Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (58)
  • Open Access

    ARTICLE

    Fingerprint-Based Millimeter-Wave Beam Selection for Interference Mitigation in Beamspace Multi-User MIMO Communications

    Sangmi Moon1, Hyeonsung Kim1, Seng-Phil Hong2, Mingoo Kang3, Intae Hwang1,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 59-70, 2021, DOI:10.32604/cmc.2020.013132

    Abstract Millimeter-wave communications are suitable for application to massive multiple-input multiple-output systems in order to satisfy the ever-growing data traffic demands of the next-generation wireless communication. However, their practical deployment is hindered by the high cost of complex hardware, such as radio frequency (RF) chains. To this end, operation in the beamspace domain, through beam selection, is a viable solution. Generally, the conventional beam selection schemes focus on the feedback and exhaustive search techniques. In addition, since the same beam in the beamspace may be assigned to a different user, conventional beam selection schemes suffer serious multi-user interference. In addition, some… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intelligent CR-NOMA Model for Industrial IoT Communications

    Yinghua Zhang1,2, Jian Liu1, Yunfeng Peng1, Yanfang Dong2, Changming Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 239-257, 2020, DOI:10.32604/cmes.2020.010778

    Abstract Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things (IIoT) applications, this paper studies a simple cognitive radio non-orthogonal multiple access (CR-NOMA) downlink system. This system consists of two secondary users (SUs) dynamically interfered by the primary user (PU), and its performance is characterized by the outage probability of the SU communications. This outage probability is calculated under two conditions where, a) the transmission of PU starts after the channel state information (CSI) is acquired, so the base station (BS) is oblivious of the interference, and b) when the BS is aware of the PU interference, and… More >

  • Open Access

    ARTICLE

    A Robust Resource Allocation Scheme for Device-to-Device Communications Based on Q-Learning

    Azka Amin1, Xihua Liu2, Imran Khan3, Peerapong Uthansakul4, *, Masoud Forsat5, Seyed Sajad Mirjavadi5

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1487-1505, 2020, DOI:10.32604/cmc.2020.011749

    Abstract One of the most effective technology for the 5G mobile communications is Device-to-device (D2D) communication which is also called terminal pass-through technology. It can directly communicate between devices under the control of a base station and does not require a base station to forward it. The advantages of applying D2D communication technology to cellular networks are: It can increase the communication system capacity, improve the system spectrum efficiency, increase the data transmission rate, and reduce the base station load. Aiming at the problem of co-channel interference between the D2D and cellular users, this paper proposes an efficient algorithm for resource… More >

  • Open Access

    ARTICLE

    Cyber-security Risk Assessment Framework for Critical Infrastructures

    Zubair Baig1, Sherali Zeadally2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 121-129, 2019, DOI:10.31209/2018.100000049

    Abstract A critical infrastructure provides essential services to a nation’s population. Interruptions in its smooth operations are highly undesirable because they will cause significant and devastating consequences on all stakeholders in the society. In order to provide sustained protection to a nation’s critical infrastructure, we must continually assess and evaluate the risks thereof. We propose a risk assessment framework that can evaluate the risks posed to the security of a critical infrastructure from threat agents, with a special emphasis on the smart grid communications infrastructure. The framework defines finegrained risk identification to help quantify and assess exploitable vulnerabilities within a critical… More >

  • Open Access

    ABSTRACT

    Sensing Traction Force Induces Cell-Cell Distant Communications for the Rapid Network Assembly of Airway Smooth Muscle Cells

    Mingxing Ouyang1,*, Zhili Qian1, Yang Jin1, Linhong Deng1

    Molecular & Cellular Biomechanics, Vol.16, Suppl.2, pp. 65-65, 2019, DOI:10.32604/mcb.2019.06642

    Abstract The collective functions at cell population level rely on cell-cell communications with or without direct contacts [1-3]. The long-range biomechanical force propagating across certain scales far beyond single cell size may reserve the capability to trigger coordinative biological responses within cell population [3-5]. Whether and how cells communicate with each other mechanically in a distant manner remains largely to be explored. Airway smooth muscle (ASM) cells are one crucial component in providing mechanical support and contraction force for the bronchial tubes in respiratory system, whereas the mechanical property of ASM is also associated with asthma attack, and during airway hyper-responsiveness,… More >

  • Open Access

    ARTICLE

    Joint Spectrum Partition and Performance Analysis of Full-Duplex D2D Communications in Multi-Tier Wireless Networks

    Yueping Wang1,*, Xuan Zhang2, Yixuan Zhang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 171-184, 2019, DOI:10.32604/cmc.2019.06204

    Abstract Full-duplex (FD) has been recognized as a promising technology for future 5G networks to improve the spectrum efficiency. However, the biggest practical impediments of realizing full-duplex communications are the presence of self-interference, especially in complex cellular networks. With the current development of self-interference cancellation techniques, full-duplex has been considered to be more suitable for device-to-device (D2D) and small cell communications which have small transmission range and low transmit power. In this paper, we consider the full-duplex D2D communications in multi-tier wireless networks and present an analytical model which jointly considers mode selection, resource allocation, and power control. Specifically, we consider… More >

  • Open Access

    ARTICLE

    Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications

    Shanshan Yu1, Ju Liu1,*, Xiaoqing Zhang1, Shangbin Wu2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 505-516, 2019, DOI:10.32604/cmc.2019.04282

    Abstract Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services. The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP) method. Next, in the defined relay selection area, we propose a secure relay selection… More >

  • Open Access

    ARTICLE

    Controlled Cyclic Remote State Preparation of Arbitrary Qubit States

    Mingming Wang1,2,*, Chen Yang1, Reza Mousoli3

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 321-329, 2018, DOI:10.3970/cmc.2018.02064

    Abstract Quantum secure communications could securely transmit quantum information by using quantum resource. Recently, novel applications such as bidirectional and asymmetric quantum protocols have been developed. In this paper, we propose a new method for generating entanglement which is highly useful for multiparty quantum communications such as teleportation and Remote State Preparation (RSP). As one of its applications, we propose a new type of quantum secure communications, i.e. cyclic RSP protocols. Starting from a four-party controlled cyclic RSP protocol of one-qubit states, we show that this cyclic protocol can be generalized to a multiparty controlled cyclic RSP protocol for preparation of… More >

Displaying 51-60 on page 6 of 58. Per Page