You are on page 1of 12

ID6020 – ASSIGNMENT-1

Roll No:EE21D055 Name :Pamarthi Uma Sindhu


(1) Subscribe for contents alert to 100 journals of your interest- list the Journal and
publisher website link of the Journals for which you have subscribed
Sl No Journals

1 IEEE Journal on Selected Areas in Communications

2 IEEE Communications Magazine

3 IEEE Network

4 Nature Machine Intelligence

5 International Journal of Information Management

6 IEEE Transactions on Neural Networks and Learning Systems

7 Internet and Higher Education

8 IEEE Internet of Things Journal

9 Information Systems Research

10 npj Quantum Information

11 IEEE Transactions on Information Forensics and Security

12 Foundations and Trends in Communications and Information Theory

13 Information Systems Journal

14 IEEE Transactions on Services Computing

15 IEEE Transactions on Cognitive Communications and Networking

16 Journal of Big Data

17 IEEE Transactions on Control of Network Systems

18 IEEE Transactions on Vehicular Technology

19 Proceedings of the ACM Conference on Computer and Communications Security

20 IEEE Transactions on Mobile Computing

21 Journal of Computer-Mediated Communication

22 Proceedings of the Annual ACM Symposium on Principles of Distributed


Computing

23 Future Generation Computer Systems


24 Journal of Network and Computer Applications

25 IEEE/ACM Transactions on Networking

26 APL Photonics

27 IEEE Transactions on Signal and Information Processing over Networks

28 IEEE Transactions on Green Communications and Networking

29 Digital Communications and Networks

30 Telematics and Informatics

31 Computer Graphics Forum

32 IEEE Transactions on Network and Service Management

33 International Journal of Web and Grid Services

34 Data Mining and Knowledge Discovery

35 Computer Networks

36 IEEE Intelligent Systems

37 Big Data Mining and Analytics

38 CAAI Transactions on Intelligence Technology

39 IEEE Transactions on Cloud Computing

40 Online Learning Journal

41 Synthesis Lectures on Communication Networks

42 Information Systems Frontiers

43 Journal of Communications and Networks

44 ICT Express

45 Ad Hoc Networks

46 Journal of Optical Communications and Networking

47 International Journal of Neural Systems

48 Electronic Commerce Research and Applications

49 IEEE Transactions on Network Science and Engineering


50 IEEE Cloud Computing

51 IEEE Systems Journal

52 Journal of Information Security and Applications

53 Journal of Internet Services and Applications

54 Computer Communications

55 Journal of Parallel and Distributed Computing

56 Networks

57 ACM Transactions on Multimedia Computing, Communications and Applications

58 Cybersecurity

59 Semantic Web

60 Journal of the Franklin Institute

61 Distributed Computing

62 Nano Communication Networks

63 Journal of Grid Computing

64 ACM Transactions on Internet Technology

65 IEEE Security and Privacy

66 Proceedings - International Conference on Distributed Computing Systems

67 IEEE Transactions on Molecular, Biological, and Multi-Scale Communications

68 Computer Law and Security Review

69 Mobile Media and Communication

70 World Wide Web

71 Synthesis Lectures on the Semantic Web: Theory and Technology

72 IEEE Transactions on Human-Machine Systems

73 ACM Transactions on Sensor Networks

74 IEEE Internet Computing

75 Networks and Spatial Economics


76 Pervasive and Mobile Computing

77 Cryptography and Communications

78 Journal of Cloud Computing

79 BIT Numerical Mathematics

80 Engineering Science and Technology, an International Journal

81 Web Semantics

82 ACM Transactions on Cyber-Physical Systems

83 Journal of Sensor and Actuator Networks

84 Online Social Networks and Media

85 China Communications

86 Journal of Communications and Information Networks

87 Internet Policy Review

88 Universal Access in the Information Society

89 Journal of Cybersecurity

90 Conference Record - International Conference on Communications

91 Journal of Computer and System Sciences

92 Journal of the Association for Information Science and Technology

93 ACM Transactions on the Web

94 Eurasip Journal on Wireless Communications and Networking

95 Journal of Cryptographic Engineering

96 Animal Biotelemetry

97 International Journal of Information and Learning Technology

98 Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous


Technologies

99 Journal of Computer Information Systems

100 Mobile Networks and Applications


(2) Enable remote access to online resources subscribed by IIT Madras - confirm this
aspect as response to this question
Ans.
Yes I have remote access to following online resources:
(a) MOODLE Courses using LDAP
(b) Workflow using LDAP
(c) Library using LDAP
(d) VPN Access
(e) IEEE
(f) Central Library etc.

(3) List Top ten papers in your area of research based on citation index
Ans.
(i) Sarkar, A., & Senthil Murugan, T. (2017). Cluster head selection for energy efficient and
delay-less routing in wireless sensor network. Wireless Networks. doi:10.1007/s11276-017-
1558-2

(ii) Almusaylim, Z. A., & Zaman, N. (2018). A review on smart home present state and
challenges: linked to context-awareness internet of things (IoT). Wireless Networks.
doi:10.1007/s11276-018-1712-5

(iii) Jia, X., He, D., Kumar, N., & Choo, K.-K. R. (2018). Authenticated key agreement scheme
for fog-driven IoT healthcare system. Wireless Networks. doi:10.1007/s11276-018-1759-3

(iv) Zhang, D., Gao, J., Liu, X., Zhang, T., & Zhao, D. (2019). Novel approach of distributed
& adaptive trust metrics for MANET. Wireless Networks. doi:10.1007/s11276-019-01955-2

(v) Abbasian Dehkordi, S., Farajzadeh, K., Rezazadeh, J., Farahbakhsh, R., Sandrasegaran, K.,
& Abbasian Dehkordi, M. (2019). A survey on data aggregation techniques in IoT sensor
networks. Wireless Networks. doi:10.1007/s11276-019-02142-z

(vi) Javadzadeh, G., & Rahmani, A. M. (2019). Fog Computing Applications in Smart Cities:
A Systematic Survey. Wireless Networks, 26(2), 1433–1457. doi:10.1007/s11276-019-02208-
y

(vii) Dhumane, A. V., & Prasad, R. S. (2017). Multi-objective fractional gravitational search
algorithm for energy efficient routing in IoT. Wireless Networks. doi:10.1007/s11276-017-
1566-2

(viii) Guleria, K., & Verma, A. K. (2018). Comprehensive review for energy efficient
hierarchical routing protocols on wireless sensor networks. Wireless Networks.
doi:10.1007/s11276-018-1696-1

(ix) Wu, J., Chen, Z., & Zhao, M. (2018). Information cache management and data transmission
algorithm in opportunistic social networks. Wireless Networks. doi:10.1007/s11276-018-
1691-6

(x) Liaqat, M., Noordin, K. A., Abdul Latef, T., & Dimyati, K. (2018). Power-domain non
orthogonal multiple access (PD-NOMA) in cooperative networks: an overview. Wireless
Networks. doi:10.1007/s11276-018-1807-z
(4) List Top Ten Researchers in your area through identified with high (i) "h-index" and
(ii) number of citations excluding self-citations

Ans.
(i) Ala’ Khalifeh et al- 78
(ii) Mazhar Javed Awan – 70
(iii) Mohamed Amine Ferrag- 66
(iv) Hina Magsi- 65
(v) Rafia Mumtaz- 55
(vi) Robertas Damaševičius-50
(vii) Himanshu Sharma– 50
(viii) Abdullah Lakhan – 38
(ix) Mazhar Javed Awan-36
(x) Tomilayo Fatokun- 35

(5) Take 10 Journal papers in your research area, write a critical review and submit

Ans.
Wireless network is a network set up by using radio signal frequency to communicate among
computers and other network devices. Sometimes it’s also referred to as wifi network or wlan.
This network is getting popular nowadays due to easy to setup feature and no cabling involved.

Performance analysis: Nowadays, ad-hoc wireless networks or mesh networks are receiving
great research interest due to their great potential in different environments. It is focused on
the simulation of the performance and energy consumption of ad-hoc network devices, an
event-triggered neural network control method is proposed for autonomous surface vehicles
subject to uncertainties and input constraints over wireless network . An event-triggered
mechanism with three logic rules is employed to determine the wireless data intrusion detection
pretended to be a major technique for revealing the attacks and guarantee the security on the
network . As the data increases tremendously every year on the internet, a single algorithm is
not sufficient for the network security. Because, deploying a in this manuscript, a compact
superwideband monopole antenna with triple notched band characteristics is presented and is
experimentally investigated.

Implementation in wireless networks: One of significant change in learning process is exam


implementation applying a computer- based test (e-exam) rather than paper-based test. Many
institutions currently use wireless network with bring your own device (byod) policy for their
e-exam implementation.to improve the transmission efficiency of the system,a cooperative
spectrum sharing protocol with secondary user selection by using decode-and this paper
extends the backstepping control strategy to wireless transmission control protocol (tcp)
network to solve the active queue management (aqm) problem. Different from the wired
network the uplink and downlink of the wireless network are asymmetric and network
convergence has vital importance due to limited network resources. Though it decreases
network cost, it also reduces quality of service (qos) as well. Due to the increase in real-time
network applications, such as video conferencing and voice over ip calls, there the topology
management classifiers consist of several methods, such as the typical clustering-based method
excelledwireless network partitioning.
Future wireless networks: Since the demand for wireless communication including not only
personal mobile devices but also IOT devices increases, sustainable growth of wireless
networks will be limited by a shortage of spectrum resources. Radio frequency has been
managed by the regulator of in this paper, a cascaded depth learning framework is constructed.
A cascaded depth model is successfully implemented by studying and analyzing the specific
feature transformation, feature selection, and classifier algorithm used in the framework.
Configuration and optimization: An alternative improvement is proposed which is the
adaptive wireless access networks-based optical backhaul convergence that will greatly
promote to use the existing resource of manet (mobile adhoc network ). However, these
characteristics itself acts as a the traditional image recognition technology can transform some
expression form of image into the data which can be processed by computer, and recognize the
image with decision function. However, in actual applications, incomplete 3d images will be
encountered.
Monitoring and controlling: A wireless network containing small interdependent sensor
nodes is called WSN ( wireless sensor network ). WSN has touched our daily life and is getting
developed day by day, and is one of the emerging technologies with sensors.

Reference journals:

1. Performance evaluation improvement of energy consumption in adhoc wireless


network mohammed ayad saad1,2 ,mohammed hussein ali 3 , sameer alani4 adnan h.
Ali5 , yasser a. Hussein5.
2. Tamex framework as an alternative for e-exam implementation in wireless network
gede sukadarmika1 , rukmi sari hartati2 , linawati3 , nyoman putra sastra4
3. Data-driven future wireless network beyond human intelligence takeo fujii advanced
wireless and communication research center, the university of electro-communications
4. Self-configuration and self-optimization process with taguchi method in hybrid optical
wireless network adam wong yoon khang1 , arnidza ramli2 , shamsul j. Elias3 , j.
Pusppanathan4 , jamil abedalrahim jamil alsayaydeh5 , fatin hamimi mustafa6 , win
adiyansyah indra7 , johar akbar mohamat gani8
5. Monitoring and controlling temperature sensors by wireless network using nrf24l01
abdalghani omar abdalla1 , abdulgader z. Abdalla1 , mohamed naji muftah2 and
mohamed s. Alsahulli3
6. Millimeter wave wireless network on chip using deep reinforcement learning suraj jog†
, zikun liu† , antonio franques† , vimuth fernando† , haitham hassanieh† , sergi abadal⋆
, josep torrellas†
7. Performance evaluation of wireless data traffic in mm wave massive mimo
communication ahmed thair al-heety1 , mohammad tariqul islam2 , ahmed hashim
rashid3 , hasanain n. Abd ali4 , ali mohammed fadil5 , farah arabian6
8. Efficient bandwidth allocation in wireless network using whale optimization algorithm
tamuno-omie joyce alalibo, sunny orike, and promise elechi department of electrical
engineering, rivers state university, port-harcourt, nigeria
9. Analysis of voip over wired & wireless network with implementation of qos cbwfq &
802.11e zahid ali department of telecommunication engineering, mehran university of
engineering and technology jamshoro, sindh, pakistan
10. Review on dynamic key security protocols in wireless sensor network using
pseudorandom number generator shrivastava n.p., bansal d
(6) Find out whether any product/process/design/idea has been patented in your field of
research – using google Patent/Orbit Express- submit a report

Ans.

Sl Patent Title Year of


No Filing

1 Method and device for monitoring at least one loudspeaker line 2021

2 Communication system, communication device, and communication 2020


device management method

3 Data sharing method of Zigbee network, gateway equipment and Zigbee 2020
network system

4 Smart fire detector 2019

5 Method and apparatus for signaling multiple data recording devices 2019

6 Nurse call system having local operation mode 2019

7 Low power digital radio range extension 2018

8 Wireless terminal and communication system 2017

9 Promiscuous monitoring using internet protocol enabled devices 2012

10 Link set up and relaying in a home automation adhoc network 2010

(7) Go through the video tutorials from Mendeley website, Install Mendeley Desktop
(which is free to download)- report experience of its use and the features of Mendeley-
including linking it to MS word for appropriate citation style of reference for as per
chosen Journal format

Ans.
Mendeley Desktop is a reference manager application that helps to build personal Mendeley
library to organize, search and read all the references. Mendeley Notebook helps to collate all
highlights and notes from multiple PDFs. Mendeley Cite, the new citation add-in for
Microsoft® Word, takes the time out of referencing. Several features of Mendeley Desktop are

(i) Add files menu - to add new entries to Mendeley library
(ii) Folders menu - the ‘Add folder’ button to create a new folder to organize Mendeley
library. The ‘Remove folder’ button to remove the folder that are being currently viewed.
Notably this will not affect any documents within the folder.
(iii) Sync - to force Mendeley to perform a sync. This will push any changes that made
to library up to the cloud for storage, making them available on other devices and computers.
(iv) Search - this field to search your Mendeley library. Note that Mendeley Desktop’s
search function is context-specific – performing a search while
(v) Discovery – Mendeley allows to discover new references in a number of different
ways. From within Mendeley Desktop, we can use ‘Literature Search’ to search within
Mendeley’s crowd-sourced catalog. Alternatively, we can use ‘Mendeley Suggest’ to receive
bespoke recommendations based on our area of study and the contents of our library.
(vi) My Library – View the entire contents of personal library by selecting ‘All
Documents’. Mendeley also offers a number of ways to filter library
(vii) Groups – Any groups we join or create will be listed under this heading. The icon
that appears next to the group’s name indicates the group type.
(viii) Main panel – when in browsing mode, the main panel of Mendeley Desktop will
display the contents of the selected view. We can use the column headings to quickly reorder
the contents.
(ix) Details panel – the right-most panel of Mendeley Desktop contains the details of
whichever library entry we currently have selected. This will show the relevant detail fields for
the document type, along with their contents. We can use this panel to modify an entry’s details.
(x) Filter panel – The filter panel offers several different options to allow to quickly
filter current view.

(8) Familiarize yourself with the citation style recommended by your Department for DC
report, Synopsis and thesis- submit a brief report on the citation style recommended by
the dept

Ans.
The citation style is:
[number] Author1, Author2, and Author3, “Title,” Journal Name, vol. <Volume>,
pp. >p1–p2>, <Year>. <Note>.
The references are listed according to the order of appearance in the paper. Only a number is
specified at the place of reference. The references tab at the end can be used to get more
information about that particular citation. There are various citation formats and one such
referencing is mentioned above.

(9) Locate Journal citation reports (JCR) from the link given in Library website- list
different metrics used for ranking Journals
Ans.

Impact Metrics Normalized Metrics Source Metrics

Total Citations 2021 JCI Citable items

2021 JIF Eigen factor % of Articles in Citable


items

5 Year JIF Normalized Eigen factor Cited Half-Life

JIF without Self Citations Article Influence Score Citing Half-Life

Immediacy Index JIF Percentile Total Articles

JIF Quartile % of OA Gold


(10) Identify top 10 Journals in your area based on one of the criteria in JCR- list them
Ans.

Sl. No. JOURNALS 59622

1 IEEE Communications Surveys & Tutorials 50008

2 IEEE Communications Magazine 55434

3 IEEE Transactions on Vehicular Technology 46741

4 IEEE Transactions on Wireless Communications 34521

5 IEEE Journal on Selected Areas in Communications 31253

6 IEEE Transactions on Communications 30428

7 IEEE Wireless Communications 29457

8 Journal of Network and Computer Applications 26543

9 IEEE Network 24420

10 IEEE Communications Letters 21781

(11) Write a note on "how the impact of a paper published is evaluated?" (one example
PlumX)
Ans.

PlumX metrics analyses and provides the impact of the research output such as articles, journal
papers, abstract, editorial manuscript, reviews and many more to our society. These metrics
divided into five separate categories to analyze the research output. The categories are –

1. Citation: In this category, they analyze the research output in two categories. First they
analyze the impact of the research output in the traditional citation index such as Scopus
and second they analyze the impact of research output in social life.
2. Usage: This is the second strongest method to analyze a research output. This gives the
idea about how many people are read and use your research output.
3. Capture: Capture gives the idea about how many people are wants to work same field
after releasing the research output.
4. Mentions: It tells about the how many blog post, news is comes out after publishing
research output.
5. Social Media: It counts the how many Tweets, Facebook posts are publishers after
publishing the research output.
(12) Write a note on "how a researcher's publication profile is evaluated?"

Ans.

Identifying the key-performance parameters for active -scientists has always remained a
problematic issue. Evaluating and comparing researchers working in a given area have become
a necessity since these competing scientists vie for the same limited resources, promotions,
awards or fellowships of scientific academies. Whatever method we choose for evaluating the
worth of a scientist’s individual research contribution, it should be simple, fair and transparent.

One common approach that has been used for a long time is to calculate the number of citations
for the publications of a scientist and also see the impact factor of journals in which these
publications have appeared.

1. Citation Count: The number of citations for each publication of a scientist is readily
available from different sources, e.g., Web of Science, Google Scholar and Scopus. It is
generally believed that the impact of a researcher’s work is significant on a given field if his or
her papers are frequently cited by other researchers.

2. Impact Factor: Publishing in a journal, such as Nature or Science, which has a high
impact factor is considered very prestigious. In our profession, which deals with electronics
and communications, it is a dream for many to publish in IEEE journals because some of the
IEEE journals do have a high impact factor and their reviewing procedure is very tough. Impact
factor is a measure of how frequently the papers published in a journal are cited in scientific
literature. Impact factors are released each year in the Journal Citation Report by the Institute
of Scientific Information (ISI).

3. The h-index: To overcome the problems associated with the citation metric and
impact factor, in 2005, Jorge Hirsch of the University of California at San Diego suggested a
simple method to quantify the impact of a scientist’s research output in a given area [3], [4].
The measure he suggested is called the h-index. In the last few years, it has quickly become a
widely used measure of a researcher’s scientific output. Without getting into the mathematical
rigor of this approach, the meaning of the h-index can be explained as follows. Suppose a
researcher has 15 publications. If 10 of these publications are cited at least 10 times by other
researchers, the h-index of the scientist is 10, indicating that the other 5 publications may have
less than 10 citations. If one of these 10, out of the 15, publications receives, let us say, 100
citations, the h-index still remains 10. If each of these 15 papers receives 10 citations, the h-
index is again only 10. The h-index will reach 15, only if each of all the 15 papers receives a
minimum of 15 citations. Therefore, to calculate the h-index of a scientist, find the citations of
each publication, rank them according to the number of citations received, and identify the first
‘h’ publications having at least ‘h’ citations. To have a reasonably good h-index it is not
sufficient to have a few publications with hundreds of citations. The use of h-index aims at
identifying researchers with more papers and relevant impact over a period of time.

You might also like