effectively in real estate industries to choose the best regression model for predicting real estate prices by optimizing several competing accuracy measures.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135750630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0157
Osiris Escamilla-Luna, Miguel A. Wister, José Hernández-Torruco
{"title":"Machine Learning Algorithms for Classification Patients with Parkinson`s Disease and Hereditary Ataxias","authors":"Osiris Escamilla-Luna, Miguel A. Wister, José Hernández-Torruco","doi":"10.24138/jcomss-2022-0157","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0157","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69099952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0169
Giorgia Adorni, F. Mangili, Alberto Piatti, Claudio Bonesana, Alessandro Antonucci
—In modern and personalised education, there is a growing interest in developing learners’ competencies and accurately assessing them. In a previous work, we proposed a procedure for deriving a learner model for automatic skill assessment from a task-specific competence rubric, thus simpli- fying the implementation of automated assessment tools. The previous approach, however, suffered two main limitations: (i) the ordering between competencies defined by the assessment rubric was only indirectly modelled; (ii) supplementary skills, not under assessment but necessary for accomplishing the task, were not included in the model. In this work, we address issue (i) by introducing dummy observed nodes, strictly enforcing the skills ordering without changing the network’s structure. In contrast, for point (ii), we design a network with two layers of gates, one performing disjunctive operations by noisy-OR gates and the other conjunctive operations through logical ANDs. Such changes improve the model outcomes’ coherence and the modelling tool’s flexibility without compromising the model’s compact parametrisation, interpretability and simple experts’ elicitation. We used this approach to develop a learner model for Computational Thinking (CT) skills assessment. The CT-cube skills assessment framework and the Cross Array Task (CAT) are used to exemplify it and demonstrate its feasibility.
{"title":"Rubric-based Learner Modelling via Noisy Gates Bayesian Networks for Computational Thinking Skills Assessment","authors":"Giorgia Adorni, F. Mangili, Alberto Piatti, Claudio Bonesana, Alessandro Antonucci","doi":"10.24138/jcomss-2022-0169","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0169","url":null,"abstract":"—In modern and personalised education, there is a growing interest in developing learners’ competencies and accurately assessing them. In a previous work, we proposed a procedure for deriving a learner model for automatic skill assessment from a task-specific competence rubric, thus simpli- fying the implementation of automated assessment tools. The previous approach, however, suffered two main limitations: (i) the ordering between competencies defined by the assessment rubric was only indirectly modelled; (ii) supplementary skills, not under assessment but necessary for accomplishing the task, were not included in the model. In this work, we address issue (i) by introducing dummy observed nodes, strictly enforcing the skills ordering without changing the network’s structure. In contrast, for point (ii), we design a network with two layers of gates, one performing disjunctive operations by noisy-OR gates and the other conjunctive operations through logical ANDs. Such changes improve the model outcomes’ coherence and the modelling tool’s flexibility without compromising the model’s compact parametrisation, interpretability and simple experts’ elicitation. We used this approach to develop a learner model for Computational Thinking (CT) skills assessment. The CT-cube skills assessment framework and the Cross Array Task (CAT) are used to exemplify it and demonstrate its feasibility.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.24138/jcomss-2022-0103
Maryam Qusai Abdulqadir, A. A. Al Janaby
The world witnessed a pandemic that needs to be limited. COVID-19 is a disease that spreads among people when an infected person is in close contact with another. To decrease the virus spreading, World Health Organization (WHO) imposed precautionary measures and suggested some rules to be followed such as social distancing and quarantining the infected people. We propose a model, using D2D and IoT technology, for tracking infected persons with COVID-19 and its proximity. If a person (mobile device) gets close to an infected person, he will also get infected, so by continuous moving, the infection will be transmitted. Thus, identifying the infected persons and their contacts will limit the spread of the disease. In each scenario, it is possible to distinguish the number of infected people and know from whom they are infected, and the location of the infection. The simulation shows the tracking of a mobile device when proximate infected person at a distance of 3 meters. As a result, our proposed D2D model is effective, especially in the scenario which found the infected person with COVID-19, tracks them, determines minimum distances, and recognizes the source of the infection. Thus, the model can limit the rapid spread of COVID-19 as it determines the 3meters distance from infected person and send precaution messages to the network.
{"title":"Tracking Infected Covid-19 Persons and their Proximity Users Using D2D in 5G Networks","authors":"Maryam Qusai Abdulqadir, A. A. Al Janaby","doi":"10.24138/jcomss-2022-0103","DOIUrl":"https://doi.org/10.24138/jcomss-2022-0103","url":null,"abstract":"The world witnessed a pandemic that needs to be limited. COVID-19 is a disease that spreads among people when an infected person is in close contact with another. To decrease the virus spreading, World Health Organization (WHO) imposed precautionary measures and suggested some rules to be followed such as social distancing and quarantining the infected people. We propose a model, using D2D and IoT technology, for tracking infected persons with COVID-19 and its proximity. If a person (mobile device) gets close to an infected person, he will also get infected, so by continuous moving, the infection will be transmitted. Thus, identifying the infected persons and their contacts will limit the spread of the disease. In each scenario, it is possible to distinguish the number of infected people and know from whom they are infected, and the location of the infection. The simulation shows the tracking of a mobile device when proximate infected person at a distance of 3 meters. As a result, our proposed D2D model is effective, especially in the scenario which found the infected person with COVID-19, tracks them, determines minimum distances, and recognizes the source of the infection. Thus, the model can limit the rapid spread of COVID-19 as it determines the 3meters distance from infected person and send precaution messages to the network.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69100246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}