Pub Date : 2022-07-18DOI: 10.13052/jmm1550-4646.18613
Wachira Lawpradit, T. Yooyativong, R. Chaisricharoen
This research was designed for analyse and compare patterns of EEG signals while blinded and normal people performing touching-leaning. The pattern analysis focuses on important EEG wavebands during touching, such as delta, theta, alpha and gamma waveband. The EEG waveband-datasets were detected and recorded with inexpensive device, the NeuroSky Mindwave, where it is connected to a computer for data analysis through Bluetooth communication and had electric noise reduction chipset inside. The analysis for the EEG waveband pattern-comparisons is performed by utilizing waveband power spectrum and statistical technique based on FFT algorithm, Area Under Curve (AUC), mean, S.D., T-score, and P-value testing. The experiment shown that dominant EEG signal wavebands of blinded people when touching-learning are delta, theta, alpha and gamma. These wavebands were higher than normal people. Moreover, by using statistical analysis T-score and P-values testing, analyzed results illustrate that normal and blinded people EEG wave patterns are significantly different on gamma waveband where blinded people have significantly higher gramma wave during touching-learning activities. The objects used for touching-leaning in the experiments are square, triangle, circle, and hexagon shape of tactile pictures. The observation also shown that blinded people use their muscle in movement more than normal people which also strongly related to gramma wave. In addition, another wave did not relate to statistic significant. This result illustrated to normal and blinded people thinking and imagination with the same pattern.
这项研究的目的是分析和比较盲人和正常人进行触摸学习时的脑电图信号模式。模式分析侧重于触摸过程中重要的脑电信号波段,如delta、theta、alpha和gamma波段。脑电图波段数据集是用廉价的设备NeuroSky Mindwave检测和记录的,该设备通过蓝牙通信连接到计算机进行数据分析,内部装有电子降噪芯片组。基于FFT算法、曲线下面积(Area Under Curve, AUC)、均值、标准差、T-score和p值检验,利用波段功率谱和统计技术对EEG波段模式比较进行分析。实验表明,盲人触摸学习时的主要脑电图信号波段为δ、θ、α和γ。这些波段比正常人高。此外,通过统计分析T-score和p值检验,分析结果表明正常人和盲者的脑电波在伽玛波段上存在显著差异,其中盲者在触摸学习活动中伽玛波明显较高。实验中用于触觉学习的对象为触觉图片的正方形、三角形、圆形和六边形。观察还表明,盲人在运动中比正常人更多地使用肌肉,这也与脑电波密切相关。另外,另一波无统计学意义相关。这一结果说明正常人和盲人的思维和想象具有相同的模式。
{"title":"The EEG Brain Signal Pattern Analysis During Touching Learning of the Blind and Normal People via a Low-cost Device","authors":"Wachira Lawpradit, T. Yooyativong, R. Chaisricharoen","doi":"10.13052/jmm1550-4646.18613","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18613","url":null,"abstract":"This research was designed for analyse and compare patterns of EEG signals while blinded and normal people performing touching-leaning. The pattern analysis focuses on important EEG wavebands during touching, such as delta, theta, alpha and gamma waveband. The EEG waveband-datasets were detected and recorded with inexpensive device, the NeuroSky Mindwave, where it is connected to a computer for data analysis through Bluetooth communication and had electric noise reduction chipset inside. The analysis for the EEG waveband pattern-comparisons is performed by utilizing waveband power spectrum and statistical technique based on FFT algorithm, Area Under Curve (AUC), mean, S.D., T-score, and P-value testing. The experiment shown that dominant EEG signal wavebands of blinded people when touching-learning are delta, theta, alpha and gamma. These wavebands were higher than normal people. Moreover, by using statistical analysis T-score and P-values testing, analyzed results illustrate that normal and blinded people EEG wave patterns are significantly different on gamma waveband where blinded people have significantly higher gramma wave during touching-learning activities. The objects used for touching-leaning in the experiments are square, triangle, circle, and hexagon shape of tactile pictures. The observation also shown that blinded people use their muscle in movement more than normal people which also strongly related to gramma wave. In addition, another wave did not relate to statistic significant. This result illustrated to normal and blinded people thinking and imagination with the same pattern.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127171081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.13052/jmm1550-4646.18618
Rodjana Suwan, P. Temdee, R. V. Prasad
Given the harmful effects of excessive sugar consumption, everyone should be aware of the amount of sugar they consume in daily life. Generally, managing nutrition and preventing negative effects from sugar intake requires a nutritional specialist or specialized knowledge, which may not always be readily accessible or understandable. Therefore, there is a need for a mobile application that can track excessive sugar consumption. This study proposes a context-aware personalized recommendation mobile application for monitoring excessive sugar consumption and providing individual recommendations (based on a predefined set of 144 rules) to Thai adolescents. The application is user friendly and can be used to provide recommendations to users for sugar consumption and proper exercise each day. Personal, health, and lifestyle data are collected and analyzed to provide individualized recommendations to each user. Experiments were conducted with 140 Thai adolescents aged 15 to 25 years old. Users’ preferences regarding degree of awareness in presentation style were also investigated. Users rated their satisfaction with the proposed mobile application as very high in terms of both function and personalization. In addition, fully automated recommendations were found to be the preferred degree of awareness among the test group.
{"title":"Context-aware Based Personalized Recommendation on Mobile for Monitoring Excessive Sugar Consumption of Thai Adolescents","authors":"Rodjana Suwan, P. Temdee, R. V. Prasad","doi":"10.13052/jmm1550-4646.18618","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18618","url":null,"abstract":"Given the harmful effects of excessive sugar consumption, everyone should be aware of the amount of sugar they consume in daily life. Generally, managing nutrition and preventing negative effects from sugar intake requires a nutritional specialist or specialized knowledge, which may not always be readily accessible or understandable. Therefore, there is a need for a mobile application that can track excessive sugar consumption. This study proposes a context-aware personalized recommendation mobile application for monitoring excessive sugar consumption and providing individual recommendations (based on a predefined set of 144 rules) to Thai adolescents. The application is user friendly and can be used to provide recommendations to users for sugar consumption and proper exercise each day. Personal, health, and lifestyle data are collected and analyzed to provide individualized recommendations to each user. Experiments were conducted with 140 Thai adolescents aged 15 to 25 years old. Users’ preferences regarding degree of awareness in presentation style were also investigated. Users rated their satisfaction with the proposed mobile application as very high in terms of both function and personalization. In addition, fully automated recommendations were found to be the preferred degree of awareness among the test group.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.13052/jmm1550-4646.18610
Dongchi Li, Pushpendu Kar
In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.
{"title":"B-Spot: Blockchain and Steganography based Robust and Secure Photo Transmission Mechanism","authors":"Dongchi Li, Pushpendu Kar","doi":"10.13052/jmm1550-4646.18610","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18610","url":null,"abstract":"In this paper, a Steganography and Blockchain based robust and secure photo transmission mechanism, named B-Spot, is proposed. At the sender side, firstly, a 3-3-2 LSB image steganography algorithm is used to hide a secret photo into a cover photo. Therefore, the existence of the secret photo is concealed. Then the stego-image is broken down into pixels and embedded into blocks. Blocks are connected by the hash values forming a blockchain. Any modifications on the blocks are reflected by the breakage of the chain, which makes the mechanism tamper-evident. Another copy of the blockchain is stored in a hash table for the latter recovery process. The blockchain and the hash table can be transmitted via any network. When the receiver receives the data, it firstly executes the verification process to check integrity of the blockchain. Then the lost and tampered blocks are recovered by referring to the hash table, which makes the mechanism more robust to noises. Finally, the stego-image is reconstructed from the recovered blockchain. Then the receiver can obtain the secret photo following the extraction algorithm. The simulation results show that the proposed mechanism has high data capacity, better imperceptibility, reasonable computing time, and strong robustness to noise. This mechanism adds an extra layer of security and robustness to the existing schemes.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128942598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-02DOI: 10.13052/jmm1550-4646.1862
Y. Kwon, Moonhee Son, Hoon Chang
With the spread of 5G services and the development of IoT technology, network traffic for information delivery is increasing in capacity. As network traffic increases, cyber threats also increase, resulting in an increasing importance on traffic analysis. The existing packet processing engine generates a signature by analyzing the characteristics of the attack after the occurrence of suspicious traffic, and based on this, it is difficult to properly respond to new and variant attack traffic because a manual response method is performed to detect the same attack. In addition, even during a network operation, only analysis results generated by passive filtering appear, and when abnormal or suspicious traffic is observed, the quality of the report is often affected by the analysis capability of the administrator. The packet processing method proposed in this paper applies the core isolation method to the NUMA structure applied to the existing 20 Gbps packet processing engine to increase the accessibility of the existing NUMA memory structure and lower the packet drop rate to enable high-capacity 30 Gbps traffic processing. Using the proposed processing engine, it is possible to determine the degree of possibility of abnormal traffic, preferentially by a quick analysis of suspicious traffic rather than a detailed analysis of traffic.
{"title":"An Improved 30 Gbps-Class Large-Capacity Packet Processing Method Using Core Isolation Technology","authors":"Y. Kwon, Moonhee Son, Hoon Chang","doi":"10.13052/jmm1550-4646.1862","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1862","url":null,"abstract":"With the spread of 5G services and the development of IoT technology, network traffic for information delivery is increasing in capacity. As network traffic increases, cyber threats also increase, resulting in an increasing importance on traffic analysis. The existing packet processing engine generates a signature by analyzing the characteristics of the attack after the occurrence of suspicious traffic, and based on this, it is difficult to properly respond to new and variant attack traffic because a manual response method is performed to detect the same attack. In addition, even during a network operation, only analysis results generated by passive filtering appear, and when abnormal or suspicious traffic is observed, the quality of the report is often affected by the analysis capability of the administrator. The packet processing method proposed in this paper applies the core isolation method to the NUMA structure applied to the existing 20 Gbps packet processing engine to increase the accessibility of the existing NUMA memory structure and lower the packet drop rate to enable high-capacity 30 Gbps traffic processing. Using the proposed processing engine, it is possible to determine the degree of possibility of abnormal traffic, preferentially by a quick analysis of suspicious traffic rather than a detailed analysis of traffic.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-02DOI: 10.13052/jmm1550-4646.1861
S. Sahoo, S. K. Pattnaik, S. Samal, Chinmay Kumar Nayak, Jitendra Kuma Das, V. Poulkov
Due to the advancement in recent technologies and emergence of Internet of Things (IoT), Smart Home Automation (SHA) plays a vital role in today’s lifestyle. Many users are showing their keen interest to move towards this era of digital transformation in order to take the potential benefits of such intelligent and smart application. Traditional smart home systems have several limitations e.g. connectivity, coverage area, device dependability, platform supportability etc. which makes the system less sustainable. In this paper, the proposed technique introduces a novel scheme to operate the devices in an intelligent manner. The scheme implements a system named as “Speech Technology enabled Smart Home (STeSH)”, which supports voice assisted home automation with extreme security and range-free localization. The idea of the proposed technique is to integrate the power of IoT with classical home automation by using an advanced speech technology service. The entire processing of Speech Enabled Services (SES) is applied with this proposed technique and the detailed analysis is presented with proper experimental proof.
{"title":"STeSH: Intelligent Speech Technology Enabled Smart Home Automation Using IoT","authors":"S. Sahoo, S. K. Pattnaik, S. Samal, Chinmay Kumar Nayak, Jitendra Kuma Das, V. Poulkov","doi":"10.13052/jmm1550-4646.1861","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1861","url":null,"abstract":"Due to the advancement in recent technologies and emergence of Internet of Things (IoT), Smart Home Automation (SHA) plays a vital role in today’s lifestyle. Many users are showing their keen interest to move towards this era of digital transformation in order to take the potential benefits of such intelligent and smart application. Traditional smart home systems have several limitations e.g. connectivity, coverage area, device dependability, platform supportability etc. which makes the system less sustainable. In this paper, the proposed technique introduces a novel scheme to operate the devices in an intelligent manner. The scheme implements a system named as “Speech Technology enabled Smart Home (STeSH)”, which supports voice assisted home automation with extreme security and range-free localization. The idea of the proposed technique is to integrate the power of IoT with classical home automation by using an advanced speech technology service. The entire processing of Speech Enabled Services (SES) is applied with this proposed technique and the detailed analysis is presented with proper experimental proof.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-02DOI: 10.13052/jmm1550-4646.1863
U. Raju, Hillol Barman, R. K. Netalkar, Sanjay Kumar, Hariom Kumar
Digital data is primarily created and delivered in the form of images and videos in today’s world. Storing and transmitting such a large number of images necessitates a lot of computer resources, such as storage and bandwidth. So, rather than keeping the image data as is, the data could be compressed and then stored, which saves a lot of space. Image compression is the process of removing as much redundant data from an image as feasible while retaining only the non-redundant data. In this paper, the traditional JPEG compression technique is executed in the distributed environment with map-reduce paradigm on big image data. This technique is carried out in serial as well as in parallel fashion with different number of workers in order to show the time comparisons between these setups with the self-created large image dataset. In this, more than one Lakh (121,856) images are compressed and decompressed and the execution times are compared with three different setups: single system, Map-Reduce (MR) with 2 workers and MR with 4 workers. Compression on more than one Million (1,096,704) images using single system and MR with 4 workers is also done. To evaluate the efficiency of JPEG technique, two performance measures such as Compression Ratio (CR) and Peak Signal to Noise Ratio (PSNR) are used.
{"title":"Distributed JPEG Compression and Decompression for Big Image Data Using Map-Reduce Paradigm","authors":"U. Raju, Hillol Barman, R. K. Netalkar, Sanjay Kumar, Hariom Kumar","doi":"10.13052/jmm1550-4646.1863","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1863","url":null,"abstract":"Digital data is primarily created and delivered in the form of images and videos in today’s world. Storing and transmitting such a large number of images necessitates a lot of computer resources, such as storage and bandwidth. So, rather than keeping the image data as is, the data could be compressed and then stored, which saves a lot of space. Image compression is the process of removing as much redundant data from an image as feasible while retaining only the non-redundant data. In this paper, the traditional JPEG compression technique is executed in the distributed environment with map-reduce paradigm on big image data. This technique is carried out in serial as well as in parallel fashion with different number of workers in order to show the time comparisons between these setups with the self-created large image dataset. In this, more than one Lakh (121,856) images are compressed and decompressed and the execution times are compared with three different setups: single system, Map-Reduce (MR) with 2 workers and MR with 4 workers. Compression on more than one Million (1,096,704) images using single system and MR with 4 workers is also done. To evaluate the efficiency of JPEG technique, two performance measures such as Compression Ratio (CR) and Peak Signal to Noise Ratio (PSNR) are used.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.18513
Keshav Kaushik
5G and beyond systems are being built to be prospective by responding to the different needs of a diverse range of applications, which represents a significant departure from this approach. Owing to its openness, encryption techniques, verifiability, integrity, and decentralized design, blockchain has evolved as an important approach. 5G and Blockchain might transform emerging technology. 5G offers consumers high speeds and QoS, while blockchain ensures peer-to-peer trust and privacy. Blockchain is a revolutionary technology having wide range of applications in various domains like Artificial Intelligence, Internet of Things (IoT), Cybersecurity, Wireless networks, 5G and beyond networks, etc. In this paper, the role of Blockchain technology in 5G and beyond networks is discussed. This paper also highlights the various challenges that acts as a hindrance while implementing the Blockchain in 5G and beyond networks. Moreover, the paper also discusses the future aspect of Blockchain in 5G networks.
{"title":"Demystifying Blockchain in 5G and Beyond Technologies","authors":"Keshav Kaushik","doi":"10.13052/jmm1550-4646.18513","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.18513","url":null,"abstract":"5G and beyond systems are being built to be prospective by responding to the different needs of a diverse range of applications, which represents a significant departure from this approach. Owing to its openness, encryption techniques, verifiability, integrity, and decentralized design, blockchain has evolved as an important approach. 5G and Blockchain might transform emerging technology. 5G offers consumers high speeds and QoS, while blockchain ensures peer-to-peer trust and privacy. Blockchain is a revolutionary technology having wide range of applications in various domains like Artificial Intelligence, Internet of Things (IoT), Cybersecurity, Wireless networks, 5G and beyond networks, etc. In this paper, the role of Blockchain technology in 5G and beyond networks is discussed. This paper also highlights the various challenges that acts as a hindrance while implementing the Blockchain in 5G and beyond networks. Moreover, the paper also discusses the future aspect of Blockchain in 5G networks.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.1855
M. A. Ilgaz, Kristjan Vuk Baliž, B. Batagelj
Next-generation 5G and 6G radio access networks (RANs) require millimetre-wave (mm-W) oscillators to generate extremely low phase-noise signals for the frequency up-conversion and down-conversion in radio units (RUs). The opto-electronic oscillator (OEO) is an outstanding candidate for generating a high-purity mm-W signal in a centralized radio access network (C-RAN) where the distributed base-stations are dislocated from the digital units (DUs) and there are only RUs on the remote side. In this paper we propose placing an OEO in the central-office, while distributing its signal from there to multiple RU base-stations through the mobile front-haul network using a radio-over-fibre (RoF) transmission approach. This new approach was used in experiments that proved the smaller degradation of the phase noise compared to a degradation of 6 dB for the well-known frequency-doubling electrical oscillator in the RU. In addition, we present the signal-strength degradation due to fibre dispersion in mm-W signal distribution, as well as the challenges in long-term stability and multimode operation. We propose solutions to overcome these drawbacks and make our new approach useful for a centralized carrier signal distribution in next-generation RANs.
{"title":"Improved Next-Generation Radio Access Networks Using a Centralized Opto-Electronic Oscillator","authors":"M. A. Ilgaz, Kristjan Vuk Baliž, B. Batagelj","doi":"10.13052/jmm1550-4646.1855","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1855","url":null,"abstract":"Next-generation 5G and 6G radio access networks (RANs) require millimetre-wave (mm-W) oscillators to generate extremely low phase-noise signals for the frequency up-conversion and down-conversion in radio units (RUs). The opto-electronic oscillator (OEO) is an outstanding candidate for generating a high-purity mm-W signal in a centralized radio access network (C-RAN) where the distributed base-stations are dislocated from the digital units (DUs) and there are only RUs on the remote side. In this paper we propose placing an OEO in the central-office, while distributing its signal from there to multiple RU base-stations through the mobile front-haul network using a radio-over-fibre (RoF) transmission approach. This new approach was used in experiments that proved the smaller degradation of the phase noise compared to a degradation of 6 dB for the well-known frequency-doubling electrical oscillator in the RU. In addition, we present the signal-strength degradation due to fibre dispersion in mm-W signal distribution, as well as the challenges in long-term stability and multimode operation. We propose solutions to overcome these drawbacks and make our new approach useful for a centralized carrier signal distribution in next-generation RANs.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.1851
I. Khan, Asrin Abdollahi, Abdul Jamil, Bisma Baig, M. A. Aziz, F. Subhan
Flying-Thing is a new promising area, while in last few years Unmanned Aerial Vehicles are emerged. UAVs are very efficient in completing tasks also organizing ad hoc behaviour of networks, thus making flying ad hoc networks. The formation of aerial nodes is not feasible until we use Mobility models for communication between UAV’s. Mobile ad hoc networks & wireless sensor networks are mostly static in behaviour but UAVs are dynamic and deployed in sky using mobility models. In flying ad hoc networks effective communication can be made possible using 5G networks while designing routing protocols. In this paper a comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flying ad hoc networks. This paper reflects and explains future challenges and help scientists, Researchers to discover more research gaps that have been discussed in the literature and need more investigation. Also, different applications of flying things can be used in IoT based forestry which includes forest mapping, management where optimal results can be obtained. The uniqueness of this research study is to provide heuristic computational algorithm called AntHocNet, Mobility models, drawbacks of traditional technologies, flying-things architecture will be the core interest of this research study.
{"title":"A Novel Design of FANET Routing Protocol Aided 5G Communication Using IoT","authors":"I. Khan, Asrin Abdollahi, Abdul Jamil, Bisma Baig, M. A. Aziz, F. Subhan","doi":"10.13052/jmm1550-4646.1851","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1851","url":null,"abstract":"Flying-Thing is a new promising area, while in last few years Unmanned Aerial Vehicles are emerged. UAVs are very efficient in completing tasks also organizing ad hoc behaviour of networks, thus making flying ad hoc networks. The formation of aerial nodes is not feasible until we use Mobility models for communication between UAV’s. Mobile ad hoc networks & wireless sensor networks are mostly static in behaviour but UAVs are dynamic and deployed in sky using mobility models. In flying ad hoc networks effective communication can be made possible using 5G networks while designing routing protocols. In this paper a comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flying ad hoc networks. This paper reflects and explains future challenges and help scientists, Researchers to discover more research gaps that have been discussed in the literature and need more investigation. Also, different applications of flying things can be used in IoT based forestry which includes forest mapping, management where optimal results can be obtained. The uniqueness of this research study is to provide heuristic computational algorithm called AntHocNet, Mobility models, drawbacks of traditional technologies, flying-things architecture will be the core interest of this research study.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-04DOI: 10.13052/jmm1550-4646.1852
Muhammad Ayoub Kamal, M. Alam, Aznida Abu Bakar Sajak, M. M. Su’ud
The Industrial Internet of Things (IIoT), also known as Industry 4.0, is a forward-thinking industrial era in which numerous developing technologies are combined to produce digital solutions. In industrial enterprises, Industry 4.0 technologies are separated into base and front-end technologies. Cloud computing, IoT, analytics, and big data are all essential technologies. In this article, we evaluate the current landscape of factory automation and the influence of 5G and LoRA communication on smart manufacturing automation, while front-end technologies are split into four categories: smart goods, smart working, smart manufacturing, and smart supply chain. First, we looked at the idea of Industry 4.0, as well as the four front-end dimensions and four basic technological components. Second, we spoke about smart industrial automation and the influence of 5G and LoRA communication. The broad use of front-end technology, of which Smart Manufacturing is a crucial component, is required for Industry 4.0 to succeed. However, the implementation of the foundation technologies is difficult. Current automation standards will serve as a solid foundation for future smart manufacturing systems. The distribution, adoption, and development of relevant morality in a requirement-driven process may result in faster, deeper, and bigger implementation of smart industrial automation.
{"title":"Impact of LoRA and 5G on Smart Manufacturing from Automation Perspective","authors":"Muhammad Ayoub Kamal, M. Alam, Aznida Abu Bakar Sajak, M. M. Su’ud","doi":"10.13052/jmm1550-4646.1852","DOIUrl":"https://doi.org/10.13052/jmm1550-4646.1852","url":null,"abstract":"The Industrial Internet of Things (IIoT), also known as Industry 4.0, is a forward-thinking industrial era in which numerous developing technologies are combined to produce digital solutions. In industrial enterprises, Industry 4.0 technologies are separated into base and front-end technologies. Cloud computing, IoT, analytics, and big data are all essential technologies. In this article, we evaluate the current landscape of factory automation and the influence of 5G and LoRA communication on smart manufacturing automation, while front-end technologies are split into four categories: smart goods, smart working, smart manufacturing, and smart supply chain. First, we looked at the idea of Industry 4.0, as well as the four front-end dimensions and four basic technological components. Second, we spoke about smart industrial automation and the influence of 5G and LoRA communication. The broad use of front-end technology, of which Smart Manufacturing is a crucial component, is required for Industry 4.0 to succeed. However, the implementation of the foundation technologies is difficult. Current automation standards will serve as a solid foundation for future smart manufacturing systems. The distribution, adoption, and development of relevant morality in a requirement-driven process may result in faster, deeper, and bigger implementation of smart industrial automation.","PeriodicalId":425561,"journal":{"name":"J. Mobile Multimedia","volume":"3 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131943362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}