Search results for "5g"
showing 10 items of 97 documents
Combinatorial Optimization for Artificial Intelligence Enabled Mobile Network Automation
2021
This chapter discusses combinatorial optimization techniques for enabling intelligent automation in mobile networks. A number of discrete optimization problems pertinent to mobile network automation can be solved effectively using artificial intelligence based combinatorial optimization approaches such as heuristics and metaheuristics. Relevant use-cases include both initial parameter assignment during network roll-out, and continuous optimization of configuration management parameters during network operation and maintenance. We discuss mobile network automation use-cases and motivation for using different heuristics and metaheuristics in designing network optimization algorithms. To this …
The New Era of Business Digitization through the Implementation of 5G Technology in Romania
2021
The main objective of the present research is to identify the advantages and benefits that the use and implementation of 5G technology has on the development and evolution of the Romanian business environment. The study is based on a theoretical documentation regarding existing information in the field and a descriptive analysis of the evolution of the technology in Romania and worldwide. The research method chosen is a survey based on an opinion poll (questionnaire) to find out the availability of economic entities regarding the implementation of 5G technologies, the foreseen expectations and those realized by the business environment regarding the effects of 5G technologies on the economi…
Rate-Splitting Random Access Mechanism for Massive Machine Type Communications in 5G Cellular Internet-of-Things
2021
The cellular Internet-of-Things has resulted in the deployment of millions of machine-type communication (MTC) devices. These massive number of devices must communicate with a single gNodeB (gNB) via the random access channel (RACH) mechanism. However, existing RACH mechanisms are inefficient when dealing with such large number of devices. To address this issue, we propose the rate-splitting random access (RSRA) mechanism, which uses rate splitting and decoding in rate-splitting multiple access (RSMA) to improve RACH success rates. The proposed mechanism divides the message into common and private messages and enhances the decoding performance. We demonstrate, using extensive simulations, t…
Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study
2016
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…
Deformation quantization of covariant fields
2002
After sketching recent advances and subtleties in classical relativistically covariant field theories, we give in this short Note some indications as to how the deformation quantization approach can be used to solve or at least give a better understanding of their quantization.
Improving RF Fingerprinting Methods by Means of D2D Communication Protocol
2019
Radio Frequency (RF) fingerprinting is widely applied for indoor positioning due to the existing Wi-Fi infrastructure present in most indoor spaces (home, work, leisure, among others) and the widespread usage of smartphones everywhere. It corresponds to a simple idea, the signal signature in a location tends to be stable over the time. Therefore, with the signals received from multiple APs, a unique fingerprint can be created. However, the Wi-Fi signal is affected by many factors which degrade the positioning error range to around a few meters. This paper introduces a collaborative method based on device-to-device (D2D) communication to improve the positioning accuracy using only fingerprin…
A Trusted Hybrid Learning Approach to Secure Edge Computing
2021
Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…
An Overview of 5G Slicing Operational Business Models for Internet of Vehicles, Maritime IoT Applications and Connectivity Solutions
2021
Identification of ecosystems and Business Models (BM) is an important starting point for new complex system development. The definition of actor (or stakeholder) roles and their interactions (at both business and technical levels), together with target scenarios and use cases, provide essential input information for further system requirement collection and architecture specification. The powerful and flexible Fifth Generation (5G) network slicing technology, which is capable of creating virtually isolated and logically parallel networks, enables a large range of complex services and vertical applications. Although various terminologies and models have been proposed in recent years for BMs …
A Green Mesh Routers' Placement to Ensure Small Cells Backhauling in 5G Networks
2017
International audience; The wireless industry is preparing the fifth generation wireless systems with several requirements regarding capacity and coverage area. A promising solution to meet this challenge is a densification of the network via a large scale deployment of small cells from different sizes. The advantage here is that small cells are easy to deploy and cost-efficient compared to macro base stations. However, the challenge is to ensure a reliable backhaul links. Mesh routers backhauling is one of the candidate solutions here, since it is easy to deploy, doesn't use wired connections between locations and cost-efficient. Nevertheless, the issue is to deploy routers in the suitable…
Multi-Connectivity in 5G and Beyond Non-Terrestrial Networks
2022
The Fifth Generation (5G) communications systems aim to serve such service classes as Ultra-Reliable Low Latency Communications (URLLC), enhanced Mobile Broadband (eMBB), and massive Machine-Type Communications (mMTC). To meet the growing requirements posed to mobile networks, satellites can be used to complement the Terrestrial Networks (TNs). To increase the efficiency of the satellite communications involved, bandwidth-efficient techniques should be used. Multi- Connectivity (MC) is one such technique. In MC, a User Equipment (UE), for example, a smartphone, can be connected to multiple Next Generation Node Bs (gNBs) simultaneously. In this paper, an adaptive MC activation scheme for thr…