[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 12 Dec 2024Bibliometrics
Skip Table Of Content Section
Review Articles
research-article
5G configured grant scheduling for seamless integration with TSN industrial networks
Abstract

The integration of 5G (5th Generation) and TSN (Time Sensitive Networking) networks is key for the support of emerging Industry 4.0 applications, where the flexibility and adaptability of 5G will be combined with the deterministic communications ...

Regular Articles
research-article
Experimental evaluation of interactive Edge/Cloud Virtual Reality gaming over Wi-Fi using unity render streaming
Abstract

Virtual Reality (VR) streaming enables end-users to seamlessly immerse themselves in interactive virtual environments using even low-end devices. However, the quality of the VR experience heavily relies on Wireless Fidelity (Wi-Fi) performance, ...

research-article
Learning-powered migration of social digital twins at the network edge
Abstract

Digital Twins (DTs), which are paired to Internet of Things (IoT) devices to represent them and augment their capabilities, are gaining ground as a promising technology to enable a wide variety of applications in the sixth-generation (6G) ...

research-article
On the optimal design of fully identifiable next-generation in-vehicle networks
Abstract

Due to the emerging advances in connected and autonomous vehicles, today’s in-vehicle networks, unlike traditional networks, are not only internally connected but externally as well, exposing the vehicle to the outside world and making it more ...

research-article
FQ-SAT: A fuzzy Q-learning-based MPQUIC scheduler for data transmission optimization
Abstract

In the 5G and beyond era, multipath transport protocols, including MPQUIC, are necessary in various use cases. In MPQUIC, one of the most critical issues is efficiently scheduling the upcoming transmission packets on several paths considering ...

research-article
DRTP: A generic Differentiated Reliable Transport Protocol
Abstract

With rapid development of network communications, the performance requirements of applications are getting more differentiated. Many applications like high-definition video transfer require high throughput but do tolerate occasional packet ...

research-article
Secure workflow scheduling algorithm utilizing hybrid optimization in mobile edge computing environments
Abstract

The rapid advancement of mobile communication technology and devices has greatly improved our way of life. It also presents a new possibility that data sources can be used to accomplish computing tasks at nearby locations. Mobile Edge Computing (...

research-article
Deep reinforcement learning-based resource scheduling for energy optimization and load balancing in SDN-driven edge computing
Abstract

Traditional techniques for edge computing resource scheduling may result in large amounts of wasted server resources and energy consumption; thus, exploring new approaches to achieve higher resource and energy efficiency is a new challenge. Deep ...

research-article
Attention-transfer-based path loss prediction in asymmetric massive MIMO IoT systems
Abstract

The asymmetric massive multiple-input–multiple-output (MIMO) array improves system capacity and provides wide-area coverage for the Internet of Things (IoT). In this paper, we propose a novel attention-based model for path loss (PL) prediction in ...

VSI: NSAI for Smart City
research-article
UAV-AGV cooperated remote toxic gas sensing and automated alarming scheme in smart factory
Abstract

This study introduces the innovative concepts of the cooperation between unmanned aerial vehicles (UAVs) and automated guided vehicles (AGVs) in remote toxic gas sensing and alarming schemes in a smart factory. Initially, the UAV is dispatched in ...

VSI: Secure Mobile Comms
research-article
Improved dynamic Byzantine Fault Tolerant consensus mechanism
Abstract

The Byzantine Fault Tolerance (BFT) consensus protocols are widely used in consortium blockchain to ensure data consistency. However, BFT protocols are generally static which means that the dynamic joining and exiting of nodes will lead to the ...

VSI: DRCN 2024
research-article
RIS-NOMA communications over Nakagami-m fading with imperfect successive interference cancellation
Abstract

Considering imperfect successive interference cancellation (SIC) for non-orthogonal multiple access (NOMA) communications, this work studies the cooperative reconfigurable intelligent surface (RIS)- and relay-assisted system under Nakagami-m ...

VSI: Real-time Analytics
research-article
aBBR: An augmented BBR for collaborative intelligent transmission over heterogeneous networks in IIoT
Abstract

In the era of Industry 5.0, with the deep convergence of Industrial Internet of Things (IIoT) and 5G technology, stable transmission of massive data in heterogeneous networks becomes crucial. This is not only the key to improving the efficiency ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.