Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Optimal Resource Allocation Method for Device-to-Device Communication in 5G Networks

    Fahd N. Al-Wesabi1,2,*, Imran Khan3, Saleem Latteef Mohammed4, Huda Farooq Jameel4, Mohammad Alamgeer5, Ali M. Al-Sharafi6, Byung Seo Kim7

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1-15, 2022, DOI:10.32604/cmc.2022.018469 - 03 November 2021

    Abstract With the rapid development of the next-generation mobile network, the number of terminal devices and applications is growing explosively. Therefore, how to obtain a higher data rate, wider network coverage and higher resource utilization in the limited spectrum resources has become the common research goal of scholars. Device-to-Device (D2D) communication technology and other frontier communication technologies have emerged. Device-to-Device communication technology is the technology that devices in proximity can communicate directly in cellular networks. It has become one of the key technologies of the fifth-generation mobile communications system(5G). D2D communication technology which is introduced into… More >

  • Open Access

    ARTICLE

    An Intent-Driven Closed-Loop Platform for 5G Network Service Orchestration

    Talha Ahmed Khan, Khizar Abbas, Afaq Muhammad, Wang-Cheol Song*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4323-4340, 2022, DOI:10.32604/cmc.2022.017118 - 11 October 2021

    Abstract The scope of the 5G network is not only limited to the enhancements in the form of the quality of service (QoS), but it also includes a wide range of services with various requirements. Besides this, many approaches and platforms are under the umbrella of 5G to achieve the goals of end-to-end service provisioning. However, the management of multiple services over heterogeneous platforms is a complex task. Each platform and service have various requirements to be handled by domain experts. Still, if the next-generation network management is dependent on manual updates, it will become impossible… More >

  • Open Access

    ARTICLE

    Cyber-Attack Detection and Mitigation Using SVM for 5G Network

    Sulaiman Yousef Alshunaifi, Shailendra Mishra*, Mohammed Alshehri

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 13-28, 2022, DOI:10.32604/iasc.2022.019121 - 03 September 2021

    Abstract 5G technology is widely seen as a game-changer for the IT and telecommunications sectors. Benefits expected from 5G include lower latency, higher capacity, and greater levels of bandwidth. 5G also has the potential to provide additional bandwidth in terms of AI support, further increasing the benefits to the IT and telecom sectors. There are many security threats and organizational vulnerabilities that can be exploited by fraudsters to take over or damage corporate data. This research addresses cybersecurity issues and vulnerabilities in 4G(LTE) and 5G technology. The findings in this research were obtained by using primary… More >

  • Open Access

    ARTICLE

    Resource Allocation and Optimization in Device-to-Device Communication 5G Networks

    Fahad Ahmed Al-Zahrani1, Imran Khan2, Mahdi Zareei3,*, Asim Zeb4, Abdul Waheed5,6

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1201-1214, 2021, DOI:10.32604/cmc.2021.018386 - 04 June 2021

    Abstract The next-generation wireless networks are expected to provide higher capacity, system throughput with improved energy efficiency. One of the key technologies, to meet the demand for high-rate transmission, is device-to-device (D2D) communication which allows users who are close to communicating directly instead of transiting through base stations, and D2D communication users to share the cellular user chain under the control of the cellular network. As a new generation of cellular network technology, D2D communication technology has the advantages of improving spectrum resource utilization and improving system throughput and has become one of the key technologies… More >

  • Open Access

    ARTICLE

    Efficient Algorithms for Cache-Throughput Analysis in Cellular-D2D 5G Networks

    Nasreen Anjum1,*, Zhaohui Yang1, Imran Khan2, Mahreen Kiran3, Falin Wu4, Khaled Rabie5, Shikh Muhammad Bahaei1

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1759-1780, 2021, DOI:10.32604/cmc.2021.014635 - 05 February 2021

    Abstract In this paper, we propose a two-tiered segment-based Device-to-Device (S-D2D) caching approach to decrease the startup and playback delay experienced by Video-on-Demand (VoD) users in a cellular network. In the S-D2D caching approach cache space of each mobile device is divided into two cache-blocks. The first cache-block reserve for caching and delivering the beginning portion of the most popular video files and the second cache-block caches the latter portion of the requested video files ‘fully or partially’ depending on the users’ video watching behaviour and popularity of videos. In this approach before caching, video is… More >

  • Open Access

    ARTICLE

    End-to-End Latency Evaluation of the Sat5G Network Based on Stochastic Network Calculus

    Huaifeng Shi1, Chengsheng Pan1, *, Li Yang2, Debin Wei2, Yunqing Shi3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1335-1348, 2020, DOI:10.32604/cmc.2020.011005 - 20 August 2020

    Abstract Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time, reliability and capacity is an inherent feature of satellite-5G integrated network (Sat5G). However, there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latencysensitive service. To this end, we build a tandem model considering the connection relationship between the various components in Sat5G network architecture, and give an end-to-end latency calculation function based on this model. By introducing stochastic network calculus, we derive the relationship between the end-to-end latency bound and the violation More >

Displaying 21-30 on page 3 of 26. Per Page