This book constitutes the refereed post-conference proceedings of the 18th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2021, which was held in November 2021. The conference was held virtually due to the COVID-19 pandemic.The 37 full pape
Ubiquitous Communications and Network Computing: 4th EAI International Conference, UBICNET 2021, Virtual Event, March 2021, Proceedings
✍ Scribed by Navin Kumar, M. Vinodhini, Ranga Rao Venkatesha Prasad
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 246
- Series
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 383
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network Computing, UBICNET 2021, held in March 2021. Due to COVID-19 pandemic the conference was held virtually.
The 17 full papers were selected from 59 submissions and are basically arranged in different sessions on 5G networks, millimeter wave communication systems and emerging applications; quantum communication, IoT and emerging applications; data analytics and cloud computing; artificial neural network, machine learning and emerging applications.
✦ Table of Contents
Preface
Organization
Contents
5G Networks, Millimeter Wave Communication Systems and Emerging Applications
Analysis of Generic Routing Encapsulation (GRE) over IP Security (IPSec) VPN Tunneling in IPv6 Network
1 Introduction
2 Related Works
3 Methodology
4 Implementation
4.1 Graphical Networking Simulator (GNS3)
4.2 Design and Analysis in GNS3
5 Results and Analysis
5.1 Response Time
5.2 Throughput
5.3 Packet Analysing
6 Conclusions
References
Mobility Management Based Mode Selection for the Next Generation Network
1 Introduction
2 Mobility Management in Cellular Network
2.1 Relevant and Recent Work
2.2 Mobility Management Model and Architecture
3 Proposed Mode Selection Method
4 Mode Selection Algorithm
4.1 Model Formulation with Mobility Management
4.2 Delay
4.3 Energy
5 Simulation Setup
6 Result
7 Conclusion
References
Specification of a Framework, Fully Distributed, for the Management of All Types of Data and the Services Close to Users
1 Introduction
2 Releated Work
2.1 Multi-scale Systems
2.2 Peer-to-Peer (P2P) Networks
3 GRAPP&S
3.1 Model and Definitions
3.2 Elements of the GRAPP&S Architecture
3.3 Community Management
3.4 Node Management
4 Operations in GRAPP&S
4.1 Storage and Indexing
4.2 Basic Routing
4.3 Data Search
4.4 Data Transfer in GRAPP&S
5 Future Work
5.1 Development of a Prototype on Pastry
5.2 Resource Redistribution with GAIA
5.3 Future Application of Our Architecture
6 Conclusions
References
A Leading Edge Detection Algorithm for UWB Based Indoor Positioning Systems
1 Introduction
2 System Model
2.1 Proposed ILED Algorithm
2.2 Trilateration
2.3 System Simulation
3 Results
3.1 Ranging Accuracy
3.2 Positioning Accuracy
3.3 Influence of Number of Anchor Nodes on the Positioning Accuracy
4 Conclusion
References
Designing Multiband Millimeter Wave Antenna for 5G and Beyond
1 Introduction
2 Design of Antenna
2.1 Theoretical Calculation of the Basic Patch
2.2 Dual Band Design
2.3 Multiband Design
2.4 Antenna Array Design
3 Results and Discussion
4 Conclusion
References
Analog Beamforming mm-Wave Two User Non-Orthogonal Multiple Access
1 Introduction
2 mm-wave Channel Model
3 System Model and Problem Formulation
3.1 System Model
3.2 Problem Formulation
4 Simulation Results
5 Conclusion
References
Quantum Communication, IoT and Emerging Applications
A Novel Multi-User Quantum Communication System Using CDMA and Quantum Fourier Transform
1 Introduction
1.1 Qubit and Quantum Communication
1.2 Multi-User Quantum Communication
2 Proposed Multi-User Quantum Communication System Using QFT
2.1 Transmitter Side Modulation
2.2 Receiver Side Demodulation
3 Mathematical Example for Single User System
3.1 CDMA Encoding
3.2 QFT
3.3 IQFT
3.4 CDMA Decoding
3.5 Measurement and User Bit Recovery
4 Simulation of 2 User System
5 Advantages of the Proposed System
6 Results and Discussion
7 Conclusion and Future Works
References
Qubit Share Multiple Access Scheme (QSMA)
1 Introduction
1.1 Qubits and Measurement
1.2 Quantum Gates and Circuits
1.3 Quantum Fourier Transform (QFT)
1.4 Inverse Quantum Fourier Transform (IQFT)
1.5 Challenges in Multi-user Quantum Communication and Quantum Internet
1.6 The Paper is Arranged as Follows
2 Multi-user Quantum Communication Using QSMA
2.1 Qubit Share Multiple Access Scheme (QSMA)
2.2 Super Dense Coding
3 Proposed Qubit Share Multiple Access Scheme for 2-Users
3.1 Transmitter Side Modulation
3.2 Receiver Side Demodulation
3.3 Superdense Decoding
3.4 Measurement and User Bit Recovery
4 Mathematical Example for 2-User System
4.1 Superdense Encoding
4.2 QFT
4.3 IQFT
4.4 Superdense Decoding
4.5 Measurement and User Bit Recovery
5 Simulation of 2 User System
6 Advantages of the Proposed System
7 Results and Discussion
8 Conclusion and Future Works
References
Design of CoAP Based Model for Monitoring and Controlling Physical Parameters
1 Introduction
2 Related Work
3 CoAP Protocol
4 Methodology
4.1 High-Level Design
4.2 Low-Level Design
4.3 Configuring TCP/IP Lite Stack
4.4 Configuring CoAP Library
4.5 Development of the Firmware
5 Results and Discussion
5.1 PING
5.2 DISCOVER
5.3 Monitoring the IR Sensor
5.4 Monitoring and Controlling the DC Motor
6 Conclusion and Future Work
References
Hardware Trojan Detection Using XGBoost Algorithm for IoT with Data Augmentation Using CTGAN and SMOTE
1 Introduction
2 Related Works
3 Hardware Trojans and Its Types
3.1 Threat Model
3.2 Trojans in IoT
3.3 The Types of Trojans Considered for Testing
4 Methodology
4.1 Feature Extraction
4.2 Handling Data Imbalance Problem
5 Results
6 Conclusion
References
Data Analytics and Cloud Computing
Predictive Modeling of the Spread of COVID-19: The Case of India
1 Introduction
2 Related Work
2.1 Data Analysis
2.2 Mathematical Modeling
2.3 Predictive Modeling
3 Exploratory Data Analysis
3.1 Data Description
3.2 Increase in Cases
3.3 Growth Rates
3.4 Impact of Lockdown
4 Predictive Modelling
4.1 Time Series Analysis
4.2 Deep Learning
4.3 Evaluation of Predictive Models
4.4 Model Validation
5 Conclusion
References
ASIF: An Internal Representation Suitable for Program Transformation and Parallel Conversion
1 Introduction
2 Related Work
3 ASIF
3.1 Asterix Transformation and Parallelization Pipeline
3.2 Rationale for ASIF
3.3 ASIF Instruction Formats
3.4 ASIF Annotation Formats
4 ASIF as an Enabler of Transformation and Parallelization
4.1 Code Motion
4.2 Data Dependence
4.3 Loop Dependence
4.4 If Conversion
4.5 Vectorization
5 Analysis
6 Results
7 Conclusion
References
Performance Comparison of VM Allocation and Selection Policies in an Integrated Fog-Cloud Environment
1 Introduction
2 Related Works
3 VM Placement
4 System Model and Problem Formulation
5 Performance Evaluation
5.1 Experimental Setup
5.2 Real Time Workloads - Google Trace and PlanetLab
5.3 Performance Comparison
6 Conclusion
References
Artificial Neural Network, Machine Learning and Emerging Applications
Fraud Detection in Credit Card Transaction Using ANN and SVM
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Used
3.2 Data Splitting
3.3 Data Scaling and Balancing
3.4 Feature Selection and Model Building
3.5 Model Validation
4 Evaluation Metrics
5 Results and Discussions
6 Conclusion
References
Detection of Leukemia Using K-Means Clustering and Machine Learning
1 Introduction
2 Few Recent and Relevant Work
3 Typical Image Processing and Input Database
3.1 Typical Image Processing
3.2 Input Database Images (IDB)
4 Proposed Algorithm
5 Classification
6 Results and Discussion
7 Conclusion
References
An Analysis and Implementation of a Deep Learning Model for Image Steganography
1 Introduction
2 Methodology
2.1 Convolutional Neural Networks
2.2 Generalized Architecture for Steganography
3 Analysis and Results
3.1 Evaluation Metrics
3.2 Performance Analysis of the Steganographic Model
4 Conclusion and Future Scope
References
Abstractive Text Summarization on Templatized Data
1 Introduction
2 Literature Review
2.1 Concept Review
2.2 Review of Previous Research Findings
3 System Design and Implementation
4 Results
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the revised selected papers of the 9th International Conference on Networked Systems, NETYS 2021, held virtually in May 2021.The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 32 submissions. The papers are organized in the f
<span>This proceedings constitutes the refereed proceedings of the 17</span><span><sup>th</sup></span><span> International Conference on Communications and Networking, ChinaCom 2022, held in November 19-20, 2022. Due to COVID-19 pandemic the conference was held virtually.</span><p><span> The 31 full
<span>This book constitutes the refereed post-conference proceedings of the 12</span><span><sup>th</sup></span><span> International Conference on Broadband Communications, Networks, and Systems, Broadnets 2021, which took place in October 2021. Due to COVID-19 pandemic the conference was held virtua
<span>This book constitutes the refereed post-conference proceedings of the 13</span><span><sup>th</sup></span><span> EAI International Conference on Broadband Communications, Networks, and Systems, Broadnets 2022, which took place in March 2023. Due to COVID-19 pandemic the conference was held virt