Search results for "5g"

showing 10 items of 97 documents

Combinatorial Optimization for Artificial Intelligence Enabled Mobile Network Automation

2021

This chapter discusses combinatorial optimization techniques for enabling intelligent automation in mobile networks. A number of discrete optimization problems pertinent to mobile network automation can be solved effectively using artificial intelligence based combinatorial optimization approaches such as heuristics and metaheuristics. Relevant use-cases include both initial parameter assignment during network roll-out, and continuous optimization of configuration management parameters during network operation and maintenance. We discuss mobile network automation use-cases and motivation for using different heuristics and metaheuristics in designing network optimization algorithms. To this …

Continuous optimizationComputer sciencebusiness.industryCellular networkCombinatorial optimizationArtificial intelligenceHeuristicsbusinessAssignment problemMetaheuristic5GNetwork model
researchProduct

The New Era of Business Digitization through the Implementation of 5G Technology in Romania

2021

The main objective of the present research is to identify the advantages and benefits that the use and implementation of 5G technology has on the development and evolution of the Romanian business environment. The study is based on a theoretical documentation regarding existing information in the field and a descriptive analysis of the evolution of the technology in Romania and worldwide. The research method chosen is a survey based on an opinion poll (questionnaire) to find out the availability of economic entities regarding the implementation of 5G technologies, the foreseen expectations and those realized by the business environment regarding the effects of 5G technologies on the economi…

Environmental effects of industries and plantsRenewable Energy Sustainability and the EnvironmentGeography Planning and DevelopmentTJ807-830big data analyticsManagement Monitoring Policy and LawIndustry 4.0artificial intelligenceTD194-1955G; Industry 4.0; artificial intelligence; machine learning; virtual reality; big data analytics; internet of thingsRenewable energy sourcesEnvironmental sciencesmachine learningvirtual realityGE1-3505GSustainability
researchProduct

Rate-Splitting Random Access Mechanism for Massive Machine Type Communications in 5G Cellular Internet-of-Things

2021

The cellular Internet-of-Things has resulted in the deployment of millions of machine-type communication (MTC) devices. These massive number of devices must communicate with a single gNodeB (gNB) via the random access channel (RACH) mechanism. However, existing RACH mechanisms are inefficient when dealing with such large number of devices. To address this issue, we propose the rate-splitting random access (RSRA) mechanism, which uses rate splitting and decoding in rate-splitting multiple access (RSMA) to improve RACH success rates. The proposed mechanism divides the message into common and private messages and enhances the decoding performance. We demonstrate, using extensive simulations, t…

FOS: Computer and information sciencesbusiness.industryMechanism (biology)Computer scienceComputer Science - Information TheoryInformation Theory (cs.IT)Type (model theory)Random-access channelSoftware deploymentInternet of Thingsbusiness5GRandom accessDecoding methodsComputer network2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

Deformation quantization of covariant fields

2002

After sketching recent advances and subtleties in classical relativistically covariant field theories, we give in this short Note some indications as to how the deformation quantization approach can be used to solve or at least give a better understanding of their quantization.

High Energy Physics - Theory[MATH.MATH-QA] Mathematics [math]/Quantum Algebra [math.QA][ MATH.MATH-QA ] Mathematics [math]/Quantum Algebra [math.QA][PHYS.HTHE]Physics [physics]/High Energy Physics - Theory [hep-th]010102 general mathematicsFOS: Physical sciences01 natural sciences[ PHYS.HTHE ] Physics [physics]/High Energy Physics - Theory [hep-th]MSC: 53D55 81T70 81R20 35G25deformation quantizationnonlinear representationsHigh Energy Physics - Theory (hep-th)53D55 81T70 81R20 35G250103 physical sciencesMathematics - Quantum Algebra[MATH.MATH-QA]Mathematics [math]/Quantum Algebra [math.QA]FOS: MathematicsQuantum Algebra (math.QA)[PHYS.HTHE] Physics [physics]/High Energy Physics - Theory [hep-th]010307 mathematical physics0101 mathematicsquantum field theory
researchProduct

Improving RF Fingerprinting Methods by Means of D2D Communication Protocol

2019

Radio Frequency (RF) fingerprinting is widely applied for indoor positioning due to the existing Wi-Fi infrastructure present in most indoor spaces (home, work, leisure, among others) and the widespread usage of smartphones everywhere. It corresponds to a simple idea, the signal signature in a location tends to be stable over the time. Therefore, with the signals received from multiple APs, a unique fingerprint can be created. However, the Wi-Fi signal is affected by many factors which degrade the positioning error range to around a few meters. This paper introduces a collaborative method based on device-to-device (D2D) communication to improve the positioning accuracy using only fingerprin…

Indoor positioningComputer Networks and CommunicationsComputer scienceReal-time computinglcsh:TK7800-83605G-tekniikkaD2D02 engineering and technologyRF fingerprintingSignal0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringRFIDSIMPLE (military communications protocol)ta213etätunnistuslcsh:ElectronicsFingerprint (computing)indoor positioning020206 networking & telecommunicationsSignature (logic)RF FingerprintingHardware and ArchitectureControl and Systems EngineeringsisätilapaikannusSignal Processing020201 artificial intelligence & image processingRadio frequencyCommunications protocol5G5G
researchProduct

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

An Overview of 5G Slicing Operational Business Models for Internet of Vehicles, Maritime IoT Applications and Connectivity Solutions

2021

Identification of ecosystems and Business Models (BM) is an important starting point for new complex system development. The definition of actor (or stakeholder) roles and their interactions (at both business and technical levels), together with target scenarios and use cases, provide essential input information for further system requirement collection and architecture specification. The powerful and flexible Fifth Generation (5G) network slicing technology, which is capable of creating virtually isolated and logically parallel networks, enables a large range of complex services and vertical applications. Although various terminologies and models have been proposed in recent years for BMs …

IoTIoV/V2XService (systems architecture)network slicingGeneral Computer ScienceScope (project management)Standardizationbusiness.industryComputer sciencebusiness models/operational business modelGeneral EngineeringBusiness modelTK1-9971System requirementsIdentification (information)Systems engineeringGeneral Materials ScienceThe InternetUse caseElectrical engineering. Electronics. Nuclear engineeringstakeholder/actors and rolesbusiness5GIEEE Access
researchProduct

A Green Mesh Routers' Placement to Ensure Small Cells Backhauling in 5G Networks

2017

International audience; The wireless industry is preparing the fifth generation wireless systems with several requirements regarding capacity and coverage area. A promising solution to meet this challenge is a densification of the network via a large scale deployment of small cells from different sizes. The advantage here is that small cells are easy to deploy and cost-efficient compared to macro base stations. However, the challenge is to ensure a reliable backhaul links. Mesh routers backhauling is one of the candidate solutions here, since it is easy to deploy, doesn't use wired connections between locations and cost-efficient. Nevertheless, the issue is to deploy routers in the suitable…

Load modelingSolar panelsComputer sciencebusiness.industryWireless communicationBase stations020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyGreen products7. Clean energyBackhaul (telecommunications)[SPI]Engineering Sciences [physics]Base stationSolar energy0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessInterferencebusiness5GComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

Multi-Connectivity in 5G and Beyond Non-Terrestrial Networks

2022

The Fifth Generation (5G) communications systems aim to serve such service classes as Ultra-Reliable Low Latency Communications (URLLC), enhanced Mobile Broadband (eMBB), and massive Machine-Type Communications (mMTC). To meet the growing requirements posed to mobile networks, satellites can be used to complement the Terrestrial Networks (TNs). To increase the efficiency of the satellite communications involved, bandwidth-efficient techniques should be used. Multi- Connectivity (MC) is one such technique. In MC, a User Equipment (UE), for example, a smartphone, can be connected to multiple Next Generation Node Bs (gNBs) simultaneously. In this paper, an adaptive MC activation scheme for thr…

Low Earth Orbit (LEO) satellite3rd Generation Partnership Project (3GPP) standardization; 6G; Beyond 5G (B5G); Low Earth Orbit (LEO) satellite; satellite network simulator; throughput enhancement5G-tekniikkamatkaviestinverkottietoliikenneverkotsatellite network simulator3rd Generation Partnership Project (3GPP) standardizationtietoliikennealgoritmittietoliikennejärjestelmätlangaton viestintäBeyond 5G (B5G)Electrical and Electronic Engineeringtietoliikennetekniikkathroughput enhancementsatelliittiviestintäSoftware6GJournal of Communications Software and Systems
researchProduct