Private 5G networks: a survey on enabling technologies, deployment models, use cases and research directions
Today’s modern enterprises are adjusting to new realities of connectivity. As companies become more distributed and autonomous, emerging applications demand more bandwidth, low latency, more spectrum, and higher reliability. 5G technology can aid ...
A novel and smarter model to authenticate and identify people intelligently for security purposes
In recent years, security concerns, including document fraud and identity theft, terrorism, and cybercrime have led to the growth and development of biometric technologies, and in general, all activities related to biometric research have gained ...
An improved high performance clustering based routing protocol for wireless sensor networks in IoT
The Internet of Things encompasses applications such as ecological, medicinal, and defense surveillance that need real-time data collecting and standardization.Wireless sensor networks are essential in this scenario as an inclusive environment ...
Performance analysis and optimization of a hybrid TSR–PSR protocol for AF, DF and hybrid AF–DF relaying under Weibull fading
In this paper, a generalized Interference-aided radio frequency energy harvesting (EH) cooperative network has been presented under Weibull faded environment. The performance analysis of the system in terms of Throughput and Outage Probability for ...
Radio resource management for device to device communication using S and V shaped transfer functions
Device-to-device (D2D) communication has become a key complementary technology in emerging next-generation communication paradigm. It offers a number potential use cases including peer to peer communication, cellular offloading, device-relaying ...
RSSI-based Hybrid Centroid-K-Nearest Neighbors localization method
Various ambient intelligent environment applications are based on location-based services. To obtain the location, many popular localization methods use the Received-Signal-Strength-Indicator (RSSI) measurement, as it can be obtained from almost ...
Statistical analysis of the Middleton Class-A noise effects on multi-carrier OFDM-based communication system
This paper addresses the effects of Middleton Class-A noise on a binary OFDM-based communication system and proposes a full theoretical study of its statistics. The simulation approach for the Class-A noise, which confirms a previous research work,...
Encrypted speech authentication and recovery scheme based on fragile watermarking
In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery, an encrypted speech authentication ...
Resource allocation for UAV-assisted 5G mMTC slicing networks using deep reinforcement learning
The Internet of Things (IoT) application scenarios is becoming extensive due to the quick evolution of smart devices with fifth-generation (5G) network slicing technologies. Hence, IoTs are becoming significantly important in 5G/6G networks. ...
Beamforming based algorithm for 5G applications
5G applications such as the Internet of Things, high-resolution video streaming, robotic cars, smart cities, and telehealth care have a universal presence nowadays. These applications mandate higher data rates, large bandwidth, increased capacity, ...