๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Cognitive Radio Oriented Wireless Networks and Wireless Internet (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

โœ Scribed by Huilong Jin (editor), Chungang Liu (editor), Al-Sakib Khan Pathan (editor), Zubair Md. Fadlullah (editor), Salimur Choudhury (editor)


Year
2022
Tongue
English
Leaves
369
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book constitutes the refereed post-conference proceedings of the 16th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2021, held in December 2021, and the 14th International Conference on Wireless Internet, WiCON 2021, held in November 2021. Due to COVID-19 pandemic the conferences were held virtually.
The 18 full papers of CROWNCOM 2021 were selected from 40 submissions and present new research results and perspectives of cognitive radio systems for 5G and beyond 5G networks, big data technologies, such as storage, search and management. WiCON 2021 presents 7 papers covering topics ranging from technology issues to new
applicationsand test-bed developments, especially focusing onnext-generation wireless Internet, 5G, 6G, IoT, Industrial IoT, Healthcare IoT, and related methodologies.

โœฆ Table of Contents


Preface
Organization
Preface
Organization
Contents
Cognitive Radio Systems (CROWNCOM 2021)
Spectrum Sensing Performance of Cognitive Radio Optimized by Soft Decision Fusion Threshold
Abstract
1 Introduction
2 Related work
2.1 Cognitive Radio Model
2.2 Research Status of Spectrum Sensing
3 Research Methodology
3.1 Spectrum Sensing Technology and Algorithm
3.2 Soft Decision Fusion Threshold Optimization
3.3 Model Performance Testing
3.4 Model Parameter Settings
4 Results and Analysis
4.1 Spectrum Sensing Performance Analysis
4.2 Model Performance Analysis Under Different Criteria
4.3 Minimum Error Probability in Different Scenarios
4.4 Different Spectrum Maximum Throughput
5 Significance and Influence
6 Conclusion
References
Methodology for Characterizing Spectrum Data by Combining Quantitative and Qualitative Information
Abstract
1 Introduction
2 Background and Related Work
2.1 Spectrum Measurements
2.2 Analysis with Spectrograms
2.3 Contextual Information
2.4 Related Work
3 Approach
3.1 Quantitative Analysis
3.2 Modeling of Qualitative Information
3.3 Combining Quantitative Analysis Results with Qualitative Information
4 Results
5 Conclusion and Future Work
References
Computationally Efficient Look-up-Tables for Behavioral Modelling and Digital Pre-distortion of Multi-standard Wireless Systems
1 Introduction
2 Background
2.1 Nonlinear Power Amplifiers with Memory Effects
2.2 Discrete Dynamic Nonlinear Models and Training Algorithm
2.3 Related Work
3 Multi-standard Behavioural Modeling
3.1 Data Collection
3.2 AM-AM Distortion Characteristics as Guide to Coefficients
3.3 Multi-standard Behavioural Models
3.4 Behavioural Model Validation
4 LUT-Based Multi-standard DPD Transceiver
4.1 DPD Coefficient Estimation
4.2 Hardware Software Co-design
5 Hardware Implementation and Experimental Validation
5.1 Experiment: DPD Performance Comparison with Different Standard's Training Signals
5.2 Experiment: DPD Performance Comparison Along Different Power Levels
6 Conclusions
References
Metaheuristic Optimisation for Radio Interface-Constrained Channel Assignment in a Hybrid Wi-Fiโ€“Dynamic Spectrum Access Wireless Mesh Network
1 Introduction
1.1 Dynamic Spectrum Access
1.2 Metaheuristic Algorithms for Optimisation
2 Related Work
3 Problem Formulation
3.1 Network Model
3.2 Problem Statement and Motivation
3.3 Assumptions
3.4 Mathematical Model
4 Methodology
4.1 Generating Feasible Candidate Solutions
4.2 Optimisation
5 Results and Discussion
6 Conclusion
References
Performance of Cooperative Spectrum Sensing Based on Random Transition of the Primary User in Laplacian Noise
1 Introduction
2 System Model
3 Performance Analysis
3.1 CSS Based on Energy Detection (CSS-ED)
3.2 CSS Based on i-AVCD (CSS-i-AVCD)
4 Results
5 Conclusion
References
Assessment of Spectrum Management Approaches in Offshore Private Industrial 5G Networks
Abstract
1 Introduction
2 Overview of Spectrum Management Approaches
3 Offshore Private Industrial Networks
3.1 Applications and Use Cases
3.2 Spectrum Requirements
3.3 Offshore Spectrum Regulation
4 Spectrum Management Approaches for Offshore Private Industrial Networks
4.1 UK Offshore Licenses
4.2 Norwegian Offshore Licenses
4.3 Local Licensing in Germany
4.4 US Offshore Regulation
4.5 Mobile Network Coverage on the Gulf of Finland
4.6 EU Regulation for Visiting Vessels
4.7 Role of Satellite
5 Discussion on Spectrum Options
6 Conclusions
Acknowledgment
References
An Eigenvalue Based Cooperative Spectrum Sensing for Multiuser MIMO Cognitive Radio Networks Under Correlated Fading Scenario
1 Introduction
2 System Description
2.1 A Correlated Reporting Channel Model
3 Analytical Study of the CSS for Multiuser MIMO CRNs
3.1 MIMO Energy Detection Based Local Spectrum Sensing at SU over Rayleigh Faded Scenario
3.2 Eigenvalue Based Spectrum Sensing at FC Under Correlated Rician Faded MIMO Reporting Channel
4 Performance Evaluation
5 Conclusion
References
Low-Profile Frequency Reconfigurable Patch Antennas for Cognitive Radio Applications
Abstract
1 Introduction
2 Proposed Patch Antenna Design
3 Results and Discussion
4 Conclusion
References
A Full-Duplex Multicarrier Cooperative Device-to-Device Communications System with MMSE Based RSI Cancellation
1 Introduction
2 System Model
2.1 Residual Self-interference Model
2.2 Residual Self-interference (RSI) Cancellation Schemes
3 Transmission Protocol Description
4 Performance Analysis
4.1 Cellular Uplink Outage Probability
4.2 D2D Link Outage Probability
5 Theoretical and Simulation Results
6 Conclusion
References
Realization and Simulation of Watermarking Algorithm Based on Spread Spectrum and DFT
Abstract
1 Introduction
1.1 Introduction to Digital Image Watermarking
1.2 Introduction to Spread Spectrum Communication
2 Realization and Simulation of Watermarking Algorithm Based on Spread Spectrum and DFT
2.1 Watermark Embedding Algorithm
2.2 Watermarking Extraction Algorithm
3 Simulation Results and Analysis
4 Conclusion
References
The Performance Research of LTE-A Cellular Network Based on Relay and Pass-Through D2D Technology
1 Introduction
2 System Model for the Coexistence of Direct D2D Users and Cellular Users
3 Power Distribution Method Based on Lagrangian Multiplier Method
4 Performance Analysis
5 Conclusion
References
Advanced Technology forย 5G/6G (CROWNCOM 2021)
A Survey Channel Estimation for Intelligent Reflecting Surface (IRS)
Abstract
1 Introduction
2 IRS Channel Estimation
2.1 Cascaded Channel Estimation (Fully-passive IRS)
2.2 Partial Channel Estimation (Semi-passive IRS)
2.3 Explicit Channel Estimation (IRS Elements Equipped with Some Receive RF Chains)
3 Summary
4 Future Research
5 Conclusion
Acknowledgement
References
Artificial Intelligence (CROWNCOM 2021)
Minimum Class Variance Thresholding Based on Multi-objective Optimization
Abstract
1 Introduction
2 Minimum Class Variance Thresholding Based on Multi- Objective Optimization
2.1 Theory of Multi-objective Optimization
2.2 MCVT Based on Multi-objective Optimization (MCVT-MO)
2.3 The Generalized MCVT Method
3 Contrastive Experiments and Analysis
3.1 Experiments on Synthetic Images
3.2 Experiments on Infrared Images
3.3 Experiments on Other Images
4 Conclusions
Acknowledgements
References
Pedestrian Detection Based on Deep Learning Under the Background of University Epidemic Prevention
Abstract
1 Introduction
1.1 The Development and Research Status of Pedestrian Detection Technology
1.2 Traditional Pedestrian Detection Based on Machine Learning
1.3 Pedestrian Detection Based on Deep Convolutional Neural Network
2 Overview of Deep Neural Networks
2.1 Shallow Fully Connected Network Model
2.2 Convolutional Network Mechanism
2.3 Deep Residual Network Model
3 Improved YOLOv3 Network Model
3.1 Brief Overview of YOLOv3 Algorithm
3.2 Improved YOLOv3 Network Model
4 Experimental Environment Construction
4.1 Experimental Equipment and Environment
4.2 System Specific Function Realization and Operation
4.3 Experimental Results
5 Conclusion
References
Gesture Recognition Controls Image Style Transfer Based on Improved YOLOV5s Algorithm
Abstract
1 Introduction
1.1 A Subsection Sample
2 Theoretical Foundation and Key Concepts
2.1 YOLOv5 Algorithms
2.2 Image Style Transfer
3 Gesture Recognition Controls Image Style Transfer Based on Improved Yolov5s Algorithm
3.1 Project Introduction
3.2 Improvements
4 Experiments and Results
4.1 Dataset Description
4.2 Results
5 Conclusion
References
Wireless Communication andย Network Technology forย Internet ofย Things (IoT) (CROWNCOM 2021)
Detection of Malicious Nodes Using Collaborative Neighbour Monitoring in DSA Networks
1 Introduction
2 System Model
3 Threat Model
4 Neighbour Monitoring in Cooperative Sensing
4.1 Detection Strategy and Weighted Decision Factor at the CDC
4.2 Malicious Node Localization
5 Naive Detection Approach
5.1 Naive Detection Hypothesis
5.2 Naive Detection Algorithm and Test Results
5.3 Comparison of Naive Algorithm to Cooperative Weighted Decision Detection Algorithm
6 Real World Measurements
7 Experimental Set Up
8 Results and Discussion
8.1 Simulation
8.2 Models
8.3 Algorithm - CWDDA
9 Naive Detection Approach
9.1 Limitation of the Algorithm
10 Conclusion
References
Research on Denoising Method in Pseudo-analog Video Transmission
Abstract
1 Introduction
2 Related Work
2.1 Related KMV-Cast Transmission Scheme
2.2 Wiener Filter Principle
2.3 KMV-Castโ€‰+โ€‰Wiener Filter
3 Experimental Results
4 Conclusions
Acknowledgement
References
Confidential Communications for Mobile UAV Relaying Network
1 Introduction
2 System Model and Problem Formulation
2.1 System Model
2.2 Problem Formulation
3 Problem Formulation
3.1 UAV-User Association Optimization
3.2 Transmit Power and UAV Trajectory
4 Numerical Results
5 Conclusion
References
Wireless Communications andย Networking (WICON 2021)
Implementation and Performance Analysis of Smart Attendance Checking Using BLE-Based Communications
1 Introduction
2 Related Work
3 System Features
4 Methodology
4.1 General System Architecture
4.2 Application
4.3 ESP32
4.4 Web Server
5 Results and Analysis
6 Conclusion and Future Work
References
Intra-train Wagon Wireless Channel Connectivity Analysis of Ultra Dense Node Deployments
Abstract
1 Introduction
2 Intra-wagon Wireless Channel Characterization
3 Conclusions
References
Internet ofย Things andย Smart Grids Security issues (WICON 2021)
Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things
1 Introduction
2 Related Work
2.1 Lightweight Cryptography
2.2 Blockchain
3 Methodology
3.1 Keyed-Hashing for Message Authentication (HMAC)
3.2 Authentication of Genesis Block
3.3 Authentication of Subsequent Blocks
3.4 Server
3.5 Database
4 Results and Analysis
5 Conclusions and Future Work
References
An Investigation of Vulnerabilities in Internet of Health Things
1 Introduction
1.1 Paper Roadmap
2 Medical Device Vulnerability Analysis
2.1 Vulnerability Exposure of Medical Devices
3 Motivation of Attacks and Recent Incidents
3.1 Attacker's Motivation
3.2 Recent Incidents
4 Solution Trends for Healthcare Device Cyber Attacks Considering Blockchain and Constraints
4.1 Usage of Blockchains in Internet of Health Things (IoHT)
4.2 Constraints to Use Blockchain on IoHT
5 Conclusions
References
Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape
1 Introduction
2 Background and Related Work
3 Methodology
3.1 Overview
3.2 T-Pot Installation
4 Result Analysis
4.1 Attacks Origin Breakdown
4.2 Attacks Scenario
4.3 Malware Analysis
4.4 IP Reputation
5 Conclusion
References
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids
Abstract
1 Introduction
2 Related Work
3 System Model
4 Results and Discussion
4.1 Security Analysis
4.2 Performance Evaluation
5 Conclusion and Future Work
References
Vehicular ad Hoc Networks (VANET) (WICON 2021)
SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of Vehicles
1 Introduction
1.1 Problematic and Research Motivation
1.2 Contributions and Paper Organization
2 Related Work
3 System Model
3.1 Network Model
3.2 Threat Model
3.3 UAV GPS-Spoofing Attack
3.4 Types of Signal Receptions
3.5 Security Model and Coverage Modes
4 The Proposed Approach: SAMA
4.1 Description and Motivation
4.2 The Techniques' Principles
4.3 SAMA Implemented Protocols
5 Simulation Runs and Results
5.1 Simulation Setup
5.2 Obstacles and Obstacles-Free Scenarios
5.3 Simulation Results
6 Discussion and Future Work
7 Conclusion
References
Author Index


๐Ÿ“œ SIMILAR VOLUMES


Ad Hoc Networks and Tools for IT (Lectur
โœ Wei Bao (editor), Xingliang Yuan (editor), Longxiang Gao (editor), Tom H. Luan ( ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the refereed post-conference proceedings of the 13</span><span><sup>th</sup></span><span> International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16</span><span><sup>th</sup></span><span> International Conference on Tools for Design, Im

Context-Aware Systems and Applications,
โœ Phan Cong Vinh (editor), Abdur Rakib (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the refereed post-conference proceedings of the International Conferences ICCASA and ICTCC 2020, held in November 2020 in Thai Nguyen, Vietnam. </span><p><span> The 27 revised full papers presented were carefully selected from 68 submissions. The papers of ICCASA cover a

Cognitive Radio, Mobile Communications a
โœ Mubashir Husain Rehmani, Riadh Dhaou ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>This book provides an overview of the latest research and development of new technologies for cognitive radio, mobile communications, and wireless networks. The contributors discuss the research and requirement analysis and initial standardization work towards 5G cellular systems and the capacity

Cognitive Radio-Oriented Wireless Networ
โœ Giuseppe Caso (editor), Luca De Nardis (editor), Liljana Gavrilovska (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the refereed proceedings of the 15</span><span><sup>th</sup></span><span> International Conference on Cognitive Radio-Oriented Wireless Networks, CROWNCOM 2020, held in Rome, Italy, in November 2020. Due to COVID-19 pandemic the conference was held virtually.<br> The 13 r

NETWORKING 2002: Networking Technologies
โœ M. Conti A. T. Cambell E. Gregori, E. Gregori ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking 2002 was sponsored bythe IFIP Working Groups 6.2, 6.3, and 6.8. For this reason the conference was structured into three tracks: i) Networking Technologies, Services, and Pr

Machine Learning and Cognitive Computing
โœ Krishna Kant Singh (editor), Akansha Singh (editor), Korhan Cengiz (editor), Dac ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Wiley-Scrivener ๐ŸŒ English

<p>Communication and network technology has witnessed recent rapid development and numerous information services and applications have been developed globally. These technologies have high impact on society and the way people are leading their lives. The advancement in technology has undoubtedly imp