scispace - formally typeset
Search or ask a question
Book ChapterDOI

Social Aware Cognitive Radio Networks: Effectiveness of Social Networks as a Strategic Tool for Organizational Business Management

TL;DR: This chapter delves into the cognitive radio (CR) and its social relations and makes sufficient exploits in establishing a scheme that will be based on social-based cooperative sensing scheme (SBC).
Abstract: The mobile networks seem to have a steady future in the direction of the recent emergence of socially aware cognitive mobile networks. Their style and design are specifically made in improving shared spectrum space access, in cooperative spectrum sensing, and in enhancing device-to-device communications. Socially aware mobile networks do have enough potential to amass sufficient returns in the efficacy of the spectrum and also to march and gain a considerable amount of increase in the capacity of the network. Even though there are lot of gains in its potency to be reaped yet, still there seems to be enough challenges that are both businessand technical-related that have to be taken care of. This chapter delves into the cognitive radio (CR) and its social relations and also makes sufficient exploits in establishing a scheme that will be based on social-based cooperative sensing scheme (SBC).
Citations
More filters
Book ChapterDOI
01 Jan 2019
TL;DR: It is found that cooperative spectrum sensing is not only advantageous but is also essential to avoid interference with any primary network users, and a dynamic technique called CUSUM algorithm is devised.
Abstract: Cognitive radio systems require the absorption of cooperative spectrum sensing among cognitive network users to increase the reliability of detection. We have found that cooperative spectrum sensing is not only advantageous but is also essential to avoid interference with any primary network users. Interference by licensed users becomes a chief concern and issue, which affects primary as well as secondary users leading to restrictions in spectrum sensing in cognitive radios. Cognitive radio spectrum sensing ability to identify and make use of vacant spaces in the spectrum without causing any interference to the primary user is elaborately studied. An overview about spectrum sensing is given, and an effective system model based on conventional and cooperative sensing model is proposed. It is reviewed along with various cooperative handover factors, and a dynamic technique called CUSUM algorithm is devised. The efficiency of the proposed cooperative CUSUM spectrum sensing algorithm performs better than existing optimal rules based on a single observation spectrum sensing techniques under cooperative networks.

46 citations

Book ChapterDOI
01 Jan 2020
TL;DR: A novel algorithm based on heat map is presented using PIR sensors in order to optimize the targeted digital advertising in shopping complexes using the PIR (pyroelectric infrared) sensors to detect the presence of people.
Abstract: For the purpose of detecting human group activity and its recognition, a novel algorithm based on heat map is presented using PIR sensors in order to optimize the targeted digital advertising in shopping complexes. Firstly, we use the PIR (pyroelectric infrared) sensors to detect the presence of people. The projected algorithm first represents trajectories of people as sequence of “heat sources” followed by the application of a thermal diffusion process to consequently generate a heat map (HM) in order to depict and illustrate the group activities. The heat maps are generated with respect to multiple factors like temporal factors such as time of day and day of week/month, cultural factors such as during festivals or other notable occasions, etc. The generated heat map brings forth an original surface fitting (SF) method, which can also be applied for identifying human group activities in academic buildings and hostel blocks. The proposed heat map can effectively retain the temporal motion knowledge of the crowd of humans, and the proposed surface fitting can efficiently fetch the features of the heat map for activity discovery and perception. By using heat maps in targeted digital advertising, signs and billboards can be optimized.

13 citations

Proceedings ArticleDOI
27 Oct 2020
TL;DR: In this article, the impact of the higher setup outside the shell model space and the inactive center which included Tassie Model (TM) to discuss the Longitudinal C2 electron scattering form factors for the nuclei: 116Sn, 92Mo,90Zr,39K and 32S, which calculated for nuclei under consideration, are compared with those of experimental data.
Abstract: In this work, we determined the electron dispersing structure factors, just as the vitality levels of certain cores. The computation of electron dispersing structure factors needs numerous issues to be remembered for request to make these figures attainable and quick in time in light of enormous measure of terms speak to arithmetic, quantum mechanical speculations, atomic shell model hypotheses and equations. In the current work, we examined the impacts of the higher setup outside the shell model space and the inactive center which included Tassie Model (TM) to discuss the Longitudinal C2 electron scattering form factors for the nuclei: 116Sn, 92Mo,90Zr ,39K and 32S, which calculated for nuclei under consideration, are compared with those of experimental data. The HO and SKX possibilities have been utilized to compute the wave elements of outspread single-molecule framework components. Some hypothetical vitality levels of the 52Cr, 32S and 181Ta nuclei are calculated compared with their experimental data. The shell model for windows code NuShellX@MSU has been used in this study.This article is being retracted because it contains substantial overlap with a manuscript submitted to Papers in Physics by Shamil Radhi and ultimately not published, under the supervision of Professor Dr. Khalid Salih Jassim at the University of Babylon, College of Education for Pure Sciences. In addition, the name and affiliation of K. Praghash was used without their knowledge or consent. AIP Publishing has a strong commitment to preserving the integrity of the scientific record, and given the extent of the overlap and the failure to properly credit the original source, this article has been retracted on August 16, 2021.

10 citations

Book ChapterDOI
01 Jan 2020
TL;DR: In this paper, a predictive analytics with machine learning framework is used to analyze big data for predicting future complications in patients with diabetes. But, the authors focus on predictive analytics for intrinsic information extraction.
Abstract: Due to the rapid adoption of Information Technology (IT) in healthcare systems, health data has grown exponentially and is available in different forms. Data mining and pattern extraction are challenging with such a quickly increasing amount of data, in terms of both information and time. A promising computing trend known as Big Data can help. Big Data combines large-scale computing with machine learning techniques to build predictive analytics for intrinsic information extraction. Cloud computing has emerged as a service-oriented computing model for processing large volumes of rapidly growing data at a faster scale, which is a requirement for Big Data computing. Big Data frameworks Hadoop and Spark can be used along with machine learning techniques. This chapter focuses on predictive analytics with machine learning to analyze Big Data for predicting future complications in patients with diabetes.

7 citations

References
More filters
Journal ArticleDOI
TL;DR: The SpecPSO is proposed for optimizing handovers using supervised machine learning technique for performing dynamic handover by adapting to the environment and make smart decisions compared to the traditional cooperative spectrum sensing (CSS) techniques.
Abstract: Cognitive communication model perform the investigation and surveillance of spectrum in cognitive radio networks abetment in advertent primary users (PUs) and in turn help in allocation of transmission space for secondary users (SUs). In effective performance of regulation of wireless channel handover strategy in cognitive computing systems, new computing models are desired in operating set of tasks to process business model, and interact naturally with humans or machine rather being programmed. Cognitive wireless network are trained via artificial intelligence (AI) and machine learning (ML) algorithms for dynamic processing of spectrum handovers. They assist human experts in making enhanced decisions by penetrating into the complexity of the handovers. This paper focuses on learning and reasoning features of cognitive radio (CR) by analyzing primary user (PU) and secondary user (SU) data communication using home location register (HLR) and visitor location register (VLR) database respectively. The SpecPSO is proposed for optimizing handovers using supervised machine learning technique for performing dynamic handover by adapting to the environment and make smart decisions compared to the traditional cooperative spectrum sensing (CSS) techniques.

287 citations

Journal ArticleDOI
TL;DR: It is shown that if the network includes a strongly connected subnetwork containing mistrust, which influences the rest of the network, then no opinion clustering is possible when that subnetwork is not structurally balanced; all of the opinions become neutralized in the end.
Abstract: Structural balance theory has been developed in sociology and psychology to explain how interacting agents, for example, countries, political parties, opinionated individuals, with mixed trust and mistrust relationships evolve into polarized camps. Recent results have shown that structural balance is necessary for polarization in networks with fixed, strongly connected neighbor relationships when the opinion dynamics are described by DeGroot-type averaging rules. We develop this line of research in this paper in two steps. First, we consider fixed, not necessarily strongly connected, neighbor relationships. It is shown that if the network includes a strongly connected subnetwork containing mistrust, which influences the rest of the network, then no opinion clustering is possible when that subnetwork is not structurally balanced; all of the opinions become neutralized in the end. In contrast, it is shown that when that subnetwork is indeed structurally balanced, the agents of the subnetwork evolve into two polarized camps and the opinions of all other agents in the network spread between these two polarized opinions. Second, we consider time-varying neighbor relationships. We show that the opinion separation criteria carry over if the conditions for fixed graphs are extended to joint graphs. The results are developed for both discrete-time and continuous-time models.

210 citations

Journal ArticleDOI
TL;DR: This work extends the original similarity to the signed similarity based on the social balance theory and proposes a multiobjective evolutionary algorithm, called MEAs-SN, which can detect overlapping communities directly and switch between different representations during the evolutionary process.
Abstract: Various types of social relationships, such as friends and foes, can be represented as signed social networks (SNs) that contain both positive and negative links. Although many community detection (CD) algorithms have been proposed, most of them were designed primarily for networks containing only positive links. Thus, it is important to design CD algorithms which can handle large-scale SNs. To this purpose, we first extend the original similarity to the signed similarity based on the social balance theory. Then, based on the signed similarity and the natural contradiction between positive and negative links, two objective functions are designed to model the problem of detecting communities in SNs as a multiobjective problem. Afterward, we propose a multiobjective evolutionary algorithm, called MEAsSN. In MEAs-SN, to overcome the defects of direct and indirect representations for communities, a direct and indirect combined representation is designed. Attributing to this representation, MEAs-SN can switch between different representations during the evolutionary process. As a result, MEAs-SN can benefit from both representations. Moreover, owing to this representation, MEAs-SN can also detect overlapping communities directly. In the experiments, both benchmark problems and large-scale synthetic networks generated by various parameter settings are used to validate the performance of MEAs-SN. The experimental results show the effectiveness and efficacy of MEAs-SN on networks with 1000, 5000, and 10000 nodes and also in various noisy situations. A thorough comparison is also made between MEAs-SN and three existing algorithms, and the results show that MEAs-SN outperforms other algorithms.

201 citations

Journal ArticleDOI
TL;DR: There is a continuing need for increased capacity for military applications, especially in network-centric operational concepts that promote the use of information as fundamental for gaining superiority on the battlefield, and free-space optical communications has the potential to meet these emerging military needs by offering dramatic increases in capacity.
Abstract: There is a continuing need for increased capacity for military applications, especially in network-centric operational concepts that promote the use of information as fundamental for gaining superiority on the battlefield. As an example, the access to, and distribution of, sensor data is a major tenet of network-centric warfare and yet radio frequency (RF) links will struggle to provide the needed capacity. Free-space optical communications (FSOC) has the potential to meet these emerging military needs by offering dramatic increases in capacity. However, there are many technical challenges al multiple layers of the communications protocol stack. This article describes these challenges and discusses some mitigation approaches to provide a path to realizing this capability on the battlefield

198 citations

Journal ArticleDOI
TL;DR: An overview of the military MANET problem space is provided, describing the ideal military MANet solution, and several deficiencies are highlighted that exist between MANET technologies and the desired capability.
Abstract: Mobile ad hoc networks (MANETs) are considered by many as fundamental to realizing the global information grid (GIG) and the vision of network-centric warfare. Indeed, a fully realized MANET would be powerful in enabling highly mobile, highly responsive, and quickly deployable tactical forces. However, significant technical challenges remain before this realization is viable. Addressing these deficiencies is a significant task that will require the invention and adoption of new technology. The goal of this article is not to declare these capabilities impossible to achieve. Rather, it is to manage the expectation of the capabilities achievable in the foreseeable future through edification on the technical difficulties standing between current technology and the desired capabilities. This article provides an overview of the military MANET problem space, describing the ideal military MANET solution. Several deficiencies are highlighted that exist between MANET technologies and the desired capability. Identified technical issues include system-level architecture, routing (both interior and exterior), management, security, and medium access control (MAC), with an emphasis on the former two areas

167 citations