Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access


    Game Theory-Based IoT Efficient Power Control in Cognitive UAV

    Fadhil Mukhlif1,*, Norafida Ithnin1, Omar B. Abdulghafoor2, Faiz Alotaibi3, Nourah Saad Alotaibi4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1561-1578, 2022, DOI:10.32604/cmc.2022.026074

    Abstract With the help of network densification, network coverage as well as the throughput can be improved via ultra-dense networks (UDNs). In tandem, Unmanned Aerial Vehicle (UAV) communications have recently garnered much attention because of their high agility as well as widespread applications. In this paper, a cognitive UAV is proposed for wireless nodes power pertaining to the IoT ground terminal. Further, the UAV is included in the IoT system as the source of power for the wireless nodes as well as for resource allocation. The quality of service (QoS) related to the cognitive node was considered as a utility function… More >

  • Open Access


    HARQ Optimization for PDCP Duplication-Based 5G URLLC Dual Connectivity

    Changsung Lee1,3, Junsung Kim2,3, Jaewook Jung3, Jungsuk Baik3, Jong-Moon Chung3,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 727-738, 2022, DOI:10.32604/cmc.2022.024824

    Abstract Packet duplication (PD) with dual connectivity (DC) was newly introduced in the 5G New Radio (NR) specifications to meet the stringent ultra reliable low latency communication (URLLC) requirements. PD technology uses duplicated packets in the packet data convergence protocol (PDCP) layer that are transmitted via two different access nodes (ANs) to the user equipment (UE) in order to enhance the reliability performance. However, PD can result in unnecessary retransmissions in the lower layers since the hybrid automatic retransmission request (HARQ) operation is unaware of the transmission success achieved through the alternate DC link to the UE. To overcome this issue,… More >

  • Open Access


    Feature Selection Based on IoT Aware QDA Node Authentication in 5G Networks

    M. P. Haripriya*, P. Venkadesh

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 825-836, 2022, DOI:10.32604/iasc.2022.022940

    Abstract The coming generation in mobile networks is the fifth generation (5G), which appears to be the promoter of the upcoming digital world. 5G is defined by a single piece of cellular access technology or a combination of advanced access technologies. Rather, 5G is a true network assembler that provides consistent support for a slew of novel network topologies. Prior generations provide as a suitable starting point and give support for the security architecture for 5G security. Through authentication and cryptography techniques, many works have tackled the security issues in 3G and 4G networks in an effective manner. However, security of… More >

  • Open Access


    Greedy-Genetic Algorithm Based Video Data Scheduling Over 5G Networks

    E. Elamaran1,*, B. Sudhakar2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1467-1477, 2022, DOI:10.32604/iasc.2022.020625

    Abstract Essential components in wireless systems are schedulin and resource allocation. The problems in scheduling refers to inactive users in a given time slot and in terms of resource allocation it refers to the issues in the allocation of physical layer resources such as power and bandwidth among the active users. In the Long Time Evolution (LTE) downlink scheduling the optimized problem refers to the flow deadlines that incorporate the formulation in the surveyed scheduling algorithm for achieving enhanced performance levels. The major challenges appear in the areas of quality and bandwidth constrains in the video processing sectors in 5G. The… More >

  • Open Access


    Optimizing Energy Conservation in V2X Communications for 5G Networks

    Arif Husen1,2, Abid Soahil1,*, Mohammad Hijji2, Muhammad Hasanain Chaudary1, Farooq Ahmed1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3479-3495, 2022, DOI:10.32604/cmc.2022.023840

    Abstract The smart vehicles are one of critical enablers for automated services in smart cities to provide intelligent transportation means without human intervention. In order to fulfil requirements, Vehicle-to-Anything(V2X) communications aims to manage massive connectivity and high traffic load on base stations and extend the range over multiple hops in 5G networks. However, V2X networking faces several challenges from dynamic topology caused by high velocity of nodes and routing overhead that degrades the network performance and increases energy consumption. The existing routing scheme for V2X networking lacks energy efficiency and scalability for high velocity nodes with dense distribution. In order to… More >

  • Open Access


    Optimal Resource Allocation Method for Device-to-Device Communication in 5G Networks

    Fahd N. Al-Wesabi1,2,*, Imran Khan3, Saleem Latteef Mohammed4, Huda Farooq Jameel4, Mohammad Alamgeer5, Ali M. Al-Sharafi6, Byung Seo Kim7

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1-15, 2022, DOI:10.32604/cmc.2022.018469

    Abstract With the rapid development of the next-generation mobile network, the number of terminal devices and applications is growing explosively. Therefore, how to obtain a higher data rate, wider network coverage and higher resource utilization in the limited spectrum resources has become the common research goal of scholars. Device-to-Device (D2D) communication technology and other frontier communication technologies have emerged. Device-to-Device communication technology is the technology that devices in proximity can communicate directly in cellular networks. It has become one of the key technologies of the fifth-generation mobile communications system(5G). D2D communication technology which is introduced into cellular networks can effectively improve… More >

  • Open Access


    Resource Allocation and Optimization in Device-to-Device Communication 5G Networks

    Fahad Ahmed Al-Zahrani1, Imran Khan2, Mahdi Zareei3,*, Asim Zeb4, Abdul Waheed5,6

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1201-1214, 2021, DOI:10.32604/cmc.2021.018386

    Abstract The next-generation wireless networks are expected to provide higher capacity, system throughput with improved energy efficiency. One of the key technologies, to meet the demand for high-rate transmission, is device-to-device (D2D) communication which allows users who are close to communicating directly instead of transiting through base stations, and D2D communication users to share the cellular user chain under the control of the cellular network. As a new generation of cellular network technology, D2D communication technology has the advantages of improving spectrum resource utilization and improving system throughput and has become one of the key technologies that have been widely concerned… More >

  • Open Access


    Efficient Algorithms for Cache-Throughput Analysis in Cellular-D2D 5G Networks

    Nasreen Anjum1,*, Zhaohui Yang1, Imran Khan2, Mahreen Kiran3, Falin Wu4, Khaled Rabie5, Shikh Muhammad Bahaei1

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1759-1780, 2021, DOI:10.32604/cmc.2021.014635

    Abstract In this paper, we propose a two-tiered segment-based Device-to-Device (S-D2D) caching approach to decrease the startup and playback delay experienced by Video-on-Demand (VoD) users in a cellular network. In the S-D2D caching approach cache space of each mobile device is divided into two cache-blocks. The first cache-block reserve for caching and delivering the beginning portion of the most popular video files and the second cache-block caches the latter portion of the requested video files ‘fully or partially’ depending on the users’ video watching behaviour and popularity of videos. In this approach before caching, video is divided and grouped in a… More >

Displaying 11-20 on page 2 of 18. Per Page