-
361
Machine learning-based spectrum occupancy prediction: a comprehensive survey
Published 2025-01-01“…Traditional statistical methods for spectrum occupancy prediction (SOP) are insufficient for addressing the non-stationary nature of spectrum occupancy, especially with UEs’ increased mobility and diversity in the sixth-generation and beyond wireless networks. This survey provides a comprehensive overview of machine learning (ML)-based SOP methods that address these challenges. …”
Get full text
Article -
362
A Novel Analytical Framework Is Developed for Wireless Heterogeneous Networks for Video Streaming Applications
Published 2022-01-01“…Due to bandwidth and time limits, delivering high-quality video streaming facility offers real-time wireless networks, but assuring quality of experience (QoE) is rather difficult. …”
Get full text
Article -
363
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
Published 2013-01-01“…Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. …”
Get full text
Article -
364
Beyond Single-User Scheduling: Exploiting Massive MIMO for Concurrent Data Delivery With Minimum Age of Information
Published 2025-01-01“…With the emergence of real-time applications, modern wireless networks have witnessed the use of Age of Information (AoI) as a critical metric for evaluating the timeliness of data delivery. …”
Get full text
Article -
365
Live video transmission optimization mechanism based on edge intelligence in high client-density environment
Published 2023-11-01“…The traditional live video transmission optimization mechanism is deployed on the server side, which cannot quickly respond to the dynamic changes of the user’s wireless network environment.To address this problem, a live video transmission optimization mechanism based on edge intelligence called S-Edge was proposed.It was deployed on the OpenWrt-based wireless access point, and comprehensively utilized the wireless channel state information such as airtime utilization and signal-to-noise ratio to make intelligent decisions on terminal priority and transmission rate based on fuzzy logic theory.Furthermore, the active queue management with hierarchical token bucket and service demand-driven wireless transmission rate adaptive control technologies were introduced to realize the real-time scheduling of live video data.In order to verify the effectiveness and performance of the proposed mechanism, a high client-density environment was built through user clusters based on multi-radio interfaces in the real-world scenario.Experimental results show that S-Edge can significantly reduce the average delay and packet loss rate, which meets QoS requirements of live video transmission services in the high client-density environment.…”
Get full text
Article -
366
An Energy-Efficient Multi-User’s Resource Allocation Scheme
Published 2013-04-01“…In wireless environment,the increases in the number of users and the demand for a higher rate have triggered rapidly booming energy consumption at the base station.Therefore,energy efficient design in wireless network has become very essential.An energy efficient multi-user OFDM downlink resource allocation scheme was studied,using the distributed way.Firstly,according to user’s average channel gain and the minimum requirements of user’s bits,subcarriers were allocated,combined with the idea of proposed energy-efficient criterion.Then better channels were assigned to each user in accordance with each user’s allocated subcarrier numbers.Again each user’s average bits were assigned on the user’s allocated subcarriers and optimal adjustment using energy-efficient criterion had to be made to ensure the minimum power.The simulation results show that under the conditions of satisfying bit-error rate and transmission rate for users,the power can be reduced by 5~6 dB in the proposed algorithm,compared with the power in the static frequency division multiple access resource allocation.Furthermore,the power can be reduced by 2~4 dB,compared with the power in a existing classical distributed algorithm.…”
Get full text
Article -
367
Opportunistic routing algorithm based on trust model for ad hoc network
Published 2013-09-01“…Due to the absence of enough physical protection,dynamic topology,distributed collaboration,the limited bandwidth and computing ability in ad hoc network,traditional routing security mechanism cannot adapt to the design of routing protocols.Recently,opportunistic routing is of the research hotspots,which can cope with the unreliable transmissions to improve throughput of the whole network by exploiting the broadcast nature of the wireless medium and spatial diversity of multi-hop wireless network.The concept of trust-based similarity in opportunistic routing for ad hoc network was incorporated,and a novel trusted opportunistic forwarding model based on trust degree of node and least cost of opportunistic routing were also built.Then a trusted minimum cost routing algorithm (MCOR) was proposed and the correctness and effectiveness of this algorithm from theoretical ana ysis were proved.Finally,MCOR algorithm was verified by simulation and was compared with the classic protocols:ExOR,TAODV and Watchdog-DSR.The simulation results show that MCOR scheme can detect and mitigate node misbehaviors.Furthermore,MCOR scheme outperforms the other protocols in terms of throughput,delay,expected ETX and cost of routing.…”
Get full text
Article -
368
MAC mechanism based on link prediction and network coding
Published 2016-01-01“…In the protocol improved, high-level secondary nodes around the path determined is increased by the routing module using the cast nature of wireless networks that al-ready exists rationally, so that significantly increased the network coding opportunity, without many problems caused by the concentrating flows. …”
Get full text
Article -
369
V2X offloading and resource allocation under SDN and MEC architecture
Published 2020-01-01“…To address the serious problem of delay and energy consumption increase and service quality degradation caused by complex network status and huge amounts of computing data in the scenario of vehicle-to-everything (V2X),a vehicular network architecture combining mobile edge computing (MEC) and software defined network (SDN) was constructed.MEC sinks cloud serviced to the edge of the wireless network to compensate for the delay fluctuation caused by remote cloud computing.The SDN controller could sense network information from a global perspective,flexibly schedule resources,and control offload traffic.To further reduce the system overhead,a joint task offloading and resource allocation scheme was proposed.By modeling the MEC-based V2X offloading and resource allocation,the optimal offloading decision,communication and computing resource allocation scheme were derived.Considering the NP-hard attribute of the problem,Agglomerative Clustering was used to select the initial offloading node,and Q-learning was used for resource allocation.The offloading decision was modeled as an exact potential game,and the existence of Nash equilibrium was proved by the potential function structure.The simulation results show that,as compared to other mechanisms,the proposed mechanism can effectively reduce the system overhead.…”
Get full text
Article -
370
Bildung through social media
Published 2019-09-01“…After computers, wireless networks and smartphones has entered the scene we see teaching taking place in communicatively open classrooms with possibilities of interactional contact with “outsiders.” …”
Get full text
Article -
371
The Effectiveness of Hybrid Beamforming in Enhancing the Performance of NOMA-mmWave and Massive MIMO Systems
Published 2024-01-01“…As wireless networks evolve, the integration of Non-Orthogonal Multiple Access (NOMA), Massive Multiple Input Multiple Output (mMIMO), and millimeter wave (mmWave) technologies emerges as an effective approach to drive this advancement. …”
Get full text
Article -
372
Application of 5G to current differential protection of distribution network
Published 2020-02-01“…Driven by the strategy of grid as a Platform,Hub,and Sharing as well as the construction of Energy Internet and Ubiquitous power Internet of Things declared by Sate Grid Corporation of China,the intelligent distribution network evolves towards Distribution Internet of Things in a gridding and multi-source manner.The traditional distribution network protection and feeder automation barely meets the self-healing requirements of a strong distribution network.The current differential protection is prevailing due to its favorable quick-acting,sensitivity and selectivity.The existing communication solutions baring protection signals includes:fiber channel,230MHz/1.8GHz private wireless network,etc.However,the above methods are usually costly and perhaps with poor stability and low real-time performance.An realistic baring scheme for current differential protection of distribution network over the fifth generation communication system (5G) was proposed,where the of sampling data transmission between differential protection devices was realized based on 5G new radio technology.Thanks to the advantages of low latency,high capacity,security,etc.,5G-based differential protection can dynamically adjust the configuration to accommodate the topology changes,and thus can reduce the transformation and maintenance cost of distribution network.…”
Get full text
Article -
373
Distortion Optimized Packet Scheduling and Prioritization of Multiple Video Streams over 802.11e Networks
Published 2007-01-01“…This paper presents a generic framework solution for minimizing video distortion of all multiple video streams transmitted over 802.11e wireless networks, including intelligent packet scheduling and channel access differentiation mechanisms. …”
Get full text
Article -
374
A New Routing Protocol with High Energy Efficiency and Reliability for Data Delivery in Mobile Ad Hoc Networks
Published 2015-08-01“…The proliferation of mobile devices has changed the trends by which people access and share contents in the communication world, leading to migration from the wired to wireless networks with high expectations of ubiquitous connectivity. …”
Get full text
Article -
375
Building end to end service guarantee system of IoT covering“terminal pipe and cloud” based on signaling big data
Published 2018-06-01“…With the evolution of wireless communication service types to massive,large connections,small traffic scenarios,mobile Internet has marched into the Internet of things.Carrying on business networking wireless network deployment in communication operators,which provides a wealth of industry applications also enable operators facing huge end-to-end backward challenges to business.An end to end service guarantee system based on the signaling big data and covering the “terminal pipe and cloud” was proposed and constructed,and the six network dimensions in the user,terminal,wireless,transmission,core network and digital network was solved,as well as the four stages of network access,service access,network switching,and service quality of six dimensions and four stages facing the Internet of things.In order to solve the problem of inter professional collaboration and demarcation,the assistant operator completes the transformation from the traditional KPI (key performance indicator) index mode to the service aware KQI (key quality indicator) end to end full process business guarantee mechanism,and provides the end to end full process one key positioning ability guarantee for the Internet of things applications.…”
Get full text
Article -
376
Reconfigurable Intelligent Surfaces Between the Reality and Imagination
Published 2024-06-01“…Still, RIS is going to be big in the next generation of wireless networks. A great deal of excitement has enveloped the whole 6G development industry. …”
Get full text
Article -
377
Design of Interference-Resilient Medium Access for High Throughput WLANs
Published 2015-10-01“…In this paper, we analyze a protocol strategy for managing multiple access in wireless networks. A network of sensors colocated with the WLAN terminals forms a control layer for managing the medium access and scheduling resources in order to limit collisions and optimize the WLAN data traffic; this control layer is based on a low-power wideband technology characterized by interference robustness, like CDMA (code division multiple access) or UWB (ultra-wideband) for sensors. …”
Get full text
Article -
378
Deep-learning enabled generalized inverse design of multi-port radio-frequency and sub-terahertz passives and integrated circuits
Published 2024-12-01“…Abstract Millimeter-wave and terahertz integrated circuits and chips are expected to serve as the backbone for future wireless networks and high resolution sensing. However, design of these integrated circuits and chips can be quite complex, requiring years of human expertise, careful tailoring of hand crafted circuit topologies and co-design with parameterized and pre-selected templates of electromagnetic structures. …”
Get full text
Article -
379
Spatial Multiple Description Coding for Scalable Video Streams
Published 2014-01-01“…However, packet losses which are frequent in wireless networks can cause a mismatch during the reconstruction in the receiver end and result in an accumulation of errors which deteriorates the quality of the delivered video. …”
Get full text
Article -
380
A Novel Scheduling Algorithm Based on Game Theory and Multicriteria Decision Making in LTE Network
Published 2015-03-01“…Fourth generation wireless networks provide mobile users with high data rate and quality of services, such as Long Term Evolution (LTE), which has been developed by the 3rd Generation Partnership Project (3GPP). …”
Get full text
Article