-
Green and Safe 6G Wireless Networks: A Hybrid Approach
Authors:
Haneet Kour,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
With the wireless internet access being increasingly popular with services such as HD video streaming and so on, the demand for high data consuming applications is also rising. This increment in demand is coupled with a proportional rise in the power consumption. It is required that the internet traffic is offloaded to technologies that serve the users and contribute in energy consumption. There i…
▽ More
With the wireless internet access being increasingly popular with services such as HD video streaming and so on, the demand for high data consuming applications is also rising. This increment in demand is coupled with a proportional rise in the power consumption. It is required that the internet traffic is offloaded to technologies that serve the users and contribute in energy consumption. There is a need to decrease the carbon footprint in the atmosphere and also make the network safe and reliable. In this article we propose a hybrid system of RF (Radio Frequency) and VLC (Visible Light Communication) for indoor communication that can provide communication along with illumination with least power consumption. The hybrid network is viable as it utilizes power with respect to the user demand and maintains the required Quality of ServiceQoS and Quality of Experience QoE for a particular application in use. This scheme aims for Green Communication and reduction in Electromagnetic EM Radiation. A comparative analysis for RF communication, Hybrid RF+ VLC and pure VLC is made and simulations are carried out using Python, Scilab and MathWorks tool. The proposal achieves high energy efficiency of about 37% low Specific Absorption Rate (SAR) lower incident and absorbed power density complexity and temperature elevation in human body tissues exposed to the radiation. It also enhances the battery lifetime of the mobile device in use by increasing the lifetime approximately by 7 hours as validated from the obtained results. Thus the overall network reliability and safety factor is enhanced with the proposed approach.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Thermal Radiation (TR) mode: A Deployment Perspective for 5G NR
Authors:
Haneet Kour,
Rakesh Kumar Jha,
Sanjeev Jain,
Shubha Jain
Abstract:
The 5G New Radio NR technology is under standardization process by 3GPP to provide outline for a new radio interface for the next generation of cellular networks. The aim of the 5G networks include not only to provide enhanced capacity coverage but also support advanced services such as enhanced mobile broadband (eMBB) Ultra-Reliable Low Latency Communication URLLC massive Machine Type Communicati…
▽ More
The 5G New Radio NR technology is under standardization process by 3GPP to provide outline for a new radio interface for the next generation of cellular networks. The aim of the 5G networks include not only to provide enhanced capacity coverage but also support advanced services such as enhanced mobile broadband (eMBB) Ultra-Reliable Low Latency Communication URLLC massive Machine Type Communication mMTC. Key features of NR include Ultra lean carrier design to minimize the power consumption by limiting the always-on signal transmissions and to reduce interference in the neighboring cells . Another feature is the use of massive number of antennas for transmission as well as reception of signals. This rise in the number of antennas to provide a greater coverage brings about various challenges and impact in the system. With the increase in investigations in the mmWave frequencies, there is a need to investigate the health hazards they have on human body and the environment at large. This paper intends to provide an insight into the harmful impacts of Radio Frequency RF fields. The radiation metric to study the RF impact for far field is power density and for near field is Specific Absorption Rate SAR. These are the two main EM radiation metrics to find out the exposure due to uplink and downlink phenomenon in mobile communications. Mobile communication systems are addressed particularly to discuss the Electromagnetic EM Radiation impact as smart phones are used in close proximity to the body. A proposal in the form of Thermal Radiation TR mode is given to reduce the radiations emitted from a mobile phone. The performance of the proposed mode is validated from the results by achieving reduced power density, complexity and exposure ratio.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Antenna Model for Safe Human Exposure in Future 6G Smartphones: A Network Perspective
Authors:
Haneet Kour,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
In this article we present the biological effect of antenna topology on a users body. At different values of exposed frequency, the absorbent nature varies in human body. One of the major factors to be taken into consideration for designing 6G mobile antenna is the biological effect and Electromagnetic Field Exposure (EMF).
In this article we present the biological effect of antenna topology on a users body. At different values of exposed frequency, the absorbent nature varies in human body. One of the major factors to be taken into consideration for designing 6G mobile antenna is the biological effect and Electromagnetic Field Exposure (EMF).
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
A Benchmark Dataset for Multimodal Prediction of Enzymatic Function Coupling DNA Sequences and Natural Language
Authors:
Yuchen Zhang,
Ratish Kumar Chandrakant Jha,
Soumya Bharadwaj,
Vatsal Sanjaykumar Thakkar,
Adrienne Hoarfrost,
Jin Sun
Abstract:
Predicting gene function from its DNA sequence is a fundamental challenge in biology. Many deep learning models have been proposed to embed DNA sequences and predict their enzymatic function, leveraging information in public databases linking DNA sequences to an enzymatic function label. However, much of the scientific community's knowledge of biological function is not represented in these catego…
▽ More
Predicting gene function from its DNA sequence is a fundamental challenge in biology. Many deep learning models have been proposed to embed DNA sequences and predict their enzymatic function, leveraging information in public databases linking DNA sequences to an enzymatic function label. However, much of the scientific community's knowledge of biological function is not represented in these categorical labels, and is instead captured in unstructured text descriptions of mechanisms, reactions, and enzyme behavior. These descriptions are often captured alongside DNA sequences in biological databases, albeit in an unstructured manner. Deep learning of models predicting enzymatic function are likely to benefit from incorporating this multi-modal data encoding scientific knowledge of biological function. There is, however, no dataset designed for machine learning algorithms to leverage this multi-modal information. Here we propose a novel dataset and benchmark suite that enables the exploration and development of large multi-modal neural network models on gene DNA sequences and natural language descriptions of gene function. We present baseline performance on benchmarks for both unsupervised and supervised tasks that demonstrate the difficulty of this modeling objective, while demonstrating the potential benefit of incorporating multi-modal data types in function prediction compared to DNA sequences alone. Our dataset is at: https://hoarfrost-lab.github.io/BioTalk/.
△ Less
Submitted 21 July, 2024;
originally announced July 2024.
-
Validating polyp and instrument segmentation methods in colonoscopy through Medico 2020 and MedAI 2021 Challenges
Authors:
Debesh Jha,
Vanshali Sharma,
Debapriya Banik,
Debayan Bhattacharya,
Kaushiki Roy,
Steven A. Hicks,
Nikhil Kumar Tomar,
Vajira Thambawita,
Adrian Krenzer,
Ge-Peng Ji,
Sahadev Poudel,
George Batchkala,
Saruar Alam,
Awadelrahman M. A. Ahmed,
Quoc-Huy Trinh,
Zeshan Khan,
Tien-Phat Nguyen,
Shruti Shrestha,
Sabari Nathan,
Jeonghwan Gwak,
Ritika K. Jha,
Zheyuan Zhang,
Alexander Schlaefer,
Debotosh Bhattacharjee,
M. K. Bhuyan
, et al. (8 additional authors not shown)
Abstract:
Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has…
▽ More
Automatic analysis of colonoscopy images has been an active field of research motivated by the importance of early detection of precancerous polyps. However, detecting polyps during the live examination can be challenging due to various factors such as variation of skills and experience among the endoscopists, lack of attentiveness, and fatigue leading to a high polyp miss-rate. Deep learning has emerged as a promising solution to this challenge as it can assist endoscopists in detecting and classifying overlooked polyps and abnormalities in real time. In addition to the algorithm's accuracy, transparency and interpretability are crucial to explaining the whys and hows of the algorithm's prediction. Further, most algorithms are developed in private data, closed source, or proprietary software, and methods lack reproducibility. Therefore, to promote the development of efficient and transparent methods, we have organized the "Medico automatic polyp segmentation (Medico 2020)" and "MedAI: Transparency in Medical Image Segmentation (MedAI 2021)" competitions. We present a comprehensive summary and analyze each contribution, highlight the strength of the best-performing methods, and discuss the possibility of clinical translations of such methods into the clinic. For the transparency task, a multi-disciplinary team, including expert gastroenterologists, accessed each submission and evaluated the team based on open-source practices, failure case analysis, ablation studies, usability and understandability of evaluations to gain a deeper understanding of the models' credibility for clinical deployment. Through the comprehensive analysis of the challenge, we not only highlight the advancements in polyp and surgical instrument segmentation but also encourage qualitative evaluation for building more transparent and understandable AI-based colonoscopy systems.
△ Less
Submitted 6 May, 2024; v1 submitted 30 July, 2023;
originally announced July 2023.
-
Tactile based Intelligence Touch Technology in IoT configured WCN in B5G/6G-A Survey
Authors:
Mantisha Gupta,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
Touch enabled sensation and actuation is expected to be one of the most promising, straightforward and important uses of the next generation communication networks. In B5G/6G need for low latency, the infrastructure should be reconfigurable and intelligent to be able to work in real time and interoperable with the existing wireless network. It has a drastic impact on the society due to its high pr…
▽ More
Touch enabled sensation and actuation is expected to be one of the most promising, straightforward and important uses of the next generation communication networks. In B5G/6G need for low latency, the infrastructure should be reconfigurable and intelligent to be able to work in real time and interoperable with the existing wireless network. It has a drastic impact on the society due to its high precision, accuracy, reliability and efficiency and the ability to connect a user from far away or remote areas. Such a touch-enabled interaction is primarily concerned with the real time transmission of the tactile based haptic information over the internet, in addition to the usual audio, visual and data traffic, thus enabling a paradigm shift towards establishing a real time control and steering communication system. The existing system latency and overhead creates delays and limits the usability of the future applications. This study proposes an intelligent touch-enabled system for B5G/6G and IoT based wireless communication network that incorporates the AR/VR technologies. The tactile internet and network slicing serve as the backbone of the touch technology which incorporates intelligence from techniques such as AI/ML/DL. The survey introduces a layered and interfacing architecture complete with its E2E solution for the intelligent touch based wireless communication system. It is anticipated for the next generation system to provide numerous opportunities for various sectors utilizing AR/VR technology in robotics and healthcare facilities, all with the intention of helping in addressing severe problems faced by the society. Conclusively the article presents a few use cases concerning the deployment of touch infrastructure in automation and robotics as well as in intelligent healthcare systems, assisting in the diagnosis and treatment of the prevailing COVID-19 cases.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the comm…
▽ More
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s). For each layer, every node is scanned for the possibility of susceptible node(s). The strategy of the IDS is based on the analysis of energy efficiency and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond the range of upper and lower thresholds are detected as the nodes under attack. Further, detected node(s) are transmitted with a random sequence of bits followed by the process of re-authentication. The obtained results validate the better performance, low time computations, and low complexity. Finally, the proposed approach is compared with the conventional solution of intrusion detection.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Behavioral Model For Live Detection of Apps Based Attack
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid autho…
▽ More
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State In…
▽ More
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State Information). Depending on the achieved path loss based on the distance of the user from the BS, the user with the highest path loss is particularized for the attack. The formulation of AD divulges the increased susceptibilities of the secure network specifically for the selected legitimate user. The parameter of visibility defines the amount of AD present in the communication channel. Based on the enumerated attenuation created by the artificial dust, the parameter of secrecy rate is evaluated with varying distance of the user from the BS and the operating frequency. Furthermore, the proposed scheme of the HD attack is initiated by the intruder at the specified valid user. The strategy of the attack focuses on the continuous monitor of the uplink and attempts the spoofing attack on the downlink wherein the allocation of the resources takes place. The efficacy of the proposed approach is corroborated through the examination of simulation results. The assessment of the proposed mechanism highlights notable characteristics as compared to the conventional methodology of the FD (Full- Duplex) attack.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Electromagnetic Radiation Reduction in 5G Networks and Beyond using Thermal Radiation Mode
Authors:
Haneet Kour,
Rakesh Kumar Jha
Abstract:
With the massive increase in the popularity of smartphones and mobile data applications demanding bandwidth requiring data rates of the order of Gigabits per second, exploration of untapped frequency spectrum such as millimeter-wave has begun. Along with providing seamless connectivity and catering to achieving high Quality of Service and Quality of Experience, investigations are ongoing to enhanc…
▽ More
With the massive increase in the popularity of smartphones and mobile data applications demanding bandwidth requiring data rates of the order of Gigabits per second, exploration of untapped frequency spectrum such as millimeter-wave has begun. Along with providing seamless connectivity and catering to achieving high Quality of Service and Quality of Experience, investigations are ongoing to enhance our knowledge about biological safety at high frequencies. There is a need to ensure safety and reliability for the exposed public and updating the government policies regarding safety standards and regulations. This article is consecrated to provide an insight into health effects pertaining to millimeter frequencies, addressing aspects such as thermal heating in the body tissues with temperature rise, specific absorption rate, power density. As a solution, a proposal has been given for Electromagnetic radiation reduction for the mobile communication system in the form of a proposed mode that is, Thermal Radiation mode endorsing its safe use, promoting Green WCN along with increased energy efficiency and reduced complexity for the future generations to come. The proposal also validates reduced power density, Specific Absorption Rate, and temperature elevation produced in the human tissue when compared to other models in the form of simulation results obtained. It can increase the safety and reliability of 5G and beyond i.e. 6G networks in the future.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
AR Based Half-Duplex Attack in Beyond 5G networks
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
With the evolution of WCN (Wireless communication networks), the absolute fulfillment of security occupies the fundamental concern. In view of security, we have identified another research direction based on the attenuation impact of rain in WCN. An approach is initiated by an eavesdropper in which a secure communication environment is degraded by generating Artificial Rain (AR), which creates an…
▽ More
With the evolution of WCN (Wireless communication networks), the absolute fulfillment of security occupies the fundamental concern. In view of security, we have identified another research direction based on the attenuation impact of rain in WCN. An approach is initiated by an eavesdropper in which a secure communication environment is degraded by generating Artificial Rain (AR), which creates an abatement in the secrecy rate, and the cybersecurity gets compromised. By doing so, an attacking scenario is perceived, in which an intruder models a Half-Duplex (HD) attack. Half-Duplex specifies the attack on the downlink instead of targeting both uplink and downlink. This allows the attacker to alleviate the miss-rate of the attacking attempts. The layout for the HD attack is explained using RRC (Radio Resource Control)-setup. Further, we have determined and examined the performance parameters such as secrecy rate, energy efficiency, miss-rate, sensitivity in the presence of AR. Further comparison of rural and urban scenarios in the presence and absence of AR is carried out concerning the variation in secrecy rate with respect to the millimeter-wave frequencies and distance. Lastly, the methodology of the HD attack is simulated, revealing that the HD attack maintains a low miss rate with improved performance as compared to the performance and miss-rate attained by the full-duplex attack
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
A Survey on Security Issues of 5G NR: Perspective of Artificial Dust and Artificial Rain
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Manish Sabraj
Abstract:
5G NR (New Radio) incorporates concepts of novel technologies such as spectrum sharing, D2D communication, UDN, and massive MIMO. However, providing security and identifying the security threats to these technologies occupies the prime concern. This paper intends to provide an ample survey of security issues and their countermeasures encompassed in the technologies of 5G NR. Further, security conc…
▽ More
5G NR (New Radio) incorporates concepts of novel technologies such as spectrum sharing, D2D communication, UDN, and massive MIMO. However, providing security and identifying the security threats to these technologies occupies the prime concern. This paper intends to provide an ample survey of security issues and their countermeasures encompassed in the technologies of 5G NR. Further, security concerns of each technology are defined mathematically. Thereby defining the impact on the factors of security. Moreover, a methodology is developed in which the influence on security due to artificially generated rain and artificially generated dust on the wireless communication network is studied. By doing so, an attacking scenario is identified, where a half-duplex attack in D2D communication is attained. Half-duplex attack specifies the attack solely on the downlink to spoof the allocated resources, with reduced miss-rate. Thus, ultra-reliable and adequate advances are required to be addressed to remove the obstacles that create a hindrance in achieving the secured and authenticated communicating network
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
The visualization of future generation Wireless Communication Network WCN redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum sharing, D2D Device to…
▽ More
The visualization of future generation Wireless Communication Network WCN redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum sharing, D2D Device to Device communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poissons distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
General Solution of Second Order Linear Ordinary Differential Equation
Authors:
Rajnish Kumar Jha
Abstract:
In this paper we present a direct formula for the solution of the general second order linear ordinary differential equation as our main result such that the parameters required for the formula are determined using another differential equation, which happens to be a Riccati Equation. We also derive other results based on the main result which include special cases for the concerned differential e…
▽ More
In this paper we present a direct formula for the solution of the general second order linear ordinary differential equation as our main result such that the parameters required for the formula are determined using another differential equation, which happens to be a Riccati Equation. We also derive other results based on the main result which include special cases for the concerned differential equation with variable coefficients, formula for solution of concerned differential equation with constant coefficients and formula for the solution of the concerned differential equation with one complimentary solution known.
△ Less
Submitted 10 January, 2021;
originally announced January 2021.
-
Machine Learning Approaches to Real Estate Market Prediction Problem: A Case Study
Authors:
Shashi Bhushan Jha,
Vijay Pandey,
Rajesh Kumar Jha,
Radu F. Babiceanu
Abstract:
Home sale prices are formed given the transaction actors economic interests, which include government, real estate dealers, and the general public who buy or sell properties. Generating an accurate property price prediction model is a major challenge for the real estate market. This work develops a property price classification model using a ten year actual dataset, from January 2010 to November 2…
▽ More
Home sale prices are formed given the transaction actors economic interests, which include government, real estate dealers, and the general public who buy or sell properties. Generating an accurate property price prediction model is a major challenge for the real estate market. This work develops a property price classification model using a ten year actual dataset, from January 2010 to November 2019. The real estate dataset is publicly available and was retrieved from Volusia County Property Appraiser of Florida website. In addition, socio-economic factors such as Gross Domestic Product, Consumer Price Index, Producer Price Index, House Price Index, and Effective Federal Funds Rate are collected and used in the prediction model. To solve this case study problem, several powerful machine learning algorithms, namely, Logistic Regression, Random Forest, Voting Classifier, and XGBoost, are employed. They are integrated with target encoding to develop an accurate property sale price prediction model with the aim to predict whether the closing sale price is greater than or less than the listing sale price. To assess the performance of the models, the accuracy, precision, recall, classification F1 score, and error rate of the models are determined. Among the four studied machine learning algorithms, XGBoost delivers superior results and robustness of the model compared to other models. The developed model can facilitate real estate investors, mortgage lenders and financial institutions to make better informed decisions.
△ Less
Submitted 22 August, 2020;
originally announced August 2020.
-
Housing Market Prediction Problem using Different Machine Learning Algorithms: A Case Study
Authors:
Shashi Bhushan Jha,
Radu F. Babiceanu,
Vijay Pandey,
Rajesh Kumar Jha
Abstract:
Developing an accurate prediction model for housing prices is always needed for socio-economic development and well-being of citizens. In this paper, a diverse set of machine learning algorithms such as XGBoost, CatBoost, Random Forest, Lasso, Voting Regressor, and others, are being employed to predict the housing prices using public available datasets. The housing datasets of 62,723 records from…
▽ More
Developing an accurate prediction model for housing prices is always needed for socio-economic development and well-being of citizens. In this paper, a diverse set of machine learning algorithms such as XGBoost, CatBoost, Random Forest, Lasso, Voting Regressor, and others, are being employed to predict the housing prices using public available datasets. The housing datasets of 62,723 records from January 2015 to November 2019 are obtained from Florida Volusia County Property Appraiser website. The records are publicly available and include the real estate or economic database, maps, and other associated information. The database is usually updated weekly according to the State of Florida regulations. Then, the housing price prediction models using machine learning techniques are developed and their regression model performances are compared. Finally, an improved housing price prediction model for assisting the housing market is proposed. Particularly, a house seller or buyer, or a real estate broker can get insight in making better-informed decisions considering the housing price prediction. The empirical results illustrate that based on prediction model performance, Coefficient of Determination (R2), Mean Square Error (MSE), Mean Absolute Error (MAE), and computational time, the XGBoost algorithm performs superior to the other models to predict the housing price.
△ Less
Submitted 17 June, 2020;
originally announced June 2020.
-
A Survey on Software Defined Networking: Architecture for Next Generation Network
Authors:
Sanjeev Singh,
Rakesh Kumar Jha
Abstract:
The evolution of software defined networking (SDN) has played a significant role in the development of next-generation networks (NGN). SDN as a programmable network having service provisioning on the fly has induced a keen interest both in academic world and industry. In this article, a comprehensive survey is presented on SDN advancement over conventional network. The paper covers historical evol…
▽ More
The evolution of software defined networking (SDN) has played a significant role in the development of next-generation networks (NGN). SDN as a programmable network having service provisioning on the fly has induced a keen interest both in academic world and industry. In this article, a comprehensive survey is presented on SDN advancement over conventional network. The paper covers historical evolution in relation to SDN, functional architecture of the SDN and its related technologies, and OpenFlow standards/protocols, including the basic concept of interfacing of OpenFlow with network elements (NEs) such as optical switches. In addition a selective architecture survey has been conducted. Our proposed architecture on software defined heterogeneous network, points towards new technology enabling the opening of new vistas in the domain of network technology, which will facilitate in handling of huge internet traffic and helps infrastructure and service providers to customize their resources dynamically. Besides, current research projects and various activities as being carried out to standardize SDN as NGN by different standard development organizations (SODs) have been duly elaborated to judge how this technology moves towards standardization.
△ Less
Submitted 27 January, 2020;
originally announced January 2020.
-
Sector-Based Radio Resource Allocation (SBRRA) Algorithm for Better Quality of Service and Experience in Device-to-Device (D2D) Communication
Authors:
Pimmy Gandotra,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
The mounting content sharing among users has resulted in a considerable rise in wireless data traffic, pressurizing the cellular networks to undergo a suitable upheaval. A competent technology of the fifth-generation networks (5G) for efficiently supporting proximity-based applications is Device-to-Device (D2D) communication, underlaying cellular networks. Significant advances have been made till…
▽ More
The mounting content sharing among users has resulted in a considerable rise in wireless data traffic, pressurizing the cellular networks to undergo a suitable upheaval. A competent technology of the fifth-generation networks (5G) for efficiently supporting proximity-based applications is Device-to-Device (D2D) communication, underlaying cellular networks. Significant advances have been made till date, for allocating resources to D2D users in cellular networks, such that sharing of spectral resources between cellular and D2D users is carried out in a coordinated manner. In this paper, a sector-based radio resource allocation (SBRRA) algorithm for resource block allocation to D2D pairs has been proposed, where the number of resource blocks (RBs) is allocated to each D2D pair in an adaptive manner, based on the demanded application by each pair. Different applications demand a varying number of RBs, in accordance with their priority. This algorithm focusses on the use of sectored antennas at the base station, for a better performance and low complexity. Extensive simulations are carried out, considering real-time scenario, for ensuring satisfactory Quality of Service (QoS) and Quality of Experience (QoE) by the users. The efficiency of the proposed scheme is proved by comparing it with the RB allocation using Hidden Markov Model (HMM).
△ Less
Submitted 21 January, 2018;
originally announced January 2018.
-
Device-to-Device Communication in Cellular Networks: A Survey
Authors:
Pimmy Gandotra,
Rakesh Kumar Jha
Abstract:
A constant need to increase the network capacity for meeting the growing demands of the subscribers has led to the evolution of cellular communication networks from the first generation (1G) to the fifth generation (5G). There will be billions of connected devices in the near future. Such a large number of connections are expected to be heterogeneous in nature, demanding higher data rates, lesser…
▽ More
A constant need to increase the network capacity for meeting the growing demands of the subscribers has led to the evolution of cellular communication networks from the first generation (1G) to the fifth generation (5G). There will be billions of connected devices in the near future. Such a large number of connections are expected to be heterogeneous in nature, demanding higher data rates, lesser delays, enhanced system capacity and superior throughput. The available spectrum resources are limited and need to be flexibly used by the mobile network operators (MNOs) to cope with the rising demands. An emerging facilitator of the upcoming high data rate demanding next generation networks (NGNs) is device-to-device (D2D) communication. An extensive survey on device-to-device (D2D) communication has been presented in this paper, including the plus points it offers, the key open issues associated with it like peer discovery, resource allocation etc, demanding special attention of the research community, some of its integrant technologies like millimeter wave D2D (mmWave), ultra dense networks (UDNs), cognitive D2D, handover procedure in D2D and its numerous use cases. Architecture is suggested aiming to fulfill all the subscriber demands in an optimal manner. The Appendix mentions some ongoing standardization activities and research projects of D2D communication.
△ Less
Submitted 18 June, 2016;
originally announced June 2016.
-
Resource Allocation in Mobile WiMAX Network: An Optimal Approach
Authors:
Rakesh Kumar Jha,
Upena D Dalal,
A. Vishal Wankhade
Abstract:
In the last few years there has been significant growth in the area of wireless communication. IEEE 802.16/WiMAX is the network which is designed for providing high speed wide area broadband wireless access; WiMAX is an emerging wireless technology for creating multi-hop Mesh network. Future generation networks will be characterized by variable and high data rates, Quality of Services (QoS), seaml…
▽ More
In the last few years there has been significant growth in the area of wireless communication. IEEE 802.16/WiMAX is the network which is designed for providing high speed wide area broadband wireless access; WiMAX is an emerging wireless technology for creating multi-hop Mesh network. Future generation networks will be characterized by variable and high data rates, Quality of Services (QoS), seamless mobility both within a network and between networks of different technologies and service providers. A technology is developed to accomplish these necessities is regular by IEEE, is 802.16, also called as WiMAX (Worldwide Interoperability for Microwave Access). This architecture aims to apply Long range connectivity, High data rates, High security, Low power utilization and Excellent Quality of Services and squat deployment costs to a wireless access technology on a metropolitan level. In this paper we have observed the performance analysis of location based resource allocation for WiMAX and WLAN-WiMAX client and in second phase we observed the rate-adaptive algorithms. We know that base station (BS) is observed the ranging first for all subscribers then established the link between them and in final phase they will allocate the resource with Subcarriers allocation according to the demand (UL) i.e. video, voice and data application. We propose linear approach, Active-Set optimization and Genetic Algorithm for Resource Allocation in downlink Mobile WiMAX networks. Purpose of proposed algorithms is to optimize total throughput. Simulation results show that Genetic Algorithm and Active-Set algorithm performs better than previous methods in terms of higher capacities but GA have high complexity then active set.
△ Less
Submitted 8 November, 2012;
originally announced November 2012.