Showing 121 - 140 results of 142 for search '"cellular networks"', query time: 0.05s Refine Results
  1. 121

    Research on 5G high-precision indoor positioning technology for smart parks by Baoyou WANG, Jingtao YANG, Saibin YAO, Haina YE, Zhihui WANG, Qiyuan ZHANG, Junfeng FU, Taishi JIN

    Published 2023-08-01
    “…The 5G cellular network not only provides wireless communication capabilities for terminals but also offers positioning functionalities.Firstly, the 3GPP 5G positioning technology was briefly outlined, followed by the proposal of the 5G indoor positioning technology road-map.The cloud-edge collaborative integrated positioning architecture, the 5G+X fusion positioning solution, as well as the 5G positioning solution for smart parks were included, with a detailed analysis of the architecture and process.These positioning solutions seamlessly addressed the issue of locating people or objects in areas where GNSS signals cannot reach, which could meet the positioning accuracy and timeliness requirements in different scenarios.The technology solution has been applied in the industry with meter-level positioning accuracy and second-level timeliness, which has been well evaluated by customers.…”
    Get full text
    Article
  2. 122

    Modeling and Performance Analyses of Hybrid Cellular and Broadcasting Networks by Peter Unger, Thomas Kürner

    Published 2009-01-01
    “…As one possible solution to meet the mentioned requirements, we consider the combination of the cellular network UMTS and the mobile broadcast network DVB-H, which form a hybrid network. …”
    Get full text
    Article
  3. 123

    Research on security defense of mobile edge computing by Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI

    Published 2021-02-01
    “…Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.…”
    Get full text
    Article
  4. 124

    Asymptotic quadratic price game mechanism for video stream extensible feedback unloading by Qianqian GE

    Published 2020-01-01
    “…A progressive quadratic price game mechanism with scalable feedback offloading of video streams was proposed.Firstly,the congestion of cellular network could be alleviated by effectively uninstalling some video traffic from all video streaming services to Wi-Fi network,thus providing seamless video streaming services.Several physi-cal paths were integrated in an economical and efficient way.The fountain coded symbols of compressed video data were transmitted simultaneously through LTE and Wi-Fi network to flexibly control the viewing through Wi-Fi net-work and reduce the video quality degradation caused by wireless channel errors.Secondly,a progressive secondary price auction mechanism was used to allocate limited LTE resources to multiple user devices to maximize social wel-fare and achieve Nash equilibrium.The scalability and convergence of the system were verified theoretically.Finally,the performance advantages of the proposed algorithm in video streaming transmission quality and energy consump-tion were verified by experimental simulation.…”
    Get full text
    Article
  5. 125

    Research of service-differentiated admission control based on Markov decision processes in heterogeneous wireless networks by DENG Qiang1, CHEN Shan-zhi2, HU Bo1, SHI Yan1

    Published 2010-01-01
    “…Service-differentiated admission control was studied in heterogeneous wireless networks.Capacity regions of voice and data services in CDMA cellular network and WLAN were derived.A theoretical model of admission control with differentiated services was proposed on basis of Markov decision processes theory,in which the admission actions were specified for each traffic service and system state transition probabilities were formulated.Furthermore,a fuzzy logic admission utility evaluation mechanism was presented based on the analysis of relationship of QoS requirements and network state,then the optimal admission control policy that maximizes overall utility with new and handoff call blocking probability constraints was formulated.The simulation results reveal that network dynamics can be captured by the proposed utility evaluation mechanism.And the average utility earned in the optimal admission control policy was significantly larger than two other schemes in which service differentiation and mobility are not considered,in addition,the new and handoff call blocking probability can be strictly constrained.…”
    Get full text
    Article
  6. 126

    Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System by Ashraf A. Tahat

    Published 2009-01-01
    “…The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.…”
    Get full text
    Article
  7. 127

    Design and Construct a Forest Fire Detection and Control System. by Ampumuza, Mary Viola

    Published 2025
    “…For the system to be functional, the availability of cellular network coverage is required in the forest to enable short message services to take place. …”
    Get full text
    Thesis
  8. 128

    D2D data sharing partner selection mechanism based on privacy degree and stability degree by Zhangjian HUANG, Guohua YE, Zhiqiang YAO

    Published 2019-12-01
    “…Device to device (D2D) data sharing has become a promising solution to offload cellular network traffic,but the privacy vulnerability and service instability of data sharing partners affect the quality of shared services.To solve this problem,a D2D data sharing partner selection mechanism based on degree of privacy degree and stability degree (named PSUS) was proposed.Firstly,the privacy information of the provider was abstracted and summarized,and the privacy measurement method was built according to the privacy preferences of the provider and the historical records of shared services,and the privacy degree of the provider in different shared services was obtained.Then,the data sharing process was designed based on privacy degree,and the provider cached data under the constraints of privacy preferences and participates in sharing services with low privacy to meet the provider's privacy requirements.Finally,on the basis of the provider who has satisfied the privacy requirements,a multi-index evaluation method was designed to evaluate the service stability of providers to select stable sharing partners.The feasibility of the proposed mechanism was demonstrated by analysis of performance.…”
    Get full text
    Article
  9. 129

    Multiband Patch Antenna for Femtocell Application by M. R. Zaman, Afaz Uddin Ahmed, Rezaul Azim, Huda Abdullah, Mohd Tarmizi Ali, M. T. Islam

    Published 2014-01-01
    “…Distributed antenna solution (DAS) has been introduced in cellular network to achieve homogenous indoor coverage. …”
    Get full text
    Article
  10. 130

    Research on Dynamic Virtualization Distributed Mobility Management Method for LEO Satellite Network by Hongtao ZHU, Qing GUO

    Published 2020-09-01
    “…With the commercialization of 5G,the integration of satellite communication and ground 5G has become a key research direction in the industry.Low earth orbit satellite network can cover the whole world and communicate with anyone at any time and anywhere.It is an eff ective supplement and expansion of terrestrial cellular network.Especially,the deployment of low earth orbit (LEO) internet constellation such as OneWeb and Starlink accelerates the development of LEO satellite network.However,due to the high dynamic of LEO satellite and the fast change of its network topology,the network management problem caused by it has become the diff culty of LEO satellite application,and mobility management is one of the key technologies.How to build a mobility management mechanism suitable for high dynamic LEO satellite network is an urgent problem to be solved.Based on the idea of ground distributed gateway and satellite agent cluster,the dynamic virtualization distributed mobility management (DV-DMM) model was proposed,which was mainly used to solve the problems of poor scalability and single point failure of traditional mobility management.At the same time,it used satellite to build virtual gateway to solve the problem of building satellite ground station on the ground.…”
    Get full text
    Article
  11. 131

    Perspectives on coordinated satellite-terrestrial intelligent maritime communication network by Wei FENG, Rui TANG, Ning GE

    Published 2020-10-01
    “…With the implementation of national marine strategy,economic activities such as maritime transport,marine resource exploitation become increasingly important,and the demand for maritime communications keeps growing.Although the terrestrial cellular network had entered the 5G era,existing maritime communications still mainly rely on marine satellites and shore-based base stations,which are far from meeting the demand in terms of communication rate,delay and reliability.The future 6G networks are expected to offer satellite-air-ground-sea full coverage.However,due to complex maritime environments and heterogeneous marine services,the 6G maritime communication networks still face unique challenges.After summarizing the current developing status of maritime communications,related key technologies were surveied from three aspects:transmission efficiency,network coverage,and information service.For the future development of 6G intelligent maritime communication networks,the technical methods and research directions of maritime environment-aware intelligent transmission,coordinated satellite-terrestrial dynamic networking and service-driven resource allocation were prospected.…”
    Get full text
    Article
  12. 132

    Mobile Localization Based on Received Signal Strength and Pearson's Correlation Coefficient by Huiyu Liu, Yunzhou Zhang, Xiaolin Su, Xintong Li, Ning Xu

    Published 2015-08-01
    “…Being applicable for almost every scenario, mobile localization based on cellular network has gained increasing interest in recent years. …”
    Get full text
    Article
  13. 133

    Optimal transmission for scalable video coded streaming in cellular wireless networks with the cooperation of local peer-to-peer network by Guangsheng Feng, Junyu Lin, Qian Zhao, Huiqiang Wang, Hongwu Lv, Bingyang Li, DongDong Su

    Published 2017-04-01
    “…We study the problem of transmitting scalable video coded streams in a hybrid scenario including a global cellular network and a local peer-to-peer network. Given desirable channel condition in cellular downlink, some cellular user equipments can fetch the video chunks via the cellular base station directly, and also provide relay service via the local peer-to-peer network for other user equipments unable to meet their basic video quality. …”
    Get full text
    Article
  14. 134

    Performance Analysis of 3D Massive MIMO Cellular Systems with Collaborative Base Station by Xingwang Li, Lihua Li, Ling Xie, Xin Su, Ping Zhang

    Published 2014-01-01
    “…Massive MIMO have drawn considerable attention as they enable significant capacity and coverage improvement in wireless cellular network. However, pilot contamination is a great challenge in massive MIMO systems. …”
    Get full text
    Article
  15. 135

    Cooperative content downloading scheme based on D2D multicast communications by Lianxin YANG, Dan WU, Feng YUAN, Chao YUE, Qinxue FU

    Published 2020-11-01
    “…Aiming at the content downloading scenario in the network such as cellular network and vehicular network,a cooperative content downloading scheme based on device-to-device multicast communications was proposed to improve the content downloading performance.Such a scheme took advantage of the proximity feature of the content requesters and groups them into disjoint clusters.Firstly,the base station delivered the entire content to a cluster,and each content requester in a cluster downloaded a proportion of the entire content.Then,the content requesters took turns sharing their downloaded content with other content requesters in the same cluster.In this way,the additional resource consumption of content sharing in a cluster was shared by the content requesters in the cluster together.During this process,a pricing-based approach was proposed to motivate these content requesters to cooperate with each other.Such an approach only required the base station to maintain a content downloading price.Based on this,the joint issue of user clustering,link scheduling and power allocation was studied to minimize the total cost of content requesters.To obtain a superior solution with reductive complexity,a joint optimization algorithm was designed based on the coalition formation game.Numerical results show that compared with the traditional non-cooperative scheme,the total cost of content requesters was reduced by 37.15%.Under different numbers of content requesters and cellular users,the proposed scheme is both superior to other benchmark schemes.…”
    Get full text
    Article
  16. 136

    Survey of software defined D2D and V2X communication by Wenjuan SHAO, Qingguo SHEN

    Published 2019-04-01
    “…The related D2D (device-to-device) and V2X (vehicle-to-everything) are regarded as vital components of 5G communication system,which providing alternative network services and multiple application services for cellular network.In the meanwhile,SDN (software defined networking) can improve the compatibilities and flexibilities of D2D and V2X.SD-D2D (software defined D2D communication) and SD-V2X (software defined V2X communication) technologies were reviewed.Based on their similarities and respective characteristics,their state-of-arts and architectures were reviewed accordingly,and the key technologies such as D2D location/discovery management,D2D routing control,D2D flow table management,V2V path scheduling,and V2V path recovery were analyzed.Finally,it was pointed out that the SD-D2D architecture was approaching mature and the SD-V2X framework had been preliminarily determined,the existing problems of interference management,mobile management and routing management in D2D/V2X communication could be effectively solved.Furthermore,it was also pointed out that the disconnection between the existing SD-D2D/V2X studies and the actual application needed to be overcome.…”
    Get full text
    Article
  17. 137

    Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI by Jingjie SHEN, Guangqiu LI, Yancui LUO, Huizhi LIU

    Published 2023-03-01
    “…The relay aided device to device (D2D) network can improve the spectrum efficiency of D2D users and the physical layer security of cellular user (CU) by sharing spectrum with the cellular network.To further improve their performance, transmit antenna selection can be used at the base station and the relay node of the D2D link, and full duplex technology can be used in the relay node.However, due to the feedback delay and mobility, the channel state information (CSI) used for the antenna selection of cellular link and all D2D links may be outdated.For the physical layer security and reliability in the above scenario, security model of a full duplex relay aided D2D network was proposed in the presence of active eavesdropping and outdated CSI, in which the base station and relay nodes both used transmit antenna selection.The closed-expressions for outage probability, ergodic capacity, probability of non-zero secrecy capacity, secure outage probability, asymptotic secure outage probability of relay aided D2D networks were derived.The numerical calculation and simulation results show that the more the number of base station transmit antennas and relay jamming antennas are, the better the CU security performance is.The outdated CSI will deteriorate the outage and security performance of CU.…”
    Get full text
    Article
  18. 138

    Enabling LTE and WiFi Coexisting in 5 GHz for Efficient Spectrum Utilization by Hongyu Sun, Zhiyi Fang, Qun Liu, Zheng Lu, Ting Zhu

    Published 2017-01-01
    “…Due to the increasing mobile traffic demands in cellular network, researchers have proposed the coexistence of LTE and WiFi technologies in 5 GHz unlicensed bands. …”
    Get full text
    Article
  19. 139

    Physical layer security of modify-and-forward cooperative D2D networks based on transmit antenna selection by LIU Huizhi, LI Guangqiu, ZHANG Yajuan, YE Mingzhu, GAO Hui

    Published 2024-04-01
    “…To further improve the physical layer security (PLS) performance of decode-and-forward (DF) cooperative device-to-device (D2D) network that shared spectrum resources with cellular network, a modify-and-forward (MF) cooperative D2D-cellular PLS model was proposed which the D2D transmitter adopted transmit antenna selection (TAS). …”
    Get full text
    Article
  20. 140

    Research on incentive mechanism for IoT based on mobile hotspot sharing by Huaizhe LIU, Lin GAO

    Published 2019-03-01
    “…Many devices in the Internet of things,especially energy-constrained sensor devices,often lack efficient network connectivity.If the networking method based on mobile hotspot sharing is adopted,large-area network coverage can be realized efficiently.The basic idea of the networking mode is to activate some mobile node in the cellular network (such as the holders of smart phones and other smart devices) to open mobile hotspot,provide Wi-Fi connections for resource-constrained node,and satisfy the communication needs of these node,so as to achieve efficient access to the mobile Internet.In this networking mode,how to encourage mobile users to contribute hotspot is the key.The incentive mechanism in mobile hotspot sharing network and the impact on network performance was studied mainly,and a novel incentive mechanism was designed to enable some users to obtain certain benefits by contributing Wi-Fi hotspot.Firstly,the optimal sharing decision of different types of users under the incentive mechanism and the influence of decision-making among different users were studied.Then,the evolution of user behavior,the overall state of the network with time and the equilibrium state of the system were analyzed.The simulation results show that under the equilibrium state of the system,the number of mobile hotspot contributors increases with the increase of free traffic ratio,which also leads to an increase in the number of hotspot.If the price of unit traffic is too high,the number of users will be reduced,which is not conducive to the operation of the network.In addition,compared with the non-hotspot sharing network,if the mobile hotspot sharing networking mode is adopted,the network performance can be increased by up to 148%.…”
    Get full text
    Article