2019
DOI: 10.30534/ijeter/2019/057122019
|View full text |Cite
|
Sign up to set email alerts
|

Joint Identification of the Clustering and Cardinality of Wireless Propagation Multipaths

Abstract: COST 2100 channel model (C2CM) wireless propagation multipaths taken from IEEE DataPort are grouped using simultaneous clustering and model selection (SCAMS). SCAMS solves simultaneously the membership and the number of clusters in contrast to just the number of clusters popular clustering approaches provide. The membership and the number of clusters rely on and , the parameters that avoid the trivial solution of the affinity matrix. Jaccard index is used to assess the accuracy of SCAMS by comparing the cluste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The communication link can be single or multiple. The dataset is clustered using the SC and the 3CAM-SC clustering approaches (6). The original form of the multipaths from the COST 2100 channel is not suitable for clustering.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The communication link can be single or multiple. The dataset is clustered using the SC and the 3CAM-SC clustering approaches (6). The original form of the multipaths from the COST 2100 channel is not suitable for clustering.…”
Section: Methodsmentioning
confidence: 99%
“…Blanza and Materum (2019) applied simultaneous clustering and the model selection matrix affinity (SCAMSMA) in clustering the multipaths (6,14). SCAMSMA represents the data as the product of the data and an affinity matrix to solve the number and membership of multipath clusters simultaneously.…”
Section: Figure 2 Multipath Clusters In Mobile Wireless Communications (27)mentioning
confidence: 99%
See 1 more Smart Citation
“…Secure communication model was proposed in [32] by considering time, energy, and traffic as factors for wireless sensor networks. The clustering of multiple paths in wireless sensor network is depicted in [33] by combinedly finding the membership and the number of clusters using SCAMS (simultaneous clustering and model selection). An efficient Multiple Objective Function (OF) in Routing Protocol for Low Power and Loss Network (RPL) is introduced in [34] for a Wireless Sensor Network in the field of healthcare.…”
Section: Related Workmentioning
confidence: 99%
“…Although it has several uses in many fields but it do not have access to energy supply limited also little of calculation with exchange of messages capabilities. The limits must taken into account in the energy consumption [23] [25] has a major issue in this era that tends to reduce the natural sources. So, for this some major steps mustbe taken to overcome this major issue to save natural resources of energy, there are some default interruptions which arises in the routing protocols in between the communication.…”
Section: Introductionmentioning
confidence: 99%