Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access


    Cyber-Attack Detection and Mitigation Using SVM for 5G Network

    Sulaiman Yousef Alshunaifi, Shailendra Mishra*, Mohammed Alshehri

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 13-28, 2022, DOI:10.32604/iasc.2022.019121

    Abstract 5G technology is widely seen as a game-changer for the IT and telecommunications sectors. Benefits expected from 5G include lower latency, higher capacity, and greater levels of bandwidth. 5G also has the potential to provide additional bandwidth in terms of AI support, further increasing the benefits to the IT and telecom sectors. There are many security threats and organizational vulnerabilities that can be exploited by fraudsters to take over or damage corporate data. This research addresses cybersecurity issues and vulnerabilities in 4G(LTE) and 5G technology. The findings in this research were obtained by using primary and secondary data. Secondary data… More >

  • Open Access


    Resource Allocation and Optimization in Device-to-Device Communication 5G Networks

    Fahad Ahmed Al-Zahrani1, Imran Khan2, Mahdi Zareei3,*, Asim Zeb4, Abdul Waheed5,6

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1201-1214, 2021, DOI:10.32604/cmc.2021.018386

    Abstract The next-generation wireless networks are expected to provide higher capacity, system throughput with improved energy efficiency. One of the key technologies, to meet the demand for high-rate transmission, is device-to-device (D2D) communication which allows users who are close to communicating directly instead of transiting through base stations, and D2D communication users to share the cellular user chain under the control of the cellular network. As a new generation of cellular network technology, D2D communication technology has the advantages of improving spectrum resource utilization and improving system throughput and has become one of the key technologies that have been widely concerned… More >

  • Open Access


    Efficient Algorithms for Cache-Throughput Analysis in Cellular-D2D 5G Networks

    Nasreen Anjum1,*, Zhaohui Yang1, Imran Khan2, Mahreen Kiran3, Falin Wu4, Khaled Rabie5, Shikh Muhammad Bahaei1

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1759-1780, 2021, DOI:10.32604/cmc.2021.014635

    Abstract In this paper, we propose a two-tiered segment-based Device-to-Device (S-D2D) caching approach to decrease the startup and playback delay experienced by Video-on-Demand (VoD) users in a cellular network. In the S-D2D caching approach cache space of each mobile device is divided into two cache-blocks. The first cache-block reserve for caching and delivering the beginning portion of the most popular video files and the second cache-block caches the latter portion of the requested video files ‘fully or partially’ depending on the users’ video watching behaviour and popularity of videos. In this approach before caching, video is divided and grouped in a… More >

  • Open Access


    End-to-End Latency Evaluation of the Sat5G Network Based on Stochastic Network Calculus

    Huaifeng Shi1, Chengsheng Pan1, *, Li Yang2, Debin Wei2, Yunqing Shi3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1335-1348, 2020, DOI:10.32604/cmc.2020.011005

    Abstract Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time, reliability and capacity is an inherent feature of satellite-5G integrated network (Sat5G). However, there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latencysensitive service. To this end, we build a tandem model considering the connection relationship between the various components in Sat5G network architecture, and give an end-to-end latency calculation function based on this model. By introducing stochastic network calculus, we derive the relationship between the end-to-end latency bound and the violation probability considering the traffic characteristics… More >

Displaying 21-30 on page 3 of 24. Per Page