Browsing by Author "Manjappa, M."
Now showing 1 - 20 of 34
- Results Per Page
- Sort Options
Item A Bidirectional Blockchain Architecture for Supply Chain Management(Institute of Electrical and Electronics Engineers Inc., 2024) Bhalla, A.; Ranjan, K.; Patidar, K.; Manjappa, M.Blockchain technology has revolutionized various industries by offering decentralized and transparent systems for data storage and transaction processing. However, as blockchain networks continue to grow in scale and complexity, challenges related to efficiency and security in data retrieval have become increasingly prevalent. In this paper, a novel bidirectional blockchain architecture is proposed, which introduces a forward pointer alongside the traditional backward pointer to address these challenges effectively. By enhancing data retrieval efficiency and boosting network security, the proposed architecture offers significant advancements in the field of blockchain technology. We also demonstrate the efficiency of the bidirectional blockchain in searching and data retrieval in a supply chain management system, overcoming existing limitations in the traditional blockchain architecture. Through a comprehensive analysis and evaluation, this paper showcases the effectiveness of the bidirectional blockchain approach in overcoming these challenges, paving the way for enhanced performance and reliability in decentralized systems. © 2024 IEEE.Item A gene expression based quality of service aware routing protocol for mobile ad hoc networks(2013) Kubusada, Y.; Mohan, G.; Manjappa, M.; Guddeti, G.Mobile Ad Hoc Network (MANET) is a collection of infrastructure less multi-hop wireless mobile nodes which communicate together to achieve the global task. Despite lack of centralized control these mobile nodes still coordinate together to deliver the message to the destination node. MANET is gaining its popularity due to its easy deployment and self-organizing ability. In spite of its unique characteristics, mobility of mobile nodes causes frequent link breakups in MANET and thus makes route setup and maintenance a critical and challenging task. As real time and multimedia applications are increasing, there is a need of an efficient Quality of Service (QoS) aware routing protocol for MANET to support such applications. In the present work, the authors proposed an efficient QoS aware routing protocol for MANET based on upcoming Gene Expression Programming. In the proposed work, the information regarding the availability of resources is managed by a resource management module, which assists in selecting the resource rich path. Further, a theoretical proof is given for the proposed model for its correctness. The results are compared with the state of art artificial neural network and support vector regression methods from the performance evaluation point of view and the results are encouraging. © 2013 Springer Science+Business Media.Item A Survey on Device to Device Communications(Institute of Electrical and Electronics Engineers Inc., 2022) Raghu, T.V.; Manjappa, M.The demand for the network capacity from the first generation to the current age of technology is exponentially increasing and it leads to scarcity of resources. The increase in the number of users and applications also causes more power consumption. In the future, billions of heterogeneous connected devices will be there and everyone will expect high-quality services. All requirements are to get higher data rates, minimum network latency, greater number of connected devices and more throughput. The existing spectrum resources technologies are insufficient to meet all of these cellular customers' requirements. Device-to-Device (D2D) communication is a potential strategy for increasing device performance by enabling direct transfer between user pairs that are close to each other. The benefits of employing D2D communication include lower network latency, reduced power consumption, greater throughput, spectrum reuse, and much more coverage area. Because D2D users use the same licensed spectrum as cellular users, interference control between cellular users and D2D users is regarded as one of the most essential concerns when D2D is introduced to cellular networks. We present a detailed review of the various state-of-the-art methodologies for interference management in D2D communication supported in cellular networks. The different D2D communication mode is also investigated using various scenarios for resource sharing between cellular and D2D users. Moreover power consumption techniques are also analyzed to improve the battery life conservation. © 2022 IEEE.Item An Iterative-Based Optimum Power and Resource Allocation in Application-Dependent Scenarios for One-to-One D2D Communication(Institute of Electrical and Electronics Engineers Inc., 2024) Raghu, T.V.; Manjappa, M.Efficient and timely sharing of critical information is crucial for Public Safety (PS) communications, which can be fulfilled using one of the cutting-edge technologies, Device-to-device (D2D) communication. During an emergency, the PS applications should be prioritized over other applications, ensuring the emergency messages reach the first responders in time. Due to its inherent characteristics, the evolved Node Base station will not prioritize or categorize the D2D communication based on its application type, thus treating all applications equally. Further, D2D communication introduces significant interference to cellular users and vice-versa while sharing resources, and it is vital to reduce the impact of these interferences to ensure the Quality of Service for all users in the network. Hence, this article proposes a novel interference management approach to increase the overall sum rate of the system. In addition, the proposed approach also allows more D2D communication in general, particularly PS application-based D2D communication, to be active in the network. As the formulated problem is a Mixed-Integer Non-Linear Programming (MINLP) type of problem, it is split into two sub-problems, namely, Iterative Resource Allocation and Sharing and Iterative Power Optimization to achieve a polynomial time complexity. The theoretical proofs adequately explain the algorithm's time complexity and convergence property. The simulation results show that the proposed system enhances the overall sum rate by allowing more active PS D2D applications in the network. © 2013 IEEE.Item Bat-termite: A novel hybrid bio inspired routing protocol for mobile ad hoc networks(Inderscience Publishers, 2014) Manjappa, M.; Guddeti, R.M.R.In this paper, the authors have proposed a novel hybrid bio-inspired routing protocol for Mobile Ad Hoc Networks (MANETs), referred to as bat-termite, by combining the unique features of both social insect termites and mammals bats. The primary objective of the proposed work is to design an adaptive routing protocol for MANETs based on the hill building nature of the termites. The secondary objective of the proposed work is to improve the backup route maintenance of the proposed algorithm using the echo-location feature of the bats. The proposed bat-termite algorithm exhibits superior routing features such as quick route discovery, high robustness with efficient management of multiple routes and rapid route repair. The bat-termite algorithm is simulated in NS-2 and the simulation results are compared with the bio-inspired (termite and D-Termite) and non bio-inspired (AODV and AOMDV) routing protocols from the performance evaluation point of view. Copyright © 2014 Inderscience Enterprises Ltd.Item Baud Rate-Based Hierarchical Multihop Routing Protocol for WSNs(Springer Science and Business Media Deutschland GmbH, 2020) Sowmya, G.V.; Manjappa, M.In wireless sensor networks (WSNs), the data sensed by the sensor node are forwarded to the sink node either by direct communication or by multihop communication. The disadvantage of direct communication is that the sensor nodes consume more energy to reach the sink node as each sensor node has to work alone to reach the sink node, and if the sink node is too far, condition gets worsens. Contrary to direct communication, the multihop communication saves energy as it forwards the data to the nearest neighbor node which in turn forwards the data toward the sink node. In multihop communication, choosing the best neighbor node for forwarding the data is the most challenging task. Hence, in this article, a novel hierarchical multihop routing protocol for WSNs referred to as “Baud Rate-Based Hierarchical Multihop Routing Protocol for WSNs†has been proposed which uses Shannon channel capacity model ‘C’ and neighbor node distance to choose the best neighbor node; the chosen neighbor node will be capable of transmitting data with high baud rate, thereby increasing the throughput of the network. Further, the proposed model also increases the lifetime of the network as the nearest neighbor node will be chosen for the data transfer which saves the energy of the sensor node. The proposed algorithm is compared against the LEACH routing protocol and multihop LEACH protocol and is implemented in MATLAB. The quantitative and qualitative analysis of the simulation results depicts that the proposed algorithm performs better against the parameters remaining energy of the sensor nodes, network lifetime, and data throughput when compared to LEACH and multihop LEACH protocols. © 2020, Springer Nature Singapore Pte Ltd.Item Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things(Elsevier B.V., 2024) Manjappa, M.; Ray, B.; Hassan, J.; Kashyap, A.; Chandrappa, V.Y.Secure digital ownership transfer is critical for smart objects within the Internet of Things (IoT) ecosystem. This paper presents the Ownership Transfer Protocol (OTP), which leverages Physically Unclonable Function (PUF) and blockchain technology to ensure the secure transfer of ownership for smart objects in the IoT. The proposed protocol can securely track and trace smart objects during their movement in the IoT supply chain. Unlike the traditional Ownership Transfer (OT) architecture, the proposed architecture does not require a Trusted Third Party (TTP) and can support Partial Ownership Transfer (POT). The innovative use of immutable blockchain architecture enabled the proposed protocol to effectively support distributed environments and authenticate both the device and involved parties. The proposed protocol is evaluated for its robustness against common attacks outlined in this paper and implemented using the Ethereum blockchain. The testbed results on Ethereum confirm the optimal gas consumption of the proposed model. Furthermore, utilizing the security claim verification tool, Scyther, the experiment validates the security claim regarding the communication between the parties involved in the proposed protocol's OT process. © 2023 Elsevier B.V.Item Cognitive network layer in MANETs mobility aware routing protocol(2012) Zakeerhusen, A.G.; Manjappa, M.; Guddeti, G.It is intended to add cognition to make cognitive network layer in order to design and develop Quality of Service (QoS) aware adaptive routing protocol in Mobile Adhoc Networks (MANETs). QoS-aware routing is challenging as nodes in the network are free to move, the topology will be changing dynamically. Performance of AODV will be less when nodes in the network are highly mobile. In this paper, Mobility Aware Routing Protocol (MARP) model is proposed to extract a core part in MANET that is stable in terms of mobility of the nodes. This core part is a subset of MANET mobile nodes through which transmission will be done. Here selection of paths through this extracted core can ensure more QoS in time. The MARP model not only provides a better way to discover a QoS but it considers an efficient route maintenance scheme by selecting the route which has more stability as source is having knowledge about other available paths. Since MARP is multipath routing protocol, route maintenance is easy and it robust. By simulation MARP show better performance over existing AODV-on demand routing protocol. © 2012 Springer-Verlag.Item Cross layer service driven adaptive retry limit for IEEE 802.11 mobile ad-hoc networks(2011) Manjappa, M.; Guddeti, G.Traffic in future Mobile Ad-Hoc Network (MANET) is expected to carry a mix of real time multimedia, and non real time file transfer etc. Providing Quality of Service (QoS) for these different applications is difficult and the current research on MANET is choosing the Cross Layer Design for providing QoS. The packet loss due to collision is misinterpreted by MANET as route failure and this triggers route maintenance phase causing unnecessary overhead resulting in low throughput. In this paper, we propose a service driven cross layer model in order to increase the throughput by dynamically adjusting the limits of Request to Send (RTS) retransmission for different flows in the network according to the priority. Simulation is done in NS-2 and the proposed method is compared with IEEE 802.11 DCF MAC using two ad-hoc routing protocols namely AODV and DSR. The results show that the prioritized flow achieves higher throughput over un-prioritized flow when compared to IEEE 802.11 MAC. © 2011 IEEE.Item Decentralized Authentication and Data Security Scheme for IoMT Devices and Patients Using Blockchain, PUF and IPFS(Springer Science and Business Media Deutschland GmbH, 2025) Cunha, T.B.D.; Manjappa, M.; Mina, D.; Waykar, S.M.; Naik, K.S.The Internet of Medical Things (IoMT) is a rapidly evolving field and requires strong authentication and data security measures to protect patient privacy and preserve the integrity of medical data. This research focuses on Interplanetary File Systems (IPFS), blockchain, and Physical Unclonable Functions (PUFs) to propose a decentralized authentication and data security scheme for IoMT devices and patients. Blockchain technology and PUF are combined in the IoMT device authentication process to provide high trust and integrity in device identity. Similarly, patient authentication utilizes the transparent and immutable properties of the blockchain. A secure and auditable framework for patient identity verification and to further improve data access, availability, and flexibility while mitigating the risks associated with centralized storage systems, the project incorporates IPFS as a decentralized storage option for patient data. Through the use of IPFS gateways, patient data is securely dispersed among a network of nodes, reducing the possibility of denied access and single points of failure. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.Item Design and evaluation of load balanced termite: A novel load aware bio inspired routing protocol for mobile Ad Hoc network(Kluwer Academic Publishers, 2014) Manjappa, M.; Guddeti, G.Bio inspired computing based on Swarm Intelligence is successful in dealing with the networking problems such as routing, congestion and load balancing by finding an optimal path to the destination. Most of the existing bio inspired protocols for MANETs focused only on the routing problem. In this paper, a novel heuristic bio inspired routing with load balancing algorithm referred to as Load Balanced Termite (LB-Termite) is proposed for MANETs by exploiting the salient features of social insect, "Termites". The primary objective of the LB-Termite algorithm is to find the stable nodes and thereby giving preferences for these stable nodes during the path setup; thus finding the reliable route to the destination. The secondary objective of the proposed LB-Termite algorithm is to mitigate the stagnation problem by using pheromone heuristic control method. The simulation results of LB-Termite are compared with other state-of-the-art bio inspired routing algorithms (ACO based Simple Ant Routing Algorithm and the Termite algorithm) and non bio inspired (Ad Hoc on Demand Distance Vector Routing Algorithm) routing protocols for its performance evaluation and the results are found to be encouraging. © 2013 Springer Science+Business Media New York.Item Design and implementation of SDN-based handover in 5G mmWave(Institute of Electrical and Electronics Engineers Inc., 2021) Dhruvik, N.; Karia, A.J.; Khatri, A.; Manjappa, M.5G networks are more reliable than the widely used 4G network. They have extremely low latency and greater capacity. Apart from these benefits, 5G networks have speeds ranging from 1 gigabit - 10 gigabits per second. For accommodating such high rates, the User Equipment(UE) has to continuously keep switching between base stations once the signal from the previous is below some threshold. This is known as handover. Further, in a 5G scenario, where the base station coverage area is much smaller compared to 4G, UE frequently encounters handover because of its mobility. Hence, an efficient handover algorithm is required, and Software-Defined Networking (SDN) is the best option to design such algorithms. SDN, a fore-front technology, uses software-defined controllers which enable the centralised supervision of the entire network. The proposed research work has defined a software controller based handover for the 5G mmWave, which ensures Quality of Service(QoS) to the UEs. For the communication, a new interface called HOinterface has also been defined. The proposed architecture reduces the handover delay and is flexible, scalable, and efficient. The proposed SDN architecture is implemented in the NS3-mmWave patch and it was evaluated for its strengths and weaknesses. The results obtained are encouraging. © 2021 IEEE.Item Distance based termite algorithm for mobile ad-hoc networks(2012) Manjappa, M.; Praveenkumar, G.H.; Guddeti, G.Providing Quality of Service (QoS) in Mobile Ad-Hoc Networks (MANET's) is difficult due to dynamic nature of its topology. Today's research trends show that Swarm Intelligence (SI) can be used effectively to provide QoS in MANET and also MANET is not much explored in the area of SI. Motivated by their self organizing behavior and robustness many routing algorithms have been proposed for both wired and wireless networks. SI routing algorithms are driven by mainly two functions, Pheromone update-decay functions and Forwarding functions. In this paper, a new pheromone update and decay function for Termite algorithm is proposed for MANET which reflects the current context of the network that is the distance between the Mobile Nodes at the time of transmitting the packets. Received Signal Strength (Pr) from Physical Layer is used to find the distance and it is made visible at the Network Layer through Cross Layer Model. The proposed model is simulated and the results are compared with the existing methods and the metric used for the comparison are throughout and control packet overhead. The results show that the new distance based pheromone update and decay methods perform better than the other existing methods. © 2012 Springer-Verlag.Item Efficient PBFT: A Novel and Efficient Approach to the PBFT Consensus Algorithm(Springer Science and Business Media Deutschland GmbH, 2022) Rao, V.; Shenoy, A.R.; Manjappa, M.Blockchain technology, which is built upon the distributed and decentralised network, suffers from mutual trust among the nodes, and hence, it employs a consensus algorithm to achieve democracy. Consensus algorithm is one of the core elements of blockchain architecture, and a strong, reliable and efficient consensus algorithm is very much required for a blockchain network in order to prevent the intrusion of malicious nodes. A good consensus algorithm drives the blockchain network in the right direction by keeping the malicious transactions off the chain. Thus, in this article, a novel consensus algorithm referred to as efficient practical Byzantine fault tolerance (E-PBFT) is proposed for a private blockchain. E-PBFT finds the winner miner for mining the candidate blocks in an efficient manner which reduces the number of messages exchanged between the nodes. Further, in order to give additional security, a hidden winner miner concept is also included in E-PBFT which hides the winner miner from the adversaries, so that the adversaries will never come to know who is mining the transactions. The theoretical proof for the proposed algorithm is also given whose results are quite convincing when compared to classical PBFT algorithm. The proposed E-PBFT will definitely strengthen the blockchain network by quickly reaching the consensus and by hiding the winner miner, thereby giving additional security. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Energy Aware Stable Multipath Disjoint Routing Based on Accumulated Trust Value in MANETs(Modern Education and Computer Science Press, 2022) Benakappa, S.M.; Manjappa, M.Conserving energy and finding the stable path are the two vital issues in Mobile Ad Hoc Networks (MANETs) as the prior increases the network lifetime and the later increases the network throughput. The nodes which are not legitimate in terms of residual energy and packet forwarding history might be a threat to the path thereby making the path unstable. Thus, it results in frequent link failure, reduced throughput, reduced network and path life time. In order to reduce these hazards, authors have proposed an energy efficient, reliable path selecting protocol referred to as Trust Based Energy Aware Multipath Disjoint Routing Protocol (TEA-MDRP) for MANETS in this article. TEA-MDRP finds the optimum route between the source and the destination nodes using two parameters namely, the Accumulated Trust Value (ATV) and the node’s residual energy (Nres). ATV is calculated based on the packet forwarding status of the node which shows how good the node is in terms of packet forwarding point of view. TEA-MDRP allows only the nodes which have a good ATV and sufficient residual energy. A good ATV shows loyalty in forwarding the packets while a sufficiently large residual energy node avoids frequent path breakups and packet drops. Thus, the TEA-MDRP not only increases the network and path lifetime but also increases the throughput of the communication. Further, with the legitimate nodes in the paths, the TEA-MDRP considerably reduces the control packet overhead which might occur because of the frequent route re-discovery process. An extensive simulation is carried out using Network Simulator-2.35 for the quantitative and qualitative analysis of TEA-MDRP. The results obtained are compared with classical AOMDV and the results are satisfactory. © 2022 MECS.Item Energy Efficient Coverage Optimization in Mobile Wireless Sensor Network Using Grey Wolf Algorithm(Institute of Electrical and Electronics Engineers Inc., 2023) Gupta, A.; Mamatha, K.M.; Manjappa, M.The issue of decreased coverage rate in Mobile Wireless Sensor Networks (MWSNs), caused by mobile sensor nodes being randomly placed inside a monitoring area. Additionally, it becomes extremely important to utilise a sensor node's energy very effectively due to the finite energy of sensor nodes. Hence, to provide optimised positions for the sensor nodes while using the energy of sensor nodes adeptly authors propose an energy efficient coverage algorithm. Initially, article focus on optimal placement of the sensor nodes within a area to achieve the maximum coverage and later authors have focused on improvising the network lifetime. Article presents a combination of Grey Wolf Optimization and Virtual Force algorithm for optimization of coverage in MWSN. Further, to improve the network lifetime, a GWO-based clustering algorithm is presented using distance and energy as a parameter. The algorithms are implemented and simulated on Matlab. The efficiency of the presented algorithm is observed comparing with other Swarm Intelligence (SI) based optimization algorithms, like GWO, VFA, Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Ant-lion Optimization (ALO) and the results of the GWO-based clustering is compared with the traditional LEACH algorithm and energy-balanced clustering based on PSO. Simulation results demonstrate that the presented algorithms outperform the considered algorithms. © 2023 IEEE.Item Firefly algorithm for self organization of mobile wireless sensor network(Engineering and Technology Publishing, 2020) Mamatha, K.M.; Manjappa, M.For a Wireless Sensor Network (WSN), designing low power scalable network remains a challenge for researchers. The sensor nodes find it difficult to gather and transfer data to sink node when they are deployed in hostile and unfavorable environment. Hence, establishing and maintaining connectivity among the mobile sensor nodes in decentralized network play an important role when the environment is unfavorable. Senor nodes self organize themselves in order to establish and maintain the connectivity. This paper proposes a nature based Swarm Intelligence (SI) technique, based on insect firefly to enhance connectivity among the sensor nodes for a decentralized mobile WSN in an energy efficient manner. The foraging feature of insect firefly is used in the proposed algorithm for which a multi-objective fitness function with parameter energy and distance has been designed. The proposed algorithm is theoretically analyzed and verified by simulation and the results show that the proposed algorithm leads energy consumption compared to existing firefly algorithm and prolongs the network lifetime significantly. © 2020 Journal of Communications.Item Game Theoretic Approach for Electric Vehicles Charging Solution: A Study of the Interplay between Time, Price and Location(Institute of Electrical and Electronics Engineers Inc., 2023) Patel, J.; Manjappa, M.Due to their potential in lowering gas emissions, the number of Electric Vehicles, which are eco-friendly, has rapidly increased in recent years and they have achieved immense popularity, creating a lot of interest in the industry and research. But, finding a Charging Station during critical low battery situations is a difficult time for Electric Vehicle users. In an Intelligent Transport System, the goal of each Electric Vehicles is to choose the Charging Station with the lowest cost by taking into account the location, charging rate, and other parameters whereas the goal of a Charging Station is to maximize its revenue by increasing its price based on the number of vehicles waiting in the Charging Station. We employ a multi-leader multi-follower Stackelberg game model to interplay between the Electric Vehicles and Charging Stations, in which location, waiting time, and price factor are considered as parameters. To find the best CS for EVs we formulate our own cost function by considering real-life parameters like the distance of the EV to the CS, waiting time at the station, time to charge the battery, price of unit charge, state of EV charging. The performance of the proposed approach is demonstrated by experiments with different EV densities, their need (units required to charge the battery), and preferences. The results are encouraging. © 2023 IEEE.Item Improved Harmony Search Algorithm for Multihop Routing in Wireless Sensor Networks(Pleiades Publishing, 2022) Sowmya, G.V.; Manjappa, M.Abstract: Energy efficiency is critical for prolonging the network lifetime of Wireless Sensor Network (WSN), and is the most important objective for any routing algorithm for WSN. In this article authors have proposed a Multihop harmony search algorithm for WSN with two objectives, first being increasing the throughput of the network and second being optimizing the energy consumption of the sensor nodes and thereby prolonging the lifetime of network. Finding the goodness of the communication channel/path is quite important. Sometimes, though the channel capacity is more, fewer amounts of data may be transmitted in the channel resulting in under utilization of the resources; and other times, though the channel capacity is less, more data may be dumped into the channel resulting in channel congestion and less output. Thus, if the goodness of the communication channel is known in advance, then it is easy for the algorithms to decide the upper bound of the channel and can have a congestion free and error free information transmission. Thus, the proposed algorithm employ Shannon channel capacity ‘C’ (baud rate) for finding the best next hop and the same is used for initialization of Harmony Memory. An effective local search strategy is also proposed to strengthen the local harmony search ability so that the convergence speed and the accuracy of routing algorithm is improved. Finally, an objective function model is developed by taking path length, energy consumption, and residual energy in to consideration. The proposed algorithm is compared with existing Multihop LEACH, BRM (Baud rate based Multihop routing protocol) and EEHSBR (Energy Efficient Harmony Search Based Routing) algorithm for the quantitative and qualitative analysis. The simulation results reveal that the proposed algorithm performs better than the considered algorithms in terms of network lifetime, throughput and energy consumption. © 2022, Pleiades Publishing, Ltd.Item Inter-Planetary File System Enabled Blockchain Solution for Securing Healthcare Records(Institute of Electrical and Electronics Engineers Inc., 2020) Marangappanavar, R.K.; Manjappa, M.The sharing of health-related data has become challenging in terms of data security which may lead to compromise patient's privacy. Generally, once the report generated by the health provider is final, it will be uploaded to the hospital's private repository. When it comes to the hospital as an organization, many participants [Doctor, Patient, Researcher, Insurance company] requires the report of patients for one or other reasons. Providing a single platform for all participants to share confidential data securely is a difficult and challenging task. Care should be taken such that the personal data of the patients should not be misused or tampered. Existing methods have been proved insufficient to effectively manage and secure health records. Blockchain technology, a recent research trend, has shown promising results for such secure data sharing. Since the contents of blockchain are tamper-proof, all participants can access the data but cannot change the data. By employing smart contracts and access control programs one can monitor data activity in the blockchain network. In this article, a blockchain architecture has been designed and discussed for secure and easy sharing of patient's Personal Health Report(PHR) among the different players of health organization. Further, Inter-Planetary File System (IPFS) has also used in the proposed blockchain architecture for faster retrieval of PHR's. We demonstrate the strengths of our proposed model, its user-centric focus and also the experimental results. © 2020 IEEE.
