Professional Documents
Culture Documents
Sample Technical Papers - Collection For Student Awarness
Sample Technical Papers - Collection For Student Awarness
Abstract—The contribution of spatial harmonics and tooth motor efficiency. Lee et al. [3] presented iron loss analysis of
pulsation in iron loss of three phase squirrel cage induction three-phase IM used for industry applications. They used
motor has been calculated using lumped circuit approach. An transient FEM to analyze the magnetic flux density waveform
equivalent circuit of the three phase induction motor considering in order to find out the flux density according to varying time.
stator magnetomotive harmonics has been used for the Iron loss in each element was evaluated using iron loss curve
calculation of the same. An empirical formula has been developed tested by Epstein test apparatus. Their results showed the
and validated for determination of tooth pulsation loss. The distribution of iron loss density and partial thermal source.
usage of lumped parameter circuit considering magnetomotive Bangura et al. [4] studied the effects of rotor abnormalities
force harmonics for predicting the iron loss components has not
such as broken squirrel-cage bars, broken cage connectors and
appeared in the literature. Here iron loss due to fundamental,
airgap eccentricity on ohmic and iron losses of induction
spatial harmonics components and tooth pulsation for various
motors with different designs and polarities have been
motors. Enokizono et al. [5] examined the loss distribution by
determined and compared with experimental results. It is found the FEM considering the two-dimensional magnetic properties
that the iron losses due to the stator magnetomotive harmonics is to develop higher efficiency induction motors. Jamil et al. [6]
in same range as that due to fundamental component, the tooth used a combined finite-element/state-space (CFE-SS)
pulsation loss is in the range of 25% to 35% for 2 pole, and 20% modeling to compute the no-load iron losses in three-phase
to 30% of total iron loss for 4 pole induction motors. The induction motors.
percentage error between computed and average experimental
Earlier literature considering magnetomotive force
results for total iron loss are within acceptable limits (±5%)
without taking too much of computation time compared to the
(m.m.f.) harmonics [7]-[9] discussed the methodology.
numerical methods. Reference [8] compares the overall performance using the
methodology. However in this paper specifically, computation
Keywords—Iron loss; magnetomotive force harmonics; squirrel of iron loss considering all components of harmonics is
cage; three phase induction motor. targeted and the comparison with experimental results is
presented.
I. INTRODUCTION In certain cases, the iron loss is computed using empirical
In three phase induction motor (IM), iron loss accounts for formulae from the determined space and time variation of the
a large percentage of the total energy loss. It is desirable to flux density [10], [11]. Even if the formulae for estimating the
predict iron loss with satisfactory precision in the stage of iron loss were accurate, the obvious error is already present in
design or during analysis to realize high efficiency and good the exclusion of the iron loss from the field computation.
performance. Due to the complicated flux distribution, spatial Gyselinck et al. [12] presented a two-step algorithm for
harmonics, and the rotation of the flux vector, major predicting the iron loss in a squirrel cage induction motor. The
difficulties are encountered for the last several decades in method presented in their paper has produced losses that are
evaluation of iron loss in the induction motor. Kunihiro et al. 15% less than the measured losses for open rotor slots. Julius
[1] presented results of iron-loss evaluation of an induction Saitz [13] presented the application of the vector Preisach
motor model core by using the finite element method (FEM) model incorporated in 2D finite element analysis for the
considering two-dimensional vector magnetic properties. magnetic field computation and estimation of the iron loss of
Kwon et al. [2] computed the loss distribution of a three-phase an induction motor. The maximum relative error between the
IM and a BLDC motor considering operating point-of-core computed and measured iron losses is 12%. His numerical
material based on the FEM and experiments. Their presented procedure is stable convergent, however, it requires a lot of
results give guidelines to selecting core materials to improve computation time (about 20 hours for one period of the supply
voltage consisting of 400 time steps). Lei Ma et al. [14] The triplen harmonics in three phase induction motors get
proposed a method to predict iron loss in rotating machines eliminated due to 120 degrees electrical displacement. So the
considering rotational variations of flux vectors as well as flux spatial harmonics from stator m.m.fs, can be given by
harmonics using the 2-D FEM. Using their proposed method, (6k±1)th, where k=1, 2, 3…i.e. 5th, 7th, 11th, 13th, 17th, 19th,....
the average prediction error of iron loss is 18% compared with till (Ns/p-1)th (Ns is number of stator slots, p is no. of pole
the experimental values. Stranges [15] described direct pairs) harmonic m.m.fs. are present.
approaches for coupling rotational iron loss measurements
with FEA results that yield the distribution of rotational flux in The equivalent circuit parameters have been calculated as
induction motor cores. Using those methods, the prediction of
follows [16]:
no-load iron loss can be made to include the effects of
rotational iron losses, but the components of iron losses cannot
be calculated. r1 = ρ (length of mean turn*turns per phase / area of
conductor),
The stator core of induction motor is subjected to flux that
rotates in the plane of the laminations. The iron loss in the Ts
2
§ 2 5 N sp ·
three phase induction motor can be divided into three x1 = 2πf℘ ¨¨ − 2 ¸
¸ + xe
(1)
components, i.e. fundamental, harmonic, tooth pulsation. The p ©q 4 q ¹
harmonic component of iron loss is primarily due to the
hysteresis and eddy currents set up in the tip region of the
stator and rotor teeth and to additional losses in the teeth from r1= stator resistance per phase
pulsations resulting from the passing flux harmonics. x1= stator reactance per phase
p= no. of pole pairs
II. MODELLING AND ANALYSIS Ts = no. of stator turns per phase
The motor is represented by the equivalent circuit shown q= no. of slots per pole per phase
in Fig. 1. This equivalent circuit represents the stator Nsp= no. of slots per pole – no. of slots spanned by Coil Pitch
magnetomotive force (m.m.f.) harmonics present in the
system.
xe = leakage reactance due to the end windings
There are a number of ways of estimating xe , we have
estimated this parameter as in [17].
Slot permeance,
§1 h d ·
℘ = "μ 0 ¨ + ¸ (2)
©3 w u ¹
h= slot height
w= slot width
d= slot depression height
u= slot depression width
"= slot length
2
(5) ωn angular speed for the nth harmonics= 2πfs _ n
Where,
s _ n is slip for the nth harmonics
ω = 2πf
2 2
ns _ n is synchronous speed for the nth harmonics
12lTs k wn
r2 _ n = Rslot (6)
NR nr is the rotor speed
ws = major slot width φn is the flux per pole for the nth harmonics
σ = conductivity of aluminum bars En is the back e.m.f. for the nth harmonics (voltage across
Xm_n)
δ n = skin depth for the nth harmonics
b) Calculation of iron loss in the stator teeth (Ps_teeth) of the
hs = trapeze height of the slot
motor at fundamental frequency and at (6k±1)th harmonics,
Rotor reactance for the nth harmonics, φn
B n m _ st = (π / 2) (13)
( N s / 2np ) ws L
2 2
12lTs k wn where,
x2 _ n = ω Lslot (8)
NR B n m _ st is the peak value of flux density in stator teeth for the
nth harmonics
hs hs
sinh 2 − sin 2 ws
hd 1 1 δn δn is width of stator teeth
Lslot = μ0 + (9)
wd ω n wsσδ n cosh 2 hs − cos 2 hs L is effective core length
δn δn
Resultant value of magnetic flux density (peak) in stator teeth
c) Calculation of the iron loss in the stator core (Ps_core) at r is the stator bore radius
fundamental frequency and at (6k±1)th harmonics,
(φn / 2) The amplitude of the magnetic field disturbance is:
B n sc = (15)
wc L
2 θD
where, B = BB sin (19)
π 2
B n sc is flux density in stator core for the nth harmonics and,
wc is effective core depth Ns
ωe = ω B (20)
p
Resultant value of magnetic flux density (peak) in stator core
Tooth pulsation loss in rotor,
n=n
Bsc = ¦ B n sc (16) Ppulsation = PdWrt (21)
n =1
where,
d) Calculation of the iron loss in the rotor teeth (tooth
pulsation losses) at fundamental frequency and at (6k±1)th W rt is the weight of rotor teeth; and
harmonics,
e) The total iron loss is calculated by summing Ps_teeth, Ps_core,
ef eb Ppulsation
§ω · § B ·
Pd = PB ¨¨ e ¸¸ ¨¨ ¸¸ (17)
III. RESULTS AND DISCUSSION
© ωB ¹ © BB ¹
The contributions from fundamental, spatial harmonic
components, and tooth pulsation losses in iron losses for
where, various three phase induction motors with different stamping
designs have been determined using proposed method, and the
ef= 1.2 for 2 Pole motor, total iron loss simulated has been compared with experimental
values. The loss in rotor bars can be easily calculated using
1.0 for 4 Pole motor and above formula based on one dimensional solution. However, the loss
due to pulsation in rotor teeth is considered here as distributed
eb= 2.5 throughout the rotor teeth. Since the rotor teeth (in
conventional outer stator motor) are saturated more than the
Pd is the tooth pulsation loss (watts/kg) in rotor stator teeth, hence it is correct to consider that the rotor teeth
flux density to be 1.8 Tesla on an average. At this level of
BB is the peak value of flux density (wb/m2) in the air-gap saturation, the relative permeability falls to be 150
(approximately) for M45 material. Hence the skin depth (į) is
PB is the iron loss (watts/kg) at BB about 4.0 mm. Considering penetration of the flux up to 6į,
almost the entire rotor tooth height has to be considered as
It is well known that the frequency of tooth pulsation is susceptible to iron loss.
Ns/p times the fundamental. Hence in above formula, we
No-load tests have been done to calculate iron losses for
substitute Ns/p in place of ω e / ω B all the ratings. The interception of the graph (no-load loss-
copper loss) vs. voltage2 on the y-axis is friction & windage
The stator slot openings ‘modulate’ the space fundamental loss. Simulations have been done for 215kW to 975kW, 3.3
magnetic flux density. A slot opening angle (relative to the kV to 11 kV, 2Pole and 4Pole, motors with materials M45 &
slot pitch) can be estimated by the following expression: M36, and having different stamping designs. TABLE I shows
the comparison of calculated and experimental values of iron
losses with all components for 2 pole motors. It can be seen
wd N s
θD = (18) from the table that the loss due to the fundamental component
r is in the range of 29% to 37% of total iron loss, and that due to
where, spatial harmonics is in the range of 34% to 39%. The
contribution from tooth pulsation loss is in the range of 27% to
35% of total iron loss.
wd is the stator slot opening
TABLE I COMPARISON OF COMPUTED AND EXPERIMENTAL OF IRON LOSSES FOR 2 POLE THREE PHASE INDUCTION MOTORS WITH
DIFFERENT STAMPING DESIGNS
S kW Voltage Stator teeth and core loss (kW) Tooth Total Fundame- Harmonic Tooth Iron % error
. (V) pulsation iron loss ntal comp.*100 pulsation loss (E-D)*100/E
N loss (kW) (kW) comp.*100/ /total iron loss*100 (tested
. Fundame- 5th+7th+ Total (C) D=A+B+ total iron loss /total iron value)
ntal comp. 11th+13th+ (A+B) C loss (B*100/D) loss (kW)
(A) 17th+19th+. (A*100/D)) (C*100/D) (E)
.. (Ns/p-1)th
harmonic
comp.
(B)
1 250 6600 1.391 1.309 2.700 1.001 3.701 37.6 35.4 27.0 3.828 3.3
2 500 6600 1.679 2.246 3.925 1.723 5.648 29.7 39.8 30.5 5.447 -3.7
3 280 6600 1.311 1.363 2.674 1.15 3.823 34.3 35.7 30.1 3.845 0.6
4 225 6600 1.125 1.179 2.304 0.95 3.254 34.6 36.2 29.2 3.395 4.2
5 354 6600 1.600 1.650 3.250 1.398 4.648 34.4 35.5 30.1 4.394 -5.8
6 280 6600 1.311 1.363 2.674 1.15 3.823 34.3 35.7 30.1 3.686 -3.7
7 225 6600 0.917 1.126 2.043 1.106 3.148 29.1 35.8 35.1 3.3 4.6
8 450 6600 1.843 2.182 4.025 2.22 6.244 29.5 34.9 35.6 6.305 1.0
TABLE II COMPARISON OF COMPUTED AND EXPERIMENTAL IRON LOSSES FOR 4 POLE THREE PHASE INDUCTION MOTORS WITH DIFFERENT
STAMPING DESIGNS
S. kW Voltage Stator teeth and core loss (kW) Tooth Total Fundame- Harmonic Tooth Iron % error
N. (V) pulsation iron loss ntal comp. pulsation loss (E-D)*100/E
loss (kW) (kW) comp.*100/ *100/total loss*100 (tested
Fundame- 5th+7th+ Total (C) D=A+B total iron iron loss /total iron value)
ntal comp. 11th+13th+ (A+B) +C loss (B*100/D) loss (kW)
(A) 17th+19th+. (A*100/D) (C*100/D) (E)
...(Ns/p-1)th
harmonic
comp.
(B )
1 925 11000 4.293 4.198 8.491 3.030 11.521 37.3 36.4 26.3 10.938 -5.3
2 215 6600 1.162 1.130 2.292 0.661 2.953 39.3 38.3 22.4 2.95 -0.1
3 260 6600 1.353 1.376 2.729 0.841 3.570 37.9 38.5 23.6 3.48 -2.6
4 600 6600 2.850 2.777 5.627 1.665 7.292 39.1 38.1 22.8 6.9 -5.7
5 975 6600 3.111 3.550 6.661 1.692 8.352 37.2 42.5 20.3 8.188 -2.0
6 350 3300 1.885 1.659 3.544 1.371 4.914 38.4 33.8 27.9 5.09 3.5
7 450 3300 2.370 1.814 4.184 1.395 5.579 42.5 32.5 25.0 5.297 -5.3
8 250 3300 1.246 1.093 2.339 0.905 3.244 38.4 33.7 27.9 3.172 -2.3
9 750 3300 2.654 2.124 4.778 2.530 7.308 36.3 29.1 34.6 7.146 -2.3
10 225 3300 1.311 1.042 2.353 0.669 3.023 43.4 34.5 22.1 2.878 -5.0
11 315 6000 1.531 1.356 2.887 1.029 3.916 39.1 34.6 26.3 4.08 4.0
TABLE II shows the results for 4 pole motors. The losses [4] Bangura, J.F. Demerdash, N.A., Effects of broken bars/end-ring
from fundamental, spatial harmonic components, and tooth connectors and airgap eccentricities on ohmic and core losses of
induction motors in ASDs using a coupled finite element-state space
pulsation, are in the range of 37% to 43%, 29% to 42%, and method, IEEE Trans.-Energy Conversion, vol. 15, no. 1, pp. 40-47,
20% to 34% of total iron loss, respectively. The percentage March 2000.
errors between computed and tested iron losses are within [5] Enokizono, M.; Shimoji, H.; Horibe, T., Effect of stator construction of
three-phase induction motors on core loss, IEEE Trans.-Magnetics, vol.
±5% for 2 Pole and 4 Pole motors.
39, no. 3, pp. 1484-1487, May 2003.
[6] Jamil, M.K.; Baldassari, P.; Demerdash, N.A.; No-load induction
IV. CONCLUSION motor core losses using a combined finite-element/state-space model,
Losses because of rotating flux differ from those observed IEEE Trans.-Magnetics, vol. 28, no. 5, pp. 2820-2822, Sept. 1992.
[7] P.L.Alger, The Nature of Polyphase Induction Machines, John Willy &
under alternating flux conditions. The components of iron loss Sons, INC, NEW York ChaPman & Hall, Ltd, London, 1951.
(fundamental, spatial harmonics, and tooth pulsation) of the [8] Williamson W., Laithwaite E.R., Generalised Harmonic Analysis for
three phase induction motor have been determined using the the steady state performance of sinusoidally excited cage induction
proposed equivalent circuit considering all stator motors, IEE Proceedings Electric Power Application, vol. 132, No 3,
May 1985, pp. 157-163, May 1985.
magnetomotive force harmonics. This method is very useful [9] Poloujadoff, M; The Theory of Three Phase Induction Squirrel Cage
for day to day design work because it is faster and more Motors, Electrical Machines & power Systems, 13, pp. 245-264, 1987.
accurate than numerical methods. It is concluded that the [10] G. Bertotti, A. Boglietti, M. Chiampi, D. Chairabaglio, F. Fiorillo, M.
harmonic component of iron loss is in addition to its Lazzari, An Improved Estimation of Iron Losses in Rotating Electrical
Machines, IEEE Trans.-Magnetics, vol. 27, no. 6, pp. 5007-5009, Nov.
fundamental component and may go up to the same value as 1991.
of latter in many ratings, and can be estimated accurately by [11] G. Bertotti; Canova A.; M. Chiampi; D. Chiarabaglio; F. Fiorillo; A.M.
considering spatial harmonics in the lumped circuit model. Rietto, Core Loss Prediction Combining Physical Models with
The tooth pulsation loss is in range of 20% to 35% of the total Numerical Field Analysis, Journal of Magnetism and Magnetic
Materials, vol. 133, pp. 647-650, 1994.
iron loss for 2 pole and 4 pole motors. It is necessary to [12] Johan J. C. Gyselinck, Luc R. L. Dupre, Lieven Vandevelde, and Jan A.
determine the iron loss due to the fundamental component, A. Melkebeek, Calculation of No-Load Induction Motor Core Losses
spatial harmonics, and tooth pulsation at the design stage itself Using the Rate-Dependent Preisach Model, IEEE Trans.-Magnetics, vol.
for the optimized and cost effective design of three phase 34, no. 6, pp. 3876-3881, November 1998.
[13] Julius Saitz, Computation of the Core Loss in an Induction Motor Using
induction motors. the Vector Preisach Hyteresis Model Incorporated in Finite Element
Analysis, IEEE Trans.-Magnetics, vol. 36, no. 4, pp. 769-773, July 2000.
REFERENCES [14] Lei Ma, Masayuki Sanada, Shigeo Morimoto, and Yoji Takeda,
[1] Kunihiro, N.; Todaka, T.; Enokizono, M., Loss Evaluation of an Prediction of Iron Loss in Rotating Machines With Rotational Loss
Induction Motor Model Core by Vector Magnetic Characteristic Included, IEEE Trans.-Magnetics, vol. 39, no. 4, pp. 2036-2041, July
Analysis, IEEE Trans.-Magnetics, vol. 47, no. 5, pp. 1098-1101, May 2003.
2011. [15] Stranges N., "Methods for predicting rotational iron losses in three phase
[2] Kwon, S.O. Lee, J.J. Lee, B.H. Kim, J.H. Ha, K.H. Hong, J.P. Hong, induction motor stators”, IEEE Trans.-Magnetics, vol. 36, no. 5, pp.
Loss Distribution of Three-Phase Induction Motor and BLDC Motor 3112-3114, September 2000.
According to Core Materials and Operating, IEEE Trans.-Magnetics, [16] H. Wayne Beaty, James L. Kirtley, Electric motor handbook, McGraw-
vol. 45, no. 10, pp. 4740-4743, Oct. 2009. Hill, 1998.
[3] Jeong-Jong Lee; Soon-O Kwon; Jung-Pyo Hong; Ji-Hyun Kim; [17] P. L. Alger, Induction Machines, Gordon and Breach, 1969.
Kyung-Ho Ha, Core loss distribution of three-phase induction motor
using numerical method, Proc. 31st International Telecommunications
Energy Conference (INTELEC), 18-22th Oct. 2009, pp. 1-4.
Abstract
The goal of knowledge production is the discovery of facts and improving the human situation, and as such,
plagiarism and using other unethical means are not compatible with this goal. Most academic scholars agree that
plagiarism is a serious violation of publishing ethics. In recent decades, the scientific community has become
really concerned about the fast growth of plagiarism. Although plagiarism is widespread, it isn’t consistent with
the principles of science.
Nowadays some media publish worrying news of plagiarism in scientific publications, including data
manipulation by well-known scientists. The prevalence rate of plagiarism has been reported in different studies
turns out to be different in various fields, countries, educational levels and times.
The goal of this study is to review the scientific concepts related to plagiarism, its factors and roots, its
prevalence in the world and methods of detecting it in order to improve the awareness of instructors and
students of plagiarism.
*
Corresponding author: Hoseinpourfard M.J., Please, direct all correspondence at hpf.javad@gmail.com.
Bahadori M. et al
progress in computer technology, that is, running giarists to take advantage of the situation [11].
websites to provide university services, the copy- Ben Jonson was the first one to sue the term pla-
paste tool, and loads of pre-fabricated papers, has giarism in the early 17th century. It was hard for
made for an increase in plagiarism [8]. Nowadays authors to protect their writings before devising
some media publish worrying news of plagiarism copyright laws. But as plagiarism increased in the
in scientific publications, including data manipula- 18th century and copyright laws were consequent-
tion by well-known scientists. The ethics of scien- ly clearly defined and devised by the middle of the
tific publication is in direct connection to the con- century, plagiarists faced a change in the public
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
cepts of copyright in writing scientific papers and opinion and strong ethical viewpoints towards pla-
of plagiarism. Sometimes, journal editors take the giarism [12].
writers’ cunningness for their lack of familiarity In view of the prevalence of plagiarism in the sci-
with journal regulations or their lack of attention entific community and its devastating effects on
to a certain paper. As Kosovsky notes, “the road to scientific progress, this study aims at surveying
hell is paved with good intentions” and after that, the concepts, causes and solutions to the issue of
the writers make very serious ethical mistakes to plagiarism.
the end [9]. Terminology, Definitions and Idioms
The author of a book, paper, poem or a scientific According to the Persian dictionary of Dehkhoda,
passage, after hours of thinking and writing about the word “steal” means “taking away somebody’s
a subject, puts to paper the fruit of years of his or possession with deception and tricks” or “to take
her continuous efforts. As such, the plagiarist not hold of something without the right to do so” [13].
only steals the fruit of such efforts but also reg- Wilson Mizner states that “when we steal an idea
isters all that painstaking work to his or her own from one author, it will be called plagiarism, but
name [7]. when we do it from a few authors, it is called re-
Plagiarism is hundreds of years old, but, due to search” [14].The word plagiarism comes from the
the progress in information technology, it has ac- word “plagarius”, meaning kidnapper, robber, mis-
quired new and different methods compared to the leader, and literary thief” [15]. Plagiarism usually
past. Plagiarism was almost a rare phenomenon refers to stealing ideas or words that are higher
until 1990, but it has spread across the world in than the level of public knowledge [16].
recent years and has worried the academic com- In Webster’s Dictionary, a plagiarist is defined as
munity [10]. In the past, there were a few scien- “One who plagiarizes, or purloins the words, writ-
tists who produced knowledge and some of them ings, or ideas of another, and passes them off as his
would produce no more than a couple of papers in own; a literary thief” [17], and plagiarism as “tak-
their lifetime. In those times, strict reviewing prin- ing someone›s words or ideas as if they were your
ciples were at work, there just a few journals and own”[18]. The University of Liverpool defines
scientists had a hard time convincing the scientific plagiarism as the “use of materials from unac-
community to accept their ideas. In the 19th cen- knowledged sources or direct quotation of materi-
tury, the problem was stealing ideas, and that was als from documented references without acknowl-
why many discoveries and inventions were dis- edging that the words have been taken verbatim
puted. Today, however, the number of scientists, from those references” [19]. Payer sees plagiarism
students, journals and papers has really increased. as “taking others’ ideas, words or wok as if they
While there is no problem with the increase in the were your own” [20]. Or as Stebel man puts it,
number of papers, peer-reviewing of the papers is plagiarism consists of “claiming as your own the
the main problem. It is certainly expected of a re- writings and research papers that originally belong
viewer to have a good command of the subject of to others [21]. Vessal and Habibzadeh take pla-
a paper. But, given the large number of papers to giarism to be “ascribing others’ ideas, processes,
be reviewed, are there enough specialists to review results and words to oneself without due acknowl-
the papers? No scientist can claim that he or she edgement” [22]. Using sentences from published
has studied all specialist papers in his or her area of medical literature with little change in the words
knowledge, and this paves the way for some pla- without acknowledging the source is also an in-
stance of plagiarism. Using unpublished images or the same data in two papers (on with a clinical fo-
pictures with the owners’ permission is also called cus and one with a theoretical focus), and publish-
plagiarism [23]. ing the same paper under two names, one being the
The Federal Government of the United States de- real author in his or her own country and the other
fines “research misconduct as fabrication, falsifi- being a foreign author.
cation or plagiarism in proposing, implementing or Republishing, which is done in a deceptive way,
reviewing of research projects or in reporting the is certainly unacceptable. If editors, reviewers and
results of research” [24]. end readers of data notice the overlap between pa-
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
Plagiarism is an unethical activity in scientific pers, they can make the right decision about it. Du-
writing. For something to be called plagiarism, plicate publication is, nevertheless, deceptive and
it needs to be a serious deviation from normally involves three problems: it is unethical, it wastes
accepted behavior of the relevant scientific com- resources and it has adverse impacts upon future
munity which is done consciously and deliberately clinical and research decisions. Editors and readers
and must be proved with solid evidence. Plagia- of a published report want to make sure that they
rism may occur in different forms: stealing ideas are dealing with new and important data, and may
and stealing parts of texts. Self-plagiarism happens wrongly be persuaded to think so, while this is not
when an author uses his or her own previously pub- the case. Duplicate or redundant publication mis-
lished work without acknowledging it [25]. Self- leads the readers and reduces the credibility of the
plagiarism is defined in three ways in the relevant journal as well as its ability to attract good papers.
literature: 1) publishing a paper which basically Duplicate publication makes for wasting resources
overlaps another paper without due acknowledge- by wasting the time which should be allocated to
ment; 2) breaking a large paper into a few smaller other papers [28].
papers and publishing them separately, called sa- “Most academic researchers agree that plagiarism
lami slicing and 3) republishing the same work. is a serious problem in the ethics of publication.
Copyright, on the other hand, means enhancing Plagiarism appears in different forms: stealing
knowledge and useful arts by providing limited- ideas and stealing texts (verbatim plagiarism).
time security for authors and inventions through Plagiarism is no doubt an instance of misconduct.
exclusive rights regarding their writings and in- Stealing part of text and rephrasing it is a severe
ventions. Authors of technical papers are usually problem in the humanities and literature where in-
asked to transfer the copyright of their work to the novation in phrasing and eloquence are essential.
journal or the publisher [26]. But in the realm of science, it is the scientific con-
Scientific integrity depends on honesty and trans- tent itself, not its eloquence, that matters” [29].
parency of the methods of producing and trans- The purpose of scientific journals is to some extent
ferring knowledge [26]. Republishing results is different from that of non-scientific ones. For in-
announcing the same results in two or more pa- stance, medical journals are published in order to
pers, multiple recalculations of the same results in improve the science of medicine and public health
meta-analyses and as a result in serious errors in by publishing the results of scientific research. In
research [27]. many areas such as literature and humanities, how-
Duplicate or redundant publication occurs when ever, different authors have different views. They
there is an overlap, without acknowledging it, try to reflect their own understanding and feelings
between two papers in terms of their hypotheses, of texts by means of a selection of good and suit-
data, arguments or results. This could include an able words. Thus, each and every word, along with
overlap with other authors, their results or their its immediate context, has a role in conveying the
samples. The most important cases involve lack meaning to the reader. But in a scientific writing,
of acknowledging the sources. The following are the writer’s audience consists of scholars who are
example cases of republishing: publishing data looking for facts based on solid evidence. There-
which has been published before, reusing tables fore, the writer is supposed to observe and report
and figures in later publications, publishing larger correctly. Unlike literary researchers, a scientific
papers using previous smaller papers, publishing paper author should follow a certain and well-es-
tablished scientific method and make sure that he copying materials of one or more texts and pro-
or she will not be become biased in his or judg- viding the right citations without using quotation
ments since this can endanger the truth or reliabili- marks to make the readers believe that they have
ty of the judgments. Thus, whether or not he or she paraphrased the materials not quoted them, and re-
is eloquent, as far as an author is a just observer wording sentences from other sources without giv-
who works based on accepted scientific methods, ing credit to them [31].
evidence and facts, he or she can publish his or Recognizing plagiarism faces a number of prob-
her findings and could be said to have followed a lems. One problem is recognizing the amount of
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
universally accepted method [29]. plagiarism because it can cover a wide scope. The
Plagiarism, in general, includes attributing some- second problem is the question as to how much
body else’s work to yourself without giving credit change in the original material can make for pla-
to the author, copying other’s ideas or words with- giarism [31]. Roig argues that many students
out giving credit to the source, not putting quota- struggle between rewording and summarizing be-
tions in quotation marks, giving the wrong infor- cause they cannot distinguish between them. The
mation about a reference, changing the words while third issue is that most authors believe that there
keeping the structure of a sentence from another is no need to reference common knowledge, but
source without acknowledging it, and copying a we may ask what common knowledge is and who
large number of words or ideas from other sources defines it? [32]
with or without due acknowledgement [30]. Plagiarism can be divided into two types with
Another definition of plagiarism numerates the regard to intentions. The first type is intentional
ways of plagiarizing in the following way: “‘co- plagiarism where the author is fully aware of the
py-past’ which means verbatim copying of words, plagiarism and is willing to do it. The second type
plagiarizing ideas, which consists of using a con- of is unintentional plagiarism where a person pla-
cept or idea which is not commonly known to oth- giarizes due to his or her unawareness and lack of
ers, rephrasing, which means changing the gram- skill in writing. The latter type could be prevented
matical structure, using synonyms, reordering the [33].
original sentences, or rewriting the same content in In another classification, plagiarism is divided into
different words, artistic plagiarism, which denotes four categories: 1) “casual plagiarism, which oc-
presenting others’ works using a different medium curs because of lack of awareness of plagiarism,
such as text, voice, or image, plagiarizing codes, or insufficient understanding of referencing or ci-
that is, using other programs’ codes, algorithms tation;” 2) unintentional plagiarism, where, due
and functions without the right permission or ref- to the wide amount of knowledge in the scientific
erencing, using expired or neglected links, adding area, a person may unknowingly present ideas sim-
quotation marks or other referencing signs without ilar to those of others;” 3) intentional plagiarism,
providing the right referencing information or up- where a person deliberately and knowingly copies
dating links to sources, inappropriate use of quota- part or all of somebody else’s work without giv-
tion marks, failure to recognize the quoted parts of ing credit to them; and 4) self-plagiarism, which
a text, incorrect referencing, i.e., adding incorrect consists of reusing one’s own published work in a
referencing information or references which do different form with acknowledging it” [30].
not exist and plagiarism in translation, which con- The Prevalence of Plagiarism
sists of translating a text without giving reference Researches show that plagiarism is an increasingly
to the original text” [30]. widespread practice in educational and research
The following are some instance of student pla- institutes. The rate of plagiarism is different in
giarism: stealing material from a source and pass- various areas of research. As reported, the rates of
ing it for as their own, for instance, by buying a prevalence of plagiarism are 78% in the students
preordered paper, copying an entire paper without of Organizational Studies and 63% in the students
acknowledging it, presenting another student’s of humanities. Also, there is a meaningful differ-
work without their knowledge, presenting some- ence between the behavior of American students
body else’s paper and passing it as your own, and that of Hungary in terms of plagiarism [31].
Similarly, studies carried out by Park in the United tion showed some signs of duplicate publication.
States, South Africa and Finland reveal that the According to Tramer et al, 17% of the reports and
rates of plagiarism are different for different ar- 28% of patient data were duplicated and the inclu-
eas of study [31]. According to some research, the sion of redundant data in a meta-analysis led to a
number of plagiarizing students in an institute in- 23% overestimation of the treatment effectiveness
creased from 11% in 1963 to 49% in 1993. These of an antiemetic agent. Redundant publication can
results include all forms of plagiarism, including undermine the results of studies which are based
copying material from encyclopedias, journals, on reliable evidence. It can exaggerate the signifi-
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
papers and the like [34]. Jude Carroll argues that cance of the results and mislead the reader [28].
unacknowledged copying of materials from books According to a met-analysis by Fanelli, medical
and journals are more common than from web scholars report more cases of scientific misconduct
sites [35]. that those of fields of study [23]. The University of
According to some research, 12% of the papers Sao Paolo has appeared in the media on the sus-
suspected of plagiarism belong to the students of picion of plagiarism in scientific publication and
Politics. According to another researcher, in an research. Journals are concerned about fabrication
American university, 16.5% students report to or making up of data in published papers or dupli-
have plagiarized, and 50% of the students believed cation production of data or text by other authors
that their classmates often copy-pasted material without proper citation or referencing or even du-
from the Internet without acknowledging it [36]. plication of the published research or texts in other
Satterthwaite argues that the rate of plagiarism in papers [43].
America is 30% [37]. One study shows that 94% Factors of Plagiarism
of students had misconducted in their research for According to Ashworth, the concept of plagiarism
at least once, and another study shows this rate to is not clear enough so much so that some students
be 91% [38]. Dordoy, who has studied plagiarism are afraid of unwitting plagiarism while putting to
in the students of an English university, claims that paper what they take to be their own ideas [44].
the rate of copying a paragraph from a book or a Researches show that students and teachers have
web site was 73.9% [39]. different understandings of plagiarism. For some
A study focusing on plagiarism reveals that 48% of teachers, some definitions are influenced by higher
the students were not aware of the methods and re- education values such as the copyright, personal
quirements of referencing [40]. The results of some effort and unity in the university [45]. The multi-
research on academic misconduct tell us that 76% plication of databases, with all its benefits, has also
of students had responded positively to cheating caused a rapid growth in plagiarism. Some factors
in high school or college [40]. Carroll holds that affecting student attitudes toward plagiarism are
because most students do not know what makes ignorance, lack of personal investment in their
for plagiarism, they do not commit it with the in- education, situational ethics, and lack of consistent
tention of deceiving others [41]. A study in 2009 styles among and within various disciplines [46].
indicates that 212 papers showed some potential According to Dordoy, the most important factors
signs of plagiarism. In these papers, the similar- influencing plagiarism include promotion, laziness
ity between the original paper and the republished or mismanagement of time, easy access to materi-
one was 86.2% while the average of shared sourc- als on the Internet, unawareness of rules and regu-
es was 73.1%. Of the 212 papers, only 47 (22%) lations and unwitting plagiarizing [39].
cited the original paper. Also, there were miscal- Some other factors causing plagiarism are low
culations, contradictory data and manipulation of commitment to the learning process and focus-
figures in 47% of the papers [42]. ing on getting an academic degree, the student life
Bloemenkamp et al. report that 20% of the papers style, family pressures, etc. make students try to
published in Holland’s Journal of General Medi- achieve the best results with the least efforts and in
cine had already been published elsewhere. Simi- the least time [47]. In the past, students had to go
larly, Schein and Paladugu reported that one sixth to libraries, retrieve information and retype it while
of the papers appearing in three journals of opera- today and with the rapid progress of the Internet,
this process has changed and most teachers believe seem to believe that ‘they should get grades based
that computers have made it easier to cheat and on effort rather than on achievement’.
plagiarize [48].Angellil-Carter claims that there is 3. Time management. There are many calls on
no transparency about factors influencing plagia- student’s time, including peer pressure for an ac-
rism all over a university [49]. Dickert claims that tive social life, commitment to college sports and
not only are Hong Kong university students not performance activities, family responsibilities and
familiar with plagiarism but also it is very hard to pressure to complete multiple work assignments in
detect plagiarism in this university [50]. Informa- short amounts of time. Little wonder that Silver-
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
tion is easily accessible through electronic media man (2002) concludes that ‘students’ overtaxed
and word processing applications can easily copy- lives leave them so vulnerable to the temptations
paste material [51]. of cheating’.
In some countries, there is a lot of pressure on re- 4. Personal values/attitudes. Some students see
searchers to publish so that if they do not publish no reason why they should not plagiarize or do it
in journals with high impact factors or other in- because of social pressure, because it makes them
ternationally indexed journals, they will not get feel good or because they regard short cuts as clev-
promoted even if they have high instructional er and acceptable.
skills. This situation represents the familiar saying 5. Defiance. To some students plagiarism is a tan-
“Publish or perish.” Therefore, some scholars may gible way of showing dissent and expressing a lack
make ethical mistakes under the pressure to make of respect for authority. They may also regard the
progress and to hurry up with publishing [9]. task set as neither important nor challenging.
Cultural issues are specially considered in the 6. Students’ attitudes towards teachers and class.
problem of plagiarism. Cheating and plagiarism is Some students cheat because they have negative
an acceptable practice among the teachers and stu- student attitudes towards assignments and tasks
dents of countries where there is little awareness of that teachers think have meaning but they don’t
copyright [52]. A study reveals that students with a (Howard, 2002). Burnett (2002) emphasizes the
stronger belief in detecting plagiarism commit this importance of a relationship of trust between stu-
less than others and turn out to have better writing dent and teacher, because ‘the classes in which
skills, self-confidence and creativity [53]. Robert [students] are more likely to cheat … are those
Harris takes students’ looking for short cuts, their where students believe their professor doesn’t
low interest in the research subject, their low plan- bother to read their papers or closely review their
ning skills, mismanagement of time, lack of skills work’.
in scientific writing and their interest in ignoring 7. Denial or neutralization. Some students deny to
regulations as some of the reasons why students themselves that they are cheating or find ways of
take to plagiarism [54]. legitimizing it by passing the blame on to others
Another study shows that the following are among 8. Temptation and opportunity. It is both easier and
the most important reasons why students plagia- more tempting for students to plagiarize as infor-
rize: mation becomes more accessible on the Internet
1. Genuine lack of understanding. Some students and web search tools make it easier and quicker to
plagiarize unintentionally, when they are not fa- find and copy.
miliar with proper ways of quoting, paraphrasing, 9. Lack of deterrence. To some students the bene-
citing and referencing and/or when they are un- fits of plagiarizing outweigh the risks, particularly
clear about the meaning of ‘common knowledge’ if they think there is little or no chance of getting
and the expression ‘in their own words’. caught and there is little or no punishment if they
2. Efficiency gain. Students plagiarize to get a bet- are caught [31].
ter grade and to save time. Some cheat because of Some of the perceived obstacles to changing the
what Straw (2002) calls ‘the GPA thing, so that management of plagiarism are:
cheating becomes ‘the price of an A’ (Whiteman a reluctance by staff to process a case of suspect-
& Gordon, 2001). Auer &Krupar (2001) identify a ed plagiarism due to the time and workload in-
strong consumer mentality amongst students, who volved in proving‟ the plagiarism;” a reluctance
to become the one who dares to differ where it has some of these applications are free and they are all
been somewhat common practice to “turn a blind good for English texts. There are methods, how-
eye” to some relatively minor cases of plagiarism; ever, that can be used in any language. The Glatt
a perception that the University is reluctant to act plagiarism service, for example, is a computer ap-
on suspected plagiarism and that therefore the ef- plication which does not depend on correlation
fort expended by individual staff is likely to be techniques. It deletes every fifth word in a paper
fruitless in terms of dissuading or punishing pla- suspected of plagiarism and the author of the paper
giarism; a fear of risking collegial relationships is then asked to fill in the missing words. If the
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
with students by seeming or becoming authoritar- student can’t fill in 77% of the missing words, the
ian through a focus on minimizing plagiarism; a work is most probably plagiarized [17]. Wcopy-
concern that following through with cases of re- find is a free application on the Internet which can
peated plagiarism that may lead to student expul- be used to detect plagiarism. This software exam-
sion might damage the international reputation of ines a group of document files to compare their
the faculty or university; and a further concern that content [57].
such damage to reputation may result in reduced There are other tools such as http://ithenticate.com,
international enrolments; fear of harassment from http://www.crossref.org) and http://turnitin.com to
the student(s) accused of plagiarism and/or from discover plagiarism, but these tools can examine
their friends (such harassment occurred previously the papers indexed in MEDLINE only [42]. This
in the faculty); fear of student complaints if accu- area of study has been attended to by Turnitin and
sations of plagiarism are made (this had been an Safe Assign in the last 10 years. Kohler and We-
issue for some sessional staff who were concerned ber-wulf carried out a study in 2010 on 47 systems
that a student complaint might mean the end of of direct plagiarism detection and concluded that
their employment) [55]. only 5 of them were to some extent useful [58].
Detecting Plagiarism There are three approaches to detecting plagia-
Detecting plagiarism is hard and this makes pla- rism. The most common approach is by comparing
giarism a threat to the health of scientific literature. the document against a number of other documents
Often plagiarism is recognized by learned review- on a word by word basis. The second approach is
ers who possess up-to-date knowledge in their own by taking a characteristic paragraph and just doing
specialist filed [23]. a search with a good search engine like Google.
The following include some of the methods that And the third is by style analysis, which is usu-
can be used by researchers to detect plagiarism. 1) ally called stylometry [30]. Computer applications
General sight overview: the academic staff should reports cannot be simply relied here and there will
assess the sentence structure, grammar and idioms be need for specialist interpretation in such cases
used in the students’ assignments. They should ex- [30]. Detecting plagiarism is sometimes very dif-
amine the work which is lower or higher than the ficult, especially when rephrasing has occurred,
student’s abilities can afford; 2) Search of online when non-electronic sources have been used and
bookstores: these stores help the academic staff to when there is shift of language between the origi-
decide whether the students mentioned the right nal document and the plagiarized one [30]. Al-
dates for publications or whether the sources used though comparing abstracts is a good way to de-
were appropriate to the subject in hand; 3) Search tect plagiarism, a comparison of the full texts will
of keywords: searching keywords in search engines render better results [23].
is another tool in the hands of academics to find Systems of retrieving data or plagiarism detect-
instances if plagiarism, although today’s search- ing applications are capable of finding plagiarism
ing technology makes it possible for us to search where a verbatim copy of words has happened, but
a whole text, too; 4) a use of plagiarism services: what happens when the order of words has been
there are many software applications and tools and changed but not the overall meaning of the sen-
web sites that can help us detect plagiarized texts tences? Naturally, in such cases, the software will
[56]. Most of these tools use correlation techniques not be able to detect plagiarism and the plagiarizer
to detect similarities between documents. Only will be able to deceive it. Therefore, these systems
may become useless in the short run [11]. they know well about it and not try to learn more.
Strategies to Tackle Pagiarism Similarly, the staff may also wrongly think that
As Delvin points out universities do not like to students are well aware, and thus lose the opportu-
endanger their reputations for the sake of plagia- nity to teach students to avoid plagiarism [40]. Al-
rizers [59]. One of the measures needed to assure though the preventing approach takes more time, it
the quality of universities is to make sure that their is more effective than other approaches [64]. Ex-
assessing policies and activities are useful enough ercises and activities encouraged by staff have led
that their assessment is effectively examined in to good results. These activities include methods
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
terms of its validity, reliability and fairness. Some of appropriate citation, quotation, paraphrasing,
of the plagiarism preventing measures recom- phrasing and presenting some instances of plagia-
mended by quality assuring organizations include rism [40].
providing a definition of academic misconduct The attempt by some Australian universities to
with regard to plagiarism, cheating, identity fraud hide their management of plagiarismhas made it
and using inappropriate content” [60]. In order to difficult to share the best practices in this field.
effectively and fairly fight against plagiarism, stu- Although it seems that common policies are in
dents and staff need to have the same definition of it practice with respect to plagiarism, there is noth-
[61]. A preventing approach on the part of the staff ing to indicate the success of these policies. Del-
can eradicate this sort of misconduct and make for vin reports that for some, “catch and persecute”
academic progress and consistency in freshmen. leads to a decrease in plagiarism [59] while there
Along with practical approaches based on skills, is little evidence to suggest the effectiveness of
interactive prevention can not only improve the such a measure [52]. Gallant similarly argues that
students’ skill in referencing and citing and avoid- traditional methods of preventing plagiarism, such
ing plagiarism but also increase their awareness of as persecution as a preventing measure, honor
and sensitivity to this matter [62]. code systems and instructor detection are not ef-
University authorities are responsible for prevent- fective today [8]. In the UK, in order to minimize
ing plagiarism in all departments of their universi- plagiarism, they makes use of special courses, as-
ties. The universities’ policies in this regard should sessment, giving awareness to students, teaching
be clearly defined and announced and disseminat- student the necessary skills, detecting plagiarism,
ed among students and staff, preferably published persecution and special policies, and instructional
on the universities’ web sites, in libraries, student programs [65].
deputy offices, research centers and dormitories. Conway and Groshek have shown that student eth-
Academic staff should always talk to students ics is flexible and can be shaped at any level of
about academic values and avoiding plagiarism. education. Students showed in this research that
Students, on the other hand, should try to improve they are concerned about ethical violations and ex-
their skills in writing papers, research method- pect that severe punishment will be considered for
ology, and organizing data. University teachers those students who plagiarize or fabricate materi-
should encourage academic honesty in students, als.” Repeating anti-plagiarism actions at any stage
clearly define plagiarism for them, and point out of education can empower students [66]. MIT has
to them that they should reference the accessed defined good methods and policies to manage aca-
materials. University policies can also help staff to demic misconduct. In this university, teachers are
decide how to deal with plagiarism [17]. rewarded for teaching the right academic behavior
Burke points out that universities should focus on to students [67]. The Online Writing and Commu-
teaching student as to how they should avoid pla- nication Centerof this university runs a program
giarism [63]. The results show that teaching stu- for improving students’ writing skills and explains
dents, especially in the first year, is more effective different aspects of plagiarism [68]. In some uni-
than other ways of preventing plagiarism. Landau versities, such as Berkeley, people are academical-
argues that taking an active approach to plagiarism ly sanctioned for plagiarism [69]. In Stanford Uni-
is very important because students who are not versity, students learn about the university policies
fully aware of such misconduct may suppose that to deal with academic misconduct, copyright and
for doing informed, thorough and conscientious Republication of an article in another language
reviewing. Journal editor, who are themselves dis- with cross-referencing. There are mixed thoughts
tinguished scholars, should assure the originality on the acceptability of this practice. Typically the
of the material they publish [42]. The ideas and two (or more) journals need to work together and
thoughts of different thinkers and authors are in- often permission to publish is needed. The Interna-
evitable connected. So, it is a great responsibility tional Council of Medical Journal Editors has pub-
of authors to make sure that no plagiarism occurs lished criteria for this practice. While publication
when they publish their results. This means that the of data in an uncommon language need not neces-
authors must do whatever they can to ensure that sarily prevent it being presented in English, sec-
the words of their papers are theirs. They should be ondary publication should follow the International
always sure that it is clear for their readers whether Council of Medical Journal Editors guideline in
the ideas presented in the papers are theirs or oth- the uniform requirements [9].
ers’ and this could be clear by citing earlier pub- Strategies to Avoid Plagiarism
lished sources [24]. 1. Read the instructions for authors provided by
The process of peer-reviewing is the best mech- the journal.
anism to ensure the high quality of publications. 2. Always acknowledge the contributions of others
But recent studies have shown that lack of appro- and the source of ideas and words, regardless of
priate standards can result in duplicate publication whether paraphrased or summarized.
as well as publication of papers which include 3. Use of verbatim text/material must be enclosed
plagiarism [42]. At present, plagiarism tackling in quotation marks.
approaches focus on instructions to students and 4. Acknowledge sources used in the writing.
making them aware of the related policies and pos- 5. When paraphrasing, understand the material
sible outcomes. For instance, students are taught to completely and use your own words.
utilize to access and use sources in the right way. 6. When in doubt about whether or not the concept
Also, developing scientific integrity and honor or fact is common knowledge, reference it.
code systems are among good approaches to pla- 7. Make sure to reference and cite references ac-
giarism [70]. Carroll argues that teachers should curately.
focus on prevention [71]. McCabe similarly thinks 8. If the results of a single complex study are best
that reducing the chances of plagiarism is an im- presented as a cohesive whole, they should not be
portant tool in reducing scientific misconduct [72]. sliced into multiple separate articles.
Authors should bear in mind that it is not accept- 9. When submitting a manuscript for publication
able to republish a paper which has already been containing research questions/hypotheses, meth-
published, but this rule has the following excep- ods, data, discussion points, or conclusions that
tions, if the right disclosure is made to the editors have already been published or disseminated in a
and reader: significantmanner (such as previously published as
Prior publication in abstract form only (generally anarticle in a separate journal or a report posted on
<400 words); theInternet), alert the editors and readers. Editorss-
A study is too large and/or complex to be reported hould be informed in the cover letter, and reader-
in one article. A proposed rule of thumb is an ex- sshould be alerted by highlighting and citing thee-
pansion of the original article by 50%. However, arlier published work.
each article should address a different distinct and 10. When submitting a manuscript for potential
publication, if there are any doubts or uncertainty in Science and Technology. 2010;4(3):1-16.
about duplication or redundancy of manuscripts 2.DeVoss D, Rosati AC. “It wasn’t me, was it?”
originating from the same study, the authors should Plagiarism and the Web. Computers and Composi-
alert the editors of the nature of the overlap anden- tion. 2002;19(2):191-203.
close the other manuscripts (published, in press/ 3. Pakjou A, Izadi M, Masoudipour Sh, Fazel M.
submitted, unpublished) that might be part of them “Pattern of travel medicine ethics in international
an uscript under consideration. Augmenting old cooperation programs.” Journal of Military Medi-
data that was previously published with new ad- cine. 2011;13(2):117-123.
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
ditional data and presenting it as a new study can 4.Stewart Jr CN. Research Ethics for Scientists: A
be an ethical breach and should be fully disclosed Companion for Students: Wiley; 2011.
to the editors. 5.Roberts DM, Toombs R. A scale to assess per-
11. Write effective cover letters to the editor, espe- ceptions of cheating in examination-related situ-
cially regarding the potential for overlap in publi- ations.Educational and Psychological Measure-
cation. The cover letter should detail the nature of ment. 1993;53(3):755-62.
the overlap and previous dissemination and ask for 6.Brown GO. Out of the way: how the next copy-
advice on the handling of the matter. right revolution can help the next scientific revolu-
12. Become familiar with the basic elements of tion. PLoS Biol. 2003 Oct;1(1):E9.
copyright law [28]. 7.Beheshti SM. Plagiarism. Tehran 2011 [Feb, 7];
Available from: http://www.tebyan.ne.
Conclusion 8.Gallant TB. Academic integrity in the twenty-
Ethical problems in science are quickly increas- first century: A teaching and learning imperative:
ing and have become controversial issues in uni- Jossey-Bass Inc Pub; 2008.
versities and educational research institutes. These 9.Miziara ID. Ethics in scientific publications: the
problems have also been reflected in media news double copyright problem. Braz J Otorhinolaryn-
recently. The growth of information technology, gol. 2010 Sep-Oct;76(5):543.
competition between countries, rapid growth of 10.Hart M, Friesner T. Plagiarism and poor aca-
knowledge, fast multiplication of scientific jour- demic practice–a threat to the extension of e-learn-
nals, lack of good explication of plagiarism and ing in higher education? Electronic Journal on e-
different understandings of it, lack of awareness, learning. 2004;2(1):89-96.
mismanagement of time, and low culture etc. have 11.Foudeh P. Performance evaluation of informa-
all contributed to the prevalence of plagiarism in tion retrieval methods in dealing with plagiarism.
the scientific community. This has worried scien- Scientific Communication. 2009;2(3):1-5.
tific institutes and has made them react to it. Some 12.Mallon T. Stolen words: Forays into the origins
institutes focus on detecting and persecuting while and ravages of plagiarism: Penguin Books; 1991.
others concentrate on preventions and teaching the 13.loghatnamehDehkhoda. Tehran2012 [cited
right behavior. Excessive stress on detection of 2012 May, 12]; Available from: http://www.jasjoo.
plagiarism has made for the development of data com/books/wordbook/dehkhoda.
retrieving systems in recent years, but these are 14.Bartlett J. Familiar quotations: a collection of
not effective enough, and even if they were, they passages, phrases, and proverbs traced to their
would not be the best solutions. Effective preven- sources in ancient and modern literature: Little,
tion through proper education at the right time, Brown, and company; 1904.
proper interaction between teachers and students 15.Barnhart RK, Steinmetz S. Chambers Diction-
and devising appropriate policies for this purpose ary of Etymology–the origins and development of
are possible means of tackling plagiarism. over 25,000 English words.Chambers. Edinburgh,
uk; 1988.
References 16.Fialkoff F. There’s no excuse for plagiarism.
1.Tavakol M, rad MN. Plagiarism with explana- Library Journal. 1993;118((17)):56.
tion of the sociology of science .Journal of Ethics 17.Austin MJ, Brown LD. Internet plagiarism: De-
veloping strategies to curb student academ48.Ben
ic dishonesty. Internet and Higher Education. 33.Park C. Rebels without a clause: towards an in-
1999;2:21-34. stitutional framework for dealing with plagiarism
18.Conners M. Cybercheating: the Internet could by students. Journal of further and higher educa-
become the newest battleground in academic tion. 2004;28(3):291-306.
fraud. The Muse. 1996. 34.University BGS, Administrators NAoSP, Af-
19.College LHU. Undergraduate modular scheme fairs AfSJ, Integrity CfA. Academic Integrity: The
(awards of the University of Liverpool)—appen- Truth of the Matter: Bowling Green State Univer-
dices. 2012 [cited 2012 May, 15]; Available from: sity; 1995.
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
48.Benning V. Higher learning, lower behavior- Prosper, but Do They Get College Degrees? Col-
students cheat by computer. The Seattle Times. lege Student Affairs Journal. 1995;15(1):87-93.
1998:A7. 66.Conway M, Groshek J. Ethics Gaps and Ethics
49.Angélil-Carter S. Stolen language? Recherche. Gains: Differences and Similarities in Mass Com-
2000;67:02. munication Students’ Perceptions of Plagiarism
50.Hyland F. Dealing with plagiarism when giving and Fabrication. Journalism & Mass Communica-
feedback. ELT Journal. 2001;55(4):375-81. tion Educator. 2008;63(2):127-45.
51.Grover D. Plagiarism and the internet: the use of 67.Massachusetts Institute of Technology Policies
Downloaded from militarymedj.ir at 4:41 +0430 on Friday August 31st 2018
correlation techniques to detect plagiarism. Com- and Procedures. 2012 [cited 2012 May, 23]; Avail-
puter Law and Security Report. 2003;19(10):6-8. able from: http://web.mit.edu/policies/10.0.html.
52.Hamilton M. Managing student plagiarism in 68.MIT Online Writing and Communication Cen-
large academic departments. 2002. ter. 2012 [cited 2012 May, 23]; Available from:
53.Martin DF. Plagiarism and technology: A tool http://web.mit.edu/writing.
for coping with plagiarism. The Journal of Educa- 69.Berkeley University of California, Student
tion for Business. 2005;80(3):149-52. Conduct, Sanctions. 2012 [cited 2012 May, 23];
54.Harris R. Anti-plagiarism strategies for research Available from: http://students.berkeley.edu/osl/
papers. Virtual salt. 2004;4:6. sja.asp?id=1004.
55.Devlin M, editor. Policy, preparation, preven- 70.Barrett R, Malcolm J. Embedding plagiarism
tion and punishment: one faculty’s holistic ap- education in the assessment process. International
proach to minimising plagiarism2011: Swinburne Journal for Educational Integrity. 2006;2(1):38-45.
University. 71.Carroll J. Institutional issues in deterring, de-
56.Ryan J. Student plagiarism in an online world. tecting and dealing with student plagiarism. Joint
ASEE Prism Magazine. 1998. Information Systems Committee (JISC). 2004.
57.Bloomfield L. WCopyfind 2.1 instructions. 72.McCabe DL, Treviño LK, Butterfield KD.
2012 [cited 2012 May, 13]; Available from: Cheating in academic institutions: A decade of re-
http://www.plagiarism.phys.virginia.edu/WCopy. search.Ethics &Behavior. 2001;11(3):219-32.
find%202.1.html.
58.Sheard J, Dick M. Directions and Dimensions
in Managing Cheating and Plagiarism of IT Stu-
dents. 2012.
59.Devlin M. Problem with plagiarism. Campus
review. 2003;12(44):4-5.
60.QAA. Code of practice for the assurance of ac-
ademic quality and standards in higher education.
2000 [cited 2012 May, 15]; Available from: www.
qaa.ac.uk/public/Cop/COPaosfinal/contents.htm.
61.Stefani LAJ, Carroll J, Centre LG. A briefing
on plagiarism: Learning and Teaching Support
Network; 2001.
62.Dunn K. Recommendations for an Interactive
Approach to Plagiarism Prevention. 2011.
63.Burke M. Deterring plagiarism: A new role for
librarians. Library Philosophy and Practice (e-
journal).2005:10.
64.Compton J, Pfau M. Inoculating against pro-
plagiarism justifications: Rational and affective
strategies. Journal of Applied Communication Re-
search. 2008;36(1):98-119.
65.Mitchell CM, Wisbey ME. Cheaters Never
Coal
Hydro electric Natural gas Renewable
based
plant plant energy
plant
Process
efficiency per
cent 30 100 35 100
Maximum
availability 47 32.5 64.9 15.9
VII.CONCLUSIONS
[13] Wang, Y., Gu, A., Zhang, A., 2011. “Recent development of
energy supply and demand in China, and energy sector
In the preceding text of paper forecasting of electricity demand prospects through 2030”. Energy Policy 39, 6745-6759, 2011
is done for the year 2030 by following baseline scenario of [14] Vashishtha, S., Ramachandran, M., “Planning for demand-side
2012. Projected electricity demand is estimated to be 212.7 management programmes in Indian utilities: A case study of
billion KWh for the year 2030. To meet this demand, suitable Rajasthan”. Pacific and Asian Journal of Energy 13(1), 25-36,
supply side mix is proposed based on data input from various 2003
sources. The projected installed capacity approximately is [15] Heaps, C., Erickson, P., Kartha, S., Kemp-Benedict, E., 2009.
52,450 MW. It is also observed that coal based power plant Europe Share of the Climate Challenge; Domestic Actions and
will dominate with 76 per cent share followed by hydraulic International Obligations to Protect the Planet. Stockholm
power plant 9.8 per cent, renewable power plant with 9 per Environment Institute.
cent and natural gas power plant 5 per cent. [16] Dagher, L., Ruble, I., “ Modeling Lebanon’s electricity sector:
Alternative scenarios and their implications”. Energy 36, 4315-
4326, 2011
REFERENCES
[1] Government of India, Ministry of Home Affairs, Office of the
Registrar General and Census Commissioner, India.
http://www.censusindia.gov.in/2011census/PCA/PCA_Highlight
s/pca_highlights_file/India/Chapter-1.pdf [Last visited on
24.06.2013]
[2] Directorate of Economics and Statistics, Planning Department,
Government of Maharashtra, Mumbai. Economic Survey of
Maharashtra 2011-12.
[3] Kale, R., Pohekar, S.,” Electricity demand supply analysis:
Current status and future prospects for Maharashtra, India.”
Renewable and Sustainable Energy Reviews 16, 3960-3966,
2012
[4] MAHAGENCO, 2013. Maharashtra Power Generation Company
Limited. http://www.mahagenco.in/index.php/about-us [Last
visited on 24.06.2013].
Abstract— Due to the depletion of fossil fuels and this oil needs to undergo refinement before it can be used in
increased awareness of environmental problems, the world is diesel engine.
looking to use alternative fuels. This paper is aimed at the M. Senthil Kumar, M. Jaikumar (2014) used waste cooking
conversion of waste edible oil into diesel fuel, which can then be oil (WCO) and its emulsion and tested it on a single cylinder
used in Compression Ignition (CI) engines. Production of edible water cooled engine. Base data was generated with diesel and
oil was 7.6 million tonnes in 2013-14. Sunflower oil is used in
majority of the houses and restaurants in India. So, the
neat WCO as fuels. Subsequently, WCO oil was converted
availability of waste sunflower oil in restaurants and houses is into its emulsion and tested. Neat WCO resulted in higher
more compared to any other edible oil. Therefore waste smoke, hydrocarbon and carbon monoxide emissions as
sunflower was considered as potential oil which could be used as compared to neat diesel. Significant reduction in all emission
an alternative to neat diesel fuel. The properties of waste was achieved with the WCO emulsion.
sunflower oil (WSO) were determined, which includes its specific Prashant Singare and P.V. Walke (2010) carried out the
gravity, kinematic viscosity, flash point, fire point, calorific value, performance analysis of soyabean and sunflower oils as C.I.
cloud point and pour point. The waste oil was initially refined engine fuel by reducing viscosity through Heat exchanger. No
using transesterification process and again the physical transesterification of oils was carried out. Results showed
properties of refined waste sunflower oil (RWSO) were
determined. An experimental study was conducted to evaluate
decrease in smoke opacity; decrease in BSFCand an increase
and compare the performance and emissions of different blends in brake thermal efficiency.
(B15,B20 and B25) of RWSO on a four stoke diesel engine. The Milan Tomic Lazar, Savin Radoslav, Micic Mirko
results indicate that blend B20 is an optimum fuel blend in terms Simikic, Timofej Furman (2014) carried out transesterification
of increased engine performance and reduced emissions process and the biodiesel obtained from sunflower oil was
compared to neat diesel fuel. blended with fossil diesel which did not have additionally
added additives for the improvement of lubrication properties.
The results indicated increased specific fuel consumption and
Keywords—Transesterification, waste sunflower oil, Biodiesel,
decreased thermal efficiency, decrease in CO2 and CO
Methyl Ester, Alternative fuels.
emissions and improved lubrication.
Jehad A. Yamin,Nina Sakhnini,Ahmad Sakhrieh,M.A.
I. INTRODUCTION Hamdan (2013) made an environmental and performance
The growing concern of the increasing demand for fossil study of a 4 stroke CI engine powered with waste groundnut
fuel and its increasing harmful effect on the environment has oil. Transesterification process was used for the refinement of
led to the search for a better environment friendly fuel. A lot of sunflower oil and then both used and unused oils were tested
research has been done in the past decade where various types on CI engine. Results showed lower thermal efficiency and
of vegetable oils have been used as an alternative diesel fuel. increase in CO2 emissions of biodiesel compared to pure
This research mainly aims at using Waste Sunflower Oil diesel.
(WSO) which is generally discarded after its use in restaurants K.A. Antonopoulos, D.C.Rakopoulos, D.T. Hountalas,
and houses as an alternative to diesel fuel. The sunflower E.G.Giakoumis (2006) made a comparative performance and
oilseed productivity in India was 706 kg/hectare in the year emissions study of a direct injection Diesel engine using
2012[1]. Though the overall sunflower oil production is less in blends of Diesel fuel with vegetable oils or bio-diesels of
India compared to the production of other oils, it is still used in various origins. Results showed that NOx and CO emission is
majority of the restaurants and houses as cooking oil. The used reduced .The smoke density was reduced with use of bio
sunflower oil is acidic in nature and also the viscosity of the oil diesel and smoke density was increased with the use of
is very high compared to conventional diesel fuel Table 1. So, vegetable oil. For higher load, engine shows high specific fuel
consumption.
This study aims at the comparison of performance and II. FUEL CHARACTERIZATION AND
emissions of a 4 stroke diesel engine powered by different EXPERIMENTATION
blends (B15, B20 and B25) of waste sunflower oil obtained The properties of the WSO and refined waste sunflower oil
from various household and restaurant sources. (RWSO) were determined and it can be clearly seen from
Laforgia D., Ardito V., Biodiesel Fueled IDI Engines: Table 1 that the viscosity of WSO is almost 14 times of that of
Performances, Emissions and Heat Release Investigation, Bio- pure diesel. And after transesterification process, the viscosity
resource Technology (1995). Laforgia D., Ardito V., reported reduced considerably. Also it can be seen from the table that
that the higher viscosity of biodiesel enhances the lubricating the calorific value of RWSO is much less compared to pure
property and excess oxygen content results better combustion. diesel.
The higher oxygen content of biodiesel causes more carbon
dioxides at tailpipe which is a product of better combustion. Table 1 : Comparison of properties of pure diesel, WSO, RWSO.
The better combustion decreases the harmful CO and Properties Pure diesel WSO RWSO
hydrocarbon at the tailpipe. On the other hand, and oxides of Kinematic Viscosity
2.44 33.2 4.363
nitrogen emissions are increased with biodiesel fuel under @ 25 ◦C (cSt)
normal operating conditions. Flash point ( C) 71 139 143
Fire point( C) 103 152 149
M. Ziejewski, H. Goettler and G. L. Pratt, Comparative Cloud point( C) 3 -1 -2
analysis of the long-term performance of a diesel engine on Pour point( C) -5 -6 -8
vegetable oil based alternate fuels, SAE Paper (1986). M. Density(kg/m3) 835 919.2 887.3
Ziejewski, H. Goettler and G. L. Pratt, were evaluated that 25- Calorific
44000 37900 38100
75 blend (v/v) of alkali-refined sunflower oil and diesel fuel, a Value(kJ/kgK)
25-75 blend (v/v) of high oleic safflower oil and diesel fuel, a
non-ionic sunflower oil-aqueous ethanol micro emulsion, and The WSO couldn’t be directly used in the engine as
a methyl ester of sunflower oil as fuels in a direct injected, previous study showed that it led to gum formation and smoky
turbo-charged, intercooled, 4-cylinder Allis-Chalmers diesel exhaust due to improper combustion. So, the WSO had to be
engine during 200-hour EMA cycle laboratory screening transesterified, blended with pure diesel in various proportions
endurance tests. The results indicated that time had a and then tested on the engine.
significant effect only on exhaust temperature. In all other The biodiesel was made from WSO, which was initially
cases, time was not a factor. However, significant differences heated to about 120 C to remove the water content from the
in the intercepts of the prediction equations were found oil. After that a calculated exact quantity of methanol and KOH
between tested fuels. (lye) was added to the oil and the entire mixture was constantly
Perkins LA, Peterson CL, Auld DL. Durability testing of stirred with addition of heat. The temperature of the mixture is
transesterified winter rape oil (Brassica Napus L.) as fuel in kept to about 50 C. After stirring it for 1 hour, the mixture is
small bore, multi-cylinder, DI, CI engines. SAE paper No. allowed to settle for about 4-6 hours which separates out the
911764. Warrendale, PA: SAE, (1991). glycerol from the mixture and hence pure biodiesel is obtained.
Perkins LA, Peterson CL, Auld DL. Tests were conducted Fig. 2 shows the biodiesel process flow diagram.
to evaluate the performance and exhaust emissions of an Oils are made up of triglycerides which are esters of free
agricultural tractor engine when fueled with sunflower oil, fatty acids with trihydric alchol, glycerol. In transesterification
rapeseed oil, and cottonseed oil and their blends with diesel process, the triglyceride molecule is broken with the help of
fuel (20/80, 40/60 and 70/30 volumetrically). Tests were also catalyst (KOH) and methanol, which separates the free fatty
carried out with diesel fuel to be used as a reference point. acids and the glycerol. Methanol molecule then gets attached to
Engine power, torque, BSFC, thermal efficiency, NOx and the free fatty acid chains forming methyl esters. Fig.1
CO2 were recorded for each tested fuel. represents the exact chemical formula of the reaction.
Shirneshan A, Almassi M, Ghobadian B, Borghei A.M,
Najafi G.H. Effects of Biodiesel and Engine Load on Some
Emission Characteristics of a Direct Injection Diesel Engine,
September 17, (2012) Shirneshan A, Almassi M, Ghobadian
B, Borghei A.M, Najafi G.H. performed the experiments at the
rated torque speed of 1800 rev/min, and at 25%, 40%, 65%
and 80% engine loads. At each engine load, experiments were
Fig 1: Transesterification reaction process
carried out for diesel and each blended fuel. In this paper, the
effects of engine load and biodiesel on emissions included
HC, CO, CO2 and NOx were investigated. The quantity of methanol and KOH used in the process is
variable for different types of fatty acids; therefore it is
necessary to carry out titration process, which enables us to add
the exact amount of KOH required for transesterification of a
particular batch of biodiesel.
2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE-2015)
Performance analysis:
TrafficIntel
Smart Traffic Management for Smart Cities
1
Student, Department of Computer Science, S.K.N.C.O.E, Pune
2
Ass. Professor, Department of Computer Science, S.K.N.C.O.E, Pune
Abstract— In India the unbalanced growth in the freight entirely inefficient in long term, there is need to utilize the
volume as compared to the road length has led to severe issues of existing infrastructure to its maximum capacity. This can be
traffic congestion, road safety and health hazards, which, as done by applying intelligence to the existing infrastructure, i.e.
estimated by recent studies will surely escalate very rapidly switching from static road traffic management system to a
within coming years. The use of a real time dynamic traffic
management system to intelligently navigate the vehicles can
more intelligent and dynamic real time traffic management
optimize the traffic flow on the roads, thus utilizing the system. considering the high dynamicity of the traffic flow
infrastructure efficiently and providing an environment along with polynomial increase of number of vehicles on the
conducive to solving gridlock in cities. The authors propose a real road networks makes management of the said traffic flow
time traffic management system (RTMS) consisting of real time through a RTMS much more complex [6]. Furthermore the
traffic monitoring system formed by small network of road side solution to a traffic congestion usually tends to be a series of
units, junction units and mobile units to dynamically decide the small intricately correlated solutions, applying only one of
time of traffic lights to discourage formation of gridlock, coupled which, while no doubt useful, generates insubstantial results.
with a web based application for vehicle drivers that will derive Here the authors propose a system consisting of real time
the data from real time traffic analysis to indicate the local traffic
traffic analysis, the data reported by which will further be
flow and suggest the incoming vehicles to make use of alternative
routes in order to further alleviate growth of the gridlock. derived by a web based application to prevent, contain and
disseminate the traffic congestion in real time. The system
Keywords — traffic congestion, real time traffic management consisting of a RSU (Road Side Unit), JU (Junction Unit) and
system, smart traffic lights MU (Mobile Unit) works on various levels to solve the
congestion. A part of the traffic analysis system i.e. the JU
I. INTRODUCTION will work at an intersection by communicating with the MU
(vehicles) to gauge the traffic density and dynamically set the
The road traffic, being versatile and economical is considered
time for traffic lights depending on it so as to maintain a
to be the most common mode of transportation in India.
constant flow of vehicles and if necessary, disperse the traffic
However, according to a study [18] by The Transport
quickly without letting it accumulate and form a congestion.
Corporation of India (TCIL) and IIM (Calcutta) on operational
While RSU’s will, by, operating on longer roads without
efficiencies of freight transportation by roads the traffic
intersections and communicating with local MU’s, try to
congestion has become such a dire situation that on some key
ascertain the traffic flow and formation of congestion. On
corridors such as Mumbai-Chennai, Delhi-Chennai and Delhi-
confirmation of a congestion the RSU’s will transfer this
Guwahati the vehicles crawl at an average speed of less than
information to central server via internet. The web application
20 kmph while it's only 21.35 kmph on Delhi-Mumbai stretch.
will, on suspicion and confirmation of a congestion by RSU’s
Consequently the Indian economy faces losses of around
in a particular area, inform the incoming vehicles and suggest
60,000 crore every year, which translates roughly to a
usage of another route thereby inhibiting the further growth of
staggering amount of $10.82 billion each year not accounting
the congestion, additionally the vehicles already within the
the subsequently engendered fatal environmental damages,
congestion can be notified to move synchronously to optimize
losses due to delay in receiving emergency services such as
the traffic flow by minimizing the progressive delay that
medical help etc. The study reports that while India's freight
occurs due to slower human reaction times when the stagnant
volume was increasing at a compounded annual growth rate of
traffic stream starts moving.
9.08% and vehicles were growing at 10.76%, the road length
In developing countries like India where the growth rate of
was increasing at only 4.01%. This has resulted paucity of vehicles outruns the growth of road length, the traffic
road space to accommodate vehicles and to increase the speed management is vital, as without it the increasing severity of the
ensuing the traffic congestions that lead to the huge gridlocks. congestion and its subsequent adverse effects are imminent. In
To overcome the gridlocks without modifying the existing this paper the authors have proposed a system as an attempt for
infrastructure, which proves to be cumbersome, expensive and overcoming the infrastructural and other issues to and
47
alternate path on its basis, which has very little effect on traffic for further analysis of vehicular density for gauging the
traffic congestion, that too on a local level. Also if all the formation of congestion. The MU’s i.e. the tags placed inside
vehicles make use of the same guidance system it leads to them continuously broadcast RF beacons, once the MU arrives
concentration on other routes [17]. with the range the signal is sensed by the RSU.
The RSU’s are to be placed on the on the length of the roads
III. PROPOSED SYSTEM with an appreciable distance between them (about 200 meters)
The proposed system consists of three real time components [8]. The RSU (router) forwards this data to the appropriate
the RSU, the JU and the MU. The system makes use of active wireless coordinator, which relays the data to the server for
RFID (based on IEEE 802.15.4 protocol, 2.4 GHz ISM band), further analysis. Ideally the MU or the vehicle travels from
the specific RFID tags are to be kept in the vehicle, both these router to junction coordinator, i.e. the vehicle passes through a
coupled together form the MU i.e. the mobile unit. The RSU’s number of RSU’s towards the JU.
contain, a RFID reader together termed as a wireless router, The JU’s work at the intersections, acting partly as RFID
with an assigned gateway (i.e. a wireless coordinator) for a readers to measure the vehicle density at each side of the
particular set of RSUs. While the JU’s contain, within them, a intersection while simultaneously reading the data updated on
processor for the required computation, a controller for traffic the server by the RSU’s to estimate the incoming traffic along
lights and a RFID reader. The Tags emit radio signals that can each direction, this data, coupled with the wait time of the
be captured by devices like routers or coordinators. Routers vehicles at the junction and the distance of each of the vehicle
are capable of capturing tag data and relay the captured data to from that particular junction are the factors based on which the
either coordinator or another router in its range. Coordinators weight for a route of the road on the intersection will be
have a serial interface through which external GSM/ GPRS decided. These weights, calculated by the JU, for each
devices can be interfaced, thus enabling the further segment of the road on the intersection are measured against a
communication with the centrally located server. threshold to decide the time of the traffic light for the same.
The distance plays a major role in deciding the contribution of
an individual MU to the total effective weight of the segment
of the road, leading to incremental increase in contribution of
MU towards the effective weight of the road segment as it
nears the particular junction, this allows for easier
coordination between the JU’s to minimize the overall idle
time. Furthermore this enables the whole network of JU’s in
synchronicity to minimize, and in case it occurs, quickly
prevent the congestion from growing further.
The data updated by the RSU’s is also used to calculate the
lane velocity i.e. the average velocity of the vehicles on the
specific road segment. This can be done with using the
location of RSU’s and the timestamps for when the MU
arrives in its range, this helps in confirmation and later with
gauging the intensity of the congestion. This data can further
Figure 1 : General Architecture of the System be relayed by the web base application to the users to allow
selection optimal path towards the destination, and in case of
The figure 1 shows the general architecture of the system, congestion, the active users headed to the congested route can
depicting the data flow between the MU, the RSU, the JU and take an alternative route thereby reducing the glut of vehicles
further the server. The RSU's and the JU's sense the data contributing to the traffic congestion and disseminating the
associated with the specific RFID tags, identifying the MU's traffic over various available routes.
in their locality and further the vehicular density of the same. The system aims at synchronizing the traffic lights to
This data is further reported to the centrally locate server via minimize the possibility of formation of congestion, and in
internet, to be used by the web based application, amongst case of congestion, the system works on multiple levels to
other things. The data reported and updated by all the other rectify the traffic congestion. Firstly it tries to resolve the
RSUs and the JUs is read by a specific JU from the centrally congestion owing to the dynamicity of traffic lights time and
located server so as to ensure proper synchronization, thereby secondly prunes its further growth by alerting the incoming
minimizing the overall idle time of the vehicles and vehicles of the congestion and suggesting the possible
furthermore discouraging formation of congestion or alternative routes. Furthermore, it reduces the overall idle time
gridlocks. of the vehicles during the travel, thereby minimizing the fuel
wastage.
The RFID tags placed within the MU’s are specifically used to
identify the type of the vehicle. This helps in categorization of
48
V. CONCLUSION
Rapid urbanization in India has led to an increase in the
number of personal transport vehicles as well as public and
commercial transport vehicles while development of road
infrastructure however has not been commensurate. This fuels
an ever growing problem of traffic congestion, which despite
enforcement of new regulations about freight volume has been
a massive concern. This problem can be resolved by either
improving the road infrastructure or increasing the efficiency
of traffic on the current roads. The latter seems the apparent
choice as it requires comparatively negligible investment of
extraneous resources. Here the authors propose simple system
that, by making use of the RFID technology, aims at enabling
reduction in traffic congestion and also saving a lot of time and
fuel for the growing economy of India.
REFERENCES
[1] Burton, R. S., Thomas, N. C., & Wright, D. (2000). Wireless
Figure 2 : Schematic of the system communications to road users and within urban traffic management and
control systems. In Road Transport Information and Control, 2000.
The above image represents a schematic of the system spread Tenth International Conference on (Conf. Publ. No. 472) (pp. 152-157).
IET.
over several blocks. A JU is placed at each intersection which [2] Chorlton, C., & Fraser, I. (1998, April). Traffic monitoring on all-
senses the vehicles within their range, thereby monitoring the purpose roads for strategic network management. In Road Transport
traffic at the intersections. The overall traffic i.e. the traffic Information and Control, 1998. 9th International Conference on (Conf.
density on the roads and at the intersections can be monitored Publ. No. 454) (pp. 125-129). IET.
[3] Dhakad, R., & Jain, M. (2014, December). GPS based road traffic
and reported, with the help of network of RSUs and JUs, to congestion reporting system. In Computational Intelligence and
the centrally located server for further use by the web based Computing Research (ICCIC), 2014 IEEE International Conference
application and for further processing. Each JU consists its on (pp. 1-6). IEEE.
own processor for faster, efficient and real time computation, [4] Gregoriades, A. (2007, December). Towards a user-centred road safety
management method based on road traffic simulation. In 2007 Winter
furthermore local computation enables the system to compute Simulation Conference (pp. 1905-1914). IEEE.
in real time without introducing considerable lag. [5] Jayapal, C., & Roy, S. S. (2016, March). Road traffic congestion
management using VANET. In 2016 International Conference on
IV. RESULTS Advances in Human Machine Interaction (HMI) (pp. 1-7). IEEE.
[6] Kammoun, H. M., Kallel, I., Alimi, A. M., & Casillas, J. (2011, April).
Improvement of the road traffic management by an ant-hierarchical
fuzzy system. In Computational Intelligence in Vehicles and
Transportation Systems (CIVTS), 2011 IEEE Symposium on (pp. 38-
45). IEEE.
[7] Malla, A. M., & Sahu, R. K. (2013). A Review on Vehicle to Vehicle
Communication Protocols in VANETs. International Journal of
Advanced Research in Computer Science and Software
engineering, 3(2).
[8] Mandal, Koushik, et al. "Road traffic congestion monitoring and
measurement using active RFID and GSM technology." 2011 14th
International IEEE Conference on Intelligent Transportation Systems
T (ITSC). IEEE, 2011.
Figure 3 : Overview of the Web based Application he [9] Misbahuddin, S., Zubairi, J. A., Saggaf, A., Basuni, J., Sulaiman, A., &
The information updated by the network of JUs and RSUs in Al-Sofi, A. (2015, December). IoT based dynamic road traffic
the central server are reflected onto the web based application, management for smart cities. In 2015 12th International Conference on
relaying the status of the vehicular flow on the route to the High-capacity Optical Networks and Enabling/Emerging Technologies
(HONET) (pp. 1-5). IEEE.
users. This allows the vehicle drivers to choose an appropriate [10] Miz, V., & Hahanov, V. (2014, September). Smart traffic light in terms
path to the destination and in case of a significant congestions, of the Cognitive road traffic management system (CTMS) based on the
to make use of an alternate route thus helping not only to rein Internet of Things. In Design & Test Symposium (EWDTS), 2014 East-
in the growth of the congestion on the road in question but also West (pp. 1-5). IEEE
to curb wastage of resources such as fuel, while ensuring a [11] Nafi, N. S., Khan, R. H., Khan, J. Y., & Gregory, M. (2014, November).
A predictive road traffic management system based on vehicular ad-hoc
smooth and faster travel with less idle time. This allows for the network. In Telecommunication Networks and Applications Conference
traffic in already congested area to be disseminated fast. (ATNAC), 2014 Australasian (pp. 135-140). IEEE.
[12] Patel, H. N., Desai, K., & Panchal, T. (2015, December). An algorithm
for automatic license plate detection from video using corner features.
In 2015 International Conference on Information Processing (ICIP) (pp.
301-306). IEEE
49
[13] Petrovska, N., & Stevanovic, A. (2015, September). Traffic Congestion [19] Yu, S., Mabu, S., Mainali, M. K., Shimada, K., & Hirasawa, K. (2011,
Analysis Visualisation Tool. In 2015 IEEE 18th International October). Dynamic traffic management model for real world road
Conference on Intelligent Transportation Systems (pp. 1489-1494). networks. InSystems, Man, and Cybernetics (SMC), 2011 IEEE
IEEE. International Conference on (pp. 2197-2202). IEEE.
[14] Report on Operational Efficiency of Freight Transportation by Road in
India http://www.tcil.com/tcil/pdf/TCI%20IIM%20Study%20Report-
2011-12.pdf (last accessed on 15/9/2016)
[15] Salama, A. S., Saleh, B. K., & Eassa, M. M. (2010, November).
Intelligent cross road traffic management system (ICRTMS).
In Computer Technology and Development (ICCTD), 2010 2nd
International Conference on (pp. 27-31). IEEE.
[16] Shashikiran, V., Kumar, T. S., Kumar, N. S., Venkateswaran, V., &
Balaji, S. (2011, June). Dynamic road traffic management based on
krushkal's algorithm. In Recent Trends in Information Technology
(ICRTIT), 2011 International Conference on (pp. 200-204). IEEE.
[17] Sowmiya, A., & Ram, N. P. (2015, March). An intelligent approach for
effective road traffic management. In Innovations in Information,
Embedded and Communication Systems (ICIIECS), 2015 International
Conference on(pp. 1-4). IEEE.
[18] Vrancken, J. L., & Kruse, O. C. (2006). Intelligent control in networks:
The case of road traffic management. In 2006 IEEE International
Conference on Networking, Sensing and Control (pp. 308-311). IEEE.
50
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED
NETWORKING FOR 5G NETWORKS
Received July 11, 2015, accepted July 22, 2015, date of publication July 28, 2015, date of current version August 7, 2015.
Digital Object Identifier 10.1109/ACCESS.2015.2461602
ABSTRACT In the near future, i.e., beyond 4G, some of the prime objectives or demands that need to
be addressed are increased capacity, improved data rate, decreased latency, and better quality of service.
To meet these demands, drastic improvements need to be made in cellular network architecture. This paper
presents the results of a detailed survey on the fifth generation (5G) cellular network architecture and some
of the key emerging technologies that are helpful in improving the architecture and meeting the demands of
users. In this detailed survey, the prime focus is on the 5G cellular network architecture, massive multiple
input multiple output technology, and device-to-device communication (D2D). Along with this, some of the
emerging technologies that are addressed in this paper include interference management, spectrum sharing
with cognitive radio, ultra-dense networks, multi-radio access technology association, full duplex radios,
millimeter wave solutions for 5G cellular networks, and cloud technologies for 5G radio access networks
and software defined networks. In this paper, a general probable 5G cellular network architecture is proposed,
which shows that D2D, small cell access points, network cloud, and the Internet of Things can be a part of
5G cellular network architecture. A detailed survey is included regarding current research projects being
conducted in different countries by research groups and institutions that are working on 5G technologies.
INDEX TERMS 5G, cloud, D2D, massive MIMO, mm-wave, relay, small-cell.
2169-3536
2015 IEEE. Translations and content mining are permitted for academic research only.
1206 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 3, 2015
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
A. Gupta, R. K. Jha: Survey of 5G Network: Architecture and Emerging Technologies
The remainder of the paper is organized as follows: and with no security, since voice calls were stored and played
In Section II, we present the evolution of wireless in radio towers due to which vulnerability of these calls from
technologies. Section III gives the detailed description of unwanted eavesdropping by third party increases [7].
the proposed general 5G cellular network architecture.
Section IV comprises of the detailed explanation of the B. 2G
emerging technologies for 5G wireless networks. We con- The 2nd generation was introduced in late 1990’s.
clude our paper in Section V. A list of current research Digital technology is used in 2nd generation mobile tele-
projects based on 5G technologies is shown in the appendix. phones. Global Systems for Mobile communications (GSM)
was the first 2nd generation system, chiefly used for voice
II. EVOLUTION OF WIRELESS TECHNOLOGIES communication and having a data rate up to 64kbps.
G. Marconi, an Italian inventor, unlocks the path of 2G mobile handset battery lasts longer because of the radio
recent day wireless communications by communicating the signals having low power. It also provides services like Short
letter ‘S’ along a distance of 3Km in the form of three dot Message Service (SMS) and e-mail. Vital eminent technolo-
Morse code with the help of electromagnetic waves. After gies were GSM, Code Division Multiple Access (CDMA),
this inception, wireless communications have become an and IS-95 [3], [7].
important part of present day society. Since satellite com-
munication, television and radio transmission has advanced C. 2.5G
to pervasive mobile telephone, wireless communications has It generally subscribes a 2nd generation cellular system
transformed the style in which society runs. The evolution merged with General Packet Radio Services (GPRS) and
of wireless begins here [2] and is shown in Fig. 1. It shows other amenities doesn’t commonly endow in 2G or 1G
the evolving generations of wireless technologies in terms of networks. A 2.5G system generally uses 2G system
data rate, mobility, coverage and spectral efficiency. As the frameworks, but it applies packet switching along with
wireless technologies are growing, the data rate, mobility, circuit switching. It can assist data rate up to 144kbps. The
coverage and spectral efficiency increases. It also shows main 2.5G technologies were GPRS, Enhanced Data Rate
that the 1G and 2G technologies use circuit switching while for GSM Evolution (EDGE), and Code Division Multiple
2.5G and 3G uses both circuit and packet switching and Access (CDMA) 2000 [3], [7].
the next generations from 3.5G to now i.e. 5G are using
packet switching. Along with these factors, it also differ- D. 3G
entiate between licensed spectrum and unlicensed spectrum. The 3rd generation was established in late 2000. It imparts
All the evolving generations use the licensed spectrum while transmission rate up to 2Mbps. Third generation (3G)
the WiFi, Bluetooth and WiMAX are using the unlicensed systems merge high speed mobile access to services based
spectrum. An overview about the evolving wireless on Internet Protocol (IP). Aside from transmission rate,
technologies is below: unconventional improvement was made for maintaining QoS.
Additional amenities like global roaming and improved voice
quality made 3G as a remarkable generation. The major
disadvantage for 3G handsets is that, they require more
power than most 2G models. Along with this 3G network
plans are more expensive than 2G [3], [7]. Since
3G involves the introduction and utilization of Wideband
Code Division Multiple Access (WCDMA), Universal
Mobile Telecommunications Systems (UMTS) and Code
Division Multiple Access (CDMA) 2000 technologies, the
evolving technologies like High Speed Uplink/Downlink
Packet Access (HSUPA/HSDPA) and Evolution-Data
Optimized (EVDO) has made an intermediate wireless
generation between 3G and 4G named as 3.5G with improved
data rate of 5-30 Mbps [3].
FIGURE 1. Evolution of wireless technologies.
E. 3.75G
A. 1G Long-Term Evolution technology (LTE) and Fixed
The 1st generation was announced in initial 1980’s. Worldwide Interoperability for Microwave Access (WIMAX)
It has a data rate up to 2.4kbps. Major subscribers were is the future of mobile data services. LTE and Fixed WIMAX
Advanced Mobile Phone System (AMPS), Nordic Mobile has the potential to supplement the capacity of the network
Telephone (NMT), and Total Access Communication and provides a substantial number of users the facility to
System (TACS). It has a lot of disadvantages like below access a broad range of high speed services like on demand
par capacity, reckless handoff, inferior voice associations, video, peer to peer file sharing and composite Web services.
Along with this, a supplementary spectrum is accessible the wireless setup which had come about from 1G to 4G.
which accredit operators manage their network very compli- Alternatively, there could be only the addition of an appli-
antly and offers better coverage with improved performance cation or amelioration done at the fundamental network to
for less cost [4]–[7]. please user requirements. This will provoke the package
providers to drift for a 5G network as early as 4G is com-
F. 4G mercially set up [8]. To meet the demands of the user and
4G is generally referred as the descendant of the 3G and 2G to overcome the challenges that has been put forward in the
standards. 3rd Generation Partnership Project (3GPP) 5G system, a drastic change in the strategy of designing
is presently standardizing Long Term Evolution (LTE) the 5G wireless cellular architecture is needed. A general
Advanced as forthcoming 4G standard along with Mobile observation of the researchers has shown in [14] that most of
Worldwide Interoperability for Microwave Access (WIMAX). the wireless users stay inside for approximately 80 percent of
A 4G system improves the prevailing communication time and outside for approximately 20 percent of the time.
networks by imparting a complete and reliable solution based In present wireless cellular architecture, for a mobile user
on IP. Amenities like voice, data and multimedia will be to communicate whether inside or outside, an outside base
imparted to subscribers on every time and everywhere basis station present in the middle of a cell helps in communication.
and at quite higher data rates as related to earlier generations. So for inside users to communicate with the outside base
Applications that are being made to use a 4G network are station, the signals will have to travel through the walls of
Multimedia Messaging Service (MMS), Digital Video the indoors, and this will result in very high penetration loss,
Broadcasting (DVB), and video chat, High Definition TV which correspondingly costs with reduced spectral efficiency,
content and mobile TV [2], [4]–[6]. data rate, and energy efficiency of wireless communications.
To overcome this challenge, a new idea or designing tech-
G. 5G nique that has come in to existence for scheming the
With an exponential increase in the demand of the users, 5G cellular architecture is to distinct outside and inside
4G will now be easily replaced with 5G with an setups [8]. With this designing technique, the penetration loss
advanced access technology named Beam Division Multiple through the walls of the building will be slightly reduced.
Access (BDMA) and Non- and quasi-orthogonal or Filter This idea will be supported with the help of massive MIMO
Bank multi carrier (FBMC) multiple access. The concept technology [15], in which geographically dispersed array
behind BDMA technique is explained by considering the case of antenna’s are deployed which have tens or hundreds of
of the base station communicating with the mobile stations. antenna units. Since present MIMO systems are using either
In this communication, an orthogonal beam is allocated to two or four antennas, but the idea of massive MIMO systems
each mobile station and BDMA technique will divide that has come up with the idea of utilizing the advantages of large
antenna beam according to locations of the mobile stations array antenna elements in terms of huge capacity gains.
for giving multiple accesses to the mobile stations, which To build or construct a large massive MIMO network,
correspondingly increase the capacity of the system [8]. firstly the outside base stations will be fitted with large
An idea to shift towards 5G is based on current drifts, it is antenna arrays and among them some are dispersed around
commonly assumed that 5G cellular networks must address the hexagonal cell and linked to the base station through
six challenges that are not effectively addressed by 4G i.e. optical fiber cables, aided with massive MIMO technologies.
higher capacity, higher data rate, lower End to End latency, The mobile users present outside are usually fitted with a
massive device connectivity, reduced cost and consistent certain number of antenna units but with cooperation a large
Quality of Experience provisioning [22], [23]. These virtual antenna array can be constructed, which together with
challenges are concisely shown in Fig. 2 along with antenna arrays of base station form virtual massive MIMO
some potential facilitators to address them. An overview links. Secondly, every building will be installed with large
of the challenges, facilitators, and corresponding design antenna arrays from outside, to communicate with outdoor
fundamentals for 5G is shown in Fig. 2 [20]. Recently base stations with the help of line of sight components.
introduced IEEE 802.11ac, 802.11ad and 802.11af standards The wireless access points inside the building are connected
are very helpful and act as a building blocks in the road with the large antenna arrays through cables for communi-
towards 5G [9]–[13]. The technical comparison between these cating with indoor users. This will significantly improves
standards is shown in table 1 and the detailed comparison of the energy efficiency, cell average throughput, data rate, and
wireless generations is shown in table 2. spectral efficiency of the cellular system but at the expense
of increased infrastructure cost. With the introduction of
III. 5G CELLULAR NETWORK ARCHITECTURE such an architecture, the inside users will only have to
To contemplate 5G network in the market now, it is evident connect or communicate with inside wireless access points
that the multiple access techniques in the network are while larger antenna arrays remained installed outside the
almost at a still and requires sudden improvement. Current buildings [8]. For indoor communication, certain technolo-
technologies like OFDMA will work at least for next gies like WiFi, Small cell, ultra wideband, millimeter wave
50 years. Moreover, there is no need to have a change in communications [16], and visible light communications [17]
are useful for small range communications having large data conventionally used for cellular communications. But it is
rates. But technologies like millimeter wave and visible light not an efficient idea to use these high frequency waves for
communication are utilizing higher frequencies which are not outside and long distance applications because these waves
will not infiltrate from dense materials efficiently and can Control plane, respectively. Special network functionality as
easily be dispersed by rain droplets, gases, and flora. Though, a service (XaaS) will provide service as per need, resource
millimeter waves and visible light communications technolo- pooling is one of the examples. XaaS is the connection
gies can enhance the transmission data rate for indoor setups between a radio network and a network cloud [20].
because they have come up with large bandwidth. Along The 5G cellular network architecture is explained
with the introduction of new spectrum, which is not being in [8] and [20]. It has equal importance in terms of front
conventionally used for wireless communication, there is one end and backhaul network respectively. In this paper, a
more method to solve the spectrum shortage problem by general 5G cellular network architecture has been proposed
improving the spectrum utilization of current radio spectra as shown in Fig. 3. It describes the interconnectivity
through cognitive radio (CR) networks [18]. among the different emerging technologies like Massive
Since the 5G cellular architecture is heterogeneous, so it MIMO network, Cognitive Radio network, mobile and
must include macrocells, microcells, small cells, and relays. static small-cell networks. This proposed architecture also
A mobile small cell concept is an integral part of 5G wireless explains the role of network function virtualization (NFV)
cellular network and partially comprises of mobile relay and cloud in the 5G cellular network architecture. The concept
small cell concepts [19]. It is being introduced to put up of Device to Device (D2D) communication, small cell access
high mobility users, which are inside the automobiles and points and Internet of things (IoT) has also been incorporated
high speed trains. Mobile small cells are positioned inside the in this proposed 5G cellular network architecture. In general,
moving automobiles to communicate with the users inside this proposed 5G cellular network architecture may provide
the automobile, while the massive MIMO unit consisting a good platform for future 5G standardization network.
of large antenna arrays is placed outside the automobile to But there are several issues that need to be addressed in
communicate with the outside base station. According to order to realize the wireless network architecture in partic-
user’s opinion, a mobile small cell is realized as a regular ular, and 5G networks in general. Some of these issues are
base station and its allied users are all observed as a single summarized in Table. 3 [20].
unit to the base station which proves the above idea of
splitting indoor and outdoor setups. Mobile small cell IV. EMERGING TECHNOLOGIES FOR
users [19] have a high data rate for data rate services with 5G WIRELESS NETWORKS
considerably reduced signaling overhead, as shown in [8]. It is expected that mobile and wireless traffic volume will
As the 5G wireless cellular network architecture consists increase a thousand-fold over the next decade which will
of only two logical layers: a radio network and a network be driven by the expected 50 billion connected devices con-
cloud. Different types of components performing different nected to the cloud by 2020 and all need to access and share
functions are constituting the radio network. The network data, anywhere and anytime. With a rapid increase in the num-
function virtualization (NFV) cloud consists of a User plane ber of connected devices, some challenges appear which will
entity (UPE) and a Control plane entity (CPE) that per- be responded by increasing capacity and by improving energy
form higher layer functionalities related to the User and efficiency, cost and spectrum utilization as well as providing
better scalability for handling the increasing number of the of applications and requirements of the user. To provide a
connected devices. For the vision of all-communicating world common connected platform for a variety of applications and
relative to today’s network, the overall technical aim is to requirements for 5G, we will research the below technology
provide a system idea that supports [21]: components [21]:
• 1000 times increased data volume per area • Radio-links, includes the development of new transmis-
• 10 to 100 times increased number of connected devices sion waveforms and new approaches of multiple access
• 10 to 100 times increased typical user data rate control and radio resource management.
• 10 times extended battery life for low power Massive • Multi-node and multi-antenna transmissions, includes
Machine Communication (MMC) devices designing of multi-antenna transmission/reception tech-
• 5 times reduced End-to-End (E2E) latency nologies based on massive antenna configurations and
In this paper, we will cover a wide area of technologies developing advanced inter-node coordination schemes
with a lot of technical challenges arises due to a variety and multi-hop technologies.
• Network dimension, includes considering the demand, In this section, we identify several technologies, ranked in
traffic and mobility management, and novel approaches perceived importance, which will be crucial in future wireless
for efficient interference management in complex standards.
heterogeneous deployments.
• Spectrum usage, includes considering extended A. MASSIVE MIMO
spectrum band of operation, as well as operation in new Massive MIMO is an evolving technology that has been
spectrum regimes to provide a complete system concept upgraded from the current MIMO technology. The Massive
for new spectrum regimes that carefully addresses the MIMO system uses arrays of antenna containing few hundred
needs of each usage scenario. antennas which are at the same time in one time, frequency
Now the topics which will integrate a subset of the slot serving many tens of user terminals. The main objective
technology components and provides the solution of some of of Massive MIMO technology is to extract all the benefits
the goals which are identified earlier are [21]: of MIMO but on a larger scale. In general, massive MIMO
• Device-to-Device (D2D) communications refers to is an evolving technology of Next generation networks,
direct communication between devices allowing local which is energy efficient, robust, and secure and spectrum
exchange of user plane traffic without going through a efficient [24].
network infrastructure. Massive MIMO depends on spatial multiplexing, which
• Massive Machine Communications (MMC) will form further depends on the base station to have channel state
the basis of the Internet of Things with a wide range information, both on the uplink as well as on the downlink.
of application fields including the automotive industry, In case of downlink, it is not easy, but in case of uplink,
public safety, emergency services and medical it is easy, as the terminals send pilots. On the basis of
field. pilots, the channel response of each terminal is estimated.
• Moving Networks (MN) will enhance and extend In conventional MIMO systems, the base station sends the
linking together potentially large populations of jointly pilot waveforms to the terminals and based on these, the
moving communication devices. terminal estimate the channel, quantize it and feedback them
• Ultra-dense Networks (UDN) will be the main driver to the base station. This process is not viable for mas-
whose goals are to increase capacity, increase energy sive MIMO systems, especially in high mobility conditions
efficiency of radio links, and enable better exploitation because of two reasons. Firstly the downlink pilots from the
of under-utilized spectrum. base station must be orthogonal among the antennas, due
• Ultra-reliable Networks (URN) will enable high to which the requirement of time, frequency slots for the
degrees of availability. downlink pilots increases with the increase in the number
of antennas. So Massive MIMO systems would now require play by confirming that all the wave fronts that have been
a large number of similar slots as compared to the con- emitted from the antennas possibly will add constructively at
ventional MIMO system. Secondly, as the number of base the intended terminal’s locations and destructively elsewhere.
station antennas increases the number of the channel esti- Zero forcing is used to suppress the remaining interfer-
mates also increases for each terminal which in turn needed ence between the terminals, but at the expense of increased
hundred times more uplink slots to feedback the channel transmitted power [24].
responses to the base station. A general solution to this prob- The desirability of maximum ratio combining (MRC) is
lem is to work in Time Division Duplexing (TDD) mode more as related to Zero forcing (ZF) because of its com-
and depend on the reciprocity amid the uplink and downlink putational ease i.e. received signals are multiplied by their
channels [25]. conjugate channel responses and due to the reason that it is
Massive MIMO technology depends on phase coherent executed in a dispersed mode, autonomously at every antenna
signals from all the antennas at the base station, but the element. Though ZF also works equally well for an orthodox
computational processing of these signals is simple. Below MIMO system which MRC normally does not. The main
are certain positives of a massive MIMO system [24]: reason behind the efficient use of the MRC with massive
MIMO involving large number of base station antennas, the
1) MASSIVE MIMO HAS THE CAPABILITY THAT IT CAN channel responses allied with different terminals tend to be
IMPROVE THE RADIATED ENERGY EFFICIENCY BY almost orthogonal.
100 TIMES AND AT THE SAME TIME, INCREASES With the use of MRC receiver, we are operating in a
THE CAPACITY OF THE ORDER OF 10 OR MORE noise restricted system. MRC in Massive MIMO system
The positive of increase in capacity is because of the will scale down the power to an extent possible deprived of
spatial multiplexing technique used in Massive really upsetting the overall spectral efficiency and multiuser
MIMO systems. Regarding the improvement in the radiated interference, but the effects of hardware deficiencies are
energy efficiency, it is because of the increase in the number likely to be overcome by the thermal noise. But the intention
of antennas, the energy can now be concentrated in small behind the overall 10 times higher spectral efficiency as
regions in the space. It is based on the principle of coherent compared to conventional MIMO is because 10 times more
superposition of wave fronts. After transmitting the shaped terminals are served concurrently in the same time frequency
signals from the antennas, the base station has no role to resource [26].
VOLUME 3, 2015 1213
A. Gupta, R. K. Jha: Survey of 5G Network: Architecture and Emerging Technologies
2) MASSIVE MIMO SYSTEMS CAN BE PUT TOGETHER it is helpful to deploy base stations to the places where
WITH THE HELP OF LOW POWER AND electricity is not available. Along with this, the increased
LESS COSTLY COMPONENTS concerns of electromagnetic exposure will be considerably
Massive MIMO has come up with a change with less.
respect to concept, schemes and execution. Massive
MIMO systems use hundreds of less expensive amplifiers in 3) MASSIVE MIMO PERMITS A SUBSTANTIAL DECREASE
respect to expensive ultra-linear 50 Watt amplifiers because IN LATENCY ON THE AIR INTERFACE
earlier are having an output power in the milliwatt range, Latency is the prime area of concern in the next generation
which is much better than the latter which are generally networks. In wireless communication, the main cause of
being used in conventional systems. It is dissimilar to con- latency is fading. This phenomenon occurs amid the base
ventional array schemes, as it will use only a little antenna’s station and terminal, i.e. when the signal is transmitted from
that are being fed from high power amplifiers but having a the base station, it travels through different multiple paths
notable impact. The most significant improvement is about because of the phenomenon’s like scattering, reflection and
the removal of a large number of expensive and massive items diffraction before it reaches the terminal. When the signal
like large coaxial cables [24]. through these multiple paths reaches the terminal it will inter-
With the use of a large number of antennas in massive fere either constructively or destructively, and the case when
MIMO technology the noise, fading and hardware deficits following waves from these multiple paths interfere destruc-
will be averaged because signals from a large number of tively, the received signal strength reduces to a considerable
antennas are combined together in the free space. It condenses low point. If the terminal is caught in a fading dip, then it has
the limits on precision and linearity of every single amplifier to wait for the transmission channel to change until any data
and radio frequency chain and altogether what matters is can be received. Massive MIMO, due to a large number of
their collective action. This will increase the robustness of antennas and with the idea of beam forming can avoid fading
massive MIMO against fading and failure of one of the dips and now latency cannot be further decreased [24].
antenna elements.
A massive MIMO system has degrees of freedom in excess. 4) MASSIVE MIMO MAKES THE MULTIPLE
For example, with 100 antennas, 10 terminals are showing ACCESS LAYER SIMPLE
presence while the remaining 90 degrees of freedom are With the arrival of Massive MIMO, the channel strength-
still available. These available degrees of freedom can be ens and now frequency domain scheduling is not enough.
exploited by using them for signal shaping which will be OFDM provides, each subcarrier in a massive MIMO system
hardware friendly. Specifically, each antenna with the use of with considerably the same channel gain due to which each
very cheap and power proficient radio frequency amplifiers and every terminal can be provided with complete bandwidth,
can transmit signals having small peak to average ratio [27] which reduces most of the physical layer control signaling
and constant envelope [28] at a modest price of increased total terminated [24].
radiated power. With the help of constant envelope multiuser
precoding, the signals transmitted from each antenna are 5) MASSIVE MIMO INCREASES THE STRENGTH EQUALLY
neither being formed in terms of beam nor by weighing of AGAINST UNINTENDED MAN MADE INTERFERENCE
a symbol. Rather, a wave field is created and sampled with AND INTENDED JAMMING
respect to the location of the terminals and they can see Jamming of the wireless systems of the civilian is a
precisely the signals what we intended to make them see. prime area of concern and poses a serious threat to cyber
Massive MIMO has a vital property which makes it possible. security. Owing to limited bandwidth, the distribution of
The massive MIMO channel has large null spaces in which information over frequency just is not possible. Massive
nearly everything can be engaged without disturbing the MIMO offers the methods of improving robustness of
terminals. Precisely modules can be placed into this null wireless communications with the help of multiple antennas.
space that makes the transmitted waveforms fulfill the It provides with an excess of degrees of freedom that can
preferred envelope restraints. Nevertheless, the operative be useful for canceling the signals from intended jammers.
channels amid the base station and every terminal, can be If massive MIMO systems use joint channel estimation and
proceeded without the involvement of PSK type modulation decoding instead of uplink pilots for channel estimation,
and can take any signal constellation as input [24]. then the problem from the intended jammers is considerably
The considerable improvement in the energy efficiency reduced [24].
facilitates massive MIMO systems to work two steps of lower The advantages of massive MIMO systems can be
magnitude than with existing technology on the total output reviewed from an information theoretic point of view.
RF power. This is important because the cellular base stations Massive MIMO systems can obtain the promising multi-
are consuming a lot of power and it is an area of concern. plexing gain of massive point to point MIMO systems,
In addition, if base stations that consume less power could be while eliminating problems due to unfavorable propagation
driven by renewable resources like solar or wind and therefore environments [29].
Let us study a massive MIMO system having L cells, where An exhaustive debate about this result can be seen in [31].
every cell has K attended single antenna users and one base Centered on the result in (6), the overall achievable rate of all
station with N antennas. hi,k,l,n represent the channel coeffi- users come to be
cient from the k-th user in the l-th cell to the n-th antenna of
C = log2 det(I + ρu H H H )
the i-th base station, which is equivalent to a complex small
scale fading factor time an amplitude factor that interprets for ≈ log2 det (I + N ρu D)
K bits
geometric attenuation and large-scale fading: X
= log2 (1 + N ρu dk ) s (7)
p Hz
hi,k,l,n = gi,k,l,n di,k,l (1) k=1
Capacity in (7) can be achieved at the base station by
Where gi,k,l,n and di,k,l represent complex small scale fad- simple MF processing. When MF processing is used, the
ing and large scale fading coefficients, respectively. The small base station processes the signal vector by multiplying the
scale fading coefficients are implicit to be diverse for diverse conjugate transpose of the channel, as
users or for diverse antennas at every base station though √
H H yu = H H ρu Hxu + nu
the large scale fading coefficients are the same for diverse
√
antennas at the same base station, but are user dependent. ≈ N ρu Dxu + H H nu (8)
Then, the channel matrix from all K users in the l-th cell to
the i-th base station can be expressed as where (6) is used. Note that the channel vectors are asymp-
totically orthogonal when the number of antennas at the base
hi,1,l,1 · · · hi,K ,l,1 station grows to infinity. So, H H does not shade the noise.
Hi,l = ... .. .. 1/2 Since D is a diagonal matrix, the MF processing splits the
. . = Gi,l Di,l (2)
signals from diverse users into diverse streams and there is
hi,1,l,N ··· hi,K ,l,N
asymptotically no inter user interference. So now the signal
Where transmission can be treated as a SISO channel transmission
for each user. From (8), the signal to noise ratio (SNR) for the
gi,1,l,1 ··· gi,K ,l,1
k-th user is N ρu dk . Subsequently, the attainable rate by using
Gi,l = ... ..
.
..
. (3)
MF is similar as the limit in (7), which indicates that simple
gi,1,l,N ··· gi.K ,l,N MF processing at the base station is best when the number of
di,1,l ··· ...
antennas at the base station, N, grows to infinity.
.. .. ..
Di,c = . . . (4) b: DOWNLINK
... ··· di.K ,l yd ∈ C K ∗1 can be denoted as the received signal vector at
all K users. Massive MIMO works properly in time division
Let us study a single cell (L = 1) massive MIMO system duplexing (TDD) mode as discussed in [29], where the down-
with K singled antenna users and a base station with link channel is the transpose of the uplink channel matrix.
N antennas. For ease, the cell and the base station indices are Then, the received signal vector can be expressed as
plunged when single cell systems are deliberated [29]. √
yd = ρd H T xd + nd (9)
a: UPLINK where xd ∈ C N ∗1 is the signal vector transmitted by the
The received signal vector at a single base station for uplink base station, nd ∈ C K ∗1 is an additive noise and ρd is the
signal transmission is denoted as yu ∈ C N ∗1 , can be stated as: transmit power of the downlink. Let us assume, E[|xd |2 ] = 1
√ for normalizing transmitting power.
yu = ρu Hxu + nu (5)
As discussed in [29], the base station usually has channel
where xu ∈ C K ∗1 is the signal vector from all users, state information equivalent to all users based on uplink pilot
H ∈ C N ∗K is the uplink channel matrix defined in (2) by transmission. So, it is likely for the base station to do power
reducing the cell and the base station indices, nu ∈ C N ∗1 is allocation for maximizing the sum transmission rate. The sum
a zero mean noise vector with complex Gaussian distribution capacity of the system with power allocation is [32]
and identity covariance matrix, and ρu is the uplink transmit C = max log2 det(IN + ρd HPH H )
power. The transmitted symbol from the k-th user, xku , is the p
bits
k-th element of xu = [x1u , . . . ., xKu ]T with [|xku |2 ] = 1. ≈ max log2 det (IK + ρd NPD) s
(10)
The column channel vectors from diverse users are asymp- p Hz
totically orthogonal as the number of antennas at the base where (6) is used and P is a positive diagonal matrix with
station, N, grows to infinity by supposing that the small the power allocations (p1 , . . . .., pk ) as its diagonal elements
scale fading coefficients for diverse users is independent [30]. and K
P
k=1 pk = 1
Then, we have If the MF precoder is used, the transmitted signal vector is
H H H = D1/2 GH GD1/2 ≈ ND1/2 IK D1/2 = ND (6) xd = H ∗ D−1/2 P1/2 sd (11)
where the second line of (12) is for the case when the
number of antennas at the base station, N, grows to infinity,
and (6) is used. Since P and D are both diagonal matrices so
the signal transmission from the base station to every user can
be treated as if initiating from a SISO transmission which thus
inhibited the inter user interference. The overall attainable
data rate in (12) can be maximized by proper choice of the
power allocation as in (10), which validates that the capacity
can be attained using the simple MF precoder.
According to the auspicious propagation assumption of (6),
FIGURE 4. Average total power consumption in the scenario containing
the simple MF precoder or detector can attain the capacity of small cell access points.
a massive MIMO system when the number of antennas at the
base station, N, is much larger than the number of users, K,
and grows to infinity, i.e., N K and N → ∞. Another However, there are saturation points where extra hardware
scenario assumption is that both the number of antennas at will not decrease the total power anymore.
the base station and the number of users grows large while With the introduction of the concept of small cell access
their ratio is bounded, i.e., N/K = c as N, K → ∞, where c point, it will fulfill the need of self organizing network (SON)
is a constant, are different [35]. technology for minimizing human intervention in the
The main area of concern in today’s wireless cellular networking processes as given in [36] and [37]. While a brief
network is on energy efficiency and power optimization. summary of the work done on the massive MIMO technology
So a lot of researchers are working on to increase the energy to increase the energy efficiency and optimizing the power of
efficiency and optimizing the power. The work done on the wireless cellular network is shown in Table 4.
power optimization in [33] has been realized and shown
in Fig. 4. B. INTERFERENCE MANAGEMENT
Fig. 4 clearly shows that if we increase the number of For efficient utilization of limited resources, reuse is one
antennas at the base station as well as on the small cell access of the concept that is being used by many specifications
point, the total power per subcarrier decreases to 10 fold as of cellular wireless communication systems. Along with
compare to the case of no antenna at small cell access point. this, for improved traffic capacity and user throughput
TABLE 4. Effect of massive MIMO technology on energy efficiency of the wireless cellular network.
densification of the network is one of the key aspect. So with the network side need to be stated in detail in the 5G systems,
the introduction of reuse and densification concept, there without separating it entirely as an employment issue. For
will be an additional enhancement in terms of efficient load attracting maximum coordination, the user equipment and
sharing between macro cells and local access networks. But network side, advanced interference management must be
all these advantages have come up with a problem that the deliberated instantaneously [38].
density and load of the network have increased considerably
C. SPECTRUM SHARING
and correspondingly receiver terminals in the network suffer
To apprehend the performance targets of future mobile
from increased co-channel interference, mainly at the bound-
broadband systems [22], [39], there is a need of considerably
aries of cells. Thus co-channel interference poses a threat
more spectrum and wider bandwidths as compared to the
which is inhibiting the further improvement of 4G cellular
current available spectrum for realizing the performance.
systems. Hence the need for efficient interference
So to overcome this difficulty, spectrum will be made avail-
management schemes is vital. Below are the two interference
able under horizontal or vertical spectrum sharing systems.
management techniques [38]:
The significance of spectrum sharing is probable to
1) ADVANCED RECEIVER
increase, dedicated licensed spectrum access is expected to
remain the baseline approach for mobile broadband which
Modern day and growing cellular system, interference grow
provides reliability and investment certainty for cellular
as a big threat, so to mitigate or manage interference, an
mobile broadband systems. Network components using joint
appropriate interference management technique is the need of
spectrum are likely to play a balancing role [40].
the hour. Advanced interference management at the receiver,
There are mainly two spectrum sharing techniques
or an advanced receiver is the technique which will somewhat
that enable mobile broadband systems to share spectrum
help in interference management. It will detect and even
and are classified as distributed solutions and
try to decode the symbols of the interference signal within
centralized solutions [40]. In a distributed solution the
the modulation constellation, coding scheme, channel, and
systems coordinate amid each other on an equal basis while
resource allocation. Then based on the detector output, the
in a centralized solution each system coordinates discretely
interference signals can be reconstructed and cancelled from
with a central unit and the systems do not directly interact
the received signal so as to improve the anticipated signal
with each other.
decoding performance [38].
Advanced receivers not only limits to inter cell interference 1) DISTRIBUTED SPECTRUM SHARING TECHNIQUES
at the cell boundaries, but also intra cell interference as in Distributed spectrum sharing techniques is more efficient as
the case of massive MIMO. According to LTE-Advanced it can take place in a local framework. Its principle is to
Release 10, every base station transmitter has been equipped only manage those transmissions that really create interfer-
with up to eight antennas which will call for intra cell ence amid systems. Distributed coordination can be entirely
interference, as the number of antenna’s increases. [38]. included into standards and thus they can work without the
need for commercial contracts between operators [40].
2) JOINT SCHEDULING The management of horizontal spectrum sharing
In LTE standard, Releases 8 and 9, interference random- happens through the clear exchange of messages unswerv-
ization through scrambling of transmitting signals is the ingly between the sharing systems through a distinct interface
only interference management strategies that were con- in a peer to peer coexistence protocol. This protocol describes
sidered and there were no advanced co-channel interfer- the performance of the nodes on the receiving of certain
ence management strategies. But in 3GPP LTE-Advanced, messages or taking place of certain events. An example of
Release 10 and 11, through probability readings, it was this is explained in [41].
realized that there was a space for additional performance The systems frequently transmit generally understood
improvement at the cell edges with the help of synchronized signals that will show presence, activity factor and the time
transmission among multiple transmitters dispersed over when they will transmit in a coexistence beacon based solu-
different cell sites [38]. tions. The information that is available openly can be used by
For calibrating the development, some typical coordinated the other systems to adjust their spectrum access performance
multipoint schemes, like to coordinate scheduling, for providing fair spectrum sharing. Coexistence beacons
coordinated beam forming, dynamic point selection, and joint are possibly the solution for both, horizontal and vertical
transmission, were normally conferred [38]. sharing setups. An example of its implementation is the
In the article [38], joint scheduling is broadly used to refer 802.22.1 standard [42].
advanced interference management of cellular systems and MAC behavior based schemes uses a MAC protocol which
link variation from the network side. But as in coordinated is designed to allow horizontal spectrum sharing. Bluetooth
multipoint schemes, the transmission rates and schemes of using frequency hopping and WLAN systems using request
multiple cells are not autonomously determined. In the case to send/clear to send functionality are some of the exam-
of fast network distribution and interoperability, advanced ples. For an even horizontal coexistence with Wi-Fi systems,
interference management schemes by joint scheduling from a Wi-Fi coexistence mode is adapted. The MAC protocol may
leave silent periods for Wi-Fi systems to operate and use a It is an area of concern that the academic researchers and the
listen before talk method which allows Wi-Fi systems to gain industry in this area has reached a point of fading returns.
access to the channel. Its future will now depend on the multi institutional research
In Spectrum sensing and dynamic frequency selection, teams that are working on a new approach with real world
operating frequency range is dynamically selected on the experimental deployments of cognitive radio networks [46].
basis of measurement results like energy detection or feature
detection. To detect the aforementioned coexistence beacons, D. DEVICE TO DEVICE COMMUNICATION SYSTEM
feature detection is highly useful. Due to a hidden node Device to Device Communication system can be explained
problem, this method is not considered as a very dependable by visualizing a two level 5G cellular network and named
method [40]. them as macro cell level and device level. The macro cell level
comprises of the base station to device communications as in
2) CENTRALIZED SPECTRUM SHARING TECHNIQUES an orthodox cellular system. The device level comprises of
The Centralized spectrum sharing technique is useful for the device to device communications. If a device links the cellular
systems that have granularity of spectrum sharing on a higher network through a base station, then it will be operating in
level than the actual radio resource allocation granularity. the macro cell level and if a device links directly to another
This technique has some restraints, as it is conservative and device or apprehends its transmission through the support of
possibly separate users on orthogonal resources without com- other devices, then it will be on the device level. In these types
plete information on whether they would actually interfere or of systems, the base stations will persist to attend the devices
not. While the benefits are in terms of reliability, certainty and as usual. But in the congested areas and at the cell edges, an
control. ad hoc mesh network is created and devices will be permitted
Geo-location database method is an example of a to communicate with each other [47].
centralized sharing technique which involves the querying of In the insight of device level communications, the base
a database to obtain information about the resources available station either have full or partial control over the resource
at a particular location [43]. This is the required classical allocation amid source, destination, and relaying devices,
vertical sharing solution for accessing the locally unused or not have any control. Thus, we can describe the
TV bands [44]. subsequent four main types of device-level communications
The spectrum broker approach is one of the example of a (Figs. 5-8) [47]:
centralized sharing technique in which horizontally sharing
systems negotiate with a central resource management unit
for getting short term grants to use spectrum resources on a
limited basis [45].
Both the Geo-location database and the spectrum
broker approach may additionally support horizontal sharing
between unlicensed systems [40].
However, along with the two above spectrum sharing
techniques most easily usable spectrum bands have also been
allocated, but various studies have revealed that these bands
are significantly underutilized. These concerns have driven
the researchers to innovate a new radio technology which
will encounter with the upcoming demands both in terms of
spectrum efficiency and performance of certain applica-
tions. To encounter the demand of the future, a disruptive
technology revolution that will empower the future wireless
world is Cognitive Radio. Cognitive radios are completely
programmable wireless devices and has an extensive adap-
tation property for achieving better network and application
performance. It can sense the environment and dynamically
performs adaptation in the networking protocols, spectrum
utilization methods, channel access methods and transmis-
FIGURE 5. Device relaying communication with base station controlled
sion waveform used. It is expected that cognitive radio tech- link formation.
nology will soon arise as a general purpose programmable
radio. Similar to the role of microprocessors in the computa-
tion, cognitive radio will also serve as a universal platform for 1) DEVICE RELAYING WITH BASE STATION
wireless system expansion. But the task of successfully build- CONTROLLED LINK FORMATION
ing and large scale deployment of cognitive radio networks This type of communication is applicable for a device which
to dynamically improve spectrum use is an intricate task. is at the edge of a cell, i.e. in the coverage area which
FIGURE 6. Direct device to device communication with base station FIGURE 8. Direct device to device communication with device controlled
controlled link formation. link formation.
In closed access, a device has a list of certain reliable devices, amid devices. Basically the base station has complete control
like the users in the close vicinity or office to whom you are over the device to device connections, like connection setup
familiar with, otherwise the users that have been legitimated and maintenance, and resource allocation. Since device to
through a reliable party like an association, can unswervingly device connections share the cellular licensed band in the
communicate with each other, sustaining a level of discretion, device level with the regular cellular connections in the macro
whereas the devices not on this list need to use the macro cell level. So for assigning resources to every device to device
cell level to communicate with it. Also to prevent divulging connection, the network can either assign resources in an
of their information to other devices in a group, one can identical manner as a regular cellular connection or in the
set an appropriate encryption amongst one another. Instead form of a dedicated resource pool to all devices to device
of this, in open access, each device can turn in to relay for connections [47].
other devices deprived of any limits. Meanwhile, in such In device relaying communication with device controller
an instance security is an open research problem. Security and direct device to device communication with device con-
problems in device to device communication contain the troller, there is no base station to control the communication
empathy of possible attacks, threats, and weakness of the amid devices. As shown in Figs. 7 and 8, several devices are
system. To discourse security problems in open access device communicating with each other by using supportive or non-
to device, the research on the security problems of machine supportive communication by playing the role of relays for
to machine communication [48]–[52] can be utilized. the other devices. Since there is no centralized supervision of
Second technical issue of a dualistic system that need to be the relaying, so distributed methods will be used for processes
addressed is of interference management. In device relaying like connection setup, interference management, and resource
communication with the base station controller and direct allocation. In this type of communication, two devices need
device to device communication with base station controlled, to find each other and the neighboring relays first by periodi-
the base station can execute the resource allocation and call cally broadcasting their identity information. This will aware
setup process. So, the base station, to a certain degree can the other devices of their presence and then they will decide
ease the problem of interference management by using cen- whether or not to start a device to device direct or device
tralized methods. But in device relaying communication with relaying communication [53].
device controller and direct device to device communication Now to know the effect of relay’s, let us study a system
with device controller, resource allocation between devices model for relay aided device to device communication [58]
will not be supervised by the centralized unit. Devices will as shown in Fig. 9. For studying it, let us consider that
unavoidably effect macro cell users because they are working the cellular user equipment eNodeB links are unfavorable
in the same licensed band. So to confirm the nominal effect for direct communication and need the assistance of relays.
on the performance of prevailing macro cell base stations, a The device to device user equipment’s are also supported by
dualistic network needs to be considered that involves differ- the relay nodes due to long distance or poor link condition
ent interference management techniques and resource alloca- between peers.
tion schemes. In addition to the interference amid the macro
cell and device levels, interference amid users at the device
level is also of prime concern. For performing the resource
allocation in this type of communication, different algorithms
as shown in table 4 and methods like resource pooling [53],
non-cooperative game [54] or bargaining game, admission
control and power allocation [55], cluster partitioning, and
relay selection [56] can be engaged.
In device relaying communication with the base station
controller, as shown in Fig. 5, since the base station is one
of the communicating units, so the aforementioned chal-
lenges can be addressed with the help of the base station
like authenticating the relaying devices through encryption
for maintaining adequate privacy of the information of the
devices [57]. The challenge of spectrum allocation amid the
relaying devices to prevent them from interfering with other
devices will also be managed by the base station.
In direct device to device communication with base station
controlled, shown in Fig. 6, the devices communicate directly FIGURE 9. A single cell with multiple relay nodes.
with each other, but the base station controls the formation of
links between them. Precisely, the work of the base station is a: NETWORK MODEL
to authenticate the access, control the connection formation, Let us consider a device to device enabled cellular network
resource allocation, and also deals with financial interaction with multiple relays as shown in Fig. 9. A relay node in
TABLE 5. Summary of proposed algorithms for optimal resource allocation in device to device communication.
networks will give rise to new challenges in terms of With the introduction of smart wireless devices, the
interference, mobility and backhauling. To overcome these interaction between these devices and with the environment
challenges, there arises a requirement of designing new are destined to increase. To meet the challenges that have
network layer functionalities for maximizing the performance arisen because of the increasing density of nodes and inter-
farther from the design of the existing physical layer. changing connectivity options, there arises a need of the
In present networks like Long Term Evolution (LTE), user independent algorithms. So future smart devices are
there exists interference mitigation techniques like enhanced designed in such a way that with the help of the context
Inter-Cell Interference Coordination and autonomous com- information, they will learn and decide how to manage the
ponent carrier selection. But these techniques are applica- connectivity. Contextual information possibly will be the
ble only to nomadic and dense small cell deployments and approaching service profile, battery position of a device or a
have limited flexibility. So for 5G networks, the interference complete data acquired through either in built sensors, cloud
mitigation techniques should be more flexible and open to servers or serving base station. For example, to enable faster
the variations as changes in the traffic and deployment are initialization of direct Device-to-Device communications and
expected to occur more rapidly than existing networks [66]. native multicast group making, context information about the
social networking will be very helpful as it will decrease the G. FULL DUPLEX RADIOS
signaling overhead in the network. Context information can For a long duration of communication period, it is assumed in
also provide sustenance for the network to decrease energy the wireless system design that radios have to operate in half
consumption in base stations because of the switching of cells duplex mode. It means that it will not transmit and receive
by improving the mobility and traffic management simultaneously on the same channel. Many scholars, aca-
procedures and local handover strictures [66]. demics and researchers at different universities and research
In short, future smart devices and small cell networks groups have tried to undermine this assumption by proposing
will be capable of providing the best wireless connectivity many designs to build in-band full-duplex radios.
with minimum interference and less power consumption. But the realization to build full duplex radio has a lot of
Along with this, they should be rapidly adaptable to implications. The cellular networks will have to reduce their
the changing requirements of devices and radio access spectrum demands to half as only a single channel is used
network. for achieving the same performance. As in LTE, for both
uplink and downlink, it uses equal width separate channels
F. MULTI RADIO ACCESS TECHNOLOGY ASSOCIATION for empowering radios to realize full duplex.
As we are heading towards 5G, the networks are becoming For communicating in the full duplex mode, the self-
more heterogeneous. The main aspect that has attracted many, interference results from its own transmission to the received
is the integration among different radio access technologies. signal has to be completely removed. Let us consider the case
A distinctive 5G aided device should be manufactured whose of WiFi signals which are transmitting at 20dBm (100mW)
radios not only support a new 5G standard like millimeter average power with the noise floor of around −90dBm.
wave frequencies, but also 3G, various releases of 4G LTE, So the transmit self-interference need to be canceled by
numerous types of WiFi, and possibly direct device to device 110dB (20dBm-(−90dBm)) to achieve the similar level as of
communication, all across the different spectral bands [67]. the noise floor and reduce it to insignificant. If any residual
So, defining of standards and utilization of spectrum to which self-interference is not completely canceled, then it will acts
base station or users will be a really intricate job for the as noise to the received signal, which in turn reduces SNR
network [68]. and subsequently throughput [82].
Defining of the optimal user association is the prime
area of concern which depends on the signal to interfer-
ence and noise ratio from every single user to every single H. A MILLIMETER WAVE SOLUTION
base station, the selections of other users in the network, FOR 5G CELLULAR NETWORK
the load at every single base station, and the prerequisite The Wireless industry has been growing day by day and in
to apply the same base station and standard in both uplink spite of the efforts by the industrial researchers for creating
and downlink for simplifying the operation of control the proficient wireless technologies, the wireless industry
channels for resource allocation and feedback [69], [70]. continuously facing the overpowering capacity demands from
So, certain procedures must be implemented to overcome its current technologies. Recent innovations in computing and
these issues. communications and the arrival of smart handsets along with
To increase edge rates by as much as 500%, a simple, the need to access the internet poses new anxieties in front
apparently highly suboptimal association method centered of the wireless industry. These demands and anxieties will
on aggressive but static biasing towards small cells and grow in the approaching years for 4G LTE and indicates that
blanking about half of the macrocell transmissions has been at some point around 2020, there will arise a problem of con-
shown in [71]. The combined problem of user association and gestion in wireless networks. It will be must for the research
resource allocation in two tier heterogeneous networks, with industry to implement new technologies and architectures for
adaptive tuning of the biasing and blanking in each cell, is meeting the increasing demands of the users. The ongoing
considered in [69], [70], and [72]–[77]. A model of hotspot work plans a wireless future in which data rates increase to
traffic shows that the optimal cell association is done by rate the multi gigabit per second range. These high data rates
ratio bias, instead of power level bias [73]–[75]. An active can be attainable with the help of steerable antennas and the
model of cell range extension as shown in [79], the traffic millimeter wave spectrum and at the same time will support
arrives as a Poisson process in time and at the possible arrival mobile communications and backhaul networks [83].
rates, for which a steadying scheduling policy subsists. With Recent researches have put forward that mm-wave
massive MIMO at the base stations, user association and frequencies of 2.6 GHz radio spectrum possibly will sup-
load balancing in a heterogeneous networks, is considered plement the presently saturated 700 MHz band for wireless
in [79]. An exciting game theoretic approach is used in [80] communications [84]. Feasibility of millimeter wave wireless
for the problem of radio access technology selection, in which communications is supported by the fact that the use of high
union to Nash equilibria and the Pareto-efficiency of these gain, steerable antennas at the mobile and base station and
equilibria are deliberated [67]. cost effective CMOS technology can now operate well into
In conclusion, there is a vast scope for modeling, exploring the millimeter wave frequency bands [85]–[87]. Additionally,
and optimizing base station-user associations in 5G [81]. with the use of millimeter wave carrier frequencies,
larger bandwidth allocations will come up with higher data because of unfriendly channel conditions like path loss effect,
transfer rates and service providers that are presently using absorption due to atmosphere and rain, small diffraction and
20 MHz channels for 4G customers will now significantly penetration about obstacles and through objects respectively.
expand the channel bandwidths [87]. With the increase in There is one more reason of unsuitability is due to strong
bandwidth, capacity will also get increased, while the latency phase noise and excessive apparatus costs. But the prevailing
will get decreased, which give rise to better internet based reason is that the large unlicensed band around 60 GHz [89],
access and applications like real time streaming. Since the were appropriate primarily for very short range transmis-
wavelength of millimeter wave frequencies are very small, sion [90]. So, the emphasis had been given to both fixed
so it will utilize polarization and different spatial processing wireless applications in the 28, 38, 71–76 and 81–86 GHz
techniques like massive MIMO and adaptive beam- and WiFi with the 802.11ad standard in the 60 GHz band.
forming [15]. With the significant increase in bandwidth, Semiconductors are also evolving, as their costs and power
the data links to densely populated areas will now handle consumption values are decreasing rapidly due to the growth
greater capacity than present 4G networks. Likewise the base of the abovementioned short range standards. The main prop-
stations are constantly reducing the coverage areas of the cell agation issues regarding millimeter wave propagation for 5G
for spatial reuse, cooperative MIMO, relays and interference cellular communication are [67]:
mitigation between base stations. Since the base stations are
abundant and more densely dispersed in urban areas, which 1) PATH LOSS
will reduce the cost per base station. Spectrum distributions The free space path loss is dependent on the carrier frequency,
of over 1 GHz of bandwidth are currently being utilized in as the size of the antennas is kept constant which is measured
the 28 GHz and 38 GHz bands. by the wavelength λ = c/fc , where fc is the carrier frequency.
By far as for the concern of building a prototype, the Now as the carrier frequency increases, the size of the anten-
antenna is essentially being positioned in very close vicinity nas got reduced and their effective aperture increases with
to the 28 GHz Radio Frequency Integrated Circuit and the the factor of 4πλ2
, while the free space path loss between a
front end module because there will be high signal attenua- transmitter and a receiver antenna grows with fc2 . So, if we
tion at 28 GHz. Realizing the antenna array directly on the increase the carrier frequency fc from 3 to 30 GHz, it will
printed circuit board of the 5G cellular device will minimize correspondingly add 20 dB of power loss irrespective of the
the insertion loss between the antenna and Radio Frequency transmitter-receiver distance. But for increased frequency, if
Integrated Circuit. This infers that an employment of the the antenna aperture at one end of the link is kept constant,
Radio Frequency blocks in the 5G architecture before the then the free-space path loss remains unchanged. Addition-
intermediate frequency stage will be reliant on the placement ally, if both the transmitter and receiver antenna apertures
of the 28 GHz antenna array in the cellular phone. Taking are kept constant, then the free space path loss decreases
this concept into a thought, a minimum set of two 28 GHz with fc2 [67].
antenna arrays is proposed for millimeter wave 5G cellular
applications in [88], the two antenna arrays are employed
2) BLOCKING
in the top and bottom part of the cellular device. The
28 GHz antenna array configuration for 5G cellular mobile Microwave signals are less prone to blockages but it dete-
terminals and its comparison with the 4G standard is given riorates due to diffraction. In the contrary, millimeter wave
in table 6. signals suffer less diffraction than the microwave signals and
exhibit specular propagation, which makes them much more
TABLE 6. 28 GHz antenna array configuration for 5G cellular mobile vulnerable to blockages. This will fallout as nearly bimodal
terminals and its comparison with the 4G standard. channel subject to the existence or lack of Line of Sight.
Recent studies in [84] and [91] reveals that, with the increase
in the transmitter and receiver distance the path loss increases
to 20 dB/decade under Line of sight propagation, but descents
to 40 dB/decade plus an added blocking loss of 15–40 dB for
non-line of sight [67].
So due to the presence of blockages, the set connection will
promptly shift from usable to unusable which will results in
large scale impediments that cannot be avoided with typical
small scale diversity countermeasures.
a: LINK ACQUISITION
FIGURE 10. Virtual resource cloud made up of mobile devices in the
The main problem that the narrow beams are facing is in vicinity.
establishing links amid users and base stations for both initial
access and handoff. The user and base stations will have
to locate each other by scanning lots of angular positions
where the possibility of a narrow beam is high. This problem
poses an important research challenge predominantly in the
perspective of high mobility [67].
service concept, which partly centralizes functionalities of the service does not fully centralize all radio access network
radio access network depending on the needs and character- functionalities [103].
istics of the network. The Radio access network as a service Functional split realization poses a serious challenge for
is an application of the software as a service paradigm [97], the radio access network. Theoretically, the functional split
so every function may be packed and distributed in the occur on every protocol layer or on the interface amid each
form of a service within a cloud platform. This will cause layer. Present architecture involves restraints on the func-
increased data storage and processing capabilities, as pro- tions between discrete protocol layers. So with a restrained
vided by a cloud platform accommodated in data centers. The backhaul, most of the radio protocol stack and radio resource
design of radio access network as a service based on cloud management will accomplished locally, while functions with
enables flexibility and adaptability from different percep- less restrained requirements like bearer management and load
tions. Recent advances in Cloud radio access network is given balancing are placed in the radio access network as a service
in [98]–[102]. platform. So when a high capacity backhaul is available,
There is a flexible functional split of the radio protocol lower-layer functions like PHY and MAC are shifted for a
stacks as shown in Fig. 12 is present in the central element higher degree of centralization into the radio access network
of radio access network as a service between the central as a service platform [103].
radio access network as a service platform and the local radio The following list as shown in Fig. 13 condenses major
access points. With the introduction of this functional split, characteristics of a radio access network as a service
degrees of freedom increases. implementation similar to the basic characteristics of a cloud
The left side demonstrates a traditional LTE employment computing platform and is explained in [103].
in which all functionalities up to admission/congestion con-
trol are locally employed at the base station. The right side 3) JOINT RADIO ACCESS NETWORK BACKHAUL OPERATION
illustrates the cloud radio access network approach in which The main reliability factor of 5G wireless networks is densely
only the radio front-end is locally employed, and all the rest spread small cell layer which necessitates to be connected to
functionality is centralized. But radio access network as a the radio access network as a service platform. Though,
the need of deployment of small cells is in the places where critical part of the infrastructure. In particular, there is a need
the line of sight centered microwave solutions are either hard of flexible centralization for dynamic adaptation of network
or too costly to deploy for backhaul. Hence, the need to con- routes. The degree of radio access network centralization
nect small cells at diverse locations made backhaul network a depends on available backhaul resources.
So there is a need of a refined transport network design demands with the same demands to 4G networks shows the
that can convey the data headed towards the central unit free progress of spectral efficiency by 3-5 times [105].
of the degree of centralization. This is an important necessity Assessment of demands to delay in control and user
for maximum flexibility when the introduction of the new planes for signaling traffic and user traffic respectively is
functionalities to the network is taking place. shown in Fig. 17. This figure depicts that the demands to
But the complications increases in routing and 5G networks will be twice more firm for traffic in the
classification of data packets according to their quality user plane and 10 times more firm in the subscriber traffic
of service. On the other hand, software defined network plane [106].
provides quicker reaction to link/node letdowns, higher uti-
lization of the accessible resources, and faster deployment V. CONCLUSION
of new updates with ease. These advantages have come up In this paper, a detailed survey has been done on the per-
with a centralized control example, which streamlines the formance requirements of 5G wireless cellular communica-
arrangement and management, but with increased computa- tion systems that have been defined in terms of capacity,
tional efforts, as algorithmic complexity increases [103]. Also data rate, spectral efficiency, latency, energy efficiency, and
for spectrum utilization, software defined radio (SDR) and Quality of service. A 5G wireless network architecture has
software defined networks (SDN) are the optimum solution been explained in this paper with massive MIMO technology,
and the study in [104] revealed that the co-existence of SDR network function virtualization (NFV) cloud and device to
and SDN is essential, and the optimal results can be attained device communication. Certain short range communication
only by co-existence and joint compliments. technologies, like WiFi, Small cell, Visible light communica-
tion, and millimeter wave communication technologies, has
J. TRENDS AND QUALITY OF SERVICE been explained, which provides a promising future in terms
MANAGEMENT IN 5G of better quality and increased data rate for inside users and
5G technologies are likely to appear in the market in 2020. at the equivalent time reduces the pressure from the outside
It is expected to significantly improve customers Quality of base stations. Some key emerging technologies have also
Service in the context of increasing growth of data volume been discussed that can be used in 5G wireless systems to
in mobile networks and the growth of wireless devices with fulfill the probable performance desires, like massive MIMO
variety of services provided. Some general trends related and Device to Device communication in particular and inter-
to 5G can be explained in terms of machine to machine ference management, spectrum sharing with cognitive radio,
traffic and number of machine to machine connections in ultra dense networks, multi radio access technology, full
mobile [105]. duplex radios, millimeter wave communication and Cloud
Based on the projections as shown in Fig. 14, in 2018 the Technologies in general with radio access networks and soft-
number of machine to machine (M2M) connections in the ware defined networks. This paper may be giving a good
networks of mobile operators will surpass 15 billion [108], platform to motivate the researchers for better outcome of
which is 2 times more than the present rate, and in 2022 different types of problems in next generation networks.
mobile operators will have more than 26 billion machine to
machine connections. APPENDIX
At the same time the stake of machine to machine con- A list of current research projects based on 5G technologies
nections of the total number of connections in the mobile are given in Table 7, 8 and 9.
operator’s networks will rise from the present 5% to 15%
in 2018 and to 22% in 2022 [105]. TABLE 9. 5G related activities in Asia [109].
[4] J. G. Andrews, A. Ghosh, and R. Muhamed, Fundamentals of WiMAX. [28] S. K. Mohammed and E. G. Larsson, ‘‘Per-antenna constant envelope
Englewood Cliffs, NJ, USA: Prentice-Hall, 2007. precoding for large multi-user MIMO systems,’’ IEEE Trans. Commun.,
[5] B. Furht and S. A. Ahson, Eds., Long Term Evolution: 3GPP LTE Radio vol. 61, no. 3, pp. 1059–1071, Mar. 2013.
and Cellular Technology. Boca Raton, FL, USA: CRC Press, 2009, ch. 12, [29] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, ‘‘An
pp. 441–443. overview of massive MIMO: Benefits and challenges,’’ IEEE J. Sel.
[6] S. Sesia, I. Toufik, and M. Baker, Eds., LTE: The UMTS Long Term Topics Signal Process., vol. 8, no. 5, pp. 742–758, Oct. 2014.
Evolution. New York, NY, USA: Wiley, 2009. [30] T. L. Marzetta, ‘‘Noncooperative cellular wireless with unlimited num-
[7] K. R. Santhi, V. K. Srivastava, G. SenthilKumaran, and A. Butare, ‘‘Goals bers of base station antennas,’’ IEEE Trans. Wireless Commun., vol. 9,
of true broad band’s wireless next wave (4G–5G),’’ in Proc. IEEE 58th no. 11, pp. 3590–3600, Nov. 2010.
Veh. Technol. Conf., vol. 4. Oct. 2003, pp. 2317–2321. [31] M. Matthaiou, M. R. McKay, P. J. Smith, and J. A. Nossek, ‘‘On the
[8] C.-X. Wang et al., ‘‘Cellular architecture and key technologies for 5G condition number distribution of complex Wishart matrices,’’ IEEE Trans.
wireless communication networks,’’ IEEE Commun. Mag., vol. 52, no. 2, Commun., vol. 58, no. 6, pp. 1705–1717, Jun. 2010.
pp. 122–130, Feb. 2014. [32] S. Vishwanath, N. Jindal, and A. Goldsmith, ‘‘Duality, achievable rates,
and sum-rate capacity of Gaussian MIMO broadcast channels,’’ IEEE
[9] E. Perahia and R. Stacey, Next Generation Wireless LANs:
Trans. Inf. Theory, vol. 49, no. 10, pp. 2658–2668, Oct. 2003.
Throughput, Robustness, and Reliability in 802.11n. Cambridge,
[33] E. Björnson, M. Kountouris, and M. Debbah, ‘‘Massive MIMO and small
U.K.: Cambridge Univ. Press, 2008.
cells: Improving energy efficiency by optimal soft-cell coordination,’’ in
[10] E. H. Ong, J. Kneckt, O. Alanen, Z. Chang, T. Huovinen, and T. Nihtila,
Proc. 20th Int. Conf. Telecommun. (ICT), May 2013, pp. 1–5.
‘‘IEEE 802.11ac: Enhancements for very high throughput WLANs,’’
[34] E. Björnson, L. Sanguinetti, J. Hoydis, and M. Debbah, ‘‘Optimal design
in Proc. IEEE 22nd Pers. Indoor Mobile Radio Commun., Sep. 2011,
of energy-efficient multi-user MIMO systems: Is massive MIMO the
pp. 849–853.
answer?’’ IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3059–3075,
[11] E. Perahia and M. X. Gong, ‘‘Gigabit wireless LANs: An overview Jun. 2015. [Online]. Available: http://arxiv.org/abs/1403.6150
of IEEE 802.11ac and 802.11ad,’’ ACM SIGMOBILE Mobile Comput. [35] Y. Xu, G. Yue, and S. Mao, ‘‘User grouping for massive MIMO in FDD
Commun. Rev., vol. 15, no. 3, pp. 23–33, Jul. 2011. systems: New design methods and analysis,’’ IEEE Access, vol. 2, no. 1,
[12] E. Perahia, C. Cordeiro, M. Park, and L. L. Yang, ‘‘IEEE 802.11ad: pp. 947–959, Sep. 2014.
Defining the next generation multi-Gbps Wi-Fi,’’ in Proc. 7th IEEE [36] M. Peng, D. Liang, Y. Wei, J. Li, and H.-H. Chen, ‘‘Self-configuration
Consum. Commun. Netw. Conf., Jan. 2010, pp. 1–5. and self-optimization in LTE-advanced heterogeneous networks,’’ IEEE
[13] A. B. Flores, R. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, Commun. Mag., vol. 51, no. 5, pp. 36–45, May 2013.
‘‘IEEE 802.11af: A standard for TV white space spectrum sharing,’’ IEEE [37] M. Peng, C. Wang, J. Li, H. Xiang, and V. Lau, ‘‘Recent advances in
Commun. Mag., vol. 51, no. 10, pp. 92–100, Oct. 2013. underlay heterogeneous networks: Interference control, resource alloca-
[14] V. Chandrasekhar, J. G. Andrews, and A. Gatherer, ‘‘Femtocell networks: tion, and self-organization,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 2,
A survey,’’ IEEE Commun. Mag., vol. 46, no. 9, pp. 59–67, Sep. 2008. pp. 700–729, Secondquarter 2015.
[15] F. Rusek et al., ‘‘Scaling up MIMO: Opportunities and challenges with [38] W. Nam, D. Bai, J. Lee, and I. Kang, ‘‘Advanced interference manage-
very large arrays,’’ IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40–60, ment for 5G cellular networks,’’ IEEE Commun. Mag., vol. 52, no. 5,
Jan. 2013. pp. 52–60, May 2014.
[16] A. Bleicher, ‘‘Millimeter waves may be the future of 5G phones,’’ [39] 5G Radio Access—Research and Vision, Ericsson, Stockholm, Sweden,
Samsung’s millimeter-wave transceiver technology could enable ultrafast Jun. 2013.
mobile broadband by 2020, Jun. 2013 [40] T. Irnich, J. Kronander, Y. Selen, and G. Li, ‘‘Spectrum sharing scenarios
[17] H. Haas. (Aug. 2011). Wireless Data From Every Light Bulb. [Online]. and resulting technical requirements for 5G systems,’’ in Proc. IEEE 24th
Available: http://bit.ly/tedvlc PIMRC, London, U.K., Sep. 2013, pp. 127–132.
[18] X. Hong, C.-X. Wang, H.-H. Chen, and Y. Zhang, ‘‘Secondary spectrum [41] M. Goldhammer, 802.16h Main Concepts, document IEEE
access networks,’’ IEEE Veh. Technol. Mag., vol. 4, no. 2, pp. 36–43, 802.19-05/0051r0, 2005.
Jun. 2009. [42] G. J. Buchwald, S. L. Kuffner, L. M. Ecklund, M. Brown, and
[19] F. Haider et al., ‘‘Spectral efficiency analysis of mobile Femtocell E. H. Callaway, ‘‘The design and operation of the IEEE 802.22.1 dis-
based cellular systems,’’ in Proc. IEEE ICCT, Jinan, China, Sep. 2011, abling beacon for the protection of TV whitespace incumbents,’’ in Proc.
pp. 347–351. 3rd IEEE DySPAN, Oct. 2008, pp. 1–6.
[20] P. Agyapong, M. Iwamura, D. Staehle, W. Kiess, and A. Benjebbour, [43] ECC REPORT 159, ‘‘Technical and Operational Requirements for the
‘‘Design considerations for a 5G network architecture,’’ IEEE Commun. Possible Operation of Cognitive Radio Systems in the ‘White Spaces’
Mag., vol. 52, no. 11, pp. 65–75, Nov. 2014. of the Frequency Band 470–790 MHz,’’ CEPT, Cardiff, Wales, Tech.
Rep. 159, Jan. 2011.
[21] A. Osseiran et al., ‘‘Scenarios for 5G mobile and wireless communica-
[44] FCC. FCC12-36 Third Memorandum Opinion and Order in the Matter
tions: The vision of the METIS project,’’ IEEE Commun. Mag., vol. 52,
of Unlicensed Operation in the TV Broadcast Bands (ET Docket No. 04-
no. 5, pp. 26–35, May 2014.
186) and Additional Spectrum for Unlicensed Devices Below 900 MHz
[22] M. Fallgren et al., Scenarios, Requirements and KPIs for 5G Mobile and and in the 3 GHz Band (ET Docket No. 02-380). Washington, DC, USA:
Wireless System, document ICT-317669-METIS/D1.1, Apr. 2013. Federal Communications Commission, 2012.
[23] Industry Proposal for a Public Private Partnership (PPP) in [45] J. Huang, R. A. Berry, and M. L. Honig, ‘‘Auction-based spectrum
Horizon 2020 (Draft Version 2.1), Horizon 2020 Advanced 5G sharing,’’ Mobile Netw. Appl., vol. 11, no. 3, pp. 405–418, Jun. 2006.
Network Infrastructure for the Future Internet PPP. [Online]. [46] P. Steenkiste, D. Sicker, G. Minden, and D. Raychaudhuri, ‘‘Future
Available: http://www.networks-etp-eu/fileadmin/user_upload/Home/ directions in cognitive radio network research,’’ in Proc. NSF Workshop
draft-PPP-proposal.pdf Rep., Mar. 2007.
[24] E. G. Larsson, F. Tufvesson, O. Edfors, and T. L. Marzetta, ‘‘Mas- [47] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, ‘‘Device-to-device
sive MIMO for next generation wireless systems,’’ IEEE Commun. communication in 5G cellular networks: Challenges, solutions, and future
Mag., vol. 52, no. 2, pp. 186–195, Feb. 2014. [Online]. Available: directions,’’ IEEE Commun. Mag., vol. 52, no. 5, pp. 86–92, May 2014.
http://arxiv.org/pdf/1304.6690v1.pdf [48] I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V. Meyerstein,
[25] J. Nam, J.-Y. Ahn, A. Adhikary, and G. Caire, ‘‘Joint spatial division and ‘‘Trust in M2M communication,’’ IEEE Veh. Technol. Mag., vol. 4, no. 3,
multiplexing: Realizing massive MIMO gains with limited channel state pp. 69–75, Sep. 2009.
information,’’ in Proc. IEEE 46th Annu. Conf. Inf. Sci. Syst., Mar. 2012, [49] J. Yue, C. Ma, H. Yu, and W. Zhou, ‘‘Secrecy-based access control for
pp. 1–6. device-to-device communication underlaying cellular networks,’’ IEEE
[26] A. Pitarokoilis, S. K. Mohammed, and E. G. Larsson, ‘‘On the optimal- Commun. Lett., vol. 17, no. 11, pp. 2068–2071, Nov. 2013.
ity of single-carrier transmission in large-scale antenna systems,’’ IEEE [50] A. Perrig, J. Stankovic, and D. Wagner, ‘‘Security in wireless sensor
Wireless Commun. Lett., vol. 1, no. 4, pp. 276–279, Aug. 2012. networks,’’ Commun. ACM, vol. 47, no. 6, pp. 53–57, Jun. 2004.
[27] C. Studer and E. G. Larsson, ‘‘PAR-aware large-scale multi-user MIMO- [51] Y. Zhou, Y. Fang, and Y. Zhang, ‘‘Securing wireless sensor networks:
OFDM downlink,’’ IEEE J. Sel. Areas Commun., vol. 31, no. 2, A survey,’’ IEEE Commun. Surveys Tuts., vol. 10, no. 3, pp. 6–28,
pp. 303–313, Feb. 2013. Third Quarter 2008.
[52] R. Muraleedharan and L. Osadciw, ‘‘Jamming attack detection and coun- [77] S. Deb, P. Monogioudis, J. Miernik, and J. P. Seymour, ‘‘Algorithms for
termeasures in wireless sensor network using ant system,’’ in Proc. Symp. enhanced inter-cell interference coordination (eICIC) in LTE HetNets,’’
Defense Secur., Orlando, FL, USA, Apr. 2006. IEEE/ACM Trans. Netw., vol. 22, no. 1, pp. 137–150, Feb. 2014.
[53] G. Fodor et al., ‘‘Design aspects of network assisted device-to-device [78] B. Soret, K. I. Pedersen, T. Kolding, H. Kroener, and I. Maniatis, ‘‘Fast
communications,’’ IEEE Commun. Mag., vol. 50, no. 3, pp. 170–177, muting adaptation for LTE-A HetNets with remote radio heads,’’ in Proc.
Mar. 2012. IEEE GLOBECOM, Dec. 2013, pp. 3790–3795.
[54] E. Hossain, D. Niyato, and Z. Han, Dynamic Spectrum Access [79] S. V. Hanly and P. A. Whiting, ‘‘On the capacity of HetNets,’’ in Proc.
and Management in Cognitive Radio Networks. Cambridge, U.K.: ITA, Feb. 2014, pp. 1–9.
Cambridge Univ. Press, 2009. [80] D. Bethanabhotla, O. Y. Bursalioglu, H. C. Papadopoulos, and G. Caire,
[55] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, ‘‘Device- ‘‘User association and load balancing for cellular massive MIMO,’’ in
to-device communications underlaying cellular networks,’’ IEEE Trans. Proc. ITA, Feb. 2014, pp. 1–10.
Commun., vol. 61, no. 8, pp. 3541–3551, Aug. 2013. [81] T. A. Levanen, J. Pirskanen, T. Koskela, J. Talvitie, and M. Valkama,
[56] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, ‘‘Intracluster device-to- ‘‘Radio interface evolution towards 5G and enhanced local area commu-
device relay algorithm with optimal resource utilization,’’ IEEE Trans. nications,’’ IEEE Access, vol. 2, pp. 1005–1029, 2014.
Veh. Technol., vol. 62, no. 5, pp. 2315–2326, Jun. 2013. [82] D. Bharadia, E. McMilin, and S. Katti, ‘‘Full duplex radios,’’ in Proc.
[57] L. Lei, Z. Zhong, C. Lin, and X. Shen, ‘‘Operator controlled device- ACM SIGCOMM Conf. SIGCOMM (SIGCOMM), 2013, pp. 375–386.
to-device communications in LTE-advanced networks,’’ IEEE Wireless [83] T. S. Rappaport et al., ‘‘Millimeter wave mobile communications for 5G
Commun., vol. 19, no. 3, pp. 96–104, Jun. 2012. cellular: It will work!’’ IEEE Access, vol. 1, pp. 335–349, 2013.
[84] Z. Pi and F. Khan, ‘‘An introduction to millimeter-wave mobile broad-
[58] Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. Andrews, ‘‘Distributed
band systems,’’ IEEE Commun. Mag., vol. 49, no. 6, pp. 101–107,
resource allocation in device-to-device enhanced cellular networks,’’
Jun. 2011.
IEEE Trans. Commun., vol. 63, no. 2, pp. 441–454, Feb. 2015.
[85] F. Gutierrez, S. Agarwal, K. Parrish, and T. S. Rappaport,
[59] D. I. Kim, W. Choi, H. Seo, and B.-H. Kim, ‘‘Partial information relaying
‘‘On-chip integrated antenna structures in CMOS for 60 GHz WPAN
and relaying in 3GPP LTE,’’ in Cooperative Cellular Wireless Networks.
systems,’’ IEEE J. Sel. Areas Commun., vol. 27, no. 8, pp. 1367–1378,
Cambridge, U.K.: Cambridge Univ. Press, 2011.
Oct. 2009.
[60] Y. Yuan, ‘‘LTE-A relay scenarios and evaluation methodology,’’ in [86] T. S. Rappaport, E. Ben-Dor, J. N. Murdock, and Y. Qiao, ‘‘38 GHz
LTE-Advanced Relay Technology and Standardization. Berlin, Germany: and 60 GHz angle-dependent propagation for cellular & peer-to-peer
Springer-Verlag, 2013, pp. 9–38. wireless communications,’’ in Proc. IEEE Int. Conf. Commun., Jun. 2012,
[61] G. Yu, L. Xu, D. Feng, R. Yin, G. Y. Li, and Y. Jiang, ‘‘Joint mode pp. 4568–4573.
selection and resource allocation for device-to-device communications,’’ [87] T. S. Rappaport, J. N. Murdock, and F. Gutierrez, ‘‘State of the art in
IEEE Trans. Commun., vol. 62, no. 11, pp. 3814–3824, Nov. 2014. 60-GHz integrated circuits and systems for wireless communications,’’
[62] L. Wang and H. Wu, ‘‘Fast pairing of device-to-device link underlay Proc. IEEE, vol. 99, no. 8, pp. 1390–1436, Aug. 2011.
for spectrum sharing with cellular users,’’ IEEE Commun. Lett., vol. 18, [88] W. Hong, K.-H. Baek, Y. Lee, Y. Kim, and S.-T. Ko, ‘‘Study and proto-
no. 10, pp. 1803–1806, Oct. 2014. typing of practically large-scale mmWave antenna systems for 5G cellular
[63] Z. Zhou, M. Dong, K. Ota, J. Wu, and T. Sato. (2014). ‘‘Energy efficiency devices,’’ IEEE Commun. Mag., vol. 52, no. 9, pp. 63–69, Sep. 2014.
and spectral efficiency tradeoff in device-to-device (D2D) communica- [89] Estimated Spectrum Bandwidth Requirements for the Future Develop-
tions.’’ [Online]. Available: http://arxiv.org/abs/1407.1556 ment of IMT-2000 and IMT-Advanced, document Rep. M.2078, ITU-R,
[64] N. Naderializadeh and A. S. Avestimehr, ‘‘ITLinQ: A new approach for Geneva, Switzerland, 2006.
spectrum sharing in device-to-device communication systems,’’ IEEE J. [90] T. Baykas et al., ‘‘IEEE 802.15.3c: The first IEEE wireless standard for
Sel. Areas Commun., vol. 32, no. 6, pp. 1139–1151, Jun. 2014. data rates over 1 Gb/s,’’ IEEE Commun. Mag., vol. 49, no. 7, pp. 114–121,
[65] H. Chen, D. Wu, and Y. Cai, ‘‘Coalition formation game for green Jul. 2011.
resource management in D2D communications,’’ IEEE Commun. Lett., [91] W. Roh et al., ‘‘Millimeter-wave beamforming as an enabling technology
vol. 18, no. 8, pp. 1395–1398, Aug. 2014. for 5G cellular communications: Theoretical feasibility and prototype
[66] T. Ihalainen et al., ‘‘Flexible scalable solutions for dense small cell results,’’ IEEE Commun. Mag., vol. 52, no. 2, pp. 106–113, Feb. 2014.
networks,’’ in Proc. WWRF, vol. 30. Oulu, Finland, Apr. 2013. [92] A. R. Khan, M. Othman, S. A. Madani, and S. U. Khan, ‘‘A survey of
[67] J. G. Andrews et al., ‘‘What will 5G be?’’ IEEE J. Sel. Areas Commun., mobile cloud computing application models,’’ IEEE Commun. Surveys
vol. 32, no. 6, pp. 1065–1082, Jun. 2014. Tuts., vol. 16, no. 1, pp. 393–413, First Quarter 2014.
[68] O. Galinina et al., ‘‘Capturing spatial randomness of heterogeneous [93] N. Fernando, S. W. Loke, and W. Rahayu, ‘‘Mobile cloud computing:
cellular/WLAN deployments with dynamic traffic,’’ IEEE J. Sel. Areas A survey,’’ Future Generat. Comput. Syst., vol. 29, no. 1, pp. 84–106,
Commun., vol. 32, no. 6, pp. 1083–1099, Jun. 2014. 2012.
[69] Q. Ye, B. Rong, Y. Chen, M. Al-Shalash, C. Caramanis, and [94] L. Mei, W. K. Chan, and T. H. Tse, ‘‘A tale of clouds: Paradigm com-
J. G. Andrews, ‘‘User association for load balancing in heterogeneous parisons and some thoughts on research issues,’’ in Proc. Asia-Pacific
cellular networks,’’ IEEE Trans. Wireless Commun., vol. 12, no. 6, Services Comput. Conf. (APSCC), Dec. 2008, pp. 464–469.
pp. 2706–2716, Jun. 2013. [95] E. E. Marinelli, ‘‘Hyrax: Cloud computing on mobile devices using
MapReduce,’’ M.S. thesis, School Comput. Sci., Carnegie Mellon Univ.,
[70] S. Corroy, L. Falconetti, and R. Mathar, ‘‘Cell association in small het-
Pittsburgh, PA, USA, 2009.
erogeneous networks: Downlink sum rate and min rate maximization,’’ in
[96] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, ‘‘The case for
Proc. IEEE Wireless Netw. Commun. Conf., Apr. 2012, pp. 888–892.
VM-based cloudlets in mobile computing,’’ IEEE Pervasive Comput.,
[71] S. Singh and J. G. Andrews, ‘‘Joint resource partitioning and offloading vol. 8, no. 4, pp. 14–23, Oct./Dec. 2009.
in heterogeneous cellular networks,’’ IEEE Trans. Wireless Commun.,
[97] P. Mell and T. Grance. (Sep. 2011). The NIST definition of cloud
vol. 13, no. 2, pp. 888–901, Feb. 2014.
computing. NIST. [Online]. Available: http://csrc.nist.gov/publications/
[72] Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. Andrews, ‘‘On/off macro- nistpubs/800-145/SP800-145.pdf, accessed Aug. 2013.
cells and load balancing in heterogeneous cellular networks,’’ in Proc. [98] M. Peng, Y. Li, Z. Zhao, and C. Wang, ‘‘System architecture and key
IEEE GLOBECOM, Atlanta, GA, USA, Dec. 2013, pp. 3814–3819. technologies for 5G heterogeneous cloud radio access networks,’’ IEEE
[73] D. Fooladivanda and C. Rosenberg, ‘‘Joint resource allocation and user Netw., vol. 29, no. 2, pp. 6–14, Mar./Apr. 2015.
association for heterogeneous wireless cellular networks,’’ IEEE Trans. [99] M. Peng, X. Xie, Q. Hu, J. Zhang, and H. V. Poor, ‘‘Contract-based
Commun., vol. 12, no. 1, pp. 248–257, Jan. 2013. interference coordination in heterogeneous cloud radio access networks,’’
[74] A. Bedekar and R. Agrawal, ‘‘Optimal muting and load balancing for IEEE J. Sel. Areas Commun., vol. 33, no. 6, pp. 1140–1153, Jun. 2015.
eICIC,’’ in Proc. Int. Symp. Modeling Optim. Mobile, Ad Hoc, Wireless [100] M. Peng, C. Wang, V. Lau, and H. V. Poor, ‘‘Fronthaul-constrained
Netw. (WiOpt), May 2013, pp. 280–287. cloud radio access networks: Insights and challenges,’’ IEEE Wireless
[75] S. Borst, S. Hanly, and P. Whiting, ‘‘Throughput utility optimization in Commun., vol. 22, no. 2, pp. 152–160, Apr. 2015.
HetNets,’’ in Proc. IEEE Veh. Technol. Conf., Jun. 2013, pp. 1–5. [101] M. Peng, C. I, C. Tan, and C. Huang, ‘‘IEEE ACCESS special section
[76] S. Borst, S. Hanly, and P. Whiting, ‘‘Optimal resource allocation in editorial: Recent advances in cloud radio access networks,’’ IEEE Access,
HetNets,’’ in Proc. IEEE Int. Conf. Commun., Jun. 2013, pp. 5437–5441. vol. 2, pp. 1683–1685, Dec. 2014.
[102] M. Peng, Y. Li, J. Jiang, J. Li, and C. Wang, ‘‘Heterogeneous cloud radio RAKESH KUMAR JHA (S’10–M’13–SM–15)
access networks: A new perspective for enhancing spectral and energy received the B.Tech. degree in electronics and
efficiencies,’’ IEEE Wireless Commun., vol. 21, no. 6, pp. 126–135, communication engineering in Bhopal, India, the
Dec. 2014. M.Tech. degree from NIT Jalandhar, India, and the
[103] P. Rost et al., ‘‘Cloud technologies for flexible 5G radio access networks,’’ Ph.D. degree from NIT Surat, India, in 2013.
IEEE Commun. Mag., vol. 52, no. 5, pp. 68–76, May 2014. He is currently an Assistant Professor with the
[104] H.-H. Cho, C.-F. Lai, T. K. Shih, and H.-C. Chao, ‘‘Integration of SDR School of Electronics and Communication Engi-
and SDN for 5G,’’ IEEE Access, vol. 2, pp. 1196–1204, 2014.
neering, Shri Mata Vaishno Devi University,
[105] V. Tikhvinskiy and G. Bochechka, ‘‘Perspectives and quality of service
Jammu and Kashmir, India. He is carrying out
requirements in 5G networks,’’ J. Telecommun. Inf. Technol., no. 1,
pp. 23–26, 2015. his research on wireless communication, power
[106] Y. Park, 5G Vision and Requirements, 5G Forum, Korea, Feb. 2014. optimizations, wireless security issues, and optical communications.
[107] 5GNOW, (5th Generation Non-Orthogonal Waveforms for Asynchronous He has authored over 30 international journal papers and more than
Signaling) is a European collaborative Research Project Supported by 20 international conference papers. His area of interest is wireless communi-
the European Commission Within FP7 ICT Call 8, 2015. cation, optical fiber communication, computer networks, and security issues.
[108] M. Hatton, The Global M2M Market in 2013. London, U.K.: Machina Dr. Jha’s concept related to router of wireless communication has been
Research White Paper, Jan. 2013 accepted by the International Telecommunication Union (ITU) in 2010.
[109] 4G America’s Summary of Global 5G Initiatives, A One-Time Overview He received the Young Scientist Author Award from ITU in 2010, the APAN
of Global 5G Initiatives as of the First Quarter of 2014, Jun. 2014. Fellowship in 2011 and 2012, and the Student Travel Grant from COMSNET
[110] G. Wunder et al., ‘‘5GNOW: Non-orthogonal, asynchronous waveforms in 2012. He is a Senior Member of the Global ICT Standardization Forum for
for future mobile applications,’’ IEEE Commun. Mag., vol. 52, no. 2, India, Society for Industrial and Applied Mathematics, the International
pp. 97–105, Feb. 2014. Association of Engineers, and the Advance Computing and Communication
[111] G. Wunder et al., ‘‘5GNOW: Challenging the LTE design paradigms Society.
of orthogonality and synchronicity,’’ in Proc. IEEE 77th Veh. Technol.
Conf. (VTC Spring), Jun. 2013, pp. 1–5.
[112] K. Samdanis, A. Ripke, and D. Kutscher, ‘‘Enhancing user QoE in
multi-carrier LTE dense networks via multi-path support,’’ in Proc. Eur.
Wireless, 20th Eur. Wireless Conf., May 2014, pp. 1–5.
[113] H. Tullberg et al., ‘‘Towards the METIS 5G concept: First view on hor-
izontal topics concepts,’’ in Proc. Eur. Conf. Netw. Commun. (EuCNC),
Jun. 2014, pp. 1–5.
[114] J. F. Monserrat et al., ‘‘Rethinking the mobile and wireless network
architecture: The METIS research into 5G,’’ in Proc. Eur. Conf. Netw.
Commun. (EuCNC), Jun. 2014, pp. 1–5.
[115] J.-C. Belfiore, ‘‘Codes for wireless wiretap channels,’’ in Proc. IEEE Inf.
Theory Workshop (ITW), Nov. 2014, pp. 307–308.
[116] M. Olsson, C. Cavdar, P. Frenger, S. Tombaz, D. Sabella, and
R. Jantti, ‘‘5GrEEn: Towards Green 5G mobile networks,’’ in Proc. 9th
Int. Conf. Wireless Mobile Comput., Netw. Commun. (WiMob), Oct. 2013,
pp. 212–216.
Abstract
A course assessment questionnaire was designed and used as an assessment tool for evaluation of
a design-based and team-oriented mechanical engineering senior design course. The student
feedback to the evaluation questionnaire was collected and analyzed to gain a better understanding
of how well this course met the learning needs of students and addressed the goal of developing
their career skills, as well as its impact on ABET educational objectives, upon which a plan to
improve this senior design course would be formulated. The designed assessment questionnaire is
a good supplement tool to the regular student evaluation form as a means to gather more insightful
and valuable information from students for this specially designed course, through which the
additive value of the unique industry-tied and team-oriented education mode implemented in that
course can be correctly evaluated.
Keywords
1. Introduction
An industry-tied and team-oriented mechanical systems design course had been previously
developed and offered to senior students at Mississippi State University (MSU) (Liu and Dou
2015, Liu 2017). In that course, design projects provided and sponsored by industrial partners,
research centers, and state agencies were assigned to student teams and used as an effective device
to improve student capacity of solving real-world engineering problems and develop their career
skills in a multidisciplinary environment. In order to assess and improve teaching approaches,
learning materials, and education model implemented in that course, an effective student
evaluation instrument was needed. However, the currently used course evaluation questionnaire is
too simple to allow the instructor to collect all useful information from the students to evaluate
that if the specific aims of this course have been achieved and to determine what specific
modifications need to be made to improve the effectiveness of that course. A powerful evaluation
questionnaire which enable the instructor to obtain a comprehensive understanding of advantages
and shortcomings of the renovated design course needs to be constructed. In particular, the
evaluation questionnaire should be able to effectively assess the unique industry-tied and team-
oriented education mode implemented in that course.
In this study, we designed and constructed an evaluation questionnaire to effectively evaluate the
quality of the mechanical systems design course, especially measure the industry-tied and team-
oriented education mode and determine the effectiveness and efficiency of the group design project
in improving students’ skills in problem solving and multidisciplinary team working.
An improved assessment instrument was designed, which includes four sessions. The first session
is about the achievement of the course goals, including 10 closed-format questions and two open
format questions. In the session the students are asked to evaluate their growths on following skills,
organization, teamwork, communication, leadership, management, and problem solving as well as
the knowledge development on topics of solid mechanics, fluid mechanics, manufacturing, and
CAD/CAE. The second session uses four open format questions to obtain more information about
the nature of the project that each student team worked on. The acquired information can provide
additional details related to their motivations, knowledge gains, and skill performances of this
course. The third session with its 10 closed format questions on a 6-point Likert scale aims at
finding out student perception of industry importance on the skills and knowledge covered in this
course. The collected results can be used to assess their possible motivation for mastering different
skills and topics associated with employability and industry standards.
A fourth session was added to discuss the impact of the renovated course on ABET educational
goals. Student perceptions of course performance for ABET criteria would enhance the assessment
of the course by expanding the prior formative and summative assessments to detail specific ABET
measures. Thus, the ABET assessment part of this survey was designed to examine the rationale
and motivation for learning gains, student perceptions of preparation and awareness of the ABET
criteria inclusion within this design course. 11 closed format questions on a 5-point Liker scale
were added to assess the student outcomes according to the 11 ABET (a-k) educational objectives.
Finally, each student is asked to write down their additional comments on this course.
This survey was conducted in the fall semester of 2016 and 44 senior students enrolled in that class
participated in the survey. All the questions, student evaluation results for the closed format
questions are listed in the next section.
3. Assessment Results
Project
1 3 14 18 8 3.66 1 4 20 19 4.30 0.64
Management
Problem Solving 1 10 24 9 3.93 3 21 20 4.39 0.46
Topics 1 2 3 4 5 1 2 3 4 5
Solid Mechanics 3 19 19 3 3.50 1 4 28 11 4.11 0.61
Fluid Mechanics 10 22 6 6 3.18 7 21 11 5 3.32 0.14
Manufacturing 4 17 18 5 3.55 7 28 9 4.05 0.5
CAD/CAE 3 17 17 7 3.64 1 8 25 10 4.00 0.36
Which, if any, skills or topics did you note an increase? What do you think lead to your increase
in that area?
Which, if any, skills or topics did you note a decrease? What do you think lead to your decrease
in that area?
Based on Table 1 it can be found that all the listed skills and knowledge of the participating
students were improved through this course. The students identified that they had achieved biggest
improvements on the project management skill and their solid mechanics knowledge. This can be
attributed to the implementation of the team-based design projects and the fact that this systems
design course focused more on the solid mechanics, including mechanical components design and
analysis. The least improvements they made in this class include the fluid mechanics knowledge
and the teamwork skill. This is because that the course syllabus did not cover many fluid mechanics
topics and few design projects include the design of fluid systems. In addition, the results also
suggest that the organization of the group design projects needs to be improved to better develop
the students’ teamwork skill.
Table 2 reveals the student perceptions of the industry importance of the listed skills and topics.
From that table it can be seen that the students highly valued the influence of knowledge base of
solid mechanics and manufacturing on their careers and ranked the leadership skill and CAD/CAE
experience with the least industry importance. These results will be brought to our industry
partners to find out the most wanted employability skills, according to which the course structure
will be further modified.
Table 3 links the student evaluation results on the course goals (Table 1) with the industry
importance (Table 2) to measure student satisfaction in this design course, in which the topics and
skills are reordered according to their ranks in the industry importance survey. From that table it
can be seen that most skills and knowledge of topics that the students considered important were
evidently improved through this course. The only exception is the teamwork skill. The students
considered that skill the third most important in industry but the growth of that skill only ranked
9th after completing the course. It is once again suggested that further measures need to be taken
to fully develop the students’ teamwork skill.
Table 4. Ranking of student perceptions on industry importance of skills and knowledge and their
corresponding growths
Ranking Skills/Topics Growth
1 Solid mechanics (2.89) 0.61(2nd)
2 Manufacturing (2.93) 0.5 (3rd)
3 Teamwork (3.09) 0.27 (9th)
4 Communication (3.20) 0.47 (4th)
5 Management (3.55) 0.64 (1st)
6 Problem solving (3.64) 0.46 (5th)
7 Organization (3.82) 0.3 (8th)
8 Fluid mechanics (4.16) 0.14 (10th)
9 Leadership (4.23) 0.44 (6th)
10 CAD/CAE (4.45) 0.36 (7th)
This course has a broad impact on ABET educational objectives, which has also been verified
through this survey. As can be seen from Table 4, the students agreed that this design course helped
them to achieve 10 out of the 11 ABET outcomes (with an overall score above 4 out of 5). The
only ABET outcome that received a score below to 4 is the criteria j): a knowledge of
contemporary issues. This fact that the students did not feel much improvement on their knowledge
of contemporary issues suggests the teacher to introduce more contemporary issues in engineering
and design into the class to fill this theory-practice gap.
The overall final average for the fall 2016 class was 79.72%, with 27 out of 44 students scoring at
or above 75% for the semester average. The overall performance breakdown for this class
consisted of 23% A, 23% B, 43% C, and 11% D grades. Homework problems were used to
evaluate ABET goals (a) and (e), and 42 out of 44 students scored at or above 75% for both goals.
The team design project was used to evaluate ABET goals (b-d), and (g). Students’ performance
showed that all the 44 students passed the performance criteria (score ≥ 75%) for goals (b), (c),
and (g), and 43 students passed the performance criteria for (d). Final exam was used to evaluate
the ABET goal (k) and we have 30 students scored at or above 75% in the final exam. A quiz on
engineering ethics conducted in classroom was used to evaluate the ABET goal (f) and all the
students passed it with a score ≥ 75%. Finally, the presented questionnaire was used to evaluate
ABET goals (h) and (j), we have 41 students passed the criteria for (h) and all 44 students passed
that for (j). Results from the direct measures of the student performance agreed very well with the
results obtained from this questionnaire (Tables 1-4) and once again confirmed that most ABET
goals as well as the course goals were achieved through the renovation of this course.
6. Conclusions
A course assessment questionnaire was designed and used for assessing teaching and course
quality of the Mechanical Systems Design course at MSU, in which a unique industry-tied and
team-oriented education mode was implemented. The questionnaire comprehensively investigate
the student perceptions on achievement of course goals, student outcomes, and impact on the
ABET outcomes, based on which the effectiveness and efficiency of the teaching and education
approach and the satisfaction level of the students on this course can be deduced. The student
feedback were collected and studied. The results showed that most course goals were achieved and
overall the students were satisfied with the renovated course and recognized the effectiveness of
the team design projects in growing their knowledge bases and developing their employability
skills. Adoption of this new survey design also advanced the course assessment to ascertain
motivation, experience, and understanding of ABET outcomes. From the results, it is also
suggested that the organization of the design projects should be improved to enable the students to
function more effectively in their teams. More contemporary issues in engineering design should
also be brought into the course syllabus.
References
1 Liu, Y.-C., and Y.-Q. Dou, 2015, “Design of an industry-tied and team-oriented course for mechanical
engineering seniors”, Proceedings of ASEE SE Section Annual Conference, University of Florida,
Gainesville, USA.
2 Liu, Y.-C., 2017, “Renovation of a Mechanical Engineering Senior Design Class to an Industry-Tied and
Team-Oriented Course”, Accepted by European Journal of Engineering Education, In Press.
Dr. Yucheng Liu is Associate Professor and Graduate Coordinator in the Department of
Mechanical Engineering at MSU.
Ms. Francie Baker is a PhD student in the Department of Mechanical Engineering at MSU.
200
150
Ops /s ec
100
50
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
600
500
400
OPs/sec
300
200
100
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Given limited time, budget, and resources, only the 10. Summary
tip of the iceberg has been discovered in relation to the
effect of vibration on system performance. The testing The test results clearly demonstrate that random
performed answered many questions but created even reads and writes are significantly impacted by vibration
more. What can be said with certainty is that vibration in the data center environment. Performance
in a typical data center does impact performance. improvements for random reads ranged from 56% to
Whether that impact is relevant depends on the 246% while improvements for random writes ranged
environment as well as the profile of the application. from 34% to 88% for a defined set of industry
So what are the next steps? First, the community benchmarks. Streaming sequential reads and writes had
needs to perform independent tests to validate the a much smaller performance improvement but were
results in their own environment. This may be as still measurable and potentially relevant to some
simple as running random read/write benchmark 5 environments.
times on a standalone server in an office and then By reviewing the raw data within the Analytics tool,
running the benchmark another 5 times with the server it is clear that it only takes a small increase in disk
mounted in a rack in a production data center. latency caused by vibration to have a cascading effect
Second, the true root cause for the performance that disproportionately effects overall system
degradation needs to be analyzed and understood. It is performance. Additional testing performed in the
theorized that the difference in performance between control environment further indicates that vibration has
the sequential and random cases are due to increased a cumulative effect and the data center environment
head movement within the hard drive. Since there is
itself (CRAC units, air movement, populated metal [5] www.jab-tech.com, Vibration Dampening Hard
racks, etc.) is a primary contributor. Drive Screws
A final finding that was not part of the initial goals
was the discovery of the “latent performance effect” [6] www.silentpcreview.com, NoiseMagic's No-Vibes
associated with vibration and disk I/O latency. This Hard Drive Suspension Kit, 2005
effect seems to be a performance or reliability
characteristic of the system and is clearly visible when [7] T.M. Ruwart, Y. Lu, Performance Impact of
viewed across a long series of runs. More importantly, External Vibration on Consumer-Grade and
this effect shows that point-in-time benchmarks can be Enterprise-Class Disk Drives, IEEE, 2005
misleading or blatantly wrong depending on the
amount of time the system has been active and [8] en.wikipedia.org/wiki/Hard_disk_drive
potentially the I/O characteristics of runs performed
prior to the benchmark. [9] www.sun.com/storage, 7410 Unified Storage Tech
All of these support the very simple premise that Spec
data center vibration affects system performance and
should be actively mitigated as part of any next-gen [10] www.datadirectnetworks.com, SFA 10000
data center or system deployment. In the case of Overview
random reads and writes, this performance difference is
significant and mitigation of vibration would have a [11] blogs.sun.com/brendan, Shouting in the Data
significant positive effect on total energy usage in a Center, Dec 31, 2008
data center.
[12] www.greenplatformcorp.com, AVR-1000
11. Author Biography
[13] www.sun.com, Sun Storage 7000 Unified Storage
Julian Turner is currently serving as the Chief Systems
Technology Officer for Q Associates out of Houston,
Texas. Mr. Turner's past employment consisted of five [14] www.google.com, Data Center Efficiency
years as the Chief Architect of the Southern US for Sun Measurements, October 2009
Microsystems, three years as an independent multi-
national consultant, and nine years with Andersen [15] M Szalkus, What is Power Usage Effectiveness?,
Consulting's/Accenture's Advanced Technology ecmweb.com, Dec 1, 2008
practice both in the US and Asia. He can be reached at
Julian.Turner@QAssociates.com [16] www.sun.com, X86 Power Calculator
Additional thanks to Sun Microsystems for
providing server and storage hardware for this test and
Green Platform Corporation for providing the AVR
1000 anti-vibration rack.
12. References
[1] ASHRE, Structural and Vibration Guidelines for
Datacom Equipment Centers, ASHRAE Publications,
2008
Abstract—Video Summarization (VS) is a technique of This paper proposes an efficient static video summarization
extracting keyframes from the video based on the video content. method using SURF features of the frames. The video
It provides the user with a concise representation of the video summary obtained is optimized using Graph Theory with the
content from which the video is semantically understood. This objective function that the graph generated by the optimal
paper proposes a video summarization technique based on
video summary is a simple graph with a simple walk. The aim
Speeded Up Robust Features (SURF). Authors further propose a
Graph Theory based approach to optimize the number of is to generate a graph such that the corresponding video
keyframes based on the objective function that the graph summary does not contain redundancy and retains only those
generated by the optimized video summary is a simple graph with keyframes that essentially add a semantic understanding to the
a simple walk. The proposed algorithm is tested on two different video summary.
videos from OpenVideo database. The video summarization
results and its optimization obtained shows non-redundancy and Various techniques using colour, texture, motion, object
improvement in the semantic understanding of the video extraction, mpeg feature extraction and attention model are
summary. also proposed in the literature. Xinding Sun et al. [1] proposed
content-based adaptive clustering (CBAC) using R-Sequences.
An innovative approach for video summarization using color
Index Terms—Video Summarization, SURF, Keyframes, histogram, wavelet statistics and an edge direction histogram is
optimization, objective function, graph theory, simple walk, reported by authors in [2]. Sandra E. F. de Avila et al. [3]
simple graph, semantic understanding. proposed VSUMM to generate video summary and a
quantitative evaluation. ZHAO Guang-Sheng [4] presented a
technique for video summarization using shot boundary
I. INTRODUCTION detection and keyframe extraction. Xiaohua He and
In the current digital era there is unexceptional growth in the JianLing[5] proposed a clustered block based color histogram
digital contents in the form of videos. Video Summarization keyframe extraction method TMOF. The main limitation of the
(VS) aims at developing the techniques that extracts keyframes video summarization techniques using low-level features is
from the video based on the video content. The semantic that it fails to capture the semantic understanding of the video
meaning of the video is understood from the keyframes. There [3, 4, 5].
are two forms of video summarization: 1. Static Video Changick Kim and Jenq-Neng Hwang [6] proposed a video
Summarization 2. Dynamic Video Summarization. Static video abstraction technique for video surveillance systems. Yael
summarization represents the summary as a collection of static Pritch, Alex Rav-Acha et al.[7] proposed a Non-Chronological
images which depicts the main contents of the video. Dynamic Video Synopsis and Indexing method for surveillance videos.
video summarization represents the original video as a short An efficient method to generate clustered summaries which
video that captures the main contents of the video [1]. In this can depict simultaneously multiple objects having similar
scenario, techniques for video browsing based on video motion is presented in [8]. Zhong Ji, Yuting Su, Rongrong
contents such as color, texture, shape, motion are proposed. Qian, Jintao Ma [9] proposed a technique for video
summarization based on moving object detection and
trajectory extraction. Zhiqiang Tian et al.[10] proposed key
Dipti Jadhav , Research scholar, Department of Computer
object-based video summarization (KOBVS) scheme for both
Engineering, Ramrao Adik Institute of Technology, Navi Mumbai,
University of Mumbai. India (Phone: 91-022-27709574; Email: static and dynamic background, efficiently depicting semantic
dipti.jadhav@rait.ac.in ) representative actions. Zhiqiang Tian, Jianru Xue et al.[11]
proposed a video summarization technique for moving and
Udhav Bhosle, Principal and Professor Department of Electronics static camera.
and Telecommunication Engineering, Rajiv Gandhi Institute of
Technology, Mumbai. University of Mumbai, India. (Phone: 91-022-
26707025; Fax: 022-26707026;Email: udhav.bhosle@mctrgit.ac.in)
1252
Aditya Khosla et al.[12] proposed a novel video If the number of matched points and matched features are less
summarization and an evaluation technique of user generated than the threshold T it means that the two consecutive frames
videos using web-images as a prior. The presented techniques are not similar and hence frame R should be considered as a
are based on object extraction which helps in detecting and keyframe for video summarization. The frame I+1 is now the
tracking objects, detection of key actions. Feng Wang and reference frame R for further comparison.
Chong Wah[13] proposed to use Hierarchical Hidden Markov In the next step, SURF features for frame I+2 are extracted and
Model(HHMM) for summarizing videos. Wafee Sabbar and number of matched points and matched features between
et al. [14] proposed a technique using shot segmentation and frame R=I+1 and frame I+2 are calculated and the procedure
local motion estimation for video summarization. for keyframe extraction is repeated as described above. This
process is repeated for the next consecutive frames in the
This paper proposes a novel video summarization technique
video and the SURF based video summary S-VS is generated.
based on SURF features of the frames. The SURF features are
scale and rotation invariant and have fast computation. This
paper also proposes an optimization technique based on graph
theory and an objective function. The optimization technique
helps to eliminate the redundancy in the generated video
summary and thus improves the semantic understanding of the
video summary.
This paper is organized as under: Section II presents the
proposed SURF based video summarization technique. Section
III presents the proposed graph theory and objective function
based optimization technique. Section IV presents the
experimental results of the proposed techniques and its
performance analysis. Section V presents the conclusion.
1253
A. Optimization algorithm OVS-GT and the second keyframe kfi+1. The number of matched points
Algorithm: OVS-GT. and matched features between keyframe kfi and kfi+1 are
Find optimized set of keyframes O-KF from the video calculated. If the number does exceeds an empirical threshold
summary S-VS based on the objective function and graph Tg calculated, then the keyframes kfi and kfi+1 are similar to
theory. each other and hence a loop ei with weight Wei=1 is generated
Input: A set of keyframes KF of the form KF: kf1,kf2,..,kfn around the vertex Vi and the weight of the vertex Vi is also
where kfi is the keyframe from S-VS. incremented by 1.This loop helps to detect the redundancy.
Output: A set of optimized keyframes O-KF without If the number of matched points and matched features for the
redundancy. keyframe kfi and kfi+1 does not exceeds the threshold Tg, then
Method: both the keyframes are not similar and hence a new vertex
V <=Set of vertices generated. Vi+1 with weight i+1 is created and an edge is generated from
E <=Set of Edges or Loops generated. Vi to Vi+1. This edge represents the chronological order of the
Wvi <= weights of vertices. images that should be present in the optimized video summary.
Wei<=weights of edges or loops. Further the keyframe kfi+2 in the video summary S-VS is
Tg <= empirical threshold. considered and its SURF features are calculated. The number
cnt1 <=counter1. of matched points and matched features between keyframe
cnt2 <= counter2. kfi+1 and kfi+2 are calculated. If the matched features does
wt <= weight allocated to vertex and edge. exceeds the threshold Tg then keyframe kfi+1 and keyframe
SF <= SURF features of keyframe kfi. kfi+2 are similar and hence a loop with weight Wei+2 is again
generated around vertex Vi and the weight of the vertex Vi is
for each keyframe kfi in KF do incremented by 1. Thus the weight of the vertex is an
indication of the number of adjacent keyframes that are similar
SFi <=SURF features extracted for kfi and hence helps to detect redundancy. If the number of
SFi+1<= SURF features extracted for kfi+1 matched points and matched features does not exceeds
threshold Tg, then the two keyframes are dissimilar and a new
Calculate the number of matched points and matched SURF vertex Vi+2 with weight i+2 is generated and an edge ei is
features between the keyframes kfi and kfi+1 generated between vertex Vi+1 and Vi+2. This process is
repeated for all the keyframes kf in the keyframe set KF.
If matched points > Tq Thus a graph G(V,E) with vertices V that represents the non-
redundant or dissimilar keyframes, edges E that represents the
cnt2(i) <=cnt2+1 chronological order between two keyframes that should follow
else each other and loops that represent redundant keyframes in the
cnt2(i) <= 0 video summary is generated.
endIf In the next step, the graph G is checked for the objective
endFor function. At the first iteration, the generated graph G is
cnt2(i+1) <= 0 evaluated for objective function that checks if the graph is
for each i do simple with a simple walk. If the graph G contains loops, then
if cnt2(i)==cnt2(i+1) and cnt2(i+1) ==1 the first vertex Vi is considered and the ranking is assigned to
then Wvi <= wt+1 and Wei <= wt+1 every loop around Vi as equation (1).
else
Wvi <= wt and Wei <= 0 Rank Ei = Wei / Wvi (1)
for each i do The loop around Vi with the lowest rank is deleted which
if Wvi == Wvi+1 and Wei == 1 actually leads to the deletion of a redundant keyframe from the
then cnt <= cnt+1andWvi <= cnt S-VS video summary. The weight of the vertex Vi is
decremented by 1. Rankings are reassigned to the loops around
for each i do vertex Vi with new weight of Vi as equation (1).
In the next iteration, the graph G is again evaluated for the
Wei <= Wei/cnt objective function and if the objective function is not satisfied
then the first vertex Vi in the graph G with loop is considered
D <= maximum of Wei again. The loop with lowest rank is deleted. The rankings are
for each i do reassigned to the loops. The graph is again checked for the
if Wei == D objective function.
then delete keyframe kf from set KF. The optimization continues until the objective function is
reached. The algorithm converges when there are no loops in
A vertex Vi is generated for the first keyframe kfi from the the graph G. The ranking assigned helps assigning a factor of
summarized output S-VS and a weight Wvi=1 is allocated to importance to the keyframes. The number of loops generated
it. The SURF features are extracted for the first keyframe kfi around a vertex denotes the number of adjacent similar
1254
keyframes in the video summary. The edge between the ver- The video summary of video v37 obtained in Fig.4 is
tices establishes a chronological order of the non-redundant or optimized using proposed graph theory based objective
dissimilar keyframes in the optimized video summary. The function algorithm OVS-GT. The redundant keyframes which
proposed algorithm preserves the semantic meaning of the are deleted at different iterations is as shown below.
summary by assigning independent vertices to every non 1st iteration: Frame 10 deleted. Fig 5
redundant and semantically meaningful keyframe in the video 2nd iteration: Frame 13 deleted. Fig 6
summary. 3rd iteration: Frame 13 deleted. Fig 7
4th iteration: Frame 15 deleted. Fig 8
IV. EXPERIMENTAL RESULTS AND PERFORMANCE ANALYSIS 5th iteration: No change
The proposed SURF based video summarization and The optimization algorithm for video v37 converges after 4th
optimization algorithm is tested on videos v37 and v24 taken iteration. As observed above, in every iteration the graph
from the OpenVideo database. theory approach and the objective function helps to delete only
those keyframes that are redundant. It retains the keyframes
that are important and improves the semantic understanding of
A. Experimental results for video v37 the video summary. The video summary of STIMO[16] and
VSUMM[3] for video v37 is shown in Fig. 9 and Fig. 10
respectively.
Fig. 4. The video summary S-VS generated by the SURF parameters for the
video v37 (OpenVideo database)
Fig. 8. Iteration 4: Frame 15 deleted
The experimental results of the proposed SURF based video
summarization S-VS as discussed in Section 2 is shown in Fig
4. As observed in Fig. 4 the robustness of SURF generates a
satisfactory video summary that captures salient actions in the
video alongwith various intermediate activities of the video.
1255
Fig. 9. Keyframes extracted by STIMO[16] for video v37
Fig 13. The video summary S-VS generated by the SURF parameters for the
video v24 (OpenVideo database)
Fig. 10. Keyframes extracted by VSUMM[3] for video v37
Fig 11. Sample Video frames extracted from the video v24
The sample of SURF features extracted from an image I of
video v24 under consideration is as shown in Fig 12. It shows
the 64 dimensional feature vector or descriptor f1 for the 24
detected interest points for image I. These detected points and
its vector f1 is matched with the detected interest points and
feature vector f2 of image I+1 and matched points are
calculated.
The SURF based video summary S-VS for the video v24 is as Fig 15. Frames obtained after 2nd, 3rd, 4th, 5th, 6th, 7th iteration
shown in Fig. 13. The iteration wise output for the
optimization of the video summary of video v24(OpenVideo)
from the proposed optimization algorithm OVS-GT is as
shown in Fig. 14, Fig. 15, Fig. 16.
First iteration: Frame 3 deleted. Fig.14.
Frames obtained after 2nd, 3rd, 4th, 5th, 6th, 7th iterations.
Fig. 15.
8th iteration: Frame 25 deleted. Fig.16
The algorithm converges after 8 iterations. Fig 16. 8th iteration: Frame 25 deleted
The video summary of STIMO [16] and VSUMM [3] for
video v24 is as shown in Fig. 17 and Fig. 18 respectively.
Fig 12. Sample SURF features extracted from a frame I of video v24
1256
algorithm OVS-GT for videos v37 and v24 is performed with V. CONCLUSION
the video summary of VSUMM [3] and STIMO [16]. The robustness of the SURF features is used to generate a
It is observed that the robustness of SURF’s detector and video summary that can capture salient frames and actions in
descriptors helps to capture much finer details and actions in the video. The proposed optimization algorithm with its
the video. Thus the video summary generated by SURF based objective function helps to retain keyframes that helps to
algorithm S-VS is more semantically meaningful. The finer improve the semantic meaning of the video summary. The
details captured by SURF can lead to some amount of proposed algorithms can be used across various genre of
redundancy as observed in Figure 4 and Figure 13. videos. The future scope is to develop an objective evaluation
The optimization algorithm OVS-GT when applied to S-VS technique to evaluate the performance of the algorithm used to
helps to retain the essential keyframes that add semantic generate a video summary.
meaning to the video summary and removes the redundant
keyframes as illustrated in Figure 8 and Figure 16. REFERENCES
In the field of Video Summarization the performance analysis
[1] Xinding Sun and Mohan S. Kankanhalli, “Video Summarization using
is done subjectively by displaying the video summary to testers R-Sequences”, Real Time Imaging 6, 449-459, 2000 Academic Press.
from various categories like students, researchers, etc. Three [2] Ciocca Gianluigi, Schettini Raimondo, “An Innovative Algorithm for
scaling grades are allocated: 3.Good 2. Acceptable 1.Bad Key-frame extraction in Video Summarization”, Journal of Real Time
based on whether the semantic meaning of the video is Image Proc, 1:69-88, Springer-Verlag, 2006.
[3] Sandra E.F. de Avila, Antonio da Luz Jr. Arnaldo A Araujo, Matthieu
understood from the video summary. The testers are first given Cord, “VSUMM: An Approach for Automatic Video Summarization
the database videos and then presented with the video and Quantitative Evaluation”, XXI Brazilian Symposium on Computer
summary. The subjective evaluation of the video summary Graphics and Image Processing, 2008 IEEE.
generated after optimization is shown in the Table I. The [4] Zhao Guang-Sheng, “A Novel Approach for Shot Boundary Detection
and Key-Frames Extraction”, 2008 International Conference on
number of frames column represents the total number of Multimedia and Information Technology, IEEE 2008.
frames in the video. The number of keyframes column [5] Xiaohua He and Jian Ling, “A Video Summarization Method Based on
represents the number of keyframes generated by the Key-frames Extracted by TMOF”, IEEE 2012.
mentioned techniques. The tester’s score in columns 2, 3 and 4 [6] Changick Kim, Jenq-Neng Hwang, “Object- Based Video Abstraction
for Video Surveillance Systems”, IEEE Transactions on Circuits and
are given for the proposed optimized video summary.
Systems for Video Technology, Vol 12, No. 12, December 2002.
[7] Yael Pritch, Alex Rav-Acha, Shmuel Peleg, “Non-Chronological
TABLE I Video Synopsis and Indexing”, IEEE Transactions on Pattern Analysis
PERFORMANCE ANALYSIS AND SUBJECTIVE EVALUATION and Machine Intelligence,2008.
[8] Yael Pritch, Sarit Ratovitch, Avishai Hendel, Shmuel Peleg,
“Clustered Synopsis of Surveillance Video”, IEEE 2009, Advanced
Video and Signal Based Surveillance.
[9] Zhong Ji, Yuting Su, Rongrong Qian, Jintao Ma, “Surveillance Video
Number of Key Frames Extracted Summarization Based on Moving Object Detection and Trajectory
Extraction “, IEEE 2010, 2nd International Conference on Signal
Video G A B NF OVS- VSUMM STIMO Processing Systems(ICSPS).
GT [3] [16] [10] Zhiqiang Tian, Jianru Xue, Xuguang Lan, Ce Li, Nanning Zheng, “Key
Object-based Static Video Summarization”, MM 2011, Proceedings of
the 19th ACM International Conference on Multimedia pages, 1301-
1304, ACM, NY, USA.
V24 85% 15% 0 1850 22 11 10 [11] Zhiqiang Tian, Jianru Xue, Xuguang Lan, Ce Li, Nanning Zheng,
“Object Segmentation and Key-pose Based Summarization for Motion
Video”, Multimedia Tools Applications, Springer, May 2013.
[12] Aditya Khosla, Raffay Hamid, Chih-Jen Lin, Neel Sundaresan,
V37 85% 15% 0 2900 16 05 11
“Large Scale Video Summarization using Web Image Priors”, IEEE,
Proceedings of Computer Vision and Pattern Recognition, 2013.
[13] Feng Wang, Chong Wah, “Summarizing Rushes Videos by Motion,
Object and Event Understanding”, IEEE Transactions on Multimedia,
G= Good, A=Acceptable, B=Bad, NF= Number of frames in the video. Vol.14, No.1, February 2012.
[14] Wafae Sabbar, Adil Chergui, Abdelkrim Bekkhoucha, “Video
As observed in Table I the testers score shows that the Summarization using Shot Segmentation and Local Colour
proposed techniques give satisfactory results. The number of Estimation”, Computing Technology (INTECH), 2012, pp.190, and 18-
20 Sept 2012.
keyframes retained by OVS-GT is more than the keyframes [15] Herbert Bay, Tinne Tuytelaars, and Luc Van Gool, “SURF: Speeded Up
generated by VSUMM [3] and STIMO [16].This is because Robust Features”, A. Leonardis, H. Bichof, and A. Pinz (Eds.): ECCV
the robustness of SURF features captures minor variations and 2006, Part I, LNCS 3951, pp. 404–417, Springer-Verlag, Berlin,
transitions in the video. The proposed optimization algorithm Heidelberg 2006.
[16] Marco Furini, Filippo Geraci, Manuela Montangero, Marco Pellegrini,
and ranking mechanism retains only those keyframes that "STIMO: STIll and MOving Video Storyboard for the WebScenario",
depicts the chronological actions in the video. This improves Multimed Tools Appl (2010) 46: 47. doi:10.1007/s11042-009-0307-7.
the understandability of the video summary.
1257
International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
Abstract- Today leading cause of cancer deaths for women is the for mammogram analysis and classification. Mass, change in
Breast cancer. For early and accurate detection of breast cancer, shape, color and dimensions of breast are some of the
mammography is found to be the most reliable and effective symptoms of cancerous breast. These variations can be studied
technique. In this context, computer aided diagnosis of breast
by extracting the textual features of mammogram. In this
cancer from mammograms is gaining high importance and
priority for many researchers. In this paper machine learning context, representation of mammograms by significant and
based mammogram classification using modified hybrid SVM- most distinctive features and use of these feature sets for
KNN is proposed. The idea is to map the feature points to kernel classification is most important [3].
space using kernel and find the K nearest neighbors among the Numbers of techniques for breast cancer detection has been
training dataset for a given test data point. Doing this we narrow reported in literature. Mammogram classification using
down the search for support vectors. Mammogram images are association rules and neural network classifier is reported in
preprocessed and region of interest is extracted using Fuzzy C [4]. Authors in [5] used image mining technique based on
Means clustering and Active Counter technique. GLCM (grey statistical and GLCM features to classify mammogram images
level covariance matrix) based texture features are extracted
into normal, benign and malignant class. Authors in [6] extract
from segmented ROI. These features are used to train modified
hybrid SVM-KNN classifier proposed by authors. The trained texture features from mammogram ROI. These features are
classifier is used to classify breast tissues in normal/abnormal ranked and highest rank features are used for classification
classes and further abnormal class into benign/malignant. using KNN. Hassanienet al [7] used maximum difference
Proposed technique is experimented on two standard MIAS and method for feature selection and proposed ensemble
DDSM databases. The proposed classifier reports classification supervised algorithms for classification. Masses detection on
accuracy of 100 % for DDSM and 94% for MIAS database for digitized mammograms and further classification using SVM
benign and malignant class. Results are compared with SVM, (Support Vector Machine) is reported by Martains [8]. Author
KNN and Random Forest classifiers. uses texture feature extraction and K-means algorithm for
image segmentation. Authors in [9] used KNN, PCA and
Keywords—Mammograms, Texture feature ,SVM,KNN,Hybrid
SVM combination for mammogram classification.
SVM_KNN,Random Forest
In this paper, post preprocessing of mammograms, author use
I. INTRODUCTION fuzzy C means clustering and active contour technique for
segmentation. From segmented ROI, low level local texture
The most frequently diagnosed cancer among women in the features are extracted. Using these features, mammograms are
world is the breast cancer [1]. Early stage breast cancer classified into normal, benign and malignant class by SVM,
detection is helpful for reducing patient mortality [2]. Patient KNN, and Random Forest classifier followed by proposed
survival rate has been improved by early detection through modified hybrid KNN_SVM classifier. Experimentation is
screening. The mammography is the most reliable and carried out on standard MIAS and DDSM databases. The rest
effective technique for early and accurate detection of breast of the paper is structured as follows. Section II discusses
cancer. Thus, everyday large numbers of mammograms are proposed method. Section III proposed modified hybrid
generated in hospitals. Therefore, physicians require an SVM_KNN classifier and Random Forest is discussed. The
accurate and automatic reading of digital mammograms due to simulations results are presented in Section IV and conclusion
its huge volume. At the same time, analysis and diagnosis of and scope for future work is presented in Section V.
mammograms is very critical and difficult. Hence, there is a
need of development of efficient CAD system. Duo to this II. PROPOSED METHOD
breast cancer detection using CAD system has gained a lot of
research attention in the past few years. Fig. 1 shows the block diagram of proposed scheme. It starts
Attempts are being made to develop an efficient CAD system with mammogram segmentation to extract ROI using active
for accurate interpretation of mammograms and further to contour and snake method. From the extracted ROI, GLCM
enhance the classification accuracy. CAD system reduces based texture feature are extracted to form feature vector
variability of judgments among the radiologists. Mammogram representation for each mammogram image. The feature
images show breast tissue density variations, which are used vector is given as input to classifier, to classify input
305
ECE Programme, Karunya University
International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
D. Classification of Mammogram images
306
ECE Programme, Karunya University
International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
returns the most common value. All training samples are average for regression). Here, we have used DDSM database
stored in n dimensional pattern space. The class of an for experimentation. We have generated 500 decision tresses
unknown sample is decided by a majority vote of its for classification of mammogram into appropriate class.
neighboring samples in the training pattern space. There are Gini Index:
many distance measures that can be used in KNN In the step (b) in the above list of steps for training and testing
classification such as Euclidian distance, Manhattan distance, random forest we have mentioned the splitting criteria in each
Minkowski distance, Mahalanobis distance etc. [14]. However decision node of a tree. We shall further discuss that here.
Euclidean distance is the most commonly used distance There are many methods for splitting at a decision node in a
metric. tree, namely Gini Index, Information Gain, Chi-Square etc. In
The KNN classifier can perform efficiently, if the optimal our experiment, we have used Gini Index as this yielded the
value of ‘k’ is used in the classifier design. In the present best result. Gini Index of a node (t) can be calculated as:
work, after experimentation, the optimal value of ‘k’ is
decided as 5. GINI (t) = 1 - ∑ (8)
Let k denotes desired number of nearest neighbors and
F: Pattern Space: set of training samples {F1 ,F2,F3,….FN,}: Where M is the number of classes of the variable and is the
The set of feature vector of training mammograms in the form proportion or probability of class in the data. And Gini
of Fi = {Xi,Ci} Where Xi: feature vector of the point Fi and Index of a split is calculated as [18]:
Ci is the class that belongs to.
F' = {X'i,C'i} :Test mammogram feature vector
( , )= ( )− ( )− ( ) (9)
For a test mammogram, following steps are followed to make
prediction: Where s: split
(i) Compute the Euclidian distance d (X', Xi) between test t : node
mammogram and all training mammograms. : Proportion of observation in left node after split s.
(ii) Sort all points Fi according to distance ( ) : Gini index of left node after split s.
(iii) Select the first K points from the sorted list. These are k : Proportion of observation in right node after split s.
closest samples to F. ( ) : Gini index of left node after split s.
(iv) Choose the closest label.
(v) Return Majority label and assign class to test mammogram III. HYBRID SVM KNN SUPERVIED CLASSIFIER
F' based on majority vote
The limitation of KNN classifier is false classification of test
(c) Random Forest image when majority of the nearest neighbors have closely
matched features. To overcome this problem, KNN could be
Random forest is a versatile machine learning technique that combined with another classifier [15, 16]. Here we combine
can be used for classification as well as regression. It is an KNN with SVM and resultant hybrid supervised classifier is
ensemble method where a group of weak classifiers are used for mammogram classification for improving the
combined to form a more powerful classifier. Here we grow performance of the classifier and accuracy. The idea is to map
multiple decision trees from the training dataset unlike a single the feature points to kernel space using kernel and find the K
Classification and Regression tree (CART) model. When we nearest neighbors among the training dataset for a given test
feed a new data point or case to the model each of the trees data point. Doing this we narrow down the search for support
classifies the data, we say each of the tree votes for a “class”. vectors to the nearest neighbors or the more relevant data
The class with maximum number of votes is considered the points. SVM classifier is trained over these nearest data points
winner and we say the model classified the data into that class. and used to classify test data point.
The training and testing steps of a random forest for
classification are stated below [17]: Proposed Hybrid KNN-SVM Classifier:
If there are N data points in the training dataset, then they are
randomly sampled with replacement and that forms the (1) Divide given database into training and testing class data.
training dataset for a tree in the forest (for each tree random (2) Segment ROI, extract GLCM texture features and
sampling is done). represent training and testing images by feature vectors.
If there are K variables in each data point, then a number k < (3) Apply K nearest neighbor algorithm using Euclidean
K is selected such that k variables are randomly taken and are distance. Different values of k are experimented, but
used for splitting at each node in the tree. The best split optimum results are obtained at k=30, hence it is used.
(according to whatever splitting criteria is chosen) out of these (4) If all the k neighbors have the same label, classification
k variables is selected to split that node. The value of k is kept process is terminated and the test image is given as the
constant across the forest. Each tree is grown to the deepest label of the neighbors.
extent possible. To predict a new data-point the output of all (5) If the test image does not identify in previous step, then
the trees are aggregated (maximum vote for classification and compute the pair wise distance matrix between the
307
ECE Programme, Karunya University
International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
neighbors. Convert distance matrix into kernel matrix
using kernel trick.
(6) Using kernel matrix, train SVM on the K nearest TABLE 1: IMAGE FEATURE VECTOR
neighbors in the training data and classify test image
using the trained SVM classifier. Label
Image Image Feature Values from 1 to 88
Numb
1 2 . . . 86 87 88
IV RESULTS AND DISCUSTION er
1 1111 18.34986 18.32752 . . . 0.997142 0.997599 0.997033
2 1111 20.82134 20.79414 . . . 0.998902 0.999104 0.998823
308
ECE Programme, Karunya University
International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
Fuzzy C means clustering is used to segment the normal and abnormal class. Table 4 shows result of
mammogram, for removal of radiopaque artifacts such as normal/abnormal classification. Table 5 shows number of
labels, markers and wedges. Hough transform is used to images for benign/malignant classification. Results of
remove pectoral muscle removal.Fig.7(C) shows final ROI benign/malignant classification is shown in Table 6.
extracted. From extracted ROI, GLCM features are calculated TABLE 5: IMAGES FOR BENIGN AND MALIGNANT CLASSIFICATION.
to generate feature vector for test images from DDSM
database as shown in Table 2. Training Images Testing Images
Database Benign Malignant Benign Malignant
TABLE 2: IMAGE FEATURE VECTOR MIAS 45 45 15 15
DDSM 40 50 21 25
Image Image Feature Values from 1 to 88
number 1 2 . . . 86 87 88
1 55.93361 55.91095 . . . 0.997142 0.997599 0.997033 TABLE 6: CLASSIFICATION ACCURACY OF BENIGN/MALIGNANT
2 53.94997 53.65203 . . . 0.998902 0.999104 0.998823
3 42.45662 42.09956 . . . 0.999055 0.999373 0.999238
4 47.44773 47.04855 . . . 0.999189 0.999411 0.999214 Data Classifier Accuracy
. . . . . . . . .
. . . . . . . . .
Set Benign Malignant Avg Sensitivity Specificity
. . . . . . . . .
73 59.27305 58.66695 . . . 0.989931 0.990901 0.989918
MIAS KNN 93.33 93.33 93.33 93.33 93.33
74 62.67675 62.49319 . . . 0.996633 0.996936 0.996635
75 62.95228 62.89389 . . . 0.978394 0.980028 0.978368
76 60.44935 59.99166 . . . 0.989771 0.99089 0.989731
MIAS SVM 93.33 93.33 93.33 93.33 93.33
TABLE 3: IMAGES FOR NORMAL/ABNORMAL CLASSIFICATION MIAS Hybrid 95.77 95.77 95.77 95.77 95.77
KNN-SVM
Training Images Testing Images
Database DDSM KNN 96 95.23 95.65 96 95.23
Normal Abnormal Normal Abnormal
MIAS 45 70 15 30
DDSM 50 90 25 46 DDSM SVM 95.55 95.55 95.55 95.55 95.55
309
ECE Programme, Karunya University
International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
MIAS DDSM
MIAS DDSM
MIAS DDSM
Comparison results with other classification technique are experimentation with more classifiers is required. There is
represented in Table 7. Table 8, 9, 10 shows confusion matrix further scope for reducing the complexity of the proposed
for benign/malignant classification using KNN, SVM and classifier by reducing the number of features for training the
Hybrid KNN-SVM classification respectively. classifier. For that feature optimization technique using
transformed domain approach can be used.
Authors present mammogram classification modified hybrid The authors express thanks to Dr. J. Suckling and co-authors
KNN-SVM classifier to improve the classification accuracy. for providing access to the dataset entitled “Mammographic
The experimental results are validated on two standard Image Analysis Society (MIAS) [27]. The authors also would
databases MIAS and DDSM. The results are compared with like to thank Dr. Thomas Deserno and co-authors, Department
KNN, SVM, and Random Forest classifier. The proposed of Medical Informatics, RWTH Aachen, Germany, for
method gives accuracy up to 97.18 for normal/abnormal providing access to the dataset entitled, “IRMA VERSION OF
mammogram classification and 100% for benign malignant DDSM LJPEG DATA” [26].
classification. The extracted feature set seems to be stable as it
yields same accuracy in hybrid SVM-KNN and Random
Forest Classifier. But at this stage, we cannot conclusively say
anything about the stability of the features as exhaustive
310
ECE Programme, Karunya University
International Conference on Signal Processing and Communication (ICSPC’17) – 28th & 29th July 2017
[14] http://machinelearningmastery.com/k-nearest-neighbors-for-machine-
References learning/
[15] Hao Zhang Alexander C. Berg, “ SVM-KNN: Discriminative Nearest
[1] Population Based Cancer Report, Neighbor Classification for Visual Category Recognition”
http://ncrpindia.org/Annual_Reports.aspx [Online].
[16] Lam Hong,Lee ,Chin Heng, “Overview of Nearest neighbor support
[2] American Cancer Society (1999). Breast Cancer Facts &Figures 1997- vector machine hybrid classifier”, Journal of Applied sciences 10(17)
1998, 1845-1858,2010
[3] Nithya R, Santhi B.,” Classification of normal and abnormal patterns in [17] https://www.analyticsvidhya.com/blog/2016/04/complete-tutorial- tree-
digital mammograms for diagnosis of breast cancer”, Int J Comput Appl based-modeling-scratch-in-python/
T. 2011;28(6):21–5.
[18] http://dni-institute.in/blogs/gini-index-work-out-example/
[4] Maria-Luiza Antonie, Osmar R. Zaiane, Alexandru Coman,
[19] Jiang Yun; Li Zhanhuai; Wang Yong; Zhang Longbo, "Joining
“Application of Data Mining Techniques for Medical Image
associative classifier for medical images," Hybrid Intelligent Systems,
Classification”, in Proceedings of Second International Workshop on
2005. HIS '05
Multimedia Data Mining (MDM/KDD’2001) in conjunction with ACM
SIGKDD conference, SanFrancisco, USA, pp. 94-101, Aug 26, 2001. [20] Sampaio WB, Diniz EM, Silva AC, de Paiva AC, Gattass M.” Detection
of masses in mammogram images using CNN, geostatistical functions
[5] Aswini Kumar Mohanty, Sukanta Kumar Swain, Pratap Kumar
and SVM”, Journal of Computers in Biology and Medicine 2011; 41:
Champati, Saroj Kumar Lenka, “Image Mining for Mammogram
653-664
Classification by Association Rule Using Statistical and GLCM
features”, International Journal of Computer Science Issue, 2011. [21] Wang D, Shi L, Ann Heng P, “Automatic detection of breast cancers in
mammograms using structured support vector machines”,
[6] Vipul Sharma and Sukhwinder Singh “Automated Classification of Fatty
Neurocomputing2009; 72: 3296-3302.
and Dense Mammograms” Journal of Medical Imaging and Health
Informatics Vol. 5, 520–526, 2015. [22] Rejani YIA, Selvi ST., “Early Detection of Breast Cancer using SVM
Classifier Technique”, International Journal of Computer Science
[7] Hossein Yousefi, Banaem, Alireza ,Mehri Dehnavi,, “Ensemble
Engineering 2009; 1: 127-130.
Supervised Classification Method Using the Regions of Interest and
Grey Level Co-Occurrence Matrices Features for Mammograms Data” [23] M. Arfan Jaffar, “Dct Features based Malignancy and abnormality type
Iranian journal of radiology ISSN: 1735-1065 detection method for mammograms “International Journal of Innovative
Pages: e11656 Computing, Information and Control ICIC ISSN 1349-4198Volume 7,
Number 9, September 2011
[8] Leonardo de Oliveira Martins, Geraldo Braz Junior,'” Detection of
Masses in Digital Mammograms using K-means and Support Vector [24] Deepa Deshpande, Archana Rajuskar, “Texture based associative
Machine”, Electronic Letters on Computer Vision and Image Analysis classifier-An application of data mining for mammogram classification”,
8(2):39-50, 2009 Computational Intelligence in Data Mining 1,Springer
[9] Kirti and Jitendra Virmani,” Comparison of CAD systems for three class [25] Kanchanamani M, Varalakshmi Perumal, “Performance evaluation and
Breast tissue classification using mammographic images”, Medical comparative analysis of various machine learning techniques for
imaging in clinical applications, Springer International Publishers, diagnosis of breast cancer”, proceedings of biomedical research 2016.
Switzerland,2016 [26] http://irma-project.org/index_en.php
[10] Haralick. R. M. et al.,” Textural features for image classification”, IEEE [27] http://peipa.essex.ac.uk/info/mias.html
Trans Syst. Man. Cybern., Vol. SMC-3. Ppc 610-621, 1973.
[11] Poonam Sonar, Dipti Jadhav, Udhav Bhosle, “Optimized association
rules using objective function for mammography image
classification",2016 International Conference on Communication and
Signal Processing
[12] Vapnik VN. The nature of statistical learning theory. 2nd ed. NY (USA):
Springer-Verlag;, p. 131,2000.
[13] Baljit Singh Khehra, Amar Pratap Singh Pharwaha b,” Classification of
Clustered Microcalcifications using MLFFBP-ANN and SVM,’’
Egyptian Informatics Journal 17, 11–20,(2016).
311
ECE Programme, Karunya University