50 results on '"Ho RA"'
Search Results
2. Slice Admission and Deployment Strategies in Resource-Constrained 5G Network Slices using an Actor-Critic Approach
- Author
-
Ralph Voltaire J. Dayot and In-Ho Ra
- Published
- 2022
- Full Text
- View/download PDF
3. A Self-Adaptive Wireless Network Service Embedding through SVM and MTA
- Author
-
Sujitha Venkatapathy, In-Ho Ra, and Han-Gue Jo
- Published
- 2022
- Full Text
- View/download PDF
4. CTU Layer Rate Control Algorithm in Scene Change Video for Free-Viewpoint Video
- Author
-
Min-Hang Weng, Che Yan, Qian Zhang, Wen Hui, In-Ho Ra, and Tao Yan
- Subjects
3D video coding ,General Computer Science ,Computer science ,Quantization (signal processing) ,General Engineering ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,02 engineering and technology ,Code rate ,Video quality ,Coding tree unit ,bit allocation ,scene detection ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Algorithm ,lcsh:TK1-9971 ,image similarity analysis ,rate control - Abstract
At present, the rate control algorithm for multiview high-efficiency video coding (MV-HEVC) does not have the capability of efficient coding tree unit(CTU) layer bit allocation, and the video quality varies greatly for sequences with sudden scene changes or large motions. To overcome this limitation, this paper proposes a rate control algorithm for MV-HEVC based on scene detection. Firstly, we established ρ domain rate control model based on multi-objective optimization. Then, it uses image similarity to make reasonable bit allocation among viewpoints. If the video scene is switched, the image similarity is recalculated, and then the correlation between the weights of the interview point rates and the correlation between the viewpoints are analyzed. Finally, the frame layer rate control considers the layer B-frame and other factors in allocating the code rate, and the basic unit layer rate control adopts different quantization methods according to the content complexity of the CTU. Experimental results show that the proposed rate control algorithm can maintain good coding efficiency and decrease the average video quality variation by 25.29%.
- Published
- 2020
5. Multi-Topology Based QoS-Differentiation in RPL for Internet of Things Applications
- Author
-
Khadak Singh Bhandari, Gihwan Cho, and In-Ho Ra
- Subjects
Routing protocol ,General Computer Science ,Computer science ,Internet of Things ,Context (language use) ,Topology (electrical circuits) ,02 engineering and technology ,Metrics ,Network topology ,01 natural sciences ,objective function ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,low power and lossy networks ,6LoWPAN ,business.industry ,Quality of service ,010401 analytical chemistry ,General Engineering ,020206 networking & telecommunications ,0104 chemical sciences ,routing metrics ,Metric (mathematics) ,quality of service ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Routing (electronic design automation) ,business ,lcsh:TK1-9971 ,Computer network - Abstract
The rapid development of the Internet of Things (IoT) concept has promoted the presence of routing protocol for low power and lossy network (RPL). Unlike traditional applications, many applications envisioned for IoT networks may have different and sometimes conflicting requirements. In this context, the underlying routing protocol requires to provide quality of service (QoS) for multipurpose IoT and is inevitable. However, the routing approach in RPL is not efficient because default objective functions (OFs) rely on a single metric, which can result in a tradeoff in routing performance, particularly for multipurpose IoT that enchant different QoS requirements in the same network. Although RPL specification allows the use of multiple metrics for parent selection, however, no specific guideline is defined for metric combinations. Besides, many studies have revealed that RPL encounters severe problems in large scale networks as it was mainly designed for low data traffic network. To address these problems, in this paper, we primarily focus on QoS differentiation by exploiting the multi-topology routing feature of the RPL standard. For this, we propose different OFs, which ensures the QoS differentiation at the network level by splitting the physical network virtually into multiple RPL Instances. Each Instance can incorporate different traffic by associating with differing OFs, and routed it through the corresponding virtual network topology. We also present a new parent selection framework based on a multi-attribute decision-making approach that addresses the single routing metric problem in RPL. The extensive simulation results verify that our multi-topology routing approach can support the QoS provisioning and is suitable for large scale networks as compared with standard RPL.
- Published
- 2020
6. Optimal Service Restoration Strategy for Smart Grid under Single and Multiple Fault Conditions
- Author
-
S. Thiruvenkadam, In-Ho Ra, and Hyun-Tae Kim
- Subjects
Computer science ,media_common.quotation_subject ,Control reconfiguration ,Stability (probability) ,Power (physics) ,Reliability engineering ,law.invention ,Electric power system ,Capacitor ,Smart grid ,law ,Benchmark (computing) ,Quality (business) ,media_common - Abstract
The distribution system plays an important role in the power system to meet out the power demands of the utility customer. It may lose its stability due to the influence of faults which leads to interruptions in supply to the utility customers. Therefore, the utility should take immediate necessary measures to ensure the quality of supply and restored the system to optimal that can satisfy all the constraints of the power system. This research work focuses on joined service restoration and optimization. Service restoration is done through restructuring and optimization is carried out through Stud Krill Herd Algorithm (SKHA). The distribution system optimization is achieved by reconfiguration and capacitor placement. SKHA is utilized for handling reconfiguration and optimal capacitor placement simultaneously. The effectiveness of the proposed strategy is validated by implementing two benchmark case studies namely IEEE 33 Bus Radial Distribution System (RDS) and Taiwan Power Distribution Company (TPDC) System.
- Published
- 2020
- Full Text
- View/download PDF
7. Optimization of Phase Current Deviation Index of Unbalanced Distribution System Considering Variable Demand
- Author
-
In-Ho Ra, S. Thiruvenkadam, and Hyun-Tae Kim
- Subjects
business.industry ,Computer science ,Control reconfiguration ,Trial and error ,law.invention ,Power (physics) ,Reduction (complexity) ,Variable (computer science) ,Capacitor ,Control theory ,law ,Electricity ,business ,Voltage drop - Abstract
Power Distribution systems are one of the most critical links between utility and utility customers. Control of power loss in distribution systems is desperately essential considering the economic aspects. Reconfiguration, Capacitor Placement, and Phase Balancing are the different methods practiced for power loss reduction. Due to the unbalanced nature of the distribution system, phase balancing is considered as the effective one amongst the above mentioned three methods. Unbalanced feeders not only increase power losses and the risk of overload situations, but they also affect power quality and electricity prices. A severely unbalanced circuit can result in excessive voltage drops on the heavy phase. Even a feeder system is intended as a balanced feeder supported the given load data, load prediction errors and unbalanced load growth can induce feeder imbalance. Phase swapping is a direct and effective way to balance a feeder in terms of phases. It has been practiced by engineers based on their previous experiences, and trial and error for phase balancing. In this paper, a phase swapping algorithm based on Stud Krill Herd Algorithm (SKHA) has been developed to minimize the phase current deviation amongst the phases. The validation of the proposed algorithm is done through two standard test cases and simulation results are compared with literature.
- Published
- 2020
- Full Text
- View/download PDF
8. Hybrid Fuzzy and Flower Pollination Optimization Algorithm for Optimal Dispatch of Generating Units in the Existence of Electric Vehicles
- Author
-
Hyung Jin Kim, In-Ho Ra, and S. Thiruvenkadam
- Subjects
Vehicle dynamics ,Cost reduction ,Mathematical optimization ,Linear programming ,Computer science ,020209 energy ,020208 electrical & electronic engineering ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,02 engineering and technology ,Fuzzy logic ,Power (physics) ,Generator (mathematics) - Abstract
The primary aim of the utility must be delivering of power supply to the utility customers with the minimal cost. Therefore, it is essential to prepare the optimal load dispatch strategy for minimization of generation cost. However, with the increase in environmental consciousness and impact of global warming, the emission dispatch from the generating stations should be viewed seriously along with generation cost reduction. The joined optimization of generation cost and emission cost has been referred as Dynamic Economic and Emission Dispatch (DEED). The combined objective function is subject to power flow, generator limit and ramp rate constraints for providing better operating conditions at the generation and transmission system. Additionally, the rapid increase of Plug-in Electric Vehicles (PEV's) in power networks makes the allocation of generating units more dynamic. The allocation of generating units under the dynamic behavior of PEV's at the energy network requires a dynamic optimization procedure. This paper proposes a hybrid Fuzzy and Flower Pollination Optimization Algorithm (FFPOA) for optimal load and emission dispatching. FFPOA is used to find the optimal solution and fuzzy is used to combine both economic and emission dispatch together. In addition, the solution process addresses the presence of PEV's in the power network along with the normal electric loads. The validation of the proposed algorithm is done with two benchmark test cases.
- Published
- 2020
- Full Text
- View/download PDF
9. Optimal Sizing and Location Identification of Suitable Compensator in a Radial Distribution Network through Fuzzy- Flower Pollination Optimization Algorithm
- Author
-
S. Thiruvenkadam, Hyung Jin Kim, and In-Ho Ra
- Subjects
Power transmission ,business.industry ,Computer science ,020209 energy ,020208 electrical & electronic engineering ,Thyristor ,Control reconfiguration ,02 engineering and technology ,Delivery Performance ,Electric power system ,Flexible AC transmission system ,Control theory ,Distributed generation ,Unified power flow controller ,0202 electrical engineering, electronic engineering, information engineering ,business - Abstract
The primary goal of distribution networks is to transfer uninterrupted power supply between utility and utility customers with greater quality. The control of real power transmission loss and maintaining the bus voltage within the permissible range are considered to measure the quality of power delivery by the utility. In recent years, strategies such as reconfiguration, capacitor placement and Distributed Energy Resources (DER) placement are practiced for improving the power delivery performance of the distribution system. Furthermore, the placement of Flexible AC Transmission System (FACTS) devices such as series and shunt controllers are also used for line and load compensation in the power system for performance enhancement. In this research work, the performance analysis of three types of the FACTS devices such as Static VAR Compensators (SVC), Thyristor Controlled Series Capacitor (TCSC) and Unified Power Flow Controller (UPFC) have been carried out with the support of hybrid Fuzzy-Flower Pollination Optimization Algorithm (FFPOA). The FPOA identifies the optimal size and location of suitable FACTS devices in a distribution system for optimizing the Total Operating Cost (TOC) and bus voltage improvement. In addition, heuristic fuzzy is integrated for the effective handling of the multi-objective problem on distribution system optimization. The efficiency of the proposed hybrid algorithm is validated with the three standard benchmark test cases.
- Published
- 2020
- Full Text
- View/download PDF
10. Influence of post-annealing on properties of $\alpha$-Ga2O3 epilayer grown by halide vapor phase epitaxy
- Author
-
Jin-Ho Kim, Sun Woog Kim, Yong-Ho Ra, Dae-Woo Jeon, Jonghee Hwang, Young-Jin Lee, Hoki Son, Ye-ji Choi, and Tae-Young Lim
- Subjects
Post annealing ,Full width at half maximum ,Materials science ,X-ray photoelectron spectroscopy ,chemistry ,Annealing (metallurgy) ,Vapor phase ,Analytical chemistry ,Halide ,chemistry.chemical_element ,Epitaxy ,Oxygen - Abstract
Effect of annealing to realize high-quality $\alpha$ -Ga 2 O 3 epilayers grown by halide vapor phase epitaxy has been studied. The structural and optical properties of $\alpha$ -Ga 2 O 3 changed with changing annealing duration. In particular, for an annealing duration of 3 min, the crystal quality improved from 51 and 2757 arcsec to 28 and 1539 arcsec for (0006) and (10-14) FWHM, respectively. X-ray photoelectron spectroscopy results confirmed that the oxygen gas during annealing reacted to compensate the oxygen vacancies in the $\alpha$ -Ga 2 O 3 epilayers. These results show that the optimized thermal annealing improved the crystal quality of $\alpha$ -Ga 2 O 3 epilayers.
- Published
- 2019
- Full Text
- View/download PDF
11. Mobility Mining in Disaster Scenarios to Improve Geographic Routing in Delay Tolerant Networks
- Author
-
In-Ho Ra and Regin Cabacas
- Subjects
0209 industrial biotechnology ,Mobility mining ,020901 industrial engineering & automation ,Computer science ,business.industry ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Geographic routing ,02 engineering and technology ,business ,Computer network - Abstract
This paper explores mobility mining to extract relevant node and network characteristics in Delay Tolerant Networks during disaster scenarios. Through mobility analysis, this paper aims to discover location hotspots and look at mobility entropy of different node groups with different roles during a disaster. In general, this paper presents a routing scheme for DTN that aims to improve the effective delivery of messages on specific geographic locations and entities. The routing scheme incorporates Area of Interest (AoI) of nodes and calculation of encounter probability in the routing decision and proposes better message management to optimize node’s memory. Simulation results show significant advantages of the proposed scheme compared to Epidemic for geographic routing and Epidemic scheme with Angle of Deviation (AoD) in terms of delivery rate, delivery latency, and message overhead.
- Published
- 2019
- Full Text
- View/download PDF
12. Supporting Road Safety Warning and Advertisement Distribution using an Interest Area-aware Messaging Scheme in Vehicular Ad-hoc Networks
- Author
-
Regin Cabacas and In-Ho Ra
- Subjects
Scheme (programming language) ,Vehicular ad hoc network ,Computer science ,business.industry ,Wireless ad hoc network ,05 social sciences ,Distribution (economics) ,050801 communication & media studies ,020302 automobile design & engineering ,Advertising ,02 engineering and technology ,Vehicle-to-vehicle ,0508 media and communications ,0203 mechanical engineering ,Work (electrical) ,Overhead (computing) ,business ,computer ,computer.programming_language - Abstract
Current implementation of VANET-based road safety warning message and advertisement dissemination does not consider cooperation of other available helpful parties such as nearby establishments. This paper presents a communication scheme that can support both road safety warning (RSW) and advertisement dissemination that also considers the participation of an establishment-based Road Side Unit (eRSU) for message dissemination. To reduce message overhead and ensure prompt and effective delivery of RSW and advertisements, the proposed scheme utilizes an interest-area aware and destination probability of encounter metrics for vehicle to vehicle (V2V) message dissemination. The proposed work is compared with several dissemination protocols and simulation results show several significant advantages of the approach in terms of effective delivery rate, delivery time and message overhead.
- Published
- 2019
- Full Text
- View/download PDF
13. Multi-color nanowire LEDs on a single chip
- Author
-
Roksana Tonny Rashid, Zetian Mi, Yong-Ho Ra, and Renjie Wang
- Subjects
010302 applied physics ,Single chip ,Materials science ,Pixel ,business.industry ,Nanowire ,Gallium nitride ,02 engineering and technology ,Color temperature ,021001 nanoscience & nanotechnology ,01 natural sciences ,law.invention ,Color rendering index ,chemistry.chemical_compound ,chemistry ,law ,0103 physical sciences ,RGB color model ,Optoelectronics ,0210 nano-technology ,business ,Light-emitting diode - Abstract
We report on the monolithic integration of RGB InGaN dot-in-a-wire LEDs on a single chip. The correlated color temperature can be continuously varied in the range of 1900K to 6800K, while maintaining excellent color rendering index capability (CRI>90). Moreover, submicron scale RGB pixels were demonstrated.
- Published
- 2017
- Full Text
- View/download PDF
14. InGaN nanowire integrated nanophotonics
- Author
-
Ishiang Shih, Yong-Ho Ra, Renjie Wang, Roksana Tonny Rashid, and Zetian Mi
- Subjects
Materials science ,business.industry ,Band gap ,Optical interconnect ,Nanowire ,Nanophotonics ,Gallium nitride ,Heterojunction ,02 engineering and technology ,021001 nanoscience & nanotechnology ,01 natural sciences ,law.invention ,010309 optics ,chemistry.chemical_compound ,chemistry ,law ,0103 physical sciences ,Optoelectronics ,Photonics ,0210 nano-technology ,business ,Light-emitting diode - Abstract
A monolithic integrated photonic platform is essentially required for a broad range of applications, including optical interconnect, quantum information processing, lighting, display, and sensing. To date, however, a ubiquitous platform for photonic integration has remained elusive. While Si photonics has been extensively studied, it has several serious shortcomings [1], including optical absorption in the ultraviolet, visible and telecom wavelengths range, and lack of second order nonlinearity. Moreover, due to the indirect bandgap of Si, a practical Si-based electrically injected laser has not been possible. These critical challenges can be readily addressed by developing a GaN-based integrated photonic platform. GaN has a direct energy bandgap of 3.4 eV and can be further tuned from 6.2 eV to 0.65 eV through alloying with In and Al, which enables a broad range of active photonic devices, including light emitting diodes (LEDs), lasers, and photodetectors operating in the deep ultraviolet (UV), visible and near-infrared spectral range. GaN exhibits strong second order nonlinearity, and the χ(2) coefficient is on the same order as LiNbOs [2, 3]. GaN has excellent thermal, electrical and optoelectronic properties, and possess outstanding potential for both linear, nonlinear, and quantum optical applications. Moreover, GaN has a wide transparency window, from ∼ 0.36 μm to 13.6 μm [4]. To date, however, the extraordinary potential of GaN-based materials for integrated photonics has been severely limited by the presence of large densities of defects and dislocations in conventional GaN planar heterostructures. In this context, we propose to develop a GaN nanowire based platform for integrated nanophotonics, which can be monolithically integrated on Si and other foreign substrates and are nearly free of dislocations. We have demonstrated the epitaxy of InGaN nanostructures with controlled shape, composition, and morphology, which will serve as the building block for the emerging GaN integrated nanophotonics.
- Published
- 2017
- Full Text
- View/download PDF
15. Corrections to 'CTU Layer Rate Control Algorithm in Scene Change Video for Free-Viewpoint Video'
- Author
-
Tao Yan, In-Ho Ra, Hui Wen, Min-Hang Weng, Qian Zhang, and Yan Che
- Subjects
lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 - Abstract
Corrections have been made to the above named paper.
- Published
- 2020
16. Energy-efficient two-hop transmission prioritization scheme for wireless body area networks
- Author
-
Hyunho Yang, In-Ho Ra, and Regin Cabacas
- Subjects
business.industry ,Computer science ,Network packet ,Real-time computing ,Computer Science::Networking and Internet Architecture ,Body area ,Wireless ,Energy consumption ,business ,Efficient energy use ,Computer network ,Hop (networking) - Abstract
This paper presents an energy-efficient scheme for wireless body area networks that utilizes two-hop strategy to forward packets to the coordinator node. It selects a forwarder node with the lowest cost function based on remaining energy and distance to the coordinator node for minimum energy consumption. The scheme includes a decision rule that ensures delivery of important packets during low energy conditions. Simulation results show that the proposed scheme performs better than other transmission schemes in terms of network lifetime, network stability, total and average residual energy and number of packets transmitted in success.
- Published
- 2014
- Full Text
- View/download PDF
17. A novel energy-aware priority transmission scheme based on context-metric queuing for delay tolerant networks
- Author
-
Regin Cabacas and In-Ho Ra
- Subjects
Routing protocol ,business.industry ,Computer science ,Distributed computing ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Context (language use) ,Geographic routing ,Transmission (telecommunications) ,Metric (mathematics) ,Redundancy (engineering) ,Routing (electronic design automation) ,business ,Computer network - Abstract
Context information utilization for routing in Delay Tolerant Networks (DTN) has received great research attention in recent years. Context information is inherent and dynamic in mobile nodes and its application improves message delivery in DTN. This paper presents a context-metric queuing method, called CEAMS for DTN that aims to optimize the delivery of message with HIGH priority by exploiting time-variant context information of a node in the network. Our approach introduces a Node Delivery Capability (NDC) metric using node's remaining energy, estimated distance to the destination and speed as metric in queuing and sorting messages in a buffer. We also design and implement the use of an energy-aware message priority transmission scheme with the proposed buffering model with admission and transmission control unit components. Our experimental results show the increase in delivery rate of HIGH priority messages and decrease in message redundancy compare to other DTN routing protocols using other queuing schemes.
- Published
- 2014
- Full Text
- View/download PDF
18. Gate-controlled Schottky barrier modulation for superior photoresponse of MoS2 field effect transistor
- Author
-
Won Jong Yoo, Xiaochi Liu, Daeyeong Lee, Hua-Min Li, Deshun Qu, Chang-Ho Ra, and Min Sup Choi
- Subjects
Photocurrent ,Materials science ,Modulation ,business.industry ,Photoconductivity ,Schottky barrier ,Optoelectronics ,Charge carrier ,Field-effect transistor ,business ,Signal ,Dark current - Abstract
An ultrahigh photocurrent (PC) signal which was about thousand times higher compared to the corresponding dark current was achieved in a two-dimensional (2D) multi-layer MoS2 field effect transistor (FET), owing to a gate-controlled MoS2/Ti/Au Schottky barrier (SB) modulation. The SBs can be enlarged for suppressing the electron drift along the channel in dark environment, and be reduced for the collection of photo-excited charge carriers in illuminating environment, providing the great potential for 2D electronic and optoelectronic applications.
- Published
- 2013
- Full Text
- View/download PDF
19. Evaluating Mobility Models in Delay Tolerant Network
- Author
-
Regin Cabacas and In-Ho Ra
- Subjects
Routing protocol ,Zone Routing Protocol ,Static routing ,Mobility model ,Dynamic Source Routing ,Link-state routing protocol ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Interior gateway protocol ,Destination-Sequenced Distance Vector routing ,business ,Computer network - Abstract
Mobility model is an essential factor in evaluating routing protocols designed for Delay Tolerant Networks. The use of inappropriate mobility models for evaluating a routing protocol in DTN can significantly affect its performance and the applicability in real world. In literature, many of existing mobility models designed for their own routing protocols are somewhat inappropriate since they are not designed for all possible scenarios. In this paper, we seek to understand the effects of different mobility patterns on routing protocols developed for DTNs applied in a specific environment, and then evaluate the impact of these mobility models by varying the number of nodes in the network. This paper is mainly focused on using mobility-based models and assessing their performance in terms of encounter times, contacts per hour, delivery probability, average latency and remaining energy of nodes.
- Published
- 2013
- Full Text
- View/download PDF
20. Design of wind turbine fault detection system based on performance curve
- Author
-
Sung Ho Kim, Se-Yoon Kim, and In-Ho Ra
- Subjects
Wind power ,Electricity generation ,SCADA ,business.industry ,Computer science ,Embedded system ,Condition monitoring ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,business ,Turbine ,Fault detection and isolation ,Automotive engineering ,Renewable energy - Abstract
Wind energy is currently the fastest growing source of renewable energy used for electrical generation around world. Wind farms are adding a significant amount of electrical generation capacity. The increase in the number of wind farms has led to the need for more effective operation and maintenance procedures. Condition Monitoring System(CMS) can be used to aid plant owners in achieving these goals. Its aim is to provide operators with information regarding the health of their machines, which in turn, can help them improve operational efficiency. In this work, wind turbine fault detection system based on wind vs. power performance curve obtained from SCADA is studied. Considered fault detection scheme utilizes artificial neural network for training normal behavior of wind turbine system. Furthermore, In order to verify the effectiveness of the performance curve based fault detection scheme, SCADA data obtained from 850kW wind turbine system installed in Kunsan Korea are used and various simulation studies were carried out.
- Published
- 2012
- Full Text
- View/download PDF
21. Instantaneous rate based cooperative MAC protocol for wireless ad hoc networks
- Author
-
Yufeng Wang, In-Ho Ra, Murad Khalid, and Ravi Sankar
- Subjects
business.industry ,Computer science ,Wireless ad hoc network ,Link Control Protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,Ad hoc wireless distribution service ,law.invention ,Optimized Link State Routing Protocol ,Relay ,law ,Computer Science::Networking and Internet Architecture ,Fading ,business ,Computer Science::Information Theory ,Computer network - Abstract
In this work, we propose an instantaneous rate based cooperative medium access control (MAC) protocol (termed as IrcMAC) and compare its performance gain over the existing cooperative MAC protocols under heavy load and fast fading conditions. CoopMAC I protocol, proposed in [5] which selects either direct path or relay path based on rate comparison to enhance average throughput and delay, performs worse under fading conditions due to lower direct path or relay path reliability. UtdMAC protocol, proposed in [8], performs better than CoopMAC I due to improved transmission reliability provided by the back up relay path, however, it uses relay path only as a secondary backup path. Our proposed IrcMAC protocol makes use of channel coherence time and estimates instantaneous signal-to-noise ratio (snr(t)) of source-to-relay, relay-to-destination and source-to-destination links; to reliably select between relay path or direct path for enhanced throughput and delay performances. Simulation results clearly show that IrcMAC significantly outperforms the existing CoopMAC I and the UtdMAC protocols in wireless ad hoc network.
- Published
- 2012
- Full Text
- View/download PDF
22. Hybrid cooperative MAC protocol for wireless ad hoc networks
- Author
-
In-Ho Ra, Yufeng Wang, Ravi Sankar, and Murad Khalid
- Subjects
Link Access Procedure for Frame Relay ,business.industry ,Wireless ad hoc network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Throughput ,Data_CODINGANDINFORMATIONTHEORY ,Ad hoc wireless distribution service ,law.invention ,Handshaking ,Geography ,Transmission (telecommunications) ,Relay ,law ,Computer Science::Networking and Internet Architecture ,business ,Relay channel ,Computer Science::Information Theory ,Computer network - Abstract
In this paper, we propose hybrid cooperative medium access control (MAC) protocol that adaptively uses single relay path or two relay paths for enhanced throughput and delay performance under fast Rayleigh fading conditions. The proposed protocol, termed as 2rcMAC, invokes two best relay (cooperating) paths for improved spatial diversity that offer higher transmission rate compared to the direct transmission path. It transmits through primary relay path for higher throughput performance and uses secondary relay path for reliable backup transmission. In case, only one best relay path (with higher rate than the direct transmission path) is available, the 2rcMAC protocol transmits directly to the destination node and invokes the secondary relay path for backup transmission only. Furthermore, handshaking and single bit feedback in 2rcMAC protocol resolve contentions among relay nodes in close proximity at the time, and further provide source node with rate information on source-to-destination, source-to-relay and relay-to-destination links. Simulation results clearly show average throughput improvement of 7% and 25% and average delay improvement of 94.8% and 98.9% compared to UtdMAC and CoopMAC I, respectively [4], [5], [7].
- Published
- 2012
- Full Text
- View/download PDF
23. Throughput and delay analysis in Aeronautical Data Networks
- Author
-
Huseyin Arslan, In-Ho Ra, Ravi Sankar, M. Cenk Erturk, Yufeng Wang, and Salvatore D. Morgera
- Subjects
Engineering ,business.industry ,Wireless ad hoc network ,Broadband networks ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Mobile ad hoc network ,law.invention ,Wireless broadband ,Relay ,law ,business ,Throughput (business) ,Network model ,Computer network - Abstract
Evergrowing consumer demand for wireless connectivity is opening a new paradigm of communications, “Aeronautical Data Networks (ADN)”. The desire is to provide high throughput and cost effective data network not only for an aeronautical applications, but also for terrestrial networks by using aeronautical platforms as a backbone. An aeronautical station (AS) could be a commercial plane, a helicopter, or any other low orbit station, i.e., Unmanned Air Vehicle, High Altitude Platforms. In this paper, we study an aeronautical broadband wireless access scheme to provide throughput and delay analysis for ADN. First, a simple topology of ADN is presented as a mobile ad-hoc network (MANET). A two-hop network model is considered where each packet makes two hops, one from the source AS to a relay AS and one from the relay AS to the destination AS. Then, based on the method of finding the maximum number of concurrent successful transmissions, the ADN throughput upper bound is obtained. Closed-form end-to-end delay expression is also derived, to provide a general ADN system performance in terms of throughput and delay. Numerical results are presented, which show the alignment with our theoretical analysis.
- Published
- 2012
- Full Text
- View/download PDF
24. Electrically switchable graphene photo-sensor using phase-change gate filter for non-volatile data storage application with high-speed data writing and access
- Author
-
Gang Zhang, Tian-Zi Shen, Hua-Min Li, Daeyeong Lee, Chang-Ho Ra, and Won Jong Yoo
- Subjects
Materials science ,business.industry ,Graphene ,Chalcogenide ,Transistor ,Photodetector ,Nanotechnology ,GeSbTe ,law.invention ,Switching time ,chemistry.chemical_compound ,chemistry ,law ,Thin-film transistor ,Filter (video) ,Optoelectronics ,business - Abstract
An electrically switchable graphene photo-sensor (SGPS) is proposed for multiple functional applications. SGPS is a dual-gate thin-film transistor with a graphene channel and a phase-change chalcogenide (GeSbTe) gate filter. This gate filter is switchable between the amorphous (optically transparent) and crystalline (optically non-transparent) phases by applying the gate biases. When the gate filter is switched to the amorphous/crystalline (a/c) phases, the SGPS will/not yield photo-current (I pc ) under a constant light source. By detecting the presence of I pc , two data states can be read out so as to accomplish non-volatile data storage. SGPS can present a switching speed of ∼50 ns between the a/c phases of GeSbTe and a data access speed as fast as 10 ns. SGPS shows very good 10-year data retention at 85°C and good endurance of >106 switching cycles between the a/c phases of the GeSbTe gate filter.
- Published
- 2011
- Full Text
- View/download PDF
25. Finite horizon scheduling in wireless ad hoc networks
- Author
-
Xuan Hung Le, Murad Khalid, Ravi Sankar, and In-Ho Ra
- Subjects
Optimization problem ,business.industry ,Computer science ,Wireless ad hoc network ,Quality of service ,Throughput ,Scheduling (computing) ,Max-min fairness ,Computer Science::Networking and Internet Architecture ,Fairness measure ,Fading ,Maximum throughput scheduling ,business ,Computer network - Abstract
A cooperative ratio-based scheduling scheme with minimal signaling to enhance network throughput and fairness in wireless ad hoc network is presented in this paper. Throughput and fairness maximization problem in a finite horizon (short term) is formulated as a novel multi-window optimization problem. Through analysis users' thresholds are shown to be time variant to achieve throughput maximization with fairness in each window. Simulation results clearly show that compared with non decision-based strategy, ratio-based scheme achieves within 1.6 % of the maximum throughput value and is scalable in terms of the number of nodes. Fairness performance is marginally better than non decision-based strategy.
- Published
- 2010
- Full Text
- View/download PDF
26. Potential well engineering by partial oxidation of TiN for high-speed and low-voltage Flash memory with good 125°C data retention and excellent endurance
- Author
-
Gang Zhang, Cheng Yang, Hua-Min Li, Won Jong Yoo, and Chang Ho Ra
- Subjects
Materials science ,Stack (abstract data type) ,Silicon ,chemistry ,X-ray photoelectron spectroscopy ,Analytical chemistry ,chemistry.chemical_element ,Partial oxidation ,Tin ,Low voltage ,Quantum tunnelling ,Flash memory - Abstract
Potential well engineering is proposed for NAND Flash memory. With a variable (∼2nm–4.3nm) tunnel barrier, the engineered well (EW) enhances tunneling of carriers during program/erase (P/E) to result in fast P/E, while it suppresses charge loss under the retention mode to result in good data retention. The EWalso improves endurance, as it is insensitive to the P/E stress induced tunnel barrier degradation. The EW demonstrated in this work is formed by partial oxidation of TiN at the interfaces of the SiO 2 /TiN/SiO 2 stack during rapid thermal process (RTP), and its band profile is characterized by XPS, TEM, internal photoemission (IPE), XRD, and band simulation. The memory devices with an EW show promising performances in fast program (≪µs), low-voltage operation (6–8MV/cm), good 10-year data retention at 125°C, and excellent endurance (≫107 P/E cycles).
- Published
- 2009
- Full Text
- View/download PDF
27. Towards a Cross Layer Framework for ad hoc wireless networks
- Author
-
Ravi Sankar, Murad Khalid, and In-Ho Ra
- Subjects
business.industry ,Wireless ad hoc network ,Computer science ,Wireless network ,Distributed computing ,Multitier architecture ,Global network ,Decomposition (computer science) ,Wireless ,Layer (object-oriented design) ,business ,Computer network - Abstract
In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper, we propose a Cross Layer Framework based on vertical layer architecture. The primary contribution of this paper is the functional architecture of the vertical layer which is primarily responsible for cross layer interaction management and optimization. The second contribution is the use of optimization cycle that comprises awareness parameters collection, mapping, classification and the analysis phases. The third contribution of the paper is the decomposition of the parameters into local and global network perspective for opportunistic optimization. We have shown through simulations how parameters' variations can represent local and global views of the network and how we can set local and global thresholds to perform opportunistic optimization. Finally, we conclude and highlight future challenges associated with the proposed framework.
- Published
- 2009
- Full Text
- View/download PDF
28. A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks
- Author
-
Young Hoon Joo, Ravi Sankar, In-Ho Ra, and Murad Khalid
- Subjects
Vehicular ad hoc network ,Directional antenna ,business.industry ,Wireless network ,Wireless ad hoc network ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,QualNet ,Throughput ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Computer Science::Networking and Internet Architecture ,business ,Computer Science::Information Theory ,Computer network - Abstract
Ad hoc wireless networks operate without any infrastructure where a node can be a source and a router at the same time. This indispensably requires high throughput and low delay performance throughout the wireless network coverage span, particularly under heavy traffic conditions. Recent research on using multiple antennas in beam-forming or multiplexing modes over a wireless channel has shown promising results in terms of high throughput and low delay. Directional antennas have shown to increase spatial reuse by allowing multiple transmitters and receivers to communicate using directional beams as long as they do not significantly interfere with each other. However, directional antenna performance asymptotically approaches the omni-directional performance in a high density ad hoc network. Simulation results in QualNet validate that average throughput and packet corruption ratio of directional antenna approach omni-directional performance.
- Published
- 2008
- Full Text
- View/download PDF
29. A new video interpolation technique based on motion-adaptive subsampling
- Author
-
Yeon-Sung Choi, Dong-Wook Kim, In-Ho Ra, and Jin-Tae Kim
- Subjects
Motion compensation ,Video post-processing ,business.industry ,Image quality ,Computer science ,Frame (networking) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Sampling (statistics) ,Image segmentation ,Adaptive filter ,Media Technology ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Data compression ,Interpolation - Abstract
In video data transmission, a subsampling technique is used to reduce the number of transmitted frames. This paper presents a new technique to improve the performance of video interpolation by controlling the subsampling rate of a video sequence. Subsampling is determined by the motion complexity of a frame. In the simulation results, we find that the picture quality fluctuation is reduced.
- Published
- 2003
- Full Text
- View/download PDF
30. Finite horizon scheduling in wireless ad hoc networks.
- Author
-
Khalid, M., Xuan Hung Le, In-ho Ra, and Sankar, R.
- Published
- 2010
- Full Text
- View/download PDF
31. A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks.
- Author
-
Khalid, M., In-ho Ra, Young-hoon Joo, and Ravi Sankar
- Published
- 2008
- Full Text
- View/download PDF
32. Second-Bit-Effect-Free Multibit-Cell Flash Memory Using Si3N4/ZrO2 Split Charge Trapping Layer.
- Author
-
Gang Zhang, Seung-Hwan Lee, Chang Ho Ra, Hua-Min L, and Won Jong Yoo
- Subjects
FLASH memory ,INFORMATION retrieval ,RANDOM access memory ,COMPUTER programming ,ELECTRONIC systems - Abstract
In this paper, a Si
3 N4 /ZrO2 split charge trapping layer (SCTL) is proposed for multibit-cell Flash memory. T complementary potential wells of Si3 N4 /ZrO2 storage nodes en able independent node control when the Fowler-Nordheim (F-N) method is applied for programming/erasing (P/E). Experiment and simulation results suggest that the 2-bit (2-b) charge storage is accomplished by physical data node separation for the SCTL rather than charge injection control. The well-confined charge storages suppress the second-bit effect, enabling excellent 2-b data clearance for short-channel SCTL devices. It was found that the remaining memory windows after 1010 s decrease, dependent on the difference of the trap properties between Si3 N4 and ZrO2 . [ABSTRACT FROM AUTHOR]- Published
- 2009
- Full Text
- View/download PDF
33. Artificial Neural Network Based Spectrum Sensing in Wireless Regional Area Network
- Author
-
Sharad Jain, Ashwani Kumar Yadav, Raj Kumar, Indra Kumar Shah, Prashant Kumar, Saurabh Singh, and In-Ho Ra
- Subjects
Artificial neural network ,cognitive radio ,cooperative spectrum sensing ,probability of false alarm ,signal to noise ratio ,wavelet packet transform ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In recent development and improvement of wireless communication system, the cognitive radio (CR) is a potential approach to utilize spectrum efficiently. Spectrum sensing technique arguably is the most significant component of cognitive radio. Cooperative spectrum sensing (CSS) is utilized to improve the detection performance of the system. Several fusion strategies of decision making are presented for sensing the primary user but they do not perform well under low signal to noise ratio (SNR) conditions. This paper proposes artificial neural network (ANN) based CSS under Rayleigh multipath fading channel in IEEE 802.22 wireless regional area network (WRAN). We implemented an ANN in the fusion centre. First, the energy of the received signal is calculated using discrete wavelet packet transform (DWPT). Then, calculated energy, SNR and false alarm probability are used jointly to make a data set of 2048 samples and are used to train Levenberg-Marquardt back propagation training algorithm-based feed-forward neural network (FFNN). Using this trained neural network, CSS in WRAN is simulated under Rayleigh multipath fading channel and results demonstrate the superiority of the proposed approach over traditional CSS with DWPT and Fast fourier transform (FFT) based energy detection schemes in low SNR environment.
- Published
- 2024
- Full Text
- View/download PDF
34. Efficacious Novel Intrusion Detection System for Cloud Computing Environment
- Author
-
Pooja Rana, Isha Batra, Arun Malik, In-Ho Ra, Oh-Sung Lee, and A. S. M. Sanwar Hosen
- Subjects
Decision Tree ,Firefly Algorithm ,Fitness Function ,Feature Selection ,Genetic Algorithm ,Intrusion Detection System ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Rife acceptance of Cloud Computing has made it bull’s eye for the hackers. Intrusion detection System (IDS) plays a vibrant role for it. Researchers have done marvelous works on the development of a competence IDS. But there are many challenges still exists with IDS. One of the biggest concerns is that the computational complexity and false alarms of the IDS escalates with the increase in the number of features or attributes of the dataset. Hence, the concept of Feature Selection (FS) contributes an all-important role for the buildout of an efficacious IDS. New FS algorithm is put forward which is the modified Firefly Algorithm in which Decision Tree (DT) classifier is used as the classification function. We have used the hybrid classifier which is the combination of neural network and DT. We have used CSE CIC IDS 2018 dataset and simulated dataset for performance assessment. Our examination pragmatic that the performance of proposed architecture is better than the state-of-the-art algorithms.
- Published
- 2024
- Full Text
- View/download PDF
35. Hierarchical Explainable Network for Investigating Depression From Multilingual Textual Data
- Author
-
Salma Akter Asma, Nazneen Akhter, Shayla Sharmin, Md. Sazzadur Rahman, A. S. M. Sanwar Hosen, Oh-Sung Lee, and In-Ho Ra
- Subjects
Convolutional neural network ,depression detection ,explainability ,hierarchical attention network ,multilingual ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Depression is the most prevalent mental health disorder, which is spreading like an epidemic. With the rise of the internet, people from all over the world now express their daily lives on social media, which can be utilized to analyze their mental health condition. Automated approaches like Machine Learning (ML) and Deep Learning (DL) are used to analyze social media posts. The ML techniques are performing well in detecting depression from monolingual text. Nevertheless, ML model’s low interpretability makes it difficult to identify depression in multilingual texts. Hence, the study focuses on seven languages for developing the model. Traditional ML and DL algorithms like Convolutional Neural Network (CNN), Support Vector Machine, Random Forest, and Decision Tree lack interpretability regarding prediction. To effectively analyze the multilingual dataset, CNN with a Hierarchical Attention Network is implemented in the model and then the Gaussian Naive Bayes algorithm is applied to the extracted output layer to generate an interpretable prediction, allowing it to offer enhanced explainability compared to other state-of-the-art algorithms. The proposed approach demonstrates effectiveness in analyzing multilingual texts with an accuracy of 89.09% outperforming other ML and DL models in terms of time and memory efficiency.
- Published
- 2024
- Full Text
- View/download PDF
36. Large Language Models and Sentiment Analysis in Financial Markets: A Review, Datasets, and Case Study
- Author
-
Chenghao Liu, Arunkumar Arulappan, Ranesh Naha, Aniket Mahanti, Joarder Kamruzzaman, and In-Ho Ra
- Subjects
Large language model ,Bitcoin price ,sentiment analysis ,machine learning ,market dynamics ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This paper comprehensively examines Large Language Models (LLMs) in sentiment analysis, specifically focusing on financial markets and exploring the correlation between news sentiment and Bitcoin prices. We systematically categorize various LLMs used in financial sentiment analysis, highlighting their unique applications and features. We also investigate the methodologies for effective data collection and categorization, underscoring the need for diverse and comprehensive datasets. Our research features a case study investigating the correlation between news sentiment and Bitcoin prices, utilizing advanced sentiment analysis and financial analysis methods to demonstrate the practical application of LLMs. The findings reveal a modest but discernible correlation between news sentiment and Bitcoin price fluctuations, with historical news patterns showing a more substantial impact on Bitcoin’s longer-term price than immediate news events. This highlights LLMs’ potential in market trend prediction and informed investment decision-making.
- Published
- 2024
- Full Text
- View/download PDF
37. A new video interpolation technique based on motion-adaptive subsampling.
- Author
-
Dong-Wook Kim, Jin-Tae Kim, In-Ho Ra, and Yeon-Sung Choi
- Published
- 1999
- Full Text
- View/download PDF
38. Sub-Micron Monolithic Full-Color Nanorod LEDs on A Single Substrate
- Author
-
Sung-Un Kim, Jeong-Kyun Oh, Dae-Young Um, Bagavath Chandran, Cheul-Ro Lee, and Yong-Ho Ra
- Subjects
FDTD ,InGaN ,LED ,light reflector ,nanorod ,Applied optics. Photonics ,TA1501-1820 ,Optics. Light ,QC350-467 - Abstract
The extended reality (XR) display, including augmented reality (AR) and virtual reality (VR), requires ultrahigh-resolution and high-luminance pixel technology. GaN-based micro-LEDs are the most promising for high-density pixel applications. However, it is necessary to simultaneously fabricate full-color R/G/B emitters on a single substrate. Moreover, the efficiency droop at long wavelengths with high-indium InGaN still remains a challenge. The InGaN nanorod has the potential to realize monolithic R/G/B LEDs on a single substrate, and the Al reflector has a light reflectance that can dramatically improve light extraction efficiency. Here, we designed sub-micron monolithic full-color R/G/B nanorod LEDs with an Al core-shell reflector on single chip. The optimal structures for light confinement and vertical light extraction by single InGaN nanorod R/G/B LED structures were identified. The single nanorod with Al core-shell structure dramatically increased the light extraction efficiency, and showed an improvement of more than 20%, especially in the red wavelength. As a result, by introducing a long-length nanorod structure, we have successfully designed a new submicron pixel with full-color R/G/B LEDs operating within 1 μm × 1 μm size. This unique design will be a key factor in enabling the next generation of AR and VR displays that require ultra-small and compact pixels.
- Published
- 2023
- Full Text
- View/download PDF
39. AI-Based Epileptic Seizure Detection and Prediction in Internet of Healthcare Things: A Systematic Review
- Author
-
Sobhana Jahan, Farhana Nowsheen, Mahathir Mahmud Antik, Md. Sazzadur Rahman, M. Shamim Kaiser, A. S. M. Sanwar Hosen, and In-Ho Ra
- Subjects
Electroencephalography ,brain-computer interface ,artificial intelligence ,Internet of Things ,deep learning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Epilepsy is a neurological condition affecting around 50 million individuals worldwide, reported by the World Health Organization. This is identified as a hypersensitive disease by clinical associations. The unique characteristics of Electroencephalography have proven to be stable and universal; therefore, researchers have a lot of credibilities. So, it is the most used test for Epileptic Seizure detection and prediction. This study examines the contributions that have so far been made utilizing Electroencephalography technology to detect, predict, and monitor Epileptic Seizures. We have reviewed around 56 research articles, and those papers are selected from different academic databases. The studies explored various approaches, including Machine Learning, Deep Learning, and the Internet of Things framework. A comprehensive discussion of different classification algorithms is analyzed, and their performances are explored. Furthermore, various open issues of the stated approach are discussed, and potential future works are addressed.
- Published
- 2023
- Full Text
- View/download PDF
40. A Novel Transceiver and an Asynchronous Mode for the Hybrid Multiple-Access HetNet Architecture
- Author
-
Joydev Ghosh, Cesar Vargas-Rosales, Luciano Leonel Mendes, In-Ho Ra, Van Nhan Vo, Phet Aimtongkham, and Chakchai So-In
- Subjects
Gigantic-multiple-input multiple-output (gMIMO) ,hybrid multiple access (HMA) ,asynchronous transmission ,quadrature amplitude modulation (QAM) ,iterative interference cancellation (IIC) ,spectral efficiency (SE) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Multiuser gigantic-multiple-input multiple-output (MU-gMIMO) and nonorthogonal multiple access (NOMA) are jointly seen as important enabling technologies for sixth generation (6G) networks. They have many benefits, such as spatial multiplexing, spatial diversity, massive connectivity, and spectral efficiency (SE). However, gMIMO-NOMA suffers from many inherent challenges. In this paper, we propose an MU-gMIMO-hybrid multiple-access (HMA) heterogeneous network architecture to address the ‘nearly same channel gain’ issue. Then, an iterative minimal mean squared error (IMMSE) scheme is applied along with quadrature amplitude modulation (QAM) for maximal ratio transmission in the proposed transceiver design to address the ‘residual error’ caused by imperfect successive interference cancellation (ISIC). Finally, to assess the performance of the proposed architecture for the ‘time offsets’ issue, we investigate the asynchronous mode with an MMSE detector matrix following imperfect channel state information (ICSI) to provide a new analysis for HMA transmission and formulate an optimization problem for energy efficiency (EE).
- Published
- 2023
- Full Text
- View/download PDF
41. On the Comparison of Optimal NOMA and OMA in a Paradigm Shift of Emerging Technologies
- Author
-
Joydev Ghosh, In-Ho Ra, Saurabh Singh, Huseyin Haci, Khaled A. Al-Utaibi, and Sadiq M. Sait
- Subjects
Non-orthogonal multiple access (NOMA) ,orthogonal multiple access (OMA) ,orthogonal frequency division multiple access (OFDMA) ,multi-user sum rate ,capacity ,transmit power ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Non-orthogonal multiple access (NOMA) is a better multiple access technique than orthogonal multiple access (OMA), precisely orthogonal frequency division multiple access (OFDMA) scheme, at the conceptual level for fifth-generation (5G) networks and beyond 5G (B5G) networks. We investigate the potentials of the schemes by comparing the proposed NOMA scheme with the traditional cooperative communication NOMA (CCNOMA) scheme, rather than the comparison between NOMA and OMA only. To probe the effectiveness of NOMA as a multiple access technique, we propose a novel NOMA scheme considering two adjacent BSs with a special design of the transceiver architecture. The proposed scheme provides a reasonable data rate to both near user (NU) and far user (FU) without compromising the quality of service (QoS) to anyone of them. The conclusive analyses on the optimization framework of multi-user sum rate, capacity, transmit power, spectral efficiency (SE), and energy efficiency (EE) trade-off for NOMA and OFDMA schemes have been established to a succession of derivations. Under the analytical optimization framework, we also prove quite a few properties for them. Simulation results confirm the theoretical findings and show that the two schemes can efficiently approach the optimal power allocation, minimization of power consumption, and optimal SE-EE trade-off, and the proposed NOMA scheme provides comparatively better data sum rates than the baseline OMA scheme.
- Published
- 2022
- Full Text
- View/download PDF
42. Predicting Trends and Research Patterns of Smart Cities: A Semi-Automatic Review Using Latent Dirichlet Allocation (LDA)
- Author
-
Chetan Sharma, Isha Batra, Shamneesh Sharma, Arun Malik, A. S. M. Sanwar Hosen, and In-Ho Ra
- Subjects
Smart cities ,Internet of Things (IoT) ,latent Dirichlet allocation (LDA) ,scopus ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Smart cities are a current worldwide topic requiring much scientific investigation. This research instigates the necessity of an organized review to a heedful insight of the research trends and patterns prevailing in this domain. The string is formulated to extract the corpus from Scopus largest database of publications. The corpus of 8320 articles published from 2010 to 2022 is processed using Latent Dirichlet Allocation. Two, five, and ten topics have been extracted to provide the recent trends for IoT in smart cities. There has been an increased recognition that more attention needs to be paid to the area of smart cities so a complete overview of the topic of smart cities research, including the most prominent nations (institutions, sources, and authors) and noteworthy research directions has been presented in this paper. The scientific collaboration across countries (regions), organizations, and authors has also been widely discussed. A detailed and comprehensive overview and visualization of the trends and research patterns used to integrate the Internet of Things in Smart Cities. This data based experimental study signifies a roadmap of the research trends in Smart Cities by implementing topic modeling technique that has never been used in this domain. Based upon the topic modeling using LDA, authors have formulated three research questions and answered those question based on the in-depth research. At the end this study concludes the areas suggested are at the growing phase and need more insight for their growth.
- Published
- 2022
- Full Text
- View/download PDF
43. Keyphrases Frequency Analysis From Research Articles: A Region-Based Unsupervised Novel Approach
- Author
-
Mohammad Badrul Alam Miah, Suryanti Awang, Md. Mustafizur Rahman, A. S. M. Sanwar Hosen, and In-Ho Ra
- Subjects
Curve fitting technique ,data pre-processing ,feature extraction ,keyphrase extraction ,keyphrase frequency analysis ,KFA technique ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Due to the advancement of technology and the exponential proliferation of digital sources and textual data, the extraction of high-quality keyphrases and the summarizing of content at a high standard has become increasingly difficult in current research. Extracting high-quality keyphrases and summing texts at a high level demands the use of keyphrase frequency as a feature for keyword extraction, which is becoming more popular. This article proposed a novel unsupervised keyphrase frequency analysis (KFA) technique for feature extraction of keyphrases that is corpus-independent, domain-independent, language-agnostic, and length-free documents, and can be used by supervised and unsupervised algorithms. This proposed technique has five essential phases: data acquisition; data pre-processing; statistical methodologies; curve plotting analysis; and curve fitting technique. First, the technique begins by collecting five different datasets from various sources and then feeding those datasets into the data pre-processing phase using text pre-processing techniques. The preprocessed data is then transmitted to the region-based statistical process, followed by the curve plotting phase, and finally, the curve fitting approach. Afterward, the proposed technique is tested and assessed using five (5) standard datasets. Then, the proposed technique is compared with our recommended systems to prove its efficacy, benefits, and significance. Finally, the experimental findings indicate that the proposed technique effectively analyses the keyphrase frequency from articles and delivers the keyphrase frequency of 70.63% in 1st region and 10.74% in 2nd region of the total present keyphrase frequency.
- Published
- 2022
- Full Text
- View/download PDF
44. A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
- Author
-
Shimao Yao, Ralph Voltaire J. Dayot, Hyung-Jin Kim, and In-Ho Ra
- Subjects
Ciphertext evolution ,cloud sharing ,conditional re-encryption ,identity-based proxy re-encryption ,key update ,revocable ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Proxy re-encryption (PRE), with the unique ciphertext transformation ability, enables various ciphertext authorization applications to be implemented efficiently. However, most existing PRE schemes mainly focus on access authorization while ignoring the situation where the key needs to be changed and the ciphertext needs to be evolved, making the scheme’s practicability and security inadequate. Moreover, the few schemes that simultaneously combine ciphertext authorization, key update, and ciphertext evolution are not satisfactory in terms of security. For solving this problem, based on Xiong et al.’s scheme, this paper proposes an improved revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution (RIB-CPRE-CE) for secure and efficient cloud data sharing. The proposed scheme inherits the characteristics of multi-use, constant ciphertext length, fine-grained authorization, collision-resistance security, and chosen ciphertext attack (CCA) security from the original method. Also, it supports updating ciphertext to adapt to the new key after changing the identity (key) or achieves authorization revocation by evolving ciphertext. Two new algorithms, URKeyGen and UpReEnc, have been integrated into the original delegation scheme to support ciphertext evolution. The formal definition, security model, concrete construction, and security analysis of RIB-CPRE-CE have been presented. The comparison and analysis show that the proposed scheme is practical and secure. Although it adds a ciphertext evolution function for supporting key update and delegation revocation, its efficiency and security are not reduced. The proposed scheme can also be used in other access authorization systems that need to change the key or revoke the authorization. It has certain practicability and security.
- Published
- 2021
- Full Text
- View/download PDF
45. Allied Power Constraint Optimization and Optimal Beam Tracking Schemes for Mobile mmWave Massive MIMO Communications
- Author
-
Joydev Ghosh, In-Ho Ra, Saurabh Singh, Huseyin Haci, Khaled A. Al-Utaibi, and Sadiq M. Sait
- Subjects
Power constraint schemes ,beam tracking schemes ,signal to interference plus noise ratio (SINR) ,channel occupancy ratio (COR) ,bit error rate (BER) ,channel state information (CSI) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The fifth generation (5G) networks and internet of things (IoT) promise to transform our lives by enabling various new applications from driver-less cars to smart cities. These applications will introduce enormous amount of data traffic and number of connected devices in addition to the current wireless networks. Thus 5G networks require many researches to develop novel telecommunication technologies to accommodate these increase in data traffic and connected devices. In this paper, novel power constraint optimization and optimal beam tracking schemes are proposed for mobile mmWave massive MIMO communications. A recently published novel channel model that is different from other widely used ones is considered. The channel model considers the number of clusters and number of rays within each cluster as varying due to user mobility. The proposed power constraint optimization scheme harmonizes conventional total power constraint (TPC) and uniform power constraint (UPC) schemes into a new one called allied power constraint (APC) that can significantly improve the system performance in 5G networks while achieving fairness among users. TPC and UPC have major drawbacks with respect to fairness and achieving quality-of-service (QoS) for users in dense networks. Thus APC aims to harmonize TPC and UPC by adjusting each antenna element’s constraint to adapt for some power resilience to a specific antenna element, hence proposing an intermediate solution between the two extreme case power constraint optimization schemes. Three optimal beam tracking schemes: (i) conventional exhaustive search (CES), (ii) multiobjective joint optimization codebook (MJOC), and (iii) linear hybrid combiner (LHS) scheme, have been provided for the mobile mmWave massive MIMO system with the proposed APC scheme. For the proposed APC scheme a comprehensive performance analysis is provided and compared with TPC and UPC. Spectral efficiency (SE), bit-error-rate (BER), Jain’s fairness index, channel occupancy ratio (COR) and instantaneous interfering power metrics are investigated. It has been shown that the proposed scheme can significantly outperform conventional schemes.
- Published
- 2021
- Full Text
- View/download PDF
46. Performance Investigation of NOMA Versus OMA Techniques for mmWave Massive MIMO Communications
- Author
-
Joydev Ghosh, Vishal Sharma, Huseyin Haci, Saurabh Singh, and In-Ho Ra
- Subjects
NOMA ,OMA ,massive MIMO ,mmwave communication ,3GPP ,PAPR ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The fifth-generation (5G) of cellular technology is currently being deployed over the world. In the next decade of mobile networks, beyond 5G (B5G) cellular networks with the under-development advanced technology enablers are expected to be a fully developed system that could offer tremendous opportunities for both enterprises and society at large. B5G in more ambitious scenarios will be capable to facilitate much-improved performance with the significant upgrade of the key parameters such as massive connectivity, ultra-reliable and low latency (URLL), spectral efficiency (SE) and energy efficiency (EE). Equipping non-orthogonal multiple access (NOMA) with other key drivers will help to explore systems’ applicability to cover a wide variety of applications to forge a path for future networks. NOMA empowers the networks with seamless connectivity and can provide a secure transmission strategy for the industrial internet of things (IIoT) anywhere and anytime. Despite being a promising candidate for B5G networks a comprehensive study that covers operating principles, fundamental features and technological feasibility of NOMA at mmWave massive MIMO communications is not available. To address this, a simulation-based comparative study between NOMA and orthogonal multiple access (OMA) techniques for mmWave massive multiple-input and multiple-output (MIMO) communications is presented with performance discussions and identifying technology gaps. Throughout the paper, aspects of operating principles, fundamental features and technological feasibility of NOMA are discussed. Also, it is demonstrated that NOMA not only has good adaptability but also can outperform other OMA techniques for mmWave massive MIMO communications. Some foreseeable challenges and future directions on applying NOMA to B5G networks are also provided
- Published
- 2021
- Full Text
- View/download PDF
47. CTU Layer Rate Control Algorithm in Scene Change Video for Free-Viewpoint Video
- Author
-
Tao Yan, In-Ho Ra, Hui Wen, Min-Hang Weng, Qian Zhang, and Yan Che
- Subjects
3D video coding ,scene detection ,rate control ,image similarity analysis ,bit allocation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
At present, the rate control algorithm for multiview high-efficiency video coding (MV-HEVC) does not have the capability of efficient coding tree unit(CTU) layer bit allocation, and the video quality varies greatly for sequences with sudden scene changes or large motions. To overcome this limitation, this paper proposes a rate control algorithm for MV-HEVC based on scene detection. Firstly, we established ρ domain rate control model based on multi-objective optimization. Then, it uses image similarity to make reasonable bit allocation among viewpoints. If the video scene is switched, the image similarity is recalculated, and then the correlation between the weights of the interview point rates and the correlation between the viewpoints are analyzed. Finally, the frame layer rate control considers the layer B-frame and other factors in allocating the code rate, and the basic unit layer rate control adopts different quantization methods according to the content complexity of the CTU. Experimental results show that the proposed rate control algorithm can maintain good coding efficiency and decrease the average video quality variation by 25.29%.
- Published
- 2020
- Full Text
- View/download PDF
48. Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based
- Author
-
Sadia Ali, Yaser Hafeez, N. Z. Jhanjhi, Mamoona Humayun, Muhammad Imran, Anand Nayyar, Saurabh Singh, and In-Ho Ra
- Subjects
Body sensor ,cloud computing ,component-based system ,design pattern ,healthcare systems ,regression testing ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
To survive in the competitive environment, most organizations have adopted component-based software development strategies in the rapid technology advancement era and the proper utilization of cloud-based services. To facilitate the continuous configuration, reduce complexity, and faster system delivery for higher user satisfaction in dynamic scenarios. In cloud services, customers select services from web applications dynamically. Healthcare body sensors are commonly used for diagnosis and monitoring patients continuously for their emergency treatment. The healthcare devices are connected with mobile or laptop etc. on cloud environment with network and frequently change applications. Thus, organizations rely on regression testing during changes and implementation to validate the quality and reliability of the system after the alteration. However, for a large application with limited resources and frequently change component management activities in the cloud computing environment, component-based system verification is difficult and challenging due to irrelevant and redundant test cases and faults. In this study, proposed a test case selection and prioritization framework using a design pattern to increase the faults detection rate. First, we select test cases on frequently accessed components using observer patterns and, secondly, prioritize test cases on adopting some strategies. The proposed framework was validated by an experiment and compared with other techniques (previous faults based and random priority). Hence, experimental results show that the proposed framework successfully verified changes. Subsequently, the proposed framework increases the fault detection rate (i.e., more than 90%) than previous faults based and random priority (i.e., more than 80% respectively).
- Published
- 2020
- Full Text
- View/download PDF
49. Blockchain-Based Transaction Validation Protocol for a Secure Distributed IoT Network
- Author
-
A. S. M. Sanwar Hosen, Saurabh Singh, Pradip Kumar Sharma, Uttam Ghosh, Jin Wang, In-Ho Ra, and Gi Hwan Cho
- Subjects
Internet of Things ,blockchain technology ,software defined networking ,delay ,security and privacy ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Blockchain is attracting more and more attention to its applicability in the fields of Internet of Things (IoT). In particular, it is able to store data in unalterable blocks, associated with its secure peer-to-peer in a growing problem of transaction authorization in industrial and service provisioning applications. Moreover, it facilitates decentralized transaction (TX) validation and distributed ledger. The underneath algorithm of TX selection for validation may not be effective in terms of delay of various services of the applications. Because the existing random-based or fee-based selections are a delay insensitive that does not guarantee a minimum delay of a time-critical TX. This paper proposes a blockchain-based transaction validation protocol for a secure distributed IoT network. It includes a context-aware TX validation technique, where a TX is validated by a miner with the priority of a service. Besides, we adopt the Software Defined Networking enabled gateway as a middleware between IoT and the blockchain network in which the control operations and security of the network in a largescale are ensured. The proposed network model has evaluated and compared to the Core network. The results ensure the given priority in TX validation is more delay sensitive than the existing technique to provide quality of service of the network.
- Published
- 2020
- Full Text
- View/download PDF
50. Security Assured CNN-Based Model for Reconstruction of Medical Images on the Internet of Healthcare Things
- Author
-
Sujeet More, Jimmy Singla, Sahil Verma, Kavita, Uttam Ghosh, Joel J. P. C. Rodrigues, A. S. M. Sanwar Hosen, and In-Ho Ra
- Subjects
Convolution neural network ,denoising ,security ,internet of healthcare things (IoHT) ,peak signal to noise ratio ,restoration ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Medical Imaging is the most significant technique that constitutes information needed to diagnose and make the right decisions for treatment. These images suffer from inadequate contrast and noise that occurs during image acquisition. Thus, denoising and contrast enhancement is crucial in increasing the visual quality of the images for obtaining quantitative measures. In this research, an innovative and improvised denoising technique is implemented that applies a sparse aware with convolution neural network (SA_CNN) for investigating various medical modalities. To evaluate and validate, the convolution neural network utilizes patch creation and dictionary methods for obtaining information. The proposed framework is predominant to other current approaches by employing image assessment quantitative measures like peak signal to noise ratio (PSNR), structural similarity index (SSIM), and mean squared error (MSE). The study also optimizes the computational time to achieve increased efficiency and better visual quality of the image. Furthermore, the widespread use of the Internet of Healthcare Things (IoHT) helps to provide security with vault and challenge schemes between IoT devices and servers.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.