21 results
Search Results
2. Secure public administration using wireless blockchain technology with efficient routing policy.
- Author
-
P, Anitha Rajakumari and Parwekar, Pritee
- Subjects
PUBLIC administration ,NEAR field communication ,BLOCKCHAINS ,WIRELESS sensor networks ,TECHNOLOGICAL innovations ,TRUST - Abstract
Summary: Current research works are majorly focused on the security importance and prevention measures in wireless sensor network (WSN). The survey of existing papers states that there are no efficient protocols for achieving secure and reliable peer authentication that ensures trust and confidentiality of the end‐users, as public administration worldwide invokes many maximized resources demanding transparency with security. Nowadays, a number of nations have started implementing smart city ideas; new technology should be used to safeguard various public administration services against corruption, intruders rendering an active part, and public transparency. By integrating blockchain (BC) technology with wireless‐based public administration process (WBPAP), the challenge of gaining trust, and eliminating corruption can be attained. Auto‐metric graph neural network (AGNN) approach is proposed for eliminating data tampering and malicious attack in the peer network. Trust, confidentiality, and integrity can be achieved using the proposed BC‐AGNN‐WBPAP‐WSN approach. The simulation of this model is activated in MATLAB, and its performance is examined using some performance metrics. Finally, the attained outcomes prove that the proposed method is the first wireless‐based public blockchain experimental method for public administration analyzed with theoretical methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Worldwide Interoperability for Microwave Access network optimization with and without relay station for next generation internet access.
- Author
-
Khan, Mubeen Ahmed, Kumar, Awanit, and Bandhu, Kailash Chandra
- Subjects
BANDWIDTH allocation ,INTERNET access ,IEEE 802.16 (Standard) ,NETWORK performance ,TECHNOLOGICAL innovations - Abstract
Summary: Enhancement of network performance is a big challenge today for the emerging technology based on IEEE 802.16. Wireless technology is an alternate solution to wired technology. Network availability all the way is an important challenge in day‐to‐day life. Due to the huge population, the availability of the network is again a big challenge. Also, it becomes more difficult to capture the network if considering rural areas, hilly, lakes, and seashores today. This work proposed relay stations in WiMAX (Worldwide Interoperability for Microwave Access) networks along with various bandwidth allocation algorithms to increase the signal strength over the long distance using retransmission of the original signal by relay station and extend the coverage with a higher data rate and higher user capacity. The availability of WiMAX networks for the channel bandwidth assignment to users for data and service is very important in today's scenario. This paper focuses on evaluating the performance of bandwidth allocation algorithms in light WiMAX networks with and without relay stations. The performance evaluation is done by increasing the number of nodes with various bandwidth allocation techniques with and without relay stations. In this work the round robin and strict priority algorithms are used for channel bandwidth allocation in a light WiMAX network and performance is analyzed through throughput, goodput, and packet drop rate, which will help to implement and configure the suggested optimal parameters in the production environment. This work enhanced the throughput and goodput and reduce the dropout rate, and the user capacity also increased. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Performance analysis for energy efficient communications aided by UAV with reconfigurable intelligent surface.
- Author
-
Liu, Jinbo and Sun, Shaohui
- Subjects
CENTRAL limit theorem ,TECHNOLOGICAL innovations ,ENERGY consumption ,TELECOMMUNICATION systems ,DISRUPTIVE innovations ,DRONE aircraft - Abstract
Summary: The continuous growth of wireless connectivity and the emergence of the concept of the Internet of Everything in the future sixth‐generation (6G) network require a new communication paradigm. Different from the prior works that focus on performance optimization for communication networks, in this paper, we attempt to analyze the energy efficiency of unmanned aerial vehicles (UAVs) communication aided by reconfigurable intelligent surfaces (RIS) which is a new disruptive technology, for the reason that UAV has the line‐of‐sight (LoS) link transmission and flexibility and RIS has the low power for improving the communication reliability and network coverage. At firstly, when central limit theorem (CLT) assumption is used and the number of RIS reflecting elements is large, we derive the closed‐form expression of the average signal‐to‐interference‐plus‐noise ratio (SINR) of each user based on the new BS‐RIS‐user communication link and RIS‐user/BS association. Following this, we further gain the energy efficiency (EE) in closed‐form based on random access between BS and user. Finally, we further show the performance of EE under certain assumptions. In particular, the offered results demonstrate that the use of the RIS can significantly improve EE due to RIS assist in improving the SINR and has very low transmission power; meanwhile, the UAV equipped with RIS can also improve EE for the reason that RIS can be used as a mobile relay to take advantage of the LoS link transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. A novel optimized routing technique to mitigate hot‐spot problem (NORTH) for wireless sensor network‐based Internet of Things.
- Author
-
Avdhesh Yadav, Suman and Poongoodi, T.
- Subjects
WIRELESS sensor networks ,INTERNET of things ,AD hoc computer networks ,TECHNOLOGICAL innovations ,STOCK price indexes ,DETECTORS - Abstract
Summary: Technological advancements in the area of the Internet of Things have fostered the development of multi‐hop architectures pertaining to applications seeking large network areas. However, while exploiting such applications, the sensor devices being used are made to communicate through multi‐hop routing techniques, burdening the relay nodes. Hence, it leads to a hot‐spot problem, as the nodes passing on the data, that is, relay nodes, consume their energy at a large magnitude. To solve this issue, in this paper, we propose a novel optimized routing technique to mitigate hot‐spot problem (NORTH) for wireless sensor network (WSN)‐based IoT. We employ the tunicate swarm algorithm (TSA) to optimize the cluster‐based routing, specifically the selection of cluster head (CH) of each cluster by using some novel parameters. These parameters include energy status, a distance of a node from the sink and other nodes, load balancing, node proximity, and average energy stock of the network. We investigate two network scenarios, that is, when a sink is placed inside the network and otherwise, to give an optimized solution for every case. Further, to mitigate the hot‐spot problem, the relay node is selected in a cluster with the same mechanism as CH, which performs the task of data forwarding. The simulation analysis of NORTH reveals the supremacy of the proposed work against the recently proposed algorithms, based on various performance metrics, namely, network longevity, stability duration, throughput, and the network's remaining energy. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Technology classification, industry, and education for Future Internet of Things.
- Author
-
Ning, Huansheng and Hu, Sha
- Subjects
INTERNET ,INFORMATION technology ,TECHNOLOGICAL innovations ,INTERNET in education ,MATHEMATICAL models ,COMPUTER architecture ,INDUSTRIES - Abstract
SUMMARY The Internet of Things (IoT) is developing rapidly and becoming a hot topic around the world. On the basis of the reorganized Unit IoT and Ubiquitous IoT, two models for Future IoT are proposed in this paper. A dimension model is established to classify the complicated IoT technologies and a layer model is built for Future IoT system architecture. Then, the IoT vision and its development phases prediction are presented. Furthermore, the thought of regarding IoT as an emerging industry is explained to be inappropriate because IoT is a new stage of intelligentization and informatization development. Meanwhile, the necessity of training qualified personnel in colleges is introduced. Then, the relation between IoT and the science and technology system and IoT relevant subjects is analyzed. At the end, this paper raises the problem of setting IoT as a major in college and proposes some suggestions. Copyright © 2012 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
7. Network condition and application‐based data adaptive intelligent message routing in vehicular network.
- Author
-
Purkait, Rajesh and Tripathi, Sachin
- Subjects
INTELLIGENT transportation systems ,ROAD safety measures ,VEHICULAR ad hoc networks ,GLOBAL Positioning System ,TECHNOLOGICAL innovations - Abstract
Summary: Recent advances in intelligent transportation systems enable a broad range of potential applications that significantly improve the vehicle and road safety and facilitate the efficient dissemination of information among the vehicles. To assist the vehicle traffic, message broadcasting is a widely adopted technique for road safety. But efficient message broadcasting is a significant issue, especially in a high network density due to the broadcast storm problem. To solve this issue, several methods are proposed to eliminate the redundant transmission of safety packets. However, they lack in restricting the broadcasting region of safety messages, and the transmissions of safety packets outside the dangerous region, and force the vehicles to unnecessary detours. This paper proposes an adaptive multimode routing protocol, network condition, and application‐based data adaptive intelligent message routing in vehicular network (NetCLEVER) that supports 2 modes of operation such as message broadcasting and intelligent routing. In message broadcasting mode, the NetCLEVER decides the dangerous region of the network by considering the changes of neighbor vehicles velocity, instead of current vehicle velocity, because a vehicle decision in velocity is interdependent with the preceding vehicles. In intelligent routing mode, the NetCLEVER exploits the cuckoo search optimization in routing by taking into account multiple routing factors such as the road topology of intersections and traffic signals and their impact on link stability, which improves the reliability of routing packets significantly. The performance evaluation illustrates that the proposed NetCLEVER improves reliable wireless communication as well as road safety in vehicular ad hoc networks. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
8. Performance study of mobile WiMAX network with changing scenarios under different modulation and coding.
- Author
-
Bhunia, Suman, Misra, Iti Saha, Sanyal, Salil K., and Kundu, Anindita
- Subjects
PERFORMANCE evaluation ,IEEE 802.16 (Standard) ,ELECTRONIC modulation ,REAL-time computing ,MULTIMEDIA systems ,QUALITY of service ,BANDWIDTHS ,TECHNOLOGICAL innovations - Abstract
WiMAX-the Worldwide Interoperability for Microwave Access is a promising technology for offering high-speed data, video and multimedia services over mobile platform evolving toward all IP networks. The increasing demand of WiMAX for VoIP and high-speed multimedia is due to the simplicity of installation and cost reduction compared with the traditional wired DSL cable. The challenges to service providers lie with the Quality of Service (QoS) under varying fading environment while at the same time maximizing for resource utilization. In this paper, a rigorous and comprehensive performance study of mobile WiMAX has been made with respect to adaptive modulation and coding techniques considering the variation in the speed of the mobile, path-loss, scheduling services and application type for comparing with the fixed type of modulations. The OPNET 14.5.A modeler for WiMAX platform has been used as simulator for adaptation at the physical layer of the transmission in WiMAX OFDMA structure. Observation reveals that dynamic adaptation of modulation and coding schemes based on channel condition enables better QoS while consuming low overall bandwidth of the system. Copyright © 2011 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
9. Defining and maximizing PPT—a novel performance parameter for IEEE 802.11 DCF.
- Author
-
Li, Yun, Long, Ke-Ping, and Zhao, Wei-Liang
- Subjects
IEEE 802.11 (Standard) ,TECHNOLOGICAL innovations ,PERFORMANCE evaluation ,PACKET switching ,QUALITY of service ,WIRELESS LANs - Abstract
Much research has been conducted on saturation throughput of IEEE802.11 DCF, and has led to some improvement. But increasing the successful transmission probability of packet is also important for saving stations' battery energy and decreasing the packet delay. In this paper, we define a new performance parameter, named Product of successful transmission Probability and saturation Throughput (PPT), for 802.11 DCF, which binds successful transmission probability and saturation throughput together. An analysis is given to maximize PPT. An expression of optimal minimum contention windows (CW
min ) is obtained analytically for maximizing PPT. For simplicity, we give a name DCF-PPT to the 802.11 DCF that sets its CWmin according to this expression. The performance of DCF-PPT is simulated with different stations in terms of saturation throughput, successful transmission probability and PPT. The simulation results indicate that, compared to 802.11 DCF, DCF-PPT can significantly increase the PPT and successful transmission probability (about 0.95) on condition that the saturation throughput is not decreased. Copyright © 2006 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]- Published
- 2006
- Full Text
- View/download PDF
10. Internet of Things.
- Author
-
Xia, Feng, Yang, Laurence T., Wang, Lizhe, and Vinel, Alexey
- Subjects
EDITORIALS ,EMBEDDED computer systems ,INTERNET ,COMPUTER networks ,TECHNOLOGICAL innovations ,RADIO frequency identification systems ,BROADBAND communication systems - Published
- 2012
- Full Text
- View/download PDF
11. Efficient and secure business model for content centric network using elliptic curve cryptography.
- Author
-
Adhikari, Sharmistha, Ray, Sangram, Biswas, Gosta P., and Obaidat, Mohammad S.
- Subjects
ELLIPTIC curve cryptography ,COMPUTER network security ,INTERNET protocol address ,INFORMATION sharing ,TECHNOLOGICAL innovations ,BUSINESS models - Abstract
Summary: Initially, Internet has evolved as a resource sharing model where resources are identified by IP addresses. However, with rapid technological advancement, resources/hardware has become cheap and thus, the need of sharing hardware over Internet is reduced. Moreover, people are using Internet mainly for information exchange and hence, Internet has gradually shifted from resource sharing to information sharing model. To meet the recent growing demand of information exchange, Content Centric Network (CCN) is envisaged as a clean‐slate future network architecture which is specially destined for smooth content distribution over Internet. In CCN, content is easily made available using network caching mechanism which is misaligned with the existing business policy of content providers/publishers in IP‐based Internet. Hence, the transition from contemporary IP‐based Internet to CCN demands attention for redesigning the business policy of the content publishers/providers. In this paper, we have proposed efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the content publisher while maintaining the salient CCN features like in‐network content caching and Interest packet aggregation. To enhance the efficiency and security, the Elliptic Curve Cryptography (ECC) is used. The proposed ECC‐based scheme is analyzed to show that it is resilient to relevant existing cryptographic attacks. The performance analysis in terms of less computation and communication overheads and increased efficiency is given. Moreover, a formal security verification of the proposed scheme is done using widely used AVISPA simulator and BAN logic that shows our scheme is well secured. The transition from IP‐based Internet to Content Centric Network (CCN) demands attention for redesigning the business policy of the content publishers. In this paper, we have proposed Elliptic Curve Cryptography (ECC) based efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the Internet. The proposed scheme is compared with existing schemes and also formally analyzed using widely used AVISPA simulator and BAN logic that shows our scheme is efficient and well secured. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
12. A zone co-operation approach for efficient caching in mobile ad hoc networks.
- Author
-
Chand, Narottam, Joshi, R. C., and Misra, Manoj
- Subjects
MOBILE communication systems ,ALGORITHMS ,ROUTING (Computer network management) ,PERFORMANCE evaluation ,MOBILE computing ,COMPUTER networks ,TECHNOLOGICAL innovations ,CACHE memory ,MANAGEMENT - Abstract
Mobile Ad hoc NETwork (MANET) presents a constrained communication environment due to fundamental limitations of client resources, insufficient wireless bandwidth and users' frequent mobility. Caching of frequently accessed data in such environment is a potential technique that can improve the data access performance and availability. Co-operative caching, which allows the sharing and co-ordination of cached data among clients, can further explore the potential of the caching techniques. In this paper, we propose a novel scheme, called zone co-operative (ZC) for caching in MANETs. In ZC scheme, one-hop neighbours of a mobile client form a co-operative cache zone. For a data miss in the local cache, each client first searches the data in its zone before forwarding the request to the next client that lies along routing path towards server. As a part of cache management, cache admission control and value-based replacement policy are developed to improve the data accessibility and reduce the local cache miss ratio. An analytical study of ZC based on data popularity, node density and transmission range is also performed. Simulation experiments show that the ZC caching mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies. Copyright © 2006 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
13. Energy‐optimized cluster head selection based on enhanced remora optimization algorithm in underwater wireless sensor network.
- Author
-
Kumar Tiwari, Keshav and Singh, Samayveer
- Subjects
WIRELESS sensor networks ,OPTIMIZATION algorithms ,TECHNOLOGICAL innovations ,EUCLIDEAN distance ,JOB performance - Abstract
Summary: With the technological advancements, wireless sensor network (WSN) has played an impeccable role in monitoring the underwater applications. Underwater WSN (UWSN) is supported by WSN but subjected to data dissemination in an acoustic medium. Due to challenging conditions in underwater scenario, the limited battery resources of these sensor nodes stem to a crucial research problem that needs to address the energy‐efficient routing in UWSN. In this research work, we intend to propose an energy‐optimized cluster head (CH) selection based on enhanced remora optimization algorithm (ECERO) in UWSN. Since CH devours the maximum energy among the nodes, we perform selection of CH based on EROA while considering energy, Euclidean distance from sink, node density, network's average energy, acoustic path loss model and lastly, the adaptive quantity of CHs in the network. Further, to reduce the load on CH node, we introduce the concept of sleep scheduling among the closely located cluster nodes. The proposed work improves the performance of recently proposed EOCSR algorithm by great magnitude which claims to mitigate hot‐spot problem, but EOCSR still suffers from the same due to relaying a large magnitude of data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. A novel membrane‐inspired multiverse optimizer algorithm for quality of service‐aware cloud web service composition with service level agreements.
- Author
-
Maroosi, Ali and Muniyandi, Ravie Chandren
- Subjects
SERVICE level agreements ,OPTIMIZATION algorithms ,BIOLOGICALLY inspired computing ,WEB services ,ALGORITHMS ,PARTICLE swarm optimization ,TECHNOLOGICAL innovations ,POLYMERIC membranes - Abstract
Summary: Cloud computing is an emerging technology in computing that provides different services over the Internet. It needs composite services to perform a complex task. Optimal selection of services that provides both functionality and nonfunctionality requirements is an NP‐hard problem. This study uses nondeterministic parallel and distributed structures of membrane systems for the recently improved multiverse optimization algorithm to improve the quality of solutions. In the previous membrane‐inspired algorithm, the population was divided into subpopulations that evolve different dynamic membranes. This study not only uses a conventional membrane‐inspired approach to introduce a conventional membrane‐inspired multiverse optimizer (CMIMVO) for the first time but also proposes an algorithm that divides the variables (dimension) into subgroups for different membranes called proposed membrane‐inspired multiverse optimizer (PMIMVO). Thus, in PMIMVO, each membrane works on a subgroup to gain global information, which considers the best values obtained by other membranes for other variables. The PMIMVO shows promising results on benchmark function problems. Furthermore, simulation results show that the PMIMVO approach could achieve up to 38% improvement in integrated quality of service (QoS) with attributes including response time, price, availability, and reliability in comparison with the previous approaches, including genetics algorithm (GA), particle swarm optimization (PSO), gravitational search algorithm (GSA), moth–flame optimization (MFO) improved multiverse optimizer (MVO), and CMIMVO. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. An efficient resource allocation to improve QoS of 5G slicing networks using general processor sharing‐based scheduling algorithm.
- Author
-
AlQahtani, Salman A.
- Subjects
5G networks ,RESOURCE allocation ,RADIO access networks ,SOFTWARE-defined networking ,QUALITY of service ,TECHNOLOGICAL innovations ,COMPUTER scheduling - Abstract
Summary: Fifth generation (5G) slicing is an emerging technology for software‐defined networking/network function virtualization–enabled mobile networks. Improving the utilization and throughput to meet the quality of service (QoS) requirements of 5G slicing is very important for the operators of mobile networks. With growing data traffic from different applications of numerous smart mobile devices having several QoS requirements, we expect networks to face problems of congestion and overload that prevent the effective functioning of a radio access network (RAN). This paper proposes a more effective packet‐based scheduling scheme for data traffic by 5G slicing with two operation modes for improving the resource utilization of 5G cloud RAN and providing an efficient isolation of the 5G slices. These two operation modes are referred to as static sharing resource (SSR) scheme and dynamic sharing resources (DSR) scheme. The SSR scheme is a modified version of an existing method. The goal of this approach is to reallocate the shared available resources of 5G network fairly and maximize the utilization of bandwidth while protecting a 5G slice from overwhelming other 5G slices. Throughput and delays of the system model are also discussed to show its performance limits. On the basis of the simulation outcomes, we observed that the proposed DSR scheme outperforms the SSR scheme in terms of provided delay and throughput. In addition, the token bucket parameters together with the assigned capacity weight for each slice can be selected and configured based on the required QoS. Finally, a good estimate for the maximum delay bounds of the slices is provided by the derived theoretical delay bound. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
16. Reliable data communication using post‐quantum encryption in Internet of Everything.
- Author
-
Balaji, Ashwin and Dhurandher, Sanjay Kumar
- Subjects
DATA transmission systems ,TELECOMMUNICATION systems ,INTERNET ,MULTICASTING (Computer networks) ,NETWORK performance ,TECHNOLOGICAL innovations - Abstract
Summary: Internet of Everything (IoE) is one of the emerging technologies in the advancement of digital life and innovation. But the major issue that is to be addressed is the security concerns over such an environment, especially in end‐to‐end device communication. The proposed approach primarily focuses on reliable end‐to‐end device communication using post‐quantum location‐aware encryption, aiming to achieve confidentiality and integrity in an Internet of Everything environment. Even though the post‐quantum techniques have shown to be one of the evolving solutions for reliable data communication, but its robustness against the Man‐In‐The‐Middle and Sybil attacks is still a wide‐open subject and undiscovered. Numerous traditional encryption algorithms are now in use, while post‐quantum encryption is being studied and considered as a quantum‐safe substitute. The proposed approach also demonstrates a robust attack model which focuses on communication network threats like namely, Man‐In‐The‐Middle and Sybil attacks intending to evaluate the overall performance of the network by analyzing the performance parameters like, number of nodes in the network, message size, execution time, and memory consumption by the nodes and aiming to achieve an appreciable accuracy in an IoE environment. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. An adaptive energy-efficient framework for time-constrained optical backbone networks.
- Author
-
Sarigiannidis, Panagiotis, Kakali, Vasiliki, and Fragakis, Manos
- Subjects
ENERGY consumption ,INFORMATION & communication technologies ,TECHNOLOGICAL innovations ,DECISION making ,QUALITY of service - Abstract
Power management has emerged as a challenge of paramount importance having strong social and financial impact in the community. The rapid growth of information and communication technologies made backbone networks a serious energy consumer. Concurrently, backbone networking is deemed as one of the most promising areas to apply energy efficient frameworks. One of the most popular energy efficient techniques, in the context of backbone networks, is to intentionally switch off nodes and links that are monitored underutilized. Having in mind that optical technology has thoroughly dominated modern backbone networks, the function of switching off techniques entails fast operation and rigorous decision-making because of the tremendous speed of the underlying optical media. This paper addresses this challenge by introducing a novel, adaptive, and efficient power management scheme for large-scale backbone networks. The proposed framework exploits traffic patterns and dynamics in order to effectively switch off the set of network entities in a periodic fashion. An adaptive decision-making algorithm is presented to maximize the network energy gains with respect to time constraints as well as QoS guarantees. The conducted simulation results reveal considerable improvements when applying the proposed framework compared with other inflexible energy efficient schemes. Copyright © 2015 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
18. Ultra‐wideband technology: Prospective solution for 5G ultra‐small cell networks.
- Author
-
Puerta, Rafael, Rommel, Simon, Jaramillo‐Ramirez, Daniel, and Tafur Monroy, Idelfonso
- Subjects
TELECOMMUNICATION ,5G networks ,WIRELESS communications ,FEMTOCELLS ,RADIO frequency ,TELECOMMUNICATION systems ,TECHNOLOGICAL innovations - Abstract
Summary: Exhaustive research is being done to establish the technologies and standards of the fifth generation (5G) of wireless communication systems. Some of the most challenging requirements of 5G systems are to increase the spectral efficiency and the capacity by a factor of 10 and 1,000, respectively. New technologies must offer an adequate framework for the 5G uses cases, which will enable higher capacities and the flexibility to adapt to dynamic scenarios. To cope with these challenging demands, a compelling approach is to exploit the current radio service bands by means of spectrum sharing and cooperation techniques, which alleviate the bandwidth requirements. In addition, advanced modulation schemes have a fundamental role in ensuring the best usage of the spectrum available in band‐limited systems. In this manuscript, we present the ultra‐wideband (UWB) technology as a prospective solution for 5G picocells and femtocells. Its main feature is its capability to operate simultaneously, without introducing interference, with current radio services on an unlicensed basis. We report experimental results reaching data rates up to 35 Gbit/s using the multiband approach of carrierless amplitude phase (MB‐CAP) modulation. To validate the versatility of the proposed system, our experimental tests were performed under the UWB regulations defined by the United States' Federal Communications Commission (FCC), the European Electronic Communications Committee (ECC), and the Russian State Committee for Radio Frequencies (SCRF). The regulations chosen provide diversity enough to demonstrate the capacity of MB‐CAP modulation to comply with worldwide regulations. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
19. Advanced processing technologies and applications for mobile communication systems.
- Author
-
Yeo, Sang Soo, Wang, Shiuh‐Jeng, and Castro, Rodrigo Román
- Subjects
MOBILE communication systems ,PERSONAL computers ,INTERNET ,UBIQUITOUS computing ,TECHNOLOGICAL innovations ,RADIO frequency identification systems ,MIDDLEWARE - Published
- 2013
- Full Text
- View/download PDF
20. Integrating multimedia streaming from heterogeneous sources to JavaME mobile devices.
- Author
-
Calvo‐Flores, M. Delgado, Quero, J. Medina, Lozano, M. D. Ruiz, and Miranda, A. Vila
- Subjects
JAVA programming language ,POCKET computer software ,WEBCAMS ,MICROPHONES ,VIRTUAL machine systems ,TECHNOLOGICAL innovations ,MULTIMEDIA systems - Abstract
SUMMARY Thanks to technological advancement, at present there exist many devices with multimedia support in our environment; among them, being mobile devices, which offer the ability to display video and audio resources from the palm of the hands, and even act as multimedia sources. However, the heterogeneity of such devices makes the multimedia integration difficult to get portable solutions. This problem is the focus of this document, which integrates environmental multimedia resources (IP cameras, Webcams, Aibo cameras and microphones) to be played in real time over Virtual Machines, in particular, using JavaME devices. We also present the techniques for generating multimedia streaming from the Virtual Machines accessing the cameras and microphones of mobile devices. Copyright © 2011 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
21. MAC-assisted topology control for ad hoc wireless networks.
- Author
-
Rahman, A. and Gburzynski, P.
- Subjects
ENERGY consumption ,ALGORITHMS ,TOPOLOGY ,WIRELESS LANs ,TOPOLOGICAL graph theory ,TECHNOLOGICAL innovations ,MOBILE communication systems ,IEEE 802.11 (Standard) - Abstract
We consider ad hoc wireless networks and the topology control problem defined as minimizing the amount of power needed to maintain connectivity. The issue boils down to selecting the optimum transmission power level at each node based on the position information of reachable nodes. Local decisions regarding the transmission power level induce a subgraph of the maximum powered graph G
max in which edges represent direct reachability at maximum power. We propose a new algorithm for constructing minimum-energy path-preserving subgraphs of Gmax , i.e. ones minimizing the energy consumption between node pairs. Our algorithm involves a modification to the medium access control (MAC) layer. Its superiority over previous solutions, up to 60% improvement in sparse networks, demonstrates once again that strict protocol layering in wireless networks tends to be detrimental to performance. Copyright © 2005 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]- Published
- 2006
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.