Forthcoming articles

International Journal of Networking and Virtual Organisations

International Journal of Networking and Virtual Organisations (IJNVO)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Networking and Virtual Organisations (25 papers in press)

Regular Issues

  • A game theory approach for UAV based flying access networks   Order a copy of this article
    by Hamid GARMANI, Driss Ait Omar, Mohamed El Amrani, Mohamed Baslam, Mostafa Jourhmane 
    Abstract: In recent years, Unmanned Aerial Vehicles (UAV) ad-hoc network has been receiving enormous attention from the research community, since they represent a new potential market. One promising application is to use UAVs in Wireless communications field as a flying base station to extend coverage and to provide high-quality network connectivity. In this paper, we model and analyze the interactions in price, beaconing duration and quality of service among UAV. A full analysis of the game outcome, in terms of equilibrium price, equilibrium quality of service and equilibrium beaconing duration, is derived. Then we analyze the existence and uniqueness of the Nash equilibrium point under some conditions. Furthermore, we provide a learning algorithm that ensures convergence of the considered UAV with its unique Nash equilibrium operating point in a fast and distributed fashion. Finally, numerical investigations offer promising insights on how the game parameters should be chosen to efficiently control the game.
    Keywords: Game theory; Nash equilibrium; UAV; beaconing duration; price; QoS.

  • On the Analysis of Online and Periodic Virtual Network Embedding in Multi-Domain Environments   Order a copy of this article
    by Samuel Araujo, Fernanda Souza, Geraldo Mateus 
    Abstract: Network virtualization allows multiple virtual networks to share resources and coexist in the same physical network. This technology has been seen as a key part of future networks. The Virtual Network Embedding problem deals with the mapping of virtual network requests by selecting physical components with enough capacity to host them. Requests are processed individually upon arrival (online) or in batches (periodic) through time windows. Multi-domain networks enable resource management across heterogeneous administrative domains with independent policies and costs. Due to its high environmental impact, energy consumption is considered another challenge also in virtualization, such that providing economic mappings can reduce costs and improve the profit of infrastructure providers. This work presents an analysis on how the online and periodic approaches relate to the acceptance rate of requests and metrics including profit, energy consumption, and attendance waiting period in multi-domain environments. An integer linear programming model is used to evaluate different simulation scenarios showing that: the dynamic nature of the problem in online and periodic approaches leads to losses (rejections of requests) of up to 25% compared to the optimal offline one, larger time windows in the periodic approach increase acceptance but also result in higher waiting periods to embed an incoming request, the relation between acceptance and profit depends on the optimization goal adopted by the embedding algorithm and the relation between profit and energy savings can induce a competition among domains (different providers) able to host a VN request.
    Keywords: Optimization; Virtual Network Embedding; Multi-domain networks; Energy Saving; Online and Periodic Approaches; Simulation.

  • Dependence of Companies on Interorganizational Networks: an Analysis Beyond the Benefits Generated   Order a copy of this article
    by Leander Luiz Klein, Breno Augusto Diniz Pereira 
    Abstract: Purpose: A lot of work already was done about benefits to organizations that join interorganizational networks, but little is known about how organizations become dependent to networks. So, the purpose is to verify the drivers of company-network dependency relationship and how these are evaluated in different phases of evolution of interorganizational networks. Design/methodology/approach: A qualitative study was carried out through semi-structured interviews conducted with twenty entrepreneurs from 10 different networks that were intentionally selected. Resources dependence theory and its assumptions, as well studies about benefits or competitive factors generated by collaborative relations between companies, were used as a base to identify and define the variables of this study. Findings: The generation of the dependence of the companies happens with the evolution of the networks and with their capacity to generate competitive advantages for them. The initial stages of formation and development of networks generate benefits to the member companies but do not generate the dependence of the same ones. Research limitations/implications: The results of the work are limited to the scope of the companies studied. No generalization can be made. Discussions advances on network benefits. In this study, we reflect on how the environment dictates the dependence of the companies with the network and explains the survival of the networks. Practical implications: The empirical evidences showed that the dependence of the companies with the networks is due to several resources generated by them. The environment dictates the need for these resources and determines the need for companies to stay in networks. Originality/value: We discuss the autonomy of companies, which decreases with dependence, and gather empirical elements to conclude that the network needs to be managed as any other organization and that dependency should not be seen as something bad by the companies.
    Keywords: Small companies; Dependence; Resources; Evolution of networks; Interorganizational Networks.

  • Digitising Chinese Medicine Clinical Practice A Patient Management System   Order a copy of this article
    by Han Catherine Lin, David Phillips, Nilmini Wickramasinghe 
    Abstract: Complementary Medicine, such as Chinese Medicine (CM), has been used to treat human illness for thousands of years. While it is important to preserve its tradition, research has shown that there is a need to utilise Information Technology and System (IS/IT) to support this clinical practice. CMs unique philosophy, diagnosis, and treatment methods suggest that a more suitable synthesis should be adopted in these IS/IT developments. Extending Churchmans Inquiring System concepts, a CM Inquiring System incorporates Hegelian and Kantian inquiring systems with the support from Singerian, Lockean, and Leibnizian inquiring systems, and key concepts of Knowledge Management.rnrnDirected by a qualitative methodology with Case Study and Design Science methods, a specific CM inquiring system, a Patient Management System (PMS) prototype, was designed and constructed. It is anticipated that the PMS is a significant step in IS/IT implementation in CM.rn
    Keywords: Clinical System Chinese Medicine Patient Management System Information Technology Information Systems.

  • CWOM: a lightweight cloud-oriented workflow optimization middleware   Order a copy of this article
    by Peng Xiao 
    Abstract: In recent years, more and more workflow applications have been developed to execute on various kinds of cloud platforms. Although many cloud-based workflow management and enactment systems have been proposed, there are still many challenges when deploying and executing workflows on various kinds of real-world cloud platform. In this paper, we present a lightweight framework, namely Cloud-oriented Workflow Optimization Middleware (CWOM), which is designed for easing the work of optimizing the workflow execution efficiency as well as the work of realizing fine-grained workflow management. The proposed CWOM is implemented as a plug-in middleware that can interact with the other workflow services and therefore provide more desirable services for workflow applications. Another advantage of our CWOM is that its services are loosely coupled with other cloud services, which makes it more flexible and configurable in most of the real-world cloud platforms. To investigate the effectiveness of the proposed system, we deploy the prototype implementation of CWOM in a campus-based cloud platform, and the experimental results indicate that it can significantly improve the delivered QoS and enhance the service level offered by conventional workflow solutions.
    Keywords: cloud computing; workflow; virtual machine; performance monitor.

  • Pricing and Coordination with Contract for the Green Supply Chain of Chinese Home Appliances Industry with Retailers Promotional Efforts   Order a copy of this article
    by Ai Xu, Yijia Gao 
    Abstract: This study focuses on the decision making about the pricing issues for home appliances companies when recycle waste home appliances. We suppose three collection methods for the recycle of waste home appliances, i.e., manufacturer collection (Model M), retailer collection (Model R) and third-party collection (Model 3P). Considering the effect of retailers promotional efforts and the effective recycle behavior on the home appliances supply chain, game models are constructed respectively according to different collection methods. The optimal recycle prices for the waste home appliances and the optimal retailers promotional efforts can be determined by these models. To improve the game effectiveness, revenue and expense-sharing contract models are designed in order that both the revenues and expenses related to the manufacturing, retailing, promotion and recycle operations in the green supply chain can be allocated among all participant players, thus the profits and effectiveness of the whole supply chain can be better improved. Lastly, all the pricing and contract models are successfully tested by using the green supply chain of GREE freon-free and inverter air-conditioner as a case.
    Keywords: Pricing strategies; coordination with contract; green supply chain; promotional efforts; recycling waste home appliances; game models.

  • DSEM-SW: a data-service enhanced scientific workflow middleware for cloud computing   Order a copy of this article
    by Kun Huang, Ning Han 
    Abstract: As more and more scientific workflows have been deployed and executed in cloud environments, how to optimize the execution efficiency and quality of workflow applications has become an important issue that needs to be addressed. Although many workflow management systems have been proposed in recent years, the performance bottleneck when running scientific workflows is still the low-efficiency of data-related services. In this paper, we present a workflow-oriented optimization plug-in system, namely Data-Service Enhanced Middleware for Scientific Workflow (DSEM-SW), which provides a set of mechanisms to improve the efficiency and quality of data processing when running scientific workflows. Extensive experiments are conducted to evaluate the performance of the proposed middleware in a real-world cloud test-bed. The experimental results indicate that our DSEM-SW outperforms many existing systems in terms of different performance metrics, and can significantly improve the execution efficiency of data-intensive workflows.
    Keywords: workflow; cloud computing; resource virtualization; quality of data.

  • Reduce Memory Consumption for Internet Traffic Classification   Order a copy of this article
    by Alhamza Munther, Ali Abdulrazzaq, Mosleh Abu- Alhaj, Ghada Almukhaini 
    Abstract: Application level traffic classification is an essential requirement for stable network operation and resource management. However, classifications processing tends to face low resources when high volumes of traffic are being classified in high-speed networks in real time. Memory consumption considered to be serious issue during classification processing time. In this paper, a data reduction method proposed to decrease redundant data entry during preprocessing phase with regard to accuracy classification. In the proposed active build model random forest (ABRF) eliminates redundant data-entry by utilizing feature selection algorithm during the preprocessing phase. The proposed system successfully reduces the memory space of entire classification process. System evaluated by comparing the proposed system against four classifiers (RF, NB, SVM and C5.0) and five features selection techniques (FCBF, SFE, Chi2 and GR). DR reported excellent results amongst the NB, C5.0, and RF. The results were optimized due to the data excluding 314216 out of 774013. Moreover, C5.0 consumed less memory space due to the decreased depth of C5.0 tree model. In conclude, The DR was most effective on the RF model due to the nature of ensemble classifier.
    Keywords: Internet traffic classification; Machine learning; feature selection techniques; supervised learning; Random forest.

  • Analysis Of Routing Protocols For Software Defined Vehicular Ad Hoc Networks   Order a copy of this article
    by Annapurna P. Patil, Lalitha Chinmayee MaheshKumar Hurali 
    Abstract: With the rapid development of smart cities, the significance of Intelligent Transport Systems (ITS) has revolutionized the functioning of the modern transportation system. Vehicular Ad hoc Networks (VANETs) are trending to be the backbones of the ITS. These VANETs, which are in the family of Mobile Ad Hoc Networks (MANETs) are characterized by high mobility and dynamically changing topology, which in turn leads to frequent link breaks. With many of the open challenges in VANETs to be addressed, it is strongly observed that routing is an essential aspect of VANETs to study and experiment with, as it majorly contributes to the overall network performance. Some of the challenges that arise with respect to routing in VANETs are diminished Quality of Service (QoS), heterogeneous networks, and security threats. These issues are efficiently addressed by a networking paradigm called Software-Defined Networking (SDN). The primary goal of this study is to bring out the current state of art in SDN based routing in VANETs with the following two objectives. The first objective of this study is to summarize the merits of SDN based routing in VANETs and provide the researchers with an intricate knowledge of the SDN based routing protocols for VANETs. The second objective is to propose a novel taxonomy of such routing protocols based on the organization of the SDN controller, QoS metric, security, heterogeneity, and type of communication. Our study has conclusive analysis, which shows that the SDN based routing in VANETs has significant benefits over the traditional network-based VANETs concerning QoS, Security, and heterogeneity in the networks. This analysis would help the researchers to venture on newer and more precise implementation in the area of SDN based routing in VANETs.
    Keywords: software defined vehicular ad hoc networks; vehicular ad hoc networks; intelligent transportation systems; smart cities; software defined networking; routing; VANETs; SDN; security; heterogeneity.

  • The Effect of the Electronic Word of Mouth (EWOM) on Purchase Intention via the Brand Image as a Mediating Factor: An Empirical Study   Order a copy of this article
    by Hani Al-Dmour, Ahmad Aloqaily, Rawan Al-qaimary, Malak Al-hassan 
    Abstract: This study aims to investigate the impact of electronic word of mouth (eWOM) on the brand image and purchase intention in the telecommunication sector in Jordan. A quantitative-based approach was used for data collection, and a research model was suggested and tested empirically using a sample of 354 respondents who had experiences with the Internet and social media. Measurement items are adopted and modified from existing scales found in the relevant prior studies to fit the studys objectives. Using multiple regression analysis, the findings show that eWOM has a positive significant effect on both purchase intention and brand image; the brand image has a significant impact on purchase intention, and eWOM has a fully indirect impact on purchase intention through the brand image as a mediating factor. The current study suggested that telecommunication service providers should wisely and professionally focus on eWOM's favourable contacts to promote a brand image that will later promote the customers purchase intention.
    Keywords: Regression Analysis; eWOM; Brand Image; Purchase Intention; mobile and Internet; Jordanian telecommunication sector.

  • The increased use of WhatsApp   Order a copy of this article
    by Pith Soh Beh, Suat Chin Ng, Amanda Nikolic, Matija Radojcic, Grace Chew, Nilmini Wickramasinghe, Phil Smart 
    Abstract: Background: The aim of this study was to analyse the volume and pattern of usage, media types and message contents of a smartphone group communication app within an acute surgical unit. Methods: WhatsApp
    Keywords: Smartphone; WhatsApp®; Information science; Communication; Surgical Unit.

  • eGovernment Whole-of-Government Approach for Good Governance: The Case of the System GID in Morocco   Order a copy of this article
    by Azelmad Said 
    Abstract: Public administration reforms, in Morocco, called for the use of ICTs tornconnect administrations in a Whole-of-Government Approach, building a culturernof collaboration and Good Governance. Indeed, Coordination Theory supportsrnthe networked bureaucracy, as a catalyst for heterogeneous multi-stakeholderrnmanagement, internal auditing and synergy. Institutional networkedrncoordination is believed to increase interoperability and integration among offices for transparency and mutual accountability. A mutual collaboration (G2G) that is deemed to better governance, streamline workflows and reduce duplication of workflows and tasks. However, stove-piped management remains always a badrnomen for networked governance for its single-purpose management. It isrnbelieved to separate offices in corrupted dispersed silos and bureaucracies,rnoperating in ambiguity, red tape and bad governance. Results from an onlinernsurvey of public agents, using the GID system in Morocco (n =253) was used to empirically analyze the effect of eGovernment Whole-of-Government Approach on Good Governance ethics in back offices, using PLS-SEM.
    Keywords: eGovernment; Good governance; Whole-of-Government Approach; Coordination Theory; GID system; Morocco.

  • A Double-controller Fuzzy Scheme for Intelligent Resource Discovery on IaaS Cloud Systems   Order a copy of this article
    by Mohammad Samadi Gharajeh, Babak Jahangir 
    Abstract: The resource discovery process discovers appropriate computing resources (e.g., shared memory) in Infrastructure as a Service (IaaS) cloud systems according to user requirements. Since fuzzy systems use intelligent procedures based on humanistic experiences, they can be used in cloud computing to increase the number of completed jobs and improves the success rate. This paper proposes a double-controller fuzzy scheme for intelligent resource discovery in IaaS cloud systems, called DOCFIR. This scheme applies two fuzzy controllers to perform the intelligent resource discovery across the network. The first controller determines the number of virtual machines in the deployment phase based on the most important characteristics of the physical machines. The second controller discovers the appropriate computing resources for the users job in the service phase based on characteristics of the physical machines and user requirements. The simulation results show that the proposed scheme surpasses some of the existing related works in terms of the number of completed jobs and success rate.
    Keywords: Cloud System; Resource Discovery; Intelligent Strategy; Fuzzy Controller; Number of Completed Jobs; Success Rate.

    by Vignesh V., Santhosh R 
    Abstract: The attraction towards cloud computing by industry and individuals increases everyday as the benefits and advantages are much reliable and convenient to user to make process simple. Software and data giants like Google, Microsoft, Apple are efficiently utilizing the cloud features and the research towards improving its efficiency and utilization is going on worldwide. Cloud computing has large computational data intensive task and by reducing the complexity of task scheduling the efficiency could be improved. This research identifies the issues the existing task scheduling model and provides an optimized scheduling algorithm. Conventional models such as particle swarm optimization and PBEES algorithm are compared with proposed improved Greywolf optimization model experimentally to achieve 96% of utilization efficiency. This reduces he computation cost and provides high performance computing with reliability among the clients and service providers.
    Keywords: Cloud computing; Learning-based Grey wolf; Reliability.

  • A Survey on Multipath Routing Techniques in Wireless Sensor Networks   Order a copy of this article
    by Shilpa Chaudhari 
    Abstract: Wireless Sensor Networks (WSN) usually consist of tiny sensor nodes to sense the environmental data that are transferred to the sink node via route discovered using unicast/multipath routing protocol. The multipath routing protocols improve load balancing and Quality of Service in addition to the reliable transfer of sensed data to the sink simultaneously by reducing delay and congestion. This survey gives a brief introduction about the existing multipath routing protocols in the literature and its classifications into four categories as follows. (1) Distributed meta-heuristic based route discovery uses intelligent algorithms for path discovery. (2) Local-heuristic knowledge based route discovery uses node level statistics to discover the route (3) Route discovery specific to multimedia applications (4) Route discovery for secure transmission of data. A comparison between these protocols in terms of various routing parameters for path discovery, traffic distribution, and path maintenance is described for each class of multipath routing protocols.
    Keywords: Wireless sensor network; routing; multipath routing; path discovery.

  • Radio Frequency Identification and Internet of Things based Smart Library Management System   Order a copy of this article
    by Phani Gannamraju, Satyanarayana Yarramsetti, Lakshmi Sutha Kumar 
    Abstract: Libraries are essential parts of educational institutes that provide teaching resources and information. There is a loss of library resources due to the inefficiency of manual library systems which are not updating the information regularly. This paper aims to improve the existing library management systems at the university level using Radio Frequency Identification Technology (RFID) and the Internet of Things (IoT). RFID is a fast emerging technology as it enhances authenticity and reliability. The proposed smart library system uses RFID tag, RFID tag reader, ESP8266, and back-end database that stores the required content. It automates the issue and return of books with minimum human intervention. The designed library portal gives the availability of a variety of library resources, book transaction information, and fine details for both students and staff. The data analysis of book transaction details is done and data visualization is also made available to both user and admin.
    Keywords: Smart library; Internet of Things; Library management; RFID; ESP8266; MYSQL; OTP; database server; data analysis.

Special Issue on: ICICCT 2019 Sustainable Computing and Wireless Networks

  • Improving the dissemination of messages in MANETs through an optimal carrier   Order a copy of this article
    by K. Muralidhar, K. Madhavi 
    Abstract: Nodes in mobile ad hoc networks (MANETs) sometimes do not have a completely connected path between them because the connectivity of a mobile network cannot be maintained for long periods. An intermittently connected MANET (ICMANET) is usually a delay tolerant network (DTN), which is capable of tolerating lengthy delays. It is not possible to achieve full connection with a DTN. The probabilistic routing protocol using the history of encounters and transitivity (PRoPHET) is the most popular DTN routing protocol. However, PRoPHET has demerits such as high resource consumption, message spread and duplication. To overcome these disadvantages, this paper proposes a method for selecting an intermediate node as an optimal carrier to disseminate messages from the source to the destination. Simulation results indicate that the proposed method provides improved delivery ratio, fewer delays and lower resource consumption, message spread and duplication than the conventional PRoPHET and fuzzy PRoPHET protocols.
    Keywords: mobile ad hoc network; MANET; delay tolerant network; DTN; intermittently connected network; message dissemination; PRoPHET protocol; equal delivery predictability value; optimal carrier.
    DOI: 10.1504/IJNVO.2020.10025193
  • Robust intrusion detection system based on fuzzy C means clustering scheme implemented in IoT-based wireless sensor networks   Order a copy of this article
    by M. Ezhilarasi, V. Krishnaveni 
    Abstract: Research in wireless networks and communication protocols have reached new heights in recent times with the advent of state-of-the-art communication techniques and gadgets. They have found widespread utility in recent times especially with the advent of cloud computing and internet of things (IoT). IoTs offer immense potential in today's scenario aiding in smart computing and automation of things focused to making life of consumers easier and simpler. However, security of information transmitted and received over wireless networks is an essential concern to preserve privacy and authenticity of information. This research issue is however quite complex as it involves security of bulk information quite private and confidential to be delivered in a wireless medium prone to hackers. This research article has investigated the various issues related to security of IoT-based wireless sensor networks and proposed a fuzzy-based clustering algorithm to effectively detect an intrusion and make the information secure.
    Keywords: wireless sensor networks; intrusion detection systems; internet of things; IoT; fuzzy clustering.
    DOI: 10.1504/IJNVO.2020.10029330
  • Design and investigations of novel compact RSS antenna for ultra-wide band applications   Order a copy of this article
    by A. Amir Anton Jone, T. Anita Jones Mary Pushpa 
    Abstract: In current scenario, many researchers are focused on antenna design with an emerging technology of ultra-wide band (UWB) applications. UWB provides many advantages such as high gain, low VSWR, minimum return loss and omni-direction radiation pattern which are best suitable for medical applications. The US Federal Communications Commission (FCC) has a frequency band of (3.1-10.6) GHz for this research. In this paper, a novel rectangular stair slot (RSS) antenna is proposed to achieve UWB with simple structure and compact size. The overall size of the designed antenna is 33 × 19 × 1.9 mm3 with FR4 substrate. It is fed with 50 Ω micro-strip lines with a truncated ground line. In addition, bandwidth is enhanced by introducing the step-cut in the left corner of radiating patch. The proposed antenna is simulated in Ansoft HFSS simulator. The performance of antenna is exhibited by investigating a various parameters such as return loss, VSWR, gain, directivity, impedance, group delay and radiation pattern. The designed antenna is fabricated with eleven lab and measured with the help of vector network analyser.
    Keywords: ultra-wide band; UWB; rectangular stair slot; RSS; gain; VSWR; return loss.
    DOI: 10.1504/IJNVO.2020.10029334
  • An improved vertical handoff decision based on the modular neural network with fuzzy logic for wireless heterogeneous network   Order a copy of this article
    by R. Ganesan, B. Sowmya 
    Abstract: In recent times, provision of required services to consumers on an anyplace any time basis is limited by several constraints one among which is the issue of call drop. In order to eliminate this situation, the network operator should enhance vertical handoff (VHO) mechanism. VHO is the process of exchanging the ongoing wireless link to any of the wireless technologies in heterogeneous to support node mobility without fail. Normally, a mobile user can achieve VHO process by utilising the received signal strength (RSS) as single criteria. But sometimes it leads to abortive handoff, service disruption and unbalanced network load. In this paper, a modified modular neural network into fuzzy logic (MNN-FL) by using multi criteria metrics in the mobile environment is proposed. State of mobile terminal (MT) is evaluated by fuzzy logic (FL) by comparing the battery level and the mobility of MT in which identification of best access network is achieved. The high value SNRs are considered for choosing the best network access to accomplish higher data rates and throughput. The performance results demonstrates that MNN-FL-based VHDA shows well-organised network concert in terms of handoff dropping rate and enhanced throughput than existing VHO algorithms.
    Keywords: heterogeneous network; vertical handoff; VHO; fuzzy logic; modular neural network; MNN; mobile terminal.
    DOI: 10.1504/IJNVO.2020.10029382
  • A novel adaptive fuzzy-based sliding mode control for channel state estimation in cognitive radio for reduction of interference   Order a copy of this article
    by S. Vadivukkarasi, S. Santhi 
    Abstract: Research in spectrum availability and its effective utilisation is becoming an epicentre of research in recent times with the increasing scarcity of radio spectrum. An effective solution is in the form of cognitive radios (CRs) which are quite intelligent to effectively utilise the scarcely available spectrum in an efficient and economic manner. Apart from being intelligent, they represent reconfigurable wireless communication systems, which are self-aware of their environment and learn to adapt it for dynamic changes. They are characteristic of efficient spectrum utilisation. This research paper defines the objective of determining the channel state information through sliding model control-based intelligent adaptive fuzzy algorithm. The CR has ability to operate in a particular radio configuration based on device status and environmental aspects including interference noise. The proposed adaptive fuzzy SMC-based channel state estimation has been compared against conventional and recent techniques and outputs established in terms of bit error rate and mean squared error. The proposed sliding rule method is quite an ideal choice for the proposed scenario characterised by dynamically changing input conditions to the sensing components of the CR network.
    Keywords: cognitive radio; channel state information; sliding mode control; SMC; adaptive fuzzy; bit error rate.
    DOI: 10.1504/IJNVO.2020.10029322
  • Non-orthogonal filter bank multi carrier systems with higher overlap factor filters for 5G communications and beyond   Order a copy of this article
    by Ravi Sekhar Yarrabothu, Usha Rani Nelakuditi 
    Abstract: The current 4G long-term evolution (LTE) system has few limitations such as lower spectral efficiency, no support for asynchronous data transfer, high out-of-band emissions. Filter bank multi carrier (FBMC) technique is getting used as one of the 5G waveform modulations to overcome the above mentioned limitations. The objective of this work is to design, simulate and verify the FBMC-based 5G communication system with prototype filters of higher order spreading factors 4, 6 and 8 along with LTE to study the performance in terms of spectral efficiency, out of band emissions, peak to average power ratio (PAPR) and bit error rate (BER) under AWGN and outdoor line of sight (LOS) fading conditions using the Keysight test-bed and tools. The results show that the FBMC with higher order spreading factors resulting in to good spectral efficiency, very minimal out-of-band emissions, comparable BER performance and slightly better PAPR than that of LTE systems.
    Keywords: filter bank multi carrier; FBMC; highway line of sight; HLOS; long-term evolution; LTE; orthogonal frequency division multiplexing; OFDM; offset quadrature amplitude modulation; OQAM; poly-phase network; PPN; rural line of sight; RLOS; urban approaching line of sight; UALOS.
    DOI: 10.1504/IJNVO.2020.10029400
  • Filter-based optimal transmission path scheduling in MIMO LTE and LTE-A networks   Order a copy of this article
    by Papa Rao Challagundla, P. Sumitha Bhashini, P. Chandra Sekhar Reddy 
    Abstract: The multi-in and multi-out (MIMO) wireless communication with robust performance often evinces the considerable bit error rate due to the imbalance signal against to noise, contention due to load, and poor bandwidth share. Hence, it is obvious to define novel methods to select the transmission channel between the source and destination that incorporates multiple antennas in sequence. In order to this, a filter-based technique that filters the unimaginative direct transmission channels between any two antennas in sequence is proposed and explored in this manuscript. The filter that portrayed is an extended version of the wiener filter that boosted up with novel distribution diversity measure called KS-test, which estimates the significance of the channel under defined constraints called noise, load and bandwidth sharing. The experimental study denoting that the proposed filter is outperforming the contemporary models in regard to minimise the bit error rate and other quality metrics.
    Keywords: orthogonal frequency domain multiplexing; OFDM; uplink; third generation partnership project; long-term evolution; LTE; self-organising network; SON; KS-test; multiple input and multiple output; MIMO.
    DOI: 10.1504/IJNVO.2020.10029402

Special Issue on: ICICCT 2020 Sustainable Computing and Wireless Networks

    by Vignesh V., Santhosh R 
    Abstract: In general the problem-solving strategies used in heuristic approaches is different compared to conventional algorithms. They differ in handling the issues in different operating conditions thereby it enhances the overall performance of the system. In this research paper we have also implemented a heuristic scheduling approach in cloud computing environment to improve the energy efficiency. Since cloud needs a better scheduling module for intense data applications this proposed priority-based energy efficient multi queue heuristic scheduling model is suitable and provides efficient scheduling with minimum energy. Experimental results are compared with greedy and load balancing scheduler algorithms to prove that proposed model achieves 93.45% of energy efficiency.
    Keywords: Cloud computing; Heuristic model; energy efficiency; scheduling.

Special Issue on: Exploring Emerging Verticals in the Future of Wireless Technology

    by Feng Cui 
    Abstract: Building Information Modellingalso popularly known as the BIM is emerging to be one of the most rapidly advancing modelling techniques used in a wide range of applications. BIM drastically reduces the time involved in manual work which is characteristic of the past and completes automates the process of managing and disbursing required data for modelling and construction of civic structures. There has been a widespread investment in BIM by clients prior to commencement of new projects, pre construction analysis, interior designing and post construction. Since BIM is a recent trend, the motivation for the proposed work has been derived an exhaustive literature survey in key areas for research contributions which could greatly increase the quality and importance of BIM. The proposed work focuses on the input side of BIM system involved with acquisition and processing of information before being exported into the database management system. 3D to 2D modelling and feature extraction has been proposed in this paper with dimensionality reduction technique which drastically reduces the feature data set before being exported in to the BIS management system. A Principal component analysis (PCA) has been implemented in this paper and the two dimensional features have been exported into the BIM database. The most appropriate texture image is selected from aerial images according to geometry between building faces and external parameters of thephotos. The method has been tested with LIDAR data of two building images and extraction accuracy determined.
    Keywords: 3D image modelling and extraction; Polgonization; multi resolution approximation; feature import in BIS.