Introduction to the Topic

With the evolution and development of network topology for some of heterogeneous network, there has been increase in demand for automatic monitoring. In addition, there is a need for management of the whole communication networks (Yang et al. 2015). The following two papers come up with a multi-level pattern for mining architecture which is needed for providing support for automatic networks (Bi, Zeng and Zhang 2016). It is all about proper discovery of some of interesting patterns from the available communication network which is needed for monitoring data.

The report aims highlight the main work of the two papers that are selected on this particular topic of wireless networks. The next part of the report mainly deals with details methodologies that are used in two papers has been discussed in details. A list comparison has been done with respect two papers on wireless communication. Both advantages and disadvantages of the paper on wireless communication have been provided in brief.

Introduction to two papers and their main work

The complete architecture is all about leverage and combining the frequent discovery of data over the streams. In addition, a list of techniques like sequential mining pattern which is needed for proper distribution of processing platform needed for having much higher value of output (Wei et al. 2016). As a result of development of telecommunication networks, there has been continuous development to the heterogeneous based network. It is mainly needed for much efficient monitoring of network along with management capabilities needed for providing much high value of performance communication-based services. Analyzing the overall complex surrounding of the network two of the major issues are identified like amount of data that has high dimension and large number of protocols for complex context (Chakchouk 2015). For understanding both high volume and dimension of the data. There is a need of algorithm for having time and overall efficiency for fitting off- the shelf for hardware configuration.

In the second paper, we have come across fifth-generation mobile network which will work like enabler for meeting the increase in demand for upcoming days. It is merely inclusive of high data rate, coverage of ultra-wide radio coverage and lastly low-ultra-latency (Wu, Zeng and Zhang 2018). The paper aims to highlight security which is a growing issue in the whole of 5G technology. It is the place where wireless communication is very much vulnerable to security breaches. The mere focus is all about understanding the physical layer security which aims to guide physical layer security. The whole thing is all about safeguarding of data confidentiality by analyzing the intrinsic of the given communication medium (Ng, Lo and Schober 2015). The whole thing is all about analyzing the benefits that are being offered by various technologies on 5G technology. Among all technologies, the three of the most promising are heterogenous attack, input and output and lastly millimeter wave. 

Detail description of methodologies used in the two papers

In the first paper, we come across the architecture needed for providing support along with combination for the given task. It is mainly needed for discovery of some of interesting patterns for high volume of data. The whole architecture can be efficiently used for achieving pattern mining for the given network needed for data monitoring (Qu et al. 2016). It is mainly needed for interesting pattern which is leverage and frequent itemset. It is for discovery of data, rule deduction, sequential pattern mining, and processing platform. The paper aims to provide an overview with respect to architecture which aims to forms a part of automatic network management system (Lin et al. 2016). In this paper, we come across overall architecture, multi-pattern structure and last architecture of EMD.   

In the second paper, a list of technologies has been discussed like Het Net, massive MIMO and lastly mm-Wave. HetNet aims to create a proper kind of multi-tier topology where various kind of nodes are completely deployed with many similar characteristics like coverage area and radio access technologies (Liu et al. 2015). This particular technology aims to provide proactive department from the single-tier wireless-based networks. It mainly to create a new trend which will reduce the cost per bit value for wireless communication network. By the deployment of large number of massive antennas at base station for serving user in simultaneous way (Razaviyayn San,jab and Luo 2016). Most of the MIMO tends to rip off all the benefits which are being offered by conventional MIMO but on much larger scales.

Comparison of the result reported in two paper with each other

In the first paper, we come across the complete architecture of EMD which is known to be frequent episodes from the dimension reduction stream of data. As a result of facilitating distributed processing along with reducing memory dimension for the frequent sequential pattern, EMD comes up with three levels of pattern structure (Che, Duan and Zhang 2015). EMD comes up with five kind of sub-module like data analyzer, combiner, episode analyzer, and miner. Data Analyzer aims to provide appropriate kind of configuration parameter needed for task of data mining. It is also needed for understanding how stream can be split into sub-sections. Mining controller comes up recursively call that is needed by data miner for processing data sets. Being a part of sub-module for EMD, data miner aims to cover frequent closed itemset from each of the sliding windows as per the window setting. After this, combiners come into play for closet itemset which has a uniform subset (Chandrasekharan et al. 2016). Episode modular is a sub-module which is in rule association for analyzing the frequent episodes for filtering the approaches.

MIMO system is known to be a research field which has attracted proper interest from industrialist and scientist. There is large number of benefits of MIMO technique which is completely analyzed by making use of large antenna rays (Bi, Zeng and Zhang 2016). The whole thing comes into picture at both the ends that receiver and transmitter. In comparison to the current data, there is large number of MIMO system that can provide spectrum efficient methods along with high power (Wei et al. 2016). In whole of the MIMO system, the overall secrecy can be improved by adaptation of reduced power consumption.

Advantages/Disadvantages/superiority of two paper with each other

In the first paper, the feasibility of the whole EMD module that is three classical algorithms New Moment, HTPM and prefix are discussed. All the required experiments are carried on Intel i5 processor with 8GB of memory size. Each of the given approaches is completely evaluated by making use of SIM which is generated open source MSC in the real-time value (Chakchouk 2015). Open MSC aims to generate real-time pattern which is corpus of the random events.

In the second paper, the current communication system has restricted its operation within the band range of 300 MHz- 3 GHz. The whole of spectrum band is currently fully occupied. In the case of 5G network, mmWave communication system comes into picture which operates within the range of 30-300 GHz (Wu, Zeng and Zhang 2018). It is completely recognized for the best solution along with removing the restriction and increase of fold capacity. There are huge number of efforts are being made for rendering GHz frequency which is completely available on mobile network. It can be stated as the series of research for certain number of initiatives for understanding the mmWave communication-based technologies.

Future direction of two papers for improving them

In the first paper, we come across the challenges that are needed for solving pattern mining in the stream of data. It merely comprises of complex kind of structure that has unpredictable and unbounded levels. In a multi-level solution, the network architecture is provided for supporting network management (Ng, Lo and Schober 2015). The whole thing comes into picture as a result of Telecom Network Monitoring data. The whole of the architecture helps in discovery of interesting patterns where the data is available from list of domains with respect to Telecomm monitoring.

The second paper puts emphasis on the present layer security that guards the data confidentiality by analyzing the intrinsic of the whole communication medium. The whole focus is all about analyzing the benefits that are being offered by various technologies to 5G. Among all the available technologies, the three of most promising one heterogeneous network, multiple input, and output (Razaviyayn San,jabi and Luo 2016). On the basis of the available technologies, a list of possible opportunities and challenges to design security that needs to be tackled.


From the above discussion, the following report is all about comparison between two papers on the topic of wireless communication. Wireless communication has seen huge amount of growth in traffic of data in the last few years. So as there has been increase in base station which is important for mobile wireless communication. Physical level security aims to offer two major kinds of advantages for cryptography that makes it suitable for working on 5G technology. Techniques of physical security are not depended on the computational complexity which aims to achieve desired level of security. The path of 5G technology is completely irreversible in nature which will create huge amount of impact on physical layer security.  


Bi, S., Zeng, Y. and Zhang, R., 2016. Wireless powered communication networks: An overview. IEEE Wireless Communications23(2), pp.10-18.

Chakchouk, N., 2015. A survey on opportunistic routing in wireless communication networks. IEEE Communications Surveys & Tutorials17(4), pp.2214-2241.

Chandrasekharan, S., Gomez, K., Al-Hourani, A., Kandeepan, S., Rasheed, T., Goratti, L., Reynaud, L., Grace, D., Bucaille, I., Wirth, T. and Allsopp, S., 2016. Designing and implementing future aerial communication networks. IEEE Communications Magazine54(5), pp.26-34.

Che, Y.L., Duan, L. and Zhang, R., 2015. Spatial throughput maximization of wireless powered communication networks. IEEE Journal on Selected Areas in Communications33(8), pp.1534-1548.

Lin, S., Miao, F., Zhang, J., Zhou, G., Gu, L., He, T., Stankovic, J.A., Son, S. and Pappas, G.J., 2016. ATPC: adaptive transmission power control for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN)12(1), p.6.

Liu, Y., Wang, L., Zaidi, S.A.R., Elkashlan, M. and Duong, T.Q., 2015. Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model. IEEE Transactions on Communications64(1), pp.329-342.

Ng, D.W.K., Lo, E.S. and Schober, R., 2015. Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer. IEEE transactions on vehicular technology65(5), pp.3166-3184.

Qu, Z., Keeney, J., Robitzsch, S., Zaman, F. and Wang, X., 2016. Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China communications13(7), pp.108-116.

Razaviyayn, M., Sanjabi, M. and Luo, Z.Q., 2016. A stochastic successive minimization method for nonsmooth nonconvex optimization with applications to transceiver design in wireless communication networks. Mathematical Programming157(2), pp.515-545.

Wei, Z., Yuan, J., Ng, D.W.K., Elkashlan, M. and Ding, Z., 2016. A survey of downlink non-orthogonal multiple access for 5G wireless communication networks. arXiv preprint arXiv:1609.01856.

Wu, Q., Zeng, Y. and Zhang, R., 2018. Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Transactions on Wireless Communications17(3), pp.2109-2121.

Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine53(4), pp.20-27.


Preserve your Top Grade with Online Assignment Help Service 24/7 Know More