Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (42)
  • Open Access

    ARTICLE

    An Optimized Algorithm for D2D-MIMO 5G Wireless Networks

    Shahid Bashir1, Imran Khan2, Fahd N. Al-Wesabi3, Nadhem Nemri3, Ammar Zahary4, Quang Ngoc Nguyen5,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3029-3044, 2021, DOI:10.32604/cmc.2021.017015

    Abstract The device-to-device (D2D) networking technology is extended to the conventional cellular network to boost the communication efficiency of the entire network, forming a heterogeneous 5G and beyond (B5G) communication network. D2D communication in a cellular cell will boost the efficiency of the spectrum, increase the ability of the device, and reduce the communication burden of base stations through the sharing of approved cell resources, causing serious interference as well. The device-to-device (D2D) networking technology is extended to the conventional cellular network to boost the communication efficiency of the entire network, forming a heterogeneous 5G communication network. D2D communication in a… More >

  • Open Access

    ARTICLE

    Interference Mitigation in D2D Communication Underlying Cellular Networks: Towards Green Energy

    Rana Zeeshan Ahamad1, Abdul Rehman Javed2,*, Shakir Mehmood3, Mohammad Zubair Khan4, Abdulfattah Noorwali5, Muhammad Rizwan6

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 45-58, 2021, DOI:10.32604/cmc.2021.016082

    Abstract Device to Device (D2D) communication is emerging as a new participant promising technology in 5G cellular networks to promote green energy networks. D2D communication can improve communication delays, spectral efficiency, system capacity, data off-loading, and many other fruitful scenarios where D2D can be implemented. Nevertheless, induction of D2D communication in reuse mode with the conventional cellular network can cause severe interference issues, which can significantly degrade network performance. To reap all the benefits of induction of D2D communication with conventional cellular communication, it is imperative to minimize interference’s detrimental effects. Efficient power control can minimize the negative effects of interference… More >

  • Open Access

    ARTICLE

    Towards Interference-Aware ZigBee Transmissions in Heterogeneous Wireless Networks

    Sangsoon Lim1, Sanghyun Seo2,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 751-765, 2021, DOI:10.32604/cmc.2020.013430

    Abstract Cross-technology interference (CTI) from diverse wireless networks such as ZigBee, Bluetooth, and Wi-Fi has become a severe problem in the 2.4 GHz Industrial Scientific and Medical (ISM) band. Especially, low power and lossy networks are vulnerable to the signal interferences from other aggressive wireless networks when they perform low power operations to conserve the energy consumption. This paper presents CoSense, which accurately detects ZigBee signals with a reliable signal correlation scheme in the presence of the CTI. The key concept of CoSense is to reduce false wake-ups of low power listening (LPL) by identifying the pre-defined ZigBee signatures. Our scheme… More >

  • Open Access

    ARTICLE

    Fingerprint-Based Millimeter-Wave Beam Selection for Interference Mitigation in Beamspace Multi-User MIMO Communications

    Sangmi Moon1, Hyeonsung Kim1, Seng-Phil Hong2, Mingoo Kang3, Intae Hwang1,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 59-70, 2021, DOI:10.32604/cmc.2020.013132

    Abstract Millimeter-wave communications are suitable for application to massive multiple-input multiple-output systems in order to satisfy the ever-growing data traffic demands of the next-generation wireless communication. However, their practical deployment is hindered by the high cost of complex hardware, such as radio frequency (RF) chains. To this end, operation in the beamspace domain, through beam selection, is a viable solution. Generally, the conventional beam selection schemes focus on the feedback and exhaustive search techniques. In addition, since the same beam in the beamspace may be assigned to a different user, conventional beam selection schemes suffer serious multi-user interference. In addition, some… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intelligent CR-NOMA Model for Industrial IoT Communications

    Yinghua Zhang1,2, Jian Liu1, Yunfeng Peng1, Yanfang Dong2, Changming Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 239-257, 2020, DOI:10.32604/cmes.2020.010778

    Abstract Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things (IIoT) applications, this paper studies a simple cognitive radio non-orthogonal multiple access (CR-NOMA) downlink system. This system consists of two secondary users (SUs) dynamically interfered by the primary user (PU), and its performance is characterized by the outage probability of the SU communications. This outage probability is calculated under two conditions where, a) the transmission of PU starts after the channel state information (CSI) is acquired, so the base station (BS) is oblivious of the interference, and b) when the BS is aware of the PU interference, and… More >

  • Open Access

    ARTICLE

    Information Flow Security Models for Cloud Computing

    Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2687-2705, 2020, DOI:10.32604/cmc.2020.011232

    Abstract Cloud computing provides services to users through Internet. This open mode not only facilitates the access by users, but also brings potential security risks. In cloud computing, the risk of data leakage exists between users and virtual machines. Whether direct or indirect data leakage, it can be regarded as illegal information flow. Methods, such as access control models can control the information flow, but not the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture. Typical noninterference models are not suitable to certificate information flow in… More >

  • Open Access

    ARTICLE

    Pipeline Scheduling Based on Constructive Interference in Strip Wireless Sensor Networks

    Xiangmao Chang1, 2, *, Xiaoxiang Xu1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 193-206, 2020, DOI:10.32604/cmc.2020.08183

    Abstract Strip Wireless Sensor Networks (SWSNs) have drawn much attention in many applications such as monitoring rivers, highways and coal mines. Packet delivery in SWSN usually requires a large number of multi-hop transmissions which leads to long transmission latency in low-duty-cycle SWSNs. Several pipeline scheduling schemes have been proposed to reduce latency. However, when communication links are unreliable, pipeline scheduling is prone to failure. In this paper, we propose a pipeline scheduling transmission protocol based on constructive interference. The protocol first divides the whole network into multiple partitions and uses a pipelined mechanism to allocate active time slots for each partition.… More >

  • Open Access

    ARTICLE

    Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism

    Lei Wang1, Jian Liu1, Changming Zhao2, 3, *, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 401-416, 2020, DOI:10.32604/cmc.2020.06680

    Abstract In this paper, we investigate the performance of secondary transmission scheme based on Markov ON-OFF state of primary users in Underlay cognitive radio networks. We propose flexible secondary cooperative transmission schemewith interference cancellation technique according to the ON-OFF status of primary transmitter. For maximal ratio combining (MRC) at destination, we have derived exact closed-form expressions of the outage probability in different situations. The numerical simulation results also reveal that the proposed scheme improve the secondary transmission performance compared with traditional mechanism in terms of secondary outage probability and energy efficiency. More >

  • Open Access

    ARTICLE

    Performance Analysis of Relay Based NOMA Cooperative Transmission under Cognitive Radio Network

    Yinghua Zhang1, 2, Jian Liu1, *, Yunfeng Peng1, Yanfang Dong2, Guozhong Sun2, Hao Huang3, Changming Zhao4, 5

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 197-212, 2020, DOI:10.32604/cmc.2020.07059

    Abstract This paper proposes a hybrid spectrum accessing mechanism by using NOMA-based cooperative transmission and beam-forming technology. In this mechanism, the secondary user employs spectrum-sensing technology to detect the existence of the primary user. If the primary user does not exist, the secondary source user directly transmits data to the destination user. If the primary user exists, the secondary source user finds the optimal relay according to certain selection principle before transmitting data to the destination user through the chosen relay node. For the signal receiving stage, the secondary user takes use of beam-forming technology to receive the signal from both… More >

  • Open Access

    ARTICLE

    Cooperative Relay Selection Mechanism in Multi-Hop Networks

    Jian Liu1, Lei Wang1, Changming Zhao2, 3, *, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 119-130, 2020, DOI:10.32604/cmc.2020.06074

    Abstract In this paper, we consider a three-hop relay system based on interference cancellation technique in Underlay cognitive radio (CR) network. Although underlay CR has been shown as a promising technique to better utilize the source of primary users (PUs), its secondary performance will be severely degraded. On one hand, by adapting the Underlay spectrum sharing pattern, secondary users (SUs) would observe the strict power constraints and be interfered by primary users. On the other hand, limited transmit power results in limited transmission range, which greatly degrade the secondary transmission capacity. To solve the problems above, we propose an interference cancellation… More >

Displaying 21-30 on page 3 of 42. Per Page