[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 14 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Massive MIMO CSI reconstruction using CNN‐LSTM and attention mechanism

In massive multiple‐input multiple‐output (MIMO) systems, the channel state information (CSI) feedback enables performance gain in frequency division duplex networks. However, with the increase in the number of antennas, the feedback overhead of CSI will ...

research-article
Joint beamforming and power allocation using deep learning for D2D communication in heterogeneous networks

Device‐to‐device (D2D) communication plays a significant role in cellular networks as it can increase the capacity, spectrum efficiency and energy efficiency of the system. However, the large computational complexity of D2D resource management ...

research-article
Machine learning‐based models for spectrum sensing in cooperative radio networks

In this study, the authors consider the application of machine learning (ML) models in cooperative spectrum sensing of cognitive radio networks (CRNs). Based on a statistical analysis of the classic energy detection scheme, the probability of detection ...

review-article
Survey on cognitive anti‐jamming communications

In this study, the authors review various jamming and anti‐jamming strategies in the context of cognitive radios (CRs). The study explores different jamming models and classifies them according to their functionality. Furthermore, a study of jamming ...

research-article
Rollout algorithm for light‐weight physical‐layer authentication in cognitive radio networks

Cognitive radio networks (CRNs) are vulnerable to spoofing attacks due to their wireless and cognitive nature. Since the traditional cryptographic authentication can hardly prevent such attacks in CRNs, the physical‐layer authentication has been ...

research-article
Enhanced physical layer security for cognitive radio systems through joint spectrum access and power allocation

Physical layer (PHY) security is an important issue in wireless communication systems. In this study, the authors investigate the interactions between the PHY security performance and the spectrum access technique in a cooperative cognitive radio (CR) ...

research-article
Improvement in the performance of mobile/hidden secondary users in multi‐user CRN

In a multi‐user cognitive radio network (CRN), mobile or hidden secondary users (SUs) are present. Conventionally, such SUs utilize rigid threshold value (λ) for spectrum sensing (SS). When these SUs perform SS, they receive poor quality signals from ...

research-article
SDN‐enabled Cognitive Radio Network Architecture

In this study, a new network architecture based on the software‐defined networking (SDN) approach is proposed for cognitive radio networks (CRNs). The proposed network architecture [software‐defined cognitive radio (SDCR)] assumes the responsibilities of ...

research-article
Joint resource allocation for dynamic cellular‐enabled UAVs communication

Emerging cellular‐enabled unmanned aerial vehicles (UAVs) communication poses both opportunities and challenges to the current research of UAV applications. On the one hand, the advanced cellular technologies and authentication mechanisms make significant ...

research-article
3D deterministic ray tracing method for massive MIMO channel modelling and parameters extraction

Geometric stochastic method and deterministic ray tracing method are two common methods of modelling massive multiple‐input multiple‐output (MIMO) channels. The former has high computational efficiency but a large number of input parameters need to be ...

research-article
Downlink data transmission for high‐speed trains in 5G communication systems

In this study, a new transmitter–receiver approach for high‐speed train (HST) downlink orthogonal frequency division multiplexing (OFDM) data transmission and detection in fifth generation (5G) communication systems is proposed. The proposed method uses a ...

research-article
Improving accuracy of wireless sensor networks localisation based on communication ranging

Localisation is one of the most important services in sensor networks. The impact of the used localisation technique used reflects on wireless sensor network services such as coverage or event detection. Accuracy is considered to be one of the factors ...

research-article
Performance enhancement of hybrid‐SIM for optical wireless downlink communication with aperture averaging and receiver diversity

Error performance of hybrid subcarrier intensity modulation (hybrid‐SIM) in optical free‐space satellite downlink has been studied in this work. Bit error rate (BER) is improved by aperture averaging and spatial receiver diversity and it is found out be ...

research-article
Delay aware scheduling in UAV‐enabled OFDMA mobile edge computing system

In infrastructure‐less scenarios such as rural environments, wild emergency response, military applications and disaster relief, unmanned aerial vehicles (UAVs) are capable of providing enhanced mobile edge computing (MEC) services for ground users. ...

research-article
Enhancing multi‐tenancy security in the cloud computing using hybrid ECC‐based data encryption approach

In this study, elliptic curve cryptography (ECC) is elected for tenant authentication, data encryption, and data decryption due to its minimum key size. The proposed ECC‐based authentication approach allows the authorised person to access private data; it ...

research-article
Cross‐layer resource allocation for critical MTC coexistent with human‐type communications in LTE: a two‐sided matching approach

Cellular systems present one of the most suitable wireless technologies to efficiently serve critical machine‐type communications (MTC) that require strict quality‐of‐service (QoS) guarantees. Therefore, ultra‐reliable and low‐latency communications is a ...

research-article
Design and implementation of reinforcement learning‐based intelligent jamming system

Here the intelligent jammer issue is studied. With the rapid development of cognitive radio technology, current cognitive terminals can adaptively or intelligently switch channel by spectrum sensing and decision‐making. Most of the traditional jamming ...

research-article
Multi‐objective emperor penguin handover optimisation for IEEE 802.21 in heterogeneous networks

IEEE concentrates on the development of effective media independent handover (IEEE 802.21 MIH) services. The major aim of IEEE 802.21 MIH is to optimise the handover process to make an uninterrupted handover service with less delay. The handover process ...

research-article
Energy efficient discontinuous reception strategy in LTE and beyond using an adaptive packet queuing technique

The next generation of mobile communication systems is being developed for high‐bandwidth mobile networks to accommodate applications with high data rates and low delay requirements such as voice over internet protocol, video streaming, cyber‐physical ...

research-article
Distributed M‐ary hypothesis testing for decision fusion in multiple‐input multiple‐output wireless sensor networks

In this study, the authors study binary decision fusion over a shared Rayleigh fading channel with multiple antennas at the decision fusion centre (DFC) in wireless sensor networks. Three fusion rules are derived for the DFC in the case of distributed M‐...

research-article
Low‐complexity PTS schemes for PAPR reduction in OFDM systems

For original partial transmit sequence (O‐PTS), the conjugate operations can be applied to achieve the purpose of ameliorating the peak‐to‐average power ratio (PAPR) performance. But in this way, an observation has been found that some of these candidate ...

research-article
Fine‐grained CSI fingerprinting for indoor localisation using convolutional neural network

As an important positioning source of indoor positioning technology, Wi‐Fi signals have attracted the attention of researchers for a long time. Fingerprint positioning can solve the problems caused by non‐line‐of‐sight propagation and multipath effects. ...

research-article
C&O charging: a hybrid wireless charging method for the mine internet of things

Most nodes of Mine Internet of Things (Mine IoT) are powered by batteries, and wireless charging using mobile chargers (MCs) is an effective way to make nodes work sustainably. A novel hybrid charging method combining the controlled and opportunistic MCs (...

research-article
Energy‐aware dynamic‐link load balancing method for a software‐defined network using a multi‐objective artificial bee colony algorithm and genetic operators

Information and communication technology (ICT) is one of the sectors that have the highest energy consumption worldwide. It implies that the use of energy in the ICT must be controlled. A software‐defined network (SDN) is a new technology in computer ...

research-article
Generic evaluation of FSO system over Málaga turbulence channel with MPPM and non‐zero‐boresight pointing errors

Free space optical (FSO) communication channels are affected by fluctuations in irradiance due to atmospheric turbulence and pointing errors. Recently, a generalized statistical model knows as Málaga (M) was developed to describe irradiance fluctuations ...

Subjects

Currently Not Available

Comments

Please enable JavaScript to view thecomments powered by Disqus.