Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284884
Abhishek Shivanna, D. Agrawal
Banks and lending institutions take risk in issuing new credit cards and loans to customers. Lending institutions at large need to have their own credit risk assessment system in accordance with Basel II guidelines. Many lending institutions lose a large amount of money as they do not have an accurate model to predict defaulters. The goal of credit risk management system is to accurately predict borrowers' ability to repay loans or make credit card payments in a timely manner. Researchers have taken multitude of approaches to solve this problem, and it continues to be an active area of research. Data mining and machine learning are emerging tools that are widely used by lending institutions to predict defaulters. These tools can effectively mine large dataset which is not feasible by traditional methods. In this work, we have used different algorithms including Deep Support Vector Machine (DSVM), Boosted Decision Tree (BDT), Averaged Perceptron (AP) and Bayes Point Machine (BPM) to build various models, in an attempt to better predict defaulters. Dataset, comprising of 25 attributes and 30k instances, was obtained from the repository of machine learning, University of California, Irvine (UCI). Our results show that, of all the four models used, DSVM can best predict defaulters. We believe that these models can be used to better predict defaulters by credit risk management system in banking and lending institutions.
{"title":"Prediction of Defaulters using Machine Learning on Azure ML","authors":"Abhishek Shivanna, D. Agrawal","doi":"10.1109/IEMCON51383.2020.9284884","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284884","url":null,"abstract":"Banks and lending institutions take risk in issuing new credit cards and loans to customers. Lending institutions at large need to have their own credit risk assessment system in accordance with Basel II guidelines. Many lending institutions lose a large amount of money as they do not have an accurate model to predict defaulters. The goal of credit risk management system is to accurately predict borrowers' ability to repay loans or make credit card payments in a timely manner. Researchers have taken multitude of approaches to solve this problem, and it continues to be an active area of research. Data mining and machine learning are emerging tools that are widely used by lending institutions to predict defaulters. These tools can effectively mine large dataset which is not feasible by traditional methods. In this work, we have used different algorithms including Deep Support Vector Machine (DSVM), Boosted Decision Tree (BDT), Averaged Perceptron (AP) and Bayes Point Machine (BPM) to build various models, in an attempt to better predict defaulters. Dataset, comprising of 25 attributes and 30k instances, was obtained from the repository of machine learning, University of California, Irvine (UCI). Our results show that, of all the four models used, DSVM can best predict defaulters. We believe that these models can be used to better predict defaulters by credit risk management system in banking and lending institutions.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"7 1","pages":"0320-0325"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88238519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284955
Pravir Malik
It has been said that the future of Life is about Artificial Intelligence (AI) and that as AI advances a point will be reached, the Singularity, when humans will no longer have a clue as to what is going on nor why. On the contrary, this article will make the case that the future of Life is enabled by the pre-existent complexity that exists in every iota of it. This pre-existent complexity derives from a multi-layered, symmetry-based model of light from which fundamental layers of matter and life – including the electromagnetic field, quantum particles, atoms, and cells - can be proposed to emerge. As such matter and life are an integral part of a unified light-based edifice proposed to have infinite-potential resident in it. By contrast contemporary AI is based on mind-based processes such as memory, computation, sensing, and learning that operate within a defined and limited conceptual space and are positioned to be substrate independent. This conceptual space and the operating principles that define it limit AI, which in its current incarnation cannot rival the kinds of creations and possibilities inherent in a multi-layered symmetry-based model of light. Unless the gap to such a unified light-based edifice is bridged, AI will always have limits within which its possibilities will be bound.
{"title":"Limits of AI as Established by a Multi-Layered Symmetry-Based Model of Light","authors":"Pravir Malik","doi":"10.1109/IEMCON51383.2020.9284955","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284955","url":null,"abstract":"It has been said that the future of Life is about Artificial Intelligence (AI) and that as AI advances a point will be reached, the Singularity, when humans will no longer have a clue as to what is going on nor why. On the contrary, this article will make the case that the future of Life is enabled by the pre-existent complexity that exists in every iota of it. This pre-existent complexity derives from a multi-layered, symmetry-based model of light from which fundamental layers of matter and life – including the electromagnetic field, quantum particles, atoms, and cells - can be proposed to emerge. As such matter and life are an integral part of a unified light-based edifice proposed to have infinite-potential resident in it. By contrast contemporary AI is based on mind-based processes such as memory, computation, sensing, and learning that operate within a defined and limited conceptual space and are positioned to be substrate independent. This conceptual space and the operating principles that define it limit AI, which in its current incarnation cannot rival the kinds of creations and possibilities inherent in a multi-layered symmetry-based model of light. Unless the gap to such a unified light-based edifice is bridged, AI will always have limits within which its possibilities will be bound.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"73 1","pages":"0151-0158"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82351925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284947
Swathi Gowroju, Aarti, Sandeep Kumar
In many of the iris biometric applications plays a major role in tracking the gaze, detecting fatigue, and predicting the age of a person, etc. that were built for human-computer interaction and security applications such as border control applications or criminal tracking applications. In this paper, we proposed a novel CNN U-Net based model to perform the accurate segmentation of pupil. We experimented on the CASIA database and generated an accuracy of 90% in segmentation. We considered various parameters such as Accuracy, Loss, and Mean Square Error (MSE) to predict the efficiency of the model. The proposed system performed the segmentation of pupil from $512times 512$ images with MSE of 1.24.
{"title":"Robust Deep Learning Technique: U-Net Architecture for Pupil Segmentation","authors":"Swathi Gowroju, Aarti, Sandeep Kumar","doi":"10.1109/IEMCON51383.2020.9284947","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284947","url":null,"abstract":"In many of the iris biometric applications plays a major role in tracking the gaze, detecting fatigue, and predicting the age of a person, etc. that were built for human-computer interaction and security applications such as border control applications or criminal tracking applications. In this paper, we proposed a novel CNN U-Net based model to perform the accurate segmentation of pupil. We experimented on the CASIA database and generated an accuracy of 90% in segmentation. We considered various parameters such as Accuracy, Loss, and Mean Square Error (MSE) to predict the efficiency of the model. The proposed system performed the segmentation of pupil from $512times 512$ images with MSE of 1.24.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2 1","pages":"0609-0613"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75211186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284853
Felix Müller, P. Nenninger, E. Sax
In this paper, we present an overview on the topic of the periodical technical inspection of passenger cars in general, and focus specifically on the situation in Germany. We argue, that there is a need to advance the current standards in the wake of upcoming autonomous vehicles and the ever increasing market penetration of steadily more capable driver assistance systems. In addition, we present our arguments of why we see a mandate for this already today. This paper concludes with an introduction of our first approach to tackle the problem described with a test bed to examine these systems. For this paper we utilize a radar based system as an example to describe our concept.
{"title":"Analysis of Requirements for Autonomous Driving Systems","authors":"Felix Müller, P. Nenninger, E. Sax","doi":"10.1109/IEMCON51383.2020.9284853","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284853","url":null,"abstract":"In this paper, we present an overview on the topic of the periodical technical inspection of passenger cars in general, and focus specifically on the situation in Germany. We argue, that there is a need to advance the current standards in the wake of upcoming autonomous vehicles and the ever increasing market penetration of steadily more capable driver assistance systems. In addition, we present our arguments of why we see a mandate for this already today. This paper concludes with an introduction of our first approach to tackle the problem described with a test bed to examine these systems. For this paper we utilize a radar based system as an example to describe our concept.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"17 1","pages":"0087-0093"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73306051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284818
Yinchen Shi, Sazia Mahfuz, F. Zulkernine, Peter Nicholls
Data analytics with unsupervised clustering of data streams has provided revolutionary breakthroughs in fields like healthcare, and E-commerce. IBM Streams and Apache Spark are among the most useful and popular data analytics tools that help engineers and researchers extend the abilities to store, analyze, transform, and visualize data for business use. IBM Streams is capable of ingesting, filtering, analyzing, and associating massive volumes of continuous data streams and the Streams Processing Language (SPL) enables coding custom stream graphs to process data and handle real-time events. Apache Spark has unified analytics edge for large scale data processing with high performance for both batch and streaming data. We developed adapters without using third party tools to facilitate data transfer between IBM Streams and Apache Spark to support new and legacy data analytic systems. An example use case would be IBM Streams ingesting and processing realtime data streams, and then passing the data to Spark to train or update machine learning algorithms in real time that can be re-deployed in the IBM Streams data processing pipeline. This paper provides an overview of the structure of the data processing pipeline, describes the implementation details and the principle behind the design.
{"title":"An Adapter for IBM Streams and Apache Spark to Facilitate Multi-level Data Analytics","authors":"Yinchen Shi, Sazia Mahfuz, F. Zulkernine, Peter Nicholls","doi":"10.1109/IEMCON51383.2020.9284818","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284818","url":null,"abstract":"Data analytics with unsupervised clustering of data streams has provided revolutionary breakthroughs in fields like healthcare, and E-commerce. IBM Streams and Apache Spark are among the most useful and popular data analytics tools that help engineers and researchers extend the abilities to store, analyze, transform, and visualize data for business use. IBM Streams is capable of ingesting, filtering, analyzing, and associating massive volumes of continuous data streams and the Streams Processing Language (SPL) enables coding custom stream graphs to process data and handle real-time events. Apache Spark has unified analytics edge for large scale data processing with high performance for both batch and streaming data. We developed adapters without using third party tools to facilitate data transfer between IBM Streams and Apache Spark to support new and legacy data analytic systems. An example use case would be IBM Streams ingesting and processing realtime data streams, and then passing the data to Spark to train or update machine learning algorithms in real time that can be re-deployed in the IBM Streams data processing pipeline. This paper provides an overview of the structure of the data processing pipeline, describes the implementation details and the principle behind the design.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2 1","pages":"0230-0235"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76309655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284835
Noah.S. Fakude, K. Ogudo
Energy management is a key element in energy distribution utilities. Whilst revenue collection is significant in the industry, safety and energy security are of top priority. With the diffusion and the adoption rate of new domestic electrical appliances and the rate of population growth, the energy demand by residential consumers skyrockets. To keep the electrical network continually distributing, there is a need to control and manage energy usage from the consumption side. This paper proposes a Smart Distribution Network System (SDNS), which employs the Master-Slave metering hierarchy for load management by controlling the usage limits in real-time. The SDNS is a digitalized electrical network concept that allows the existing power network to operate at an optimum level during peak periods and limits unnecessary consumption excesses. The system ensures maximum revenue returns to utilities and energy security to consumers by keeping the network in operation with no disturbances. A standard traditional grid was used to model the smart system using a MATLAB tool. The grid was put under test in heavy load conditions, first with no enhancement and again with the enhancement of the proposed SNDS system. Results were recorded for both simulation tests, then the conclusion was drawn from the discussion of results compared to examining the effectiveness of the system.
{"title":"Improving energy revenue and security by employing SDNS for the Low Voltage distribution network for residential users in South Africa","authors":"Noah.S. Fakude, K. Ogudo","doi":"10.1109/IEMCON51383.2020.9284835","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284835","url":null,"abstract":"Energy management is a key element in energy distribution utilities. Whilst revenue collection is significant in the industry, safety and energy security are of top priority. With the diffusion and the adoption rate of new domestic electrical appliances and the rate of population growth, the energy demand by residential consumers skyrockets. To keep the electrical network continually distributing, there is a need to control and manage energy usage from the consumption side. This paper proposes a Smart Distribution Network System (SDNS), which employs the Master-Slave metering hierarchy for load management by controlling the usage limits in real-time. The SDNS is a digitalized electrical network concept that allows the existing power network to operate at an optimum level during peak periods and limits unnecessary consumption excesses. The system ensures maximum revenue returns to utilities and energy security to consumers by keeping the network in operation with no disturbances. A standard traditional grid was used to model the smart system using a MATLAB tool. The grid was put under test in heavy load conditions, first with no enhancement and again with the enhancement of the proposed SNDS system. Results were recorded for both simulation tests, then the conclusion was drawn from the discussion of results compared to examining the effectiveness of the system.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"8 2 1","pages":"0420-0426"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80565269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284885
Golam Kayas, M. Hossain, J. Payton, S. Islam
Advances in the development and increased availability of smart devices ranging from small sensors to complex cloud infrastructures as well as various networking technologies and communication protocols have supported the rapid expansion of Internet of Things deployments. The Universal Plug and Play (UPnP) protocol has been widely accepted and used in the IoT domain to support interactions among heterogeneous IoT devices, in part due to zero configuration implementation which makes it feasible for use in large-scale networks. The popularity and ubiquity of UPnP to support IoT systems necessitate an exploration of security risks associated with the use of the protocol for IoT deployments. In this work, we analyze security vulnerabilities of UPnP-based IoT systems and identify attack opportunities by the adversaries leveraging the vulnerabilities. Finally, we propose prospective solutions to secure UPnP-based IoT systems from adversarial operations.
{"title":"An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions","authors":"Golam Kayas, M. Hossain, J. Payton, S. Islam","doi":"10.1109/IEMCON51383.2020.9284885","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284885","url":null,"abstract":"Advances in the development and increased availability of smart devices ranging from small sensors to complex cloud infrastructures as well as various networking technologies and communication protocols have supported the rapid expansion of Internet of Things deployments. The Universal Plug and Play (UPnP) protocol has been widely accepted and used in the IoT domain to support interactions among heterogeneous IoT devices, in part due to zero configuration implementation which makes it feasible for use in large-scale networks. The popularity and ubiquity of UPnP to support IoT systems necessitate an exploration of security risks associated with the use of the protocol for IoT deployments. In this work, we analyze security vulnerabilities of UPnP-based IoT systems and identify attack opportunities by the adversaries leveraging the vulnerabilities. Finally, we propose prospective solutions to secure UPnP-based IoT systems from adversarial operations.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"97 1","pages":"0452-0460"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75432044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284843
Benjamin Imanilov
In this paper we propose a new method of occupied spectrum analysis for channel detection in a shared spectrum environment. Our approach is based on iterative multi-stage multi-resolution scanning using configurable Sliding Discrete Fourier Transform (SDFT) aided by an Unsupervised Machine Learning (UML) clustering method. The proposed low-complexity high-accuracy real-time spectrum scanning and channel detection is simulated for multiple Radio Access Networks (RAN) of Long-Term Evolution (LTE) & Fifth Generation (5G) channels in a shared frequency band. The results of the simulation show possible successful utilization of the proposed method as a sensing tool for spectrum sharing management and other applications where accurate channel detection occupancy is required.
{"title":"Low-Complexity High-Accuracy 5G and LTE Multichannel Spectrum Analysis Aided by Unsupervised Machine Learning","authors":"Benjamin Imanilov","doi":"10.1109/IEMCON51383.2020.9284843","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284843","url":null,"abstract":"In this paper we propose a new method of occupied spectrum analysis for channel detection in a shared spectrum environment. Our approach is based on iterative multi-stage multi-resolution scanning using configurable Sliding Discrete Fourier Transform (SDFT) aided by an Unsupervised Machine Learning (UML) clustering method. The proposed low-complexity high-accuracy real-time spectrum scanning and channel detection is simulated for multiple Radio Access Networks (RAN) of Long-Term Evolution (LTE) & Fifth Generation (5G) channels in a shared frequency band. The results of the simulation show possible successful utilization of the proposed method as a sensing tool for spectrum sharing management and other applications where accurate channel detection occupancy is required.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"81 1","pages":"0031-0040"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75234106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284953
Hritik Sateesh, P. Zavarsky
Research on trust models in Vehicular Ad-hoc Networks (VANET) was mainly focused on entity-centric, data-centric, and combined trust models until the latter half of the previous decade. There are a number of attacks these conventional trust models cannot hold back. The popularity of blockchain technology in the last few years resulted in the research on blockchain-based trust management models for VANET. Meanwhile, zero trust solutions claimed to overcome the problems of the traditional perimeter security model. With the perimeter security model, information systems within an organization's internal network are inherently trusted and the ones that belong outside the organization are consequently deemed untrusted. The zero trust architecture overcomes these flaws by simply not trusting any entity regardless of the entity belonging inside the organization's perimeter or outside. This paper discusses the various trust management models for VANET, their drawbacks and proposes a private blockchain technology to improve the performance and highlight the need for a central governing authority. The paper also investigates the challenges of implementing a zero-trust architecture for vehicular communications and brings forth the idea of using the concepts of zero trust to provide state-of-the-art security for VANET's supporting infrastructure. Additionally, this study surveys the benefits and challenges of developing the VANET architecture based on software-defined networking (SDN).
{"title":"State-of-the-Art VANET Trust Models: Challenges and Recommendations","authors":"Hritik Sateesh, P. Zavarsky","doi":"10.1109/IEMCON51383.2020.9284953","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284953","url":null,"abstract":"Research on trust models in Vehicular Ad-hoc Networks (VANET) was mainly focused on entity-centric, data-centric, and combined trust models until the latter half of the previous decade. There are a number of attacks these conventional trust models cannot hold back. The popularity of blockchain technology in the last few years resulted in the research on blockchain-based trust management models for VANET. Meanwhile, zero trust solutions claimed to overcome the problems of the traditional perimeter security model. With the perimeter security model, information systems within an organization's internal network are inherently trusted and the ones that belong outside the organization are consequently deemed untrusted. The zero trust architecture overcomes these flaws by simply not trusting any entity regardless of the entity belonging inside the organization's perimeter or outside. This paper discusses the various trust management models for VANET, their drawbacks and proposes a private blockchain technology to improve the performance and highlight the need for a central governing authority. The paper also investigates the challenges of implementing a zero-trust architecture for vehicular communications and brings forth the idea of using the concepts of zero trust to provide state-of-the-art security for VANET's supporting infrastructure. Additionally, this study surveys the benefits and challenges of developing the VANET architecture based on software-defined networking (SDN).","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"162 1","pages":"0757-0764"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75949063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-04DOI: 10.1109/IEMCON51383.2020.9284956
Yasmine H. Hussein, E. Maher, A. El-Mahdy
Full duplex, cooperative communications and device to device (D2D) communications are considered as key technologies for 5G mobile networks. In this paper, an optimum power allocation for full-duplex(FD) relaying aided D2D communications in underlaying mode is derived. The D2D transmitters act as FD relays to assist cellular downlink transmissions. Both amplify-and-forward and decode- and forward relay protocols are considered. The objective is to maximize the achievable rate for the D2D receiver while fulfilling the minimum rate requirements of the cellular user. Optimization technique is used to reduce the self interference resulted from the full-duplex mode.
{"title":"Power Adaptation for Full-Duplex Relay-Aided D2D Communications with Direct Link","authors":"Yasmine H. Hussein, E. Maher, A. El-Mahdy","doi":"10.1109/IEMCON51383.2020.9284956","DOIUrl":"https://doi.org/10.1109/IEMCON51383.2020.9284956","url":null,"abstract":"Full duplex, cooperative communications and device to device (D2D) communications are considered as key technologies for 5G mobile networks. In this paper, an optimum power allocation for full-duplex(FD) relaying aided D2D communications in underlaying mode is derived. The D2D transmitters act as FD relays to assist cellular downlink transmissions. Both amplify-and-forward and decode- and forward relay protocols are considered. The objective is to maximize the achievable rate for the D2D receiver while fulfilling the minimum rate requirements of the cellular user. Optimization technique is used to reduce the self interference resulted from the full-duplex mode.","PeriodicalId":6871,"journal":{"name":"2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"44 1","pages":"0473-0478"},"PeriodicalIF":0.0,"publicationDate":"2020-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76005954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}