Mobile ad-hoc networks (MANET) is a network mode that does not depend on network infrastructure and central access. The fast and flexible networking mode of MANET renders its wide applications in specific scenarios. However, rapidly changing topology and open channels bring potential security problems. In this paper, we proposed an active-routing a...
|
One major advantage of cloud/centralized radio access network (C-RAN) is the ease of implementation of multicell coordination mechanisms to improve the system spectrum efficiency (SE). Theoretically, large number of cooperative cells lead to a higher SE, however, it may also cause significant delay due to extra channel state information (CSI) feedb...
|
Network embedding assigns nodes in a network to low dimensional representations and effectively preserves the network structure. Recently, a significant amount of progresses have been made toward this emerging network analysis paradigm. In this survey, we focus on categorizing and then reviewing the current development on network embedding methods,...
|
This article investigates the basic design principles for a new Wireless Network Operating System (WNOS), a radically different approach to software-defined networking (SDN) for infrastructure-less wireless networks. Departing from well understood approaches inspired by Open Flow, WNOS provides the network designer with an abstraction hiding (i) th...
|
The integration of multi-access edge computing (MEC) and RAFT consensus makes it feasible to deploy blockchain on trustful base stations and gateways to provide efficient and tamper-proof edge data services for Internet of Things (IoT) applications. However, reducing the latency of storing data on blockchain remains a challenge, especially when an ...
|
Broadcasting is an essential operation for the source node to disseminate the message to all other nodes in the network. Unfortunately, the problem of Minimum Latency Broadcast Scheduling (MLBS) in duty-cycled wireless networks is not well studied. In existing works, the construction of broadcast tree and the scheduling of transmissions are conduct...
|
This work conceives the robust linear transceivers for the estimation of an unknown vector parameter in a coherent multiple access channel (MAC)-based multiple-input multiple-output (MIMO) multi-sensor network under imperfect channel state information (CSI) at the fusion center (FC). Both the popular stochastic (S-) and norm ball CSI uncertainty (N...
|
This paper considers wireless link scheduling in a new setting: nodes with Energy Harvesting (EH) as well as energy sharing capabilities. We propose a Mixed Integer Linear Program (MILP) to determine 1) the shortest link schedule, whereby active links in the same slot adhere to the physical interference model; 2) the optimal transmission power of a...
|
A novel carrier sense multiple access strategy with collision avoidance (CSMA/CA) balancing contention probability and channel access time is proposed. The approach can be applied to any context where the computational simplicity of the MAC must be preferred to the complexity of the channel access strategy. Our MAC, called Delay-Collision CSMA (DC-...
|
Federated Learning (FL) is a distributed learning framework that can deal with the distributed issue in machine learning and still guarantee high learning performance. However, it is impractical that all users will sacrifice their resources to join the FL algorithm. This motivates us to study the incentive mechanism design for FL. In this paper, we...
|
In this paper, a multiple cluster-based transmission diversity scheme is proposed for asynchronous joint transmissions (JT) in private networks. The use of multiple clusters or small cells is adopted to reduce the transmission distance to users thereby increasing data-rates and reducing latency. To further increase the spectral efficiency and achie...
|
This article presented a single-phase shaded-pole induction motor (SPIM) system, which aims to work in an isolated environment. Compared with the previous wireless SPIM, this system employs less controlled switches and can work at full-resonant condition, while retaining the merit of secondary controllerless. The key is to employ a half-bridge inve...
|
As the core count in shared-memory manycores keeps increasing, it is becoming increasingly harder to design cache-coherence protocols that deliver high performance without an inordinate increase in complexity and cost. In particular, sharing patterns where a group of cores frequently reads and writes a shared variable are hard to support efficientl...
|
This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...
|
An optimal precoder design is conceived for the decentralized estimation of an unknown spatially as well as temporally correlated parameter vector in a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) based wireless sensor network (WSN). Furthermore, exploiting the temporal correlation present in the parameter...
|
This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
|
We consider the downlink of an unmanned aerial vehicle (UAV) assisted cellular network consisting of multiple cooperative UAVs, whose operations are coordinated by a central ground controller using wireless fronthaul links, to serve multiple ground user equipments (UEs). A problem of jointly designing UAVs’ positions, transmit beamforming, as well ...
|
In this paper, we consider a wireless-powered communication network (WPCN) where one mobile hybrid access point (HAP) coordinates the wireless energy transfer to sensor nodes and receives data from sensor nodes, which are powered exclusively by the harvested wireless energy. As the harvest-then-transmit protocol is employed by sensor nodes, a major...
|
Research efforts in trust evaluation has evolved to provide security in Wireless Sensor Networks (WSNs), while being dependent on external parameters and network topology. Existing node level trust evaluation in WSNs evaluate trust over 1-hop assuring trustworthiness of an immediate node. This paper proposes trust evaluation using the intrinsic pro...
|
This paper is concerned with the security problem of Time of Arrival (ToA) based localization schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses on defending against external attacks, especially under cooperative external attackers. The prior scheme for defending against the attacks in the localization scheme ...
|
Intelligent reflecting surface (IRS) is a new and promising paradigm to substantially improve the spectral and energy efficiency of wireless networks, by constructing favorable communication channels via tuning massive low-cost passive reflecting elements. Despite recent advances in the link-level performance optimization for various IRS-aided wire...
|
Unmanned aerial vehicles (UAVs) have extensive civilian and military applications, but establishing a UAV network providing high data rate communications with low delay is a challenge. Millimeter wave (mmWave), with its high bandwidth nature, can be adopted in the UAV network to achieve high speed data transfer. However, it is difficult to establis...
|
The flexibility offered by reconfigurable wireless networks, provide new opportunities for various applications such as online AR/VR gaming, high-quality video streaming and autonomous vehicles, that desire high-bandwidth, reliable and low-latency communications. These applications come with very stringent Quality of Service (QoS) requirements and ...
|
In this paper, we consider an unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) network, where the UAV is responsible for sustaining the network with all devices on the ground. The sustainable charge process operates periodically, i.e., in each working period, the UAV flies from and back to a landing position. The initial remainin...
|
This paper proposes a communication strategy for decentralized learning in wireless systems that employs adaptive modulation and coding capability. The main objective of this work is to address a critical issue in decentralized learning based on the cooperative stochastic gradient descent (C-SGD) over wireless systems: the relationship between the ...
|
Wireless sensor networks (WSN) allow to exchange information and to take immediate and remote actions in natural, industrial, military or domestic environment systems. These networks are vulnerable to cyber-attacks, hence, they are vulnerable to being intercepted, interrupted or modified. However, for the last twenty years, the amount of informatio...
|
Telecommunication service providers have to guarantee acceptable speech quality during a phone call to avoid a negative impact on the users' quality of experience. Currently, there are different speech quality assessment methods. ITU-T Recommendation G.107 describes the E-model algorithm, which is a computational model developed for network plannin...
|
In ultra-dense networks, the increasing popularity of computation intensive applications imposes challenges to the resource-constrained smart mobile devices (SMDs), which may be solved by offloading these computation tasks to the nearby mobile edge computing centers. However, when massive SMDs offload computation tasks in a dynamic wireless environ...
|
This paper investigates adaptive streaming of one or multiple tiled 360 videos from a multi-antenna base station (BS) to one or multiple single-antenna users, respectively, in a multi-carrier wireless system. We aim to maximize the video quality while keeping rebuffering time small via encoding rate adaptation at each group of pictures (GOP) and tr...
|
This paper investigates a futuristic spectrum sharing paradigm for heterogeneous wireless networks with imperfect channels. In the heterogeneous networks, multiple wireless networks adopt different medium access control (MAC) protocols to share a common wireless spectrum and each network is unaware of the MACs of others. This paper aims to design a...
|
In application scenarios such as Internet of Things, a large number of energy receivers (ERs) exist and line-of-sight (LOS) propagation could be common. Considering this, we investigate wireless energy transfer (WET) in extra-large massive MIMO Rician channels. We derive analytical expressions of the received net energy for different schemes, inclu...
|
Wireless Ad Hoc Networks are self-organizing networks deployed without any centralized infrastructure. Flooding based Denial-of-Service (DoS) attacks were targeting the constrained resources of mobile nodes as well as the network. Route Request (RREQ) flooding attack is one of the prominent DoS attacks launched from the network layer in which the a...
|
Energy supplies, spectrum resources, and transmission overheads of wireless nodes are the bottlenecks in decentralized networks (e.g., device-to-device communication networks). In this paper, we study the total power minimization problem of secondary users (SUs) for a multiuser simultaneous wireless information and power transfer-based cognitive ad...
|
In this paper, we propose a covert wireless uplink transmission strategy in space-air-ground integrated vehicular networks, where the source vehicle transmits its own message over the channel that being used by the host communication system, to avoid being detected by the warden. It is obvious that the data transmission efficiency of the covert com...
|
Future of massive Internet-of-things (IoT) and low latency applications hinges on delivering fresh information on time. Thus, to analyse data freshness for time critical use cases in future networks, the age of information (AoI) measure is introduced. Besides, energy harvesting is also essential to improve energy sustainability and lifetime of a po...
|
Unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) has recently emerged as a promising technique to provide sustainable energy supply for widely distributed low-power ground devices (GDs) in large-scale wireless networks. Compared with the energy transmitters (ETs) in conventional WPT systems which are deployed at fixed locations, ...
|
This paper investigates the performance of a wireless network that consists of two pairs of transmitter-receiver sharing the same channel, modeled using two coupled queues. In this analysis, we use the power metric P , defined as the ratio of throughput and mean delay, to understand the compromise between these two metrics. We show that, when the u...
|
In this paper, we consider the problem of scheduling real-time traffic in wireless networks under a conflict-graph interference model and single-hop traffic. The objective is to guarantee that at least a certain fraction of packets of each link are delivered within their deadlines, which is referred to as delivery ratio . This problem has been stud...
|
This article proposes and evaluates a technique to predict the level of interference in wireless networks. We design a recursive predictor that estimates future interference values by filtering measured interference at a given location. The predictor’s parameterization is done offline by translating the autocorrelation of interference into an autor...
|
This paper investigates the problem of resource allocation for a wireless communication network with distributed reconfigurable intelligent surfaces (RISs). In this network, multiple RISs are spatially distributed to serve wireless users and the energy efficiency of the network is maximized by dynamically controlling the on-off status of each RIS a...
|
Limited backhaul bandwidth and blockage effects are two main factors limiting the practical deployment of millimeter wave (mmWave) networks. To tackle these issues, we study the feasibility of relaying as well as caching in mmWave networks. A user association and relaying (UAR) criterion dependent on both caching status and maximum biased received ...
|
In the past two decades, wireless sensor networks (WSNs) and their applications have been the topic of many studies. Different multi-sensor nodes are used to collect, process and distribute data over wireless links to perform different tasks such as smart detection, target tracking, node localization, etc. In this article, the problem of distribute...
|
We consider a wireless-powered ad hoc network with clustered Power Beacons (PBs). The wireless-powered transmitters (WP-Txs) only activate stochastically deployed PBs within the circles centered at their locations. The PBs transmit radio frequency (RF) signals, which are harvested by the WP-Txs to transmit information to their target receivers. The...
|
Wireless charging coupled with computation offloading in edge networks offers a promising solution for realizing power-hungry and computation intensive applications on user-devices. We consider a multi-access edge computing (MEC) system with collocated MEC server and base-station/access point (AP), each equipped with a massive MIMO antenna array, s...
|
Replacing base stations with unmanned aerial vehicles (UAVs) to serve the communication of ground users has attracted a lot of attention recently. In this paper, we study the joint resource allocation and UAV trajectory optimization for maximizing the total energy efficiency in UAV-based non-orthogonal multiple access (NOMA) downlink wireless netwo...
|
Coded caching is a technique that promises significant reductions in network traffic by exploiting the multicast opportunities among multiple cache-enabled users. Most works in this area investigate the fundamental performance limits of coded caching from an information-theoretic perspective. In this paper, from a practical perspective, we focus on...
|
This paper presents a cost-effective, ultra-low-power and highly sensitive wake-up receiver (WuRX) to reduce overall power consumption of Wireless Sensor Networks (WSN). The proposed tuned radio frequency (TRF) receiver (RX) analogue front-end (AFE) incorporates a 400-MHz, low-power, low-noise amplifier (LNA) with a high voltage gain of 50 dB as we...
|
Traditional ground wireless communication networks cannot provide high-quality services for artificial intelligence (AI) applications such as intelligent transportation systems (ITS) due to deployment, coverage and capacity issues. The space-air-ground integrated network (SAGIN) has become a research focus in the industry. Compared with traditional...
|
This study exploits a quantum neural network (QNN) for resource allocation in wireless communications. A QNN is presented to reduce time complexity while still maintaining performance. Moreover, a reinforcement-learning-inspired QNN (RL-QNN) is presented to improve the performance. Quantum circuit design of the QNN is presented to ensure the practi...
|
Network Function Virtualization is a key technology that enables network operators to provide diverse communication services flexibly over a common infrastructure, resulting in a significantly reduced cost. This paper addresses the problem of optimal network function virtualization for providing multicast services in wireless mesh networks with min...
|
In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...
|
Radio access network (RAN) slicing is a virtualization technology that partitions radio resources into multiple autonomous virtual networks. Since RAN slicing can be tailored to provide diverse performance requirements, it will be pivotal to achieve the high-throughput and low-latency communications that next-generation (5G) systems have long yearn...
|
Intelligent network management for reconfigurable wireless networks such as 5G and beyond applications is crucial for many industrial applications, and has been the subject of ongoing research. This paper proposes an Artificial Intelligence(AI)-Assisted energy-efficient and intelligent routing, based on both energy efficiency prioritization and AI ...
|
Clock synchronization is crucial for applications in wireless sensor networks, such as event scheduling and data fusion. In practical wireless networks, environmental changes cause the oscillator to be imperfect. Thus, it is necessary to track the nonlinear varying clock dynamically. In this paper, we propose a timestamp-free clock skew (frequency ...
|
Many Internet of Things smart-* applications are being powered solely through ambient energy-harvested energy. These applications require periodic data collection with low latency and high reliability. Since the energy is harvested in small amounts from ambient sources and is stochastic in nature, it is extremely challenging to achieve low latency ...
|
The network control plays a vital role in the mega satellite constellation (MSC) to coordinate massive network nodes to ensure the effectiveness and reliability of operations and services for future space wireless communications networks. One of the critical issues in satellite network control is how to design an optimal network control structure (...
|
Wireless Sensors Networks (WSN) is the self-configured wireless network which consists of a huge measure of resource-restrained Sensor Nodes (SN). In WSN, the key parameters are effectual energy utilization and security. The adversary could send false information because of the Malicious Nodes' (MNs') presence. Thus, to shun security threats, it is...
|
Unmanned aerial vehicles (UAVs) are anticipated to be integrated into the next generation wireless networks as new aerial mobile nodes, which can provide various live streaming applications such as surveillance, reconnaissance, etc. For such applications, due to the dynamic characteristics of traffic and wireless channels, how to guarantee the qual...
|
Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...
|
This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...
|
In wireless multi-hop networks, a fundamental problem is to disseminate continuous data traffic from a source node to all other network nodes, which is known as the broadcast problem. Such a problem becomes even more complicated in wireless multi-hop networks with energy-harvesting capabilities at nodes when facing the interaction between stochasti...
|
This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes. Individual nodes decide their optimal states with distributed coordination among other nodes through randomly varying backhaul links. This poses a technical challenge in distri...
|
This paper describes systems, devices, and methods to implement a bi-directional integrated inter-tower wireless communications network (IITWCN). The described technology can be implemented in combination with the Broadcast Core Network (BCN) in next generation broadcast eco-system and, therefore, support new business cases for broadcast operators ...
|
In this paper, the impact of imperfect beam alignment (IBA) on millimeter wave (mmWave) wireless power transfer (WPT) is investigated. We consider a mmWave WPT network, where the location of the energy transmitters follows a Poisson point process. Instead of the mostly used flat-top antenna model, we adopt the Gaussian antenna model suggested by th...
|
Nowadays transceiver-free (also referred to as device-free) localization using Received Signal Strength (RSS) is a hot topic for researchers due to its widespread applicability. However, RSS is easily affected by the indoor environment, resulting in a dense deployment of reference nodes. Some hybrid systems have already been proposed to help RSS lo...
|
Wireless charging is an attractive technology that often promises increased mobility for electrical devices. However, commonly-available wireless charging systems are generally intolerant to misalignment between the charger and the receiving device due to the need for inductive coupling between the two, defeating the promise of mobility. Many techn...
|
A swarm of Autonomous Underwater Vehicles (AUVs) can provide richer spatial-temporal information than the traditional single-robot system, which can be used for underwater mapping, exploration, target tracking, among others. However, the limitation of AUVs’ battery cannot support persistent services, which restricts AUVs’ operating range and missio...
|
In the coming 6G communications, network densification, high throughput, positioning accuracy, energy efficiency, and many other key performance indicator requirements are becoming increasingly strict. In the future, how to improve work efficiency while saving costs is one of the foremost research directions in wireless communications. Being able t...
|
Recently, wireless edge networks have realized intelligent operation and management with edge artificial intelligence (AI) techniques (i.e., federated edge learning). However, the trustworthiness and effective incentive mechanisms of federated edge learning (FEL) have not been fully studied. Thus, the current FEL framework will still suffer untrust...
|
We study federated learning (FL) at the wireless edge, where power-limited devices with local datasets collaboratively train a joint model with the help of a remote parameter server (PS). We assume that the devices are connected to the PS through a bandwidth-limited shared wireless channel. At each iteration of FL, a subset of the devices are sched...
|
Wireless Multimedia Sensor Network (WMSN) is increasingly being deployed for surveillance, monitoring and Internet-of-Things (IoT) sensing applications where a set of cameras capture and compress local images and then transmit the data to a remote controller. Such captured local images may also be compressed in a multi-view fashion to reduce the re...
|
This paper presents an integrated ultra-low-power (ULP) wireless sensor system-on-chip (SoC) that can be used for voltage sensing in both Internet of Things applications and bio-potential monitoring. In order to increase the energy efficiency of the analog front-end (AFE), we propose a noise and power efficient push-pull low noise instrumentation a...
|
Recently, wireless powered cooperative cognitive radio networks (CRNs), which combine the technologies of radio frequency (RF) energy harvesting and CR, have drawn great attention. In such networks, energy cooperation between the cognitive users (CUs) and the wireless powered primary users (PUs) can be performed, where the CUs can charge the PUs wi...
|
The excessive use of nodes and communication links in a wireless control system (WCS) causes unnecessary utilization of resources. In this article, a strategic topological formation is studied for a WCS, where a previously proposed topology consisting of a plant system, a controller system, and an intermediate network system is further developed. M...
|
Next generation wireless systems have witnessed significant R&D attention from academia and industries to enable wide range of applications for connected environment around us. The technical design of next generation wireless systems in terms of relay and transmit power control is very critical due to the ever-reducing size of these sensor enabled ...
|
This paper deals with the problem of achieving finite-time max-consensus in a multi-agent system that communicates over a fading wireless channel. A key feature of the wireless channel is the superposition (or broadcast) property. In traditional wireless communication systems, the superposition property is usually undesired since it might cause int...
|
Intelligent reflecting surface (IRS) is an enabling technology to engineer the radio signal propagation in wireless networks. By smartly tuning the signal reflection via a large number of low-cost passive reflecting elements, IRS is capable of dynamically altering wireless channels to enhance the communication performance. It is thus expected that ...
|
This correspondence studies resource allocation for a wireless-powered relay network, where a hybrid relay with constant energy supply assists an energy-constrained source to send confidential information to a destination in the presence of an eavesdropper. We propose a novel transmission protocol termed charge-then-cooperate to support secure comm...
|
Underwater wireless sensor networks (UWSNs) have emerged as an enabling technology for aquatic monitoring. However, data delivery in UWSNs is challenging, due to the harsh aquatic environment and characteristics of the underwater acoustic channel. In recent years, underwater nodes with multi-modal communication capabilities have been proposed to cr...
|
The multi-hop protocols are proved effective in the railway disaster wireless monitoring system. However, farther transmission distance with the larger data will decline the valid lifetime and reliability of the system. Most existing studies focused primarily on the communication protocols optimization, and some works tried to utilize the limited c...
|
To perform large-scale monitoring of sensitive events, energy harvesting wireless sensor network is considered where a mobile data sink MS collects data while travelling on a fixed path Pms. The sensor nodes sense environmental data continuously at a pre-specified rate. The sensors close to Pms are referred as gateways. Sensors forward their data t...
|
Communicating over multi-hop connections simplifies the establishment of wireless multi-hop networks but brings new challenges such as limited reliability, bottlenecks, and weak connections. The minimum cut of a graph is the smallest subset of edges whose removal disconnects some nodes from the others. Finding minimum cuts of a wireless multi-hop n...
|
Thanks to flexible deployment and excellent maneuverability, autonomous drones are regarded as an effective means to enable aerial data capture in large-scale wireless sensor networks with limited to no cellular infrastructure, e.g., smart farming in a remote area. A key challenge in drone-assisted sensor networks is that the autonomous drone's man...
|
Edge computing promises to facilitate the collaboration of smart sensors at the network edge, in order to satisfying the delay constraints of certain requests, and decreasing the transmission of large-volume sensory data from the edge to the cloud. Generally, the functionalities provided by smart sensors are encapsulated as services, and the satisf...
|
Radio links in Wireless Body Area Networks (WBANs) suffer from both short-term and long-term variations due to the dynamic network topology and frequent blockage caused by body movements, making it challenging to achieve reliable, energy-efficient and real-time data communication. Through experiments with TelosB motes, we observe a strong positive ...
|
With advances in wireless power transfer techniques, Battery-Free Wireless Sensor Networks (BF-WSNs) which can support long-term applications, has been attracting increasing interests in recent years. Unfortunately, the problem of Minimum Latency Aggregation Scheduling (MLAS) is not well studied in BF-WSNs. Existing works always have a rigid assump...
|
This paper studies an intelligent reflecting surface (IRS) aided wireless powered sensor network (WPSN). Specifically, a power station (PS) provides wireless energy to multiple internet of thing (IoT) devices which supports them to deliver their own messages to an access point (AP). Moreover, we deploy an IRS to enhance the performance of the WPSN ...
|
The byzantine model is widely used to depict a variety of node faults in networks. Previous studies on byzantine-resilient protocols in wireless networks assume reliable communications and do not consider the jamming behavior of byzantine nodes. Such jamming, however, is a very critical and realistic behavior to be considered in modern wireless net...
|
Sensor scheduling is a well studied problem in signal processing and control with numerous applications. Despite its successful history, most of the related literature assumes the knowledge of the underlying probabilistic model of the sensor measurements such as the correlation structure or the entire joint probability density function. Herein, a f...
|
In wireless network virtualization processes, load imbalance in substrate nodes and substrate links may significantly reduce the number of virtual network requests served by a substrate network. In addition, load imbalance also impairs resource utilization and increases embedding cost of the virtual networks. To tackle these issues, this work propo...
|
This paper presents a part of our ground-breaking work on evaluation of buildings in terms of wireless friendliness at the building-design stage. The main goal is to devise building design practices that provide for a good performance of wireless networks deployed in buildings. In this paper, the interference gain (IG) and power gain (PG) are defin...
|
Wireless virtualization has emerged as one of the efficient ways to overcome numerous wireless networking challenges such as RF resource sharing. RF spectrum sharing in wireless networks focuses on increasing the usage efficiency of radio frequency (RF) spectrum with its increasing demand. To reduce uncertainties that accompany the spectrum sharing...
|
Minimized and nearly deterministic end-to-end latency facilitates real-time data acquisition and actuator control. In addition, defined latency is an integral part of quality oriented service in order to get closer to the reliability of wired networks and at the same time take advantage of wireless networking. This paper introduces a QoS routing pr...
|
The diffusion of toxic gas, biochemical material, and radio-active contamination, known as continuous objects, endangers the safe production of petrochemical and nuclear industry. Industrial wireless sensor networks are a new paradigm, which shows great potential in monitoring evolving hazardous phenomena in unfriendly industrial field. To prolong ...
|
Wireless sensor networks have wide applications in monitoring applications. However, sensors' energy and processing power constraints, as well as the limited network bandwidth, constitute significant obstacles to near-real-time requirements of modern IoT applications. Offloading sensor data on an edge computing infrastructure instead of in-cloud or...
|
Wireless sensor network (WSN) is composed of many micro sensor nodes, and the localization technology is one of the most important applications of WSN technology. At present, many positioning algorithms have high position-ing accuracy in line-of-sight (LOS) environment, but poor positioning accuracy in non-line-of-sight (NLOS) environ-ment. In this...
|
This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
|
Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensors networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broad...
|
This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
|
Clustering is one of the popular methods for improving energy efficiency in wireless sensor networks. In most of the existing fuzzy approaches, the CHs are selected first, and then clusters are generated, but this may lead to uneven distribution of the sensor nodes in the clusters. In this article, the clusters are generated using the famous Fuzzy ...
|
This article presents a new approach to designing the Frobenius norm-based weighted unbiased finite impulse response (FIR) fusion filter for wireless sensor networks. The weighted Frobenius norm is employed as a cost function to design a local unbiased FIR filter. The design problem is converted into a constrained optimization problem subject to an...
|
With the development of sensor-clouds, the traditional WSN is expanded and the computing capacity is greatly improved. However, there are still challenges to be solved in sensor-clouds, such as how to disseminate codes to all nodes in a fast and energy-saving way. In this paper, an early wake-up ahead (EWA) code dissemination scheme is proposed to ...
|
To extend the lifetime of wireless multihop networks suffering from energy scarcity of constituent nodes, we apply a wireless power transfer (WPT) technology to multihop transmission and allow the nodes with substantial energy to perform WPT to energy-deprived nodes in a cooperative way. We construct a system model for this cooperative WPT (CoWPT)-...
|
In this paper, we show the remarkable timing error (TE) and residual chromatic dispersion (CD) tolerance improvements of the filter bank multicarrier (FBMC) over orthogonal frequency division multiplexing (OFDM) for high-baudrate spectral slicing transmitter and single coherent receiver transmissions. For a 512 Gb/s 16 quadrature amplitude modulate...
|
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provide...
|
Smart grid applications, such as teleportation, synchrophasors, remote condition monitoring, and control of assets, require timely and reliable data communication systems. Many communication architectures and solutions have been proposed to provide support for these smart grid applications, including ber networks, wireless mobile networks, wireless...
|
In this paper, the concept o 2-Layer routing for wireless 5G networks is presented. New fifth generations of the network along with the platform known asthe Internet of Things (IoT) are an upcoming trend not only in the commercial market but also in the research area. The 5G networks and IoT will be part of smart homes, smart cities and every aspec...
|
A united and automated fault management platform for heterogeneous optical networks is quite important for telecom operators to monitor and respond to various levels of network events. In this demo, we are demonstrating the details of the design, implementation and evaluation of the proposed Optical router platform while targeting to manage the und...
|
In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc net-works (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a numb...
|
With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other. By leveraging edge caching technology, various content services can be provided to mobile user...
|
With the explosive growth of mobile data demand, the fifth generation (5G) mobile network would exploit the enormous amount of spectrum in the millimeter wave (mmWave) bands to greatly increase communication capacity. There are fundamental differences between mmWave communications and existing other communication systems, in terms of high propagati...
|
With the rapid development of communication technology in recent years, Wireless Sensor Network (WSN) has become a promising research project. WSN is widely applied in a number of fields such as military, environmental monitoring, space exploration and so on. The non-line-of-sight (NLOS) localization is one of the most essential techniques for WSN....
|