Pub Date : 2022-07-18DOI: 10.13052/jmm1550-4646.18612
M. Al-Shabi
Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud computing plays a vital role, since it provides a reliable safety journey to vehicular drivers, passengers, etc. However, attaining security and emergency message dissemination is still major bottleneck in VANET combined Cloud, due to the dynamic nature of vehicles and wireless communication. Our major intention is to provide high level security in VANET-Cloud environment. In addition to it, we also reduce delay in emergency dissemination. Our proposed Delay aware Emergency Message Dissemination and Data Retrieval in secure (DEMD22RS) VANET-Cloud is composed of four sequential processes: Authentication, Clustering, Data Retrieval and Data dissemination. In regard to maintaining security for both Road Side Unit (RSU) and Vehicles, we propose Hash based Credential Authentication Scheme (HCAS) that affords authentication using Secure Hash Algorithm-3 (SHA-3) and Elliptic Curve Points (ECP). To sustain a stable cluster, Firm Aware Clustering Scheme (FACS) is pursued where Stud Krill Herd (SKH) algorithm is exploited. In the data retrieval process, cloud provides requested information to the RSU in encrypted form using the Twofish algorithm. RSU discover the path to deliver received data through executing Artificial Neural Network (ANN) algorithm. In order to diminish delay in emergency message dissemination, best disseminator is selected by cluster head using Fuzzy-Topsis (FT) algorithm. Our DEMD22RS VANET-Cloud network is implemented in Network Simulator 3 tool. Finally, the evaluation of DEMD22RS work performance is achieved by computing consequent metrics that are Throughput, Packet Delivery Ratio, Transmission delay, Average delay, Key generation time, Encryption time and Decryption time.
{"title":"An Enhance the Performance of Mining Vehicular and Machinery Security Systems Using Artificial Intelligence in VANET Cloud Computing","authors":"M. Al-Shabi","doi":"10.13052/jmm1550-4646.18612","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18612","url":null,"abstract":"Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud computing plays a vital role, since it provides a reliable safety journey to vehicular drivers, passengers, etc. However, attaining security and emergency message dissemination is still major bottleneck in VANET combined Cloud, due to the dynamic nature of vehicles and wireless communication. Our major intention is to provide high level security in VANET-Cloud environment. In addition to it, we also reduce delay in emergency dissemination. Our proposed Delay aware Emergency Message Dissemination and Data Retrieval in secure (DEMD22RS) VANET-Cloud is composed of four sequential processes: Authentication, Clustering, Data Retrieval and Data dissemination. In regard to maintaining security for both Road Side Unit (RSU) and Vehicles, we propose Hash based Credential Authentication Scheme (HCAS) that affords authentication using Secure Hash Algorithm-3 (SHA-3) and Elliptic Curve Points (ECP). To sustain a stable cluster, Firm Aware Clustering Scheme (FACS) is pursued where Stud Krill Herd (SKH) algorithm is exploited. In the data retrieval process, cloud provides requested information to the RSU in encrypted form using the Twofish algorithm. RSU discover the path to deliver received data through executing Artificial Neural Network (ANN) algorithm. In order to diminish delay in emergency message dissemination, best disseminator is selected by cluster head using Fuzzy-Topsis (FT) algorithm. Our DEMD22RS VANET-Cloud network is implemented in Network Simulator 3 tool. Finally, the evaluation of DEMD22RS work performance is achieved by computing consequent metrics that are Throughput, Packet Delivery Ratio, Transmission delay, Average delay, Key generation time, Encryption time and Decryption time.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.13052/jmm1550-4646.18618
Rodjana Suwan, P. Temdee, R. V. Prasad
Given the harmful effects of excessive sugar consumption, everyone should be aware of the amount of sugar they consume in daily life. Generally, managing nutrition and preventing negative effects from sugar intake requires a nutritional specialist or specialized knowledge, which may not always be readily accessible or understandable. Therefore, there is a need for a mobile application that can track excessive sugar consumption. This study proposes a context-aware personalized recommendation mobile application for monitoring excessive sugar consumption and providing individual recommendations (based on a predefined set of 144 rules) to Thai adolescents. The application is user friendly and can be used to provide recommendations to users for sugar consumption and proper exercise each day. Personal, health, and lifestyle data are collected and analyzed to provide individualized recommendations to each user. Experiments were conducted with 140 Thai adolescents aged 15 to 25 years old. Users’ preferences regarding degree of awareness in presentation style were also investigated. Users rated their satisfaction with the proposed mobile application as very high in terms of both function and personalization. In addition, fully automated recommendations were found to be the preferred degree of awareness among the test group.
{"title":"Context-aware Based Personalized Recommendation on Mobile for Monitoring Excessive Sugar Consumption of Thai Adolescents","authors":"Rodjana Suwan, P. Temdee, R. V. Prasad","doi":"10.13052/jmm1550-4646.18618","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18618","url":null,"abstract":"Given the harmful effects of excessive sugar consumption, everyone should be aware of the amount of sugar they consume in daily life. Generally, managing nutrition and preventing negative effects from sugar intake requires a nutritional specialist or specialized knowledge, which may not always be readily accessible or understandable. Therefore, there is a need for a mobile application that can track excessive sugar consumption. This study proposes a context-aware personalized recommendation mobile application for monitoring excessive sugar consumption and providing individual recommendations (based on a predefined set of 144 rules) to Thai adolescents. The application is user friendly and can be used to provide recommendations to users for sugar consumption and proper exercise each day. Personal, health, and lifestyle data are collected and analyzed to provide individualized recommendations to each user. Experiments were conducted with 140 Thai adolescents aged 15 to 25 years old. Users’ preferences regarding degree of awareness in presentation style were also investigated. Users rated their satisfaction with the proposed mobile application as very high in terms of both function and personalization. In addition, fully automated recommendations were found to be the preferred degree of awareness among the test group.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.13052/jmm1550-4646.18610
Dongchi Li, Pushpendu Kar
In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.
{"title":"B-Spot: Blockchain and Steganography based Robust and Secure Photo Transmission Mechanism","authors":"Dongchi Li, Pushpendu Kar","doi":"10.13052/jmm1550-4646.18610","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18610","url":null,"abstract":"In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128942598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-02DOI: 10.13052/jmm1550-4646.1862
Y. Kwon, Moonhee Son, Hoon Chang
With the spread of 5G services and the development of IoT technology, network traffic for information delivery is increasing in capacity. As network traffic increases, cyber threats also increase, resulting in an increasing importance on traffic analysis. The existing packet processing engine generates a signature by analyzing the characteristics of the attack after the occurrence of suspicious traffic, and based on this, it is difficult to properly respond to new and variant attack traffic because a manual response method is performed to detect the same attack. In addition, even during a network operation, only analysis results generated by passive filtering appear, and when abnormal or suspicious traffic is observed, the quality of the report is often affected by the analysis capability of the administrator. The packet processing method proposed in this paper applies the core isolation method to the NUMA structure applied to the existing 20 Gbps packet processing engine to increase the accessibility of the existing NUMA memory structure and lower the packet drop rate to enable high-capacity 30 Gbps traffic processing. Using the proposed processing engine, it is possible to determine the degree of possibility of abnormal traffic, preferentially by a quick analysis of suspicious traffic rather than a detailed analysis of traffic.
{"title":"An Improved 30 Gbps-Class Large-Capacity Packet Processing Method Using Core Isolation Technology","authors":"Y. Kwon, Moonhee Son, Hoon Chang","doi":"10.13052/jmm1550-4646.1862","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1862","url":null,"abstract":"With the spread of 5G services and the development of IoT technology, network traffic for information delivery is increasing in capacity. As network traffic increases, cyber threats also increase, resulting in an increasing importance on traffic analysis. The existing packet processing engine generates a signature by analyzing the characteristics of the attack after the occurrence of suspicious traffic, and based on this, it is difficult to properly respond to new and variant attack traffic because a manual response method is performed to detect the same attack. In addition, even during a network operation, only analysis results generated by passive filtering appear, and when abnormal or suspicious traffic is observed, the quality of the report is often affected by the analysis capability of the administrator. The packet processing method proposed in this paper applies the core isolation method to the NUMA structure applied to the existing 20 Gbps packet processing engine to increase the accessibility of the existing NUMA memory structure and lower the packet drop rate to enable high-capacity 30 Gbps traffic processing. Using the proposed processing engine, it is possible to determine the degree of possibility of abnormal traffic, preferentially by a quick analysis of suspicious traffic rather than a detailed analysis of traffic.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-02DOI: 10.13052/jmm1550-4646.1861
S. Sahoo, S. K. Pattnaik, S. Samal, Chinmay Kumar Nayak, Jitendra Kuma Das, V. Poulkov
Due to the advancement in recent technologies and emergence of Internet of Things (IoT), Smart Home Automation (SHA) plays a vital role in today’s lifestyle. Many users are showing their keen interest to move towards this era of digital transformation in order to take the potential benefits of such intelligent and smart application. Traditional smart home systems have several limitations e.g. connectivity, coverage area, device dependability, platform supportability etc. which makes the system less sustainable. In this paper, the proposed technique introduces a novel scheme to operate the devices in an intelligent manner. The scheme implements a system named as “Speech Technology enabled Smart Home (STeSH)”, which supports voice assisted home automation with extreme security and range-free localization. The idea of the proposed technique is to integrate the power of IoT with classical home automation by using an advanced speech technology service. The entire processing of Speech Enabled Services (SES) is applied with this proposed technique and the detailed analysis is presented with proper experimental proof.
{"title":"STeSH: Intelligent Speech Technology Enabled Smart Home Automation Using IoT","authors":"S. Sahoo, S. K. Pattnaik, S. Samal, Chinmay Kumar Nayak, Jitendra Kuma Das, V. Poulkov","doi":"10.13052/jmm1550-4646.1861","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1861","url":null,"abstract":"Due to the advancement in recent technologies and emergence of Internet of Things (IoT), Smart Home Automation (SHA) plays a vital role in today’s lifestyle. Many users are showing their keen interest to move towards this era of digital transformation in order to take the potential benefits of such intelligent and smart application. Traditional smart home systems have several limitations e.g. connectivity, coverage area, device dependability, platform supportability etc. which makes the system less sustainable. In this paper, the proposed technique introduces a novel scheme to operate the devices in an intelligent manner. The scheme implements a system named as “Speech Technology enabled Smart Home (STeSH)”, which supports voice assisted home automation with extreme security and range-free localization. The idea of the proposed technique is to integrate the power of IoT with classical home automation by using an advanced speech technology service. The entire processing of Speech Enabled Services (SES) is applied with this proposed technique and the detailed analysis is presented with proper experimental proof.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-02DOI: 10.13052/jmm1550-4646.1863
U. Raju, Hillol Barman, R. K. Netalkar, Sanjay Kumar, Hariom Kumar
Digital data is primarily created and delivered in the form of images and videos in today’s world. Storing and transmitting such a large number of images necessitates a lot of computer resources, such as storage and bandwidth. So, rather than keeping the image data as is, the data could be compressed and then stored, which saves a lot of space. Image compression is the process of removing as much redundant data from an image as feasible while retaining only the non-redundant data. In this paper, the traditional JPEG compression technique is executed in the distributed environment with map-reduce paradigm on big image data. This technique is carried out in serial as well as in parallel fashion with different number of workers in order to show the time comparisons between these setups with the self-created large image dataset. In this, more than one Lakh (121,856) images are compressed and decompressed and the execution times are compared with three different setups: single system, Map-Reduce (MR) with 2 workers and MR with 4 workers. Compression on more than one Million (1,096,704) images using single system and MR with 4 workers is also done. To evaluate the efficiency of JPEG technique, two performance measures such as Compression Ratio (CR) and Peak Signal to Noise Ratio (PSNR) are used.
{"title":"Distributed JPEG Compression and Decompression for Big Image Data Using Map-Reduce Paradigm","authors":"U. Raju, Hillol Barman, R. K. Netalkar, Sanjay Kumar, Hariom Kumar","doi":"10.13052/jmm1550-4646.1863","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1863","url":null,"abstract":"Digital data is primarily created and delivered in the form of images and videos in today’s world. Storing and transmitting such a large number of images necessitates a lot of computer resources, such as storage and bandwidth. So, rather than keeping the image data as is, the data could be compressed and then stored, which saves a lot of space. Image compression is the process of removing as much redundant data from an image as feasible while retaining only the non-redundant data. In this paper, the traditional JPEG compression technique is executed in the distributed environment with map-reduce paradigm on big image data. This technique is carried out in serial as well as in parallel fashion with different number of workers in order to show the time comparisons between these setups with the self-created large image dataset. In this, more than one Lakh (121,856) images are compressed and decompressed and the execution times are compared with three different setups: single system, Map-Reduce (MR) with 2 workers and MR with 4 workers. Compression on more than one Million (1,096,704) images using single system and MR with 4 workers is also done. To evaluate the efficiency of JPEG technique, two performance measures such as Compression Ratio (CR) and Peak Signal to Noise Ratio (PSNR) are used.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.18513
Keshav Kaushik
5G and beyond systems are being built to be prospective by responding to the different needs of a diverse range of applications, which represents a significant departure from this approach. Owing to its openness, encryption techniques, verifiability, integrity, and decentralized design, blockchain has evolved as an important approach. 5G and Blockchain might transform emerging technology. 5G offers consumers high speeds and QoS, while blockchain ensures peer-to-peer trust and privacy. Blockchain is a revolutionary technology having wide range of applications in various domains like Artificial Intelligence, Internet of Things (IoT), Cybersecurity, Wireless networks, 5G and beyond networks, etc. In this paper, the role of Blockchain technology in 5G and beyond networks is discussed. This paper also highlights the various challenges that acts as a hindrance while implementing the Blockchain in 5G and beyond networks. Moreover, the paper also discusses the future aspect of Blockchain in 5G networks.
{"title":"Demystifying Blockchain in 5G and Beyond Technologies","authors":"Keshav Kaushik","doi":"10.13052/jmm1550-4646.18513","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18513","url":null,"abstract":"5G and beyond systems are being built to be prospective by responding to the different needs of a diverse range of applications, which represents a significant departure from this approach. Owing to its openness, encryption techniques, verifiability, integrity, and decentralized design, blockchain has evolved as an important approach. 5G and Blockchain might transform emerging technology. 5G offers consumers high speeds and QoS, while blockchain ensures peer-to-peer trust and privacy. Blockchain is a revolutionary technology having wide range of applications in various domains like Artificial Intelligence, Internet of Things (IoT), Cybersecurity, Wireless networks, 5G and beyond networks, etc. In this paper, the role of Blockchain technology in 5G and beyond networks is discussed. This paper also highlights the various challenges that acts as a hindrance while implementing the Blockchain in 5G and beyond networks. Moreover, the paper also discusses the future aspect of Blockchain in 5G networks.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.1855
M. A. Ilgaz, Kristjan Vuk Baliž, B. Batagelj
Next-generation 5G and 6G radio access networks (RANs) require millimetre-wave (mm-W) oscillators to generate extremely low phase-noise signals for the frequency up-conversion and down-conversion in radio units (RUs). The opto-electronic oscillator (OEO) is an outstanding candidate for generating a high-purity mm-W signal in a centralized radio access network (C-RAN) where the distributed base-stations are dislocated from the digital units (DUs) and there are only RUs on the remote side. In this paper we propose placing an OEO in the central-office, while distributing its signal from there to multiple RU base-stations through the mobile front-haul network using a radio-over-fibre (RoF) transmission approach. This new approach was used in experiments that proved the smaller degradation of the phase noise compared to a degradation of 6 dB for the well-known frequency-doubling electrical oscillator in the RU. In addition, we present the signal-strength degradation due to fibre dispersion in mm-W signal distribution, as well as the challenges in long-term stability and multimode operation. We propose solutions to overcome these drawbacks and make our new approach useful for a centralized carrier signal distribution in next-generation RANs.
{"title":"Improved Next-Generation Radio Access Networks Using a Centralized Opto-Electronic Oscillator","authors":"M. A. Ilgaz, Kristjan Vuk Baliž, B. Batagelj","doi":"10.13052/jmm1550-4646.1855","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1855","url":null,"abstract":"Next-generation 5G and 6G radio access networks (RANs) require millimetre-wave (mm-W) oscillators to generate extremely low phase-noise signals for the frequency up-conversion and down-conversion in radio units (RUs). The opto-electronic oscillator (OEO) is an outstanding candidate for generating a high-purity mm-W signal in a centralized radio access network (C-RAN) where the distributed base-stations are dislocated from the digital units (DUs) and there are only RUs on the remote side. In this paper we propose placing an OEO in the central-office, while distributing its signal from there to multiple RU base-stations through the mobile front-haul network using a radio-over-fibre (RoF) transmission approach. This new approach was used in experiments that proved the smaller degradation of the phase noise compared to a degradation of 6 dB for the well-known frequency-doubling electrical oscillator in the RU. In addition, we present the signal-strength degradation due to fibre dispersion in mm-W signal distribution, as well as the challenges in long-term stability and multimode operation. We propose solutions to overcome these drawbacks and make our new approach useful for a centralized carrier signal distribution in next-generation RANs.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.1851
I. Khan, Asrin Abdollahi, Abdul Jamil, Bisma Baig, M. A. Aziz, F. Subhan
Flying-Thing is a new promising area, while in last few years Unmanned Aerial Vehicles are emerged. UAVs are very efficient in completing tasks also organizing ad hoc behaviour of networks, thus making flying ad hoc networks. The formation of aerial nodes is not feasible until we use Mobility models for communication between UAV’s. Mobile ad hoc networks & wireless sensor networks are mostly static in behaviour but UAVs are dynamic and deployed in sky using mobility models. In flying ad hoc networks effective communication can be made possible using 5G networks while designing routing protocols. In this paper a comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flying ad hoc networks. This paper reflects and explains future challenges and help scientists, Researchers to discover more research gaps that have been discussed in the literature and need more investigation. Also, different applications of flying things can be used in IoT based forestry which includes forest mapping, management where optimal results can be obtained. The uniqueness of this research study is to provide heuristic computational algorithm called AntHocNet, Mobility models, drawbacks of traditional technologies, flying-things architecture will be the core interest of this research study.
{"title":"A Novel Design of FANET Routing Protocol Aided 5G Communication Using IoT","authors":"I. Khan, Asrin Abdollahi, Abdul Jamil, Bisma Baig, M. A. Aziz, F. Subhan","doi":"10.13052/jmm1550-4646.1851","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1851","url":null,"abstract":"Flying-Thing is a new promising area, while in last few years Unmanned Aerial Vehicles are emerged. UAVs are very efficient in completing tasks also organizing ad hoc behaviour of networks, thus making flying ad hoc networks. The formation of aerial nodes is not feasible until we use Mobility models for communication between UAV’s. Mobile ad hoc networks & wireless sensor networks are mostly static in behaviour but UAVs are dynamic and deployed in sky using mobility models. In flying ad hoc networks effective communication can be made possible using 5G networks while designing routing protocols. In this paper a comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flying ad hoc networks. This paper reflects and explains future challenges and help scientists, Researchers to discover more research gaps that have been discussed in the literature and need more investigation. Also, different applications of flying things can be used in IoT based forestry which includes forest mapping, management where optimal results can be obtained. The uniqueness of this research study is to provide heuristic computational algorithm called AntHocNet, Mobility models, drawbacks of traditional technologies, flying-things architecture will be the core interest of this research study.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.1852
Muhammad Ayoub Kamal, M. Alam, Aznida Abu Bakar Sajak, M. M. Su’ud
The Industrial Internet of Things (IIoT), also known as Industry 4.0, is a forward-thinking industrial era in which numerous developing technologies are combined to produce digital solutions. In industrial enterprises, Industry 4.0 technologies are separated into base and front-end technologies. Cloud computing, IoT, analytics, and big data are all essential technologies. In this article, we evaluate the current landscape of factory automation and the influence of 5G and LoRA communication on smart manufacturing automation, while front-end technologies are split into four categories: smart goods, smart working, smart manufacturing, and smart supply chain. First, we looked at the idea of Industry 4.0, as well as the four front-end dimensions and four basic technological components. Second, we spoke about smart industrial automation and the influence of 5G and LoRA communication. The broad use of front-end technology, of which Smart Manufacturing is a crucial component, is required for Industry 4.0 to succeed. However, the implementation of the foundation technologies is difficult. Current automation standards will serve as a solid foundation for future smart manufacturing systems. The distribution, adoption, and development of relevant morality in a requirement-driven process may result in faster, deeper, and bigger implementation of smart industrial automation.
{"title":"Impact of LoRA and 5G on Smart Manufacturing from Automation Perspective","authors":"Muhammad Ayoub Kamal, M. Alam, Aznida Abu Bakar Sajak, M. M. Su’ud","doi":"10.13052/jmm1550-4646.1852","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1852","url":null,"abstract":"The Industrial Internet of Things (IIoT), also known as Industry 4.0, is a forward-thinking industrial era in which numerous developing technologies are combined to produce digital solutions. In industrial enterprises, Industry 4.0 technologies are separated into base and front-end technologies. Cloud computing, IoT, analytics, and big data are all essential technologies. In this article, we evaluate the current landscape of factory automation and the influence of 5G and LoRA communication on smart manufacturing automation, while front-end technologies are split into four categories: smart goods, smart working, smart manufacturing, and smart supply chain. First, we looked at the idea of Industry 4.0, as well as the four front-end dimensions and four basic technological components. Second, we spoke about smart industrial automation and the influence of 5G and LoRA communication. The broad use of front-end technology, of which Smart Manufacturing is a crucial component, is required for Industry 4.0 to succeed. However, the implementation of the foundation technologies is difficult. Current automation standards will serve as a solid foundation for future smart manufacturing systems. The distribution, adoption, and development of relevant morality in a requirement-driven process may result in faster, deeper, and bigger implementation of smart industrial automation.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"3 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131943362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}