Science topic

Wireless Networks - Science topic

A wireless network refers to any type of computer network that is not connected by cables of any kind.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Wireless Networks (10,000)
Sorted by most recent
Article
Full-text available
In the era of wireless network communication, the demand for determining the best transmitter (Tx) location is constantly increasing especially in outdoor environments and localization-based services. In this paper, localization optimal location of a Tx has been achieved in electrical engineering technical college by using received signal strength...
Article
Full-text available
Sixth-generation wireless networks will aggregate higher-than-ever mobile traffic into ultra-high capacity backhaul links, which could be deployed on the largely untapped spectrum above 100 GHz. Current regulations however prevent the allocation of large contiguous bands for communications at these frequencies, since several narrow bands are reserv...
Article
Full-text available
Enforcing network slice isolation in 5G Radio Access Networks (RANs) can degrade a network slicing solution’s ability to efficiently support different types of traffic. In addition, competing virtual network operators may share one network infrastructure that forces network slicing solutions to provide fair treatment between them. This work present...
Article
Full-text available
In a backbone-assisted industrial wireless network (BAIWN), the technology of successive interference cancellation (SIC) based non-orthogonal multiple access (NOMA) provides potential solutions for improving the delay performance. Previous work emphasizes minimizing the transmission delay by user scheduling without considering power control. Howeve...
Article
Full-text available
A Wireless Sensor Network (WSN) consists of a group of energy-constrained tiny devices called sensors which have sensing, processing, and communicating capabilities. These sensors are deployed in a region of interest for monitoring targets or detecting events, and forwarding the processed data to the sink nodes or gateways. In any wireless network...
Article
Full-text available
Interference is the main source of capacity limitation in wireless networks. In some medium access technologies in cellular networks, such as OFDMA, the allocation of frequency subbands is such that interference between cells occurs. This article focuses on preventing harmful interference by properly allocating cells and wireless resources such as...
Chapter
Full-text available
Today's communication systems are concentrated majorly in wireless networks that depend upon the density in the radio frequency (RF) spectrum. This density means a shortage of space for new services or technologies to be created in the RF spectrum. The main reason for this density in the frequency spectrum is the inefficient use of the RF spectrum...
Article
Full-text available
In communication networks, edge computing is a method of distributing processing, storage, and bandwidth resources to the side of the network that is closest to the user. This could be achieved through small computing devices installed in proximity of user or the network routers. In this paper, we discuss the architecture and principles of mobile e...
Article
Full-text available
Vehicular edge computing (VEC) offers a new paradigm for improving vehicular services and enhancing vehicle capabilities. In the VEC environments, vehicles can offload tasks to edge servers deployed in roadside units or other vehicles via wireless networks to enhance their computation capability. However, the high mobility of vehicles will lead to...
Conference Paper
Full-text available
A sensor node has limited radio range, subsequently that covers a limited geographical area. So it's not always possible in practical ground to have a single-hop wireless network. Most of the wireless network architecture that may be flat or clustered, follows multi-hop routing. In this paper we have simulated an adaptive multi-hop routing sensor n...
Preprint
Full-text available
Polling systems with losses are useful mathematical objects that can model many practical systems like travelling salesman problem with recurrent requests. One of the less studied yet an important aspect in such systems is the disparity in the utilities derived by the individual stations. Further, the random fluctuations of the travel conditions ca...
Article
Full-text available
The continuous growth in the number of mobile users in wireless networks necessitates the need for increased network capacity as well as data dissemination to these users simultaneously. Device-to-Device (D2D) communication provides a way of accommodating more users in the networks, while multicast communication makes it possible to transmit data f...
Article
Full-text available
This paper presents a software prototype of a wireless network for the Internet of Things (IoT) based on the DECT standard. It proposes an architecture for encapsulating commands from the most common IoT protocol, MQTT, into SIP packets. A module is created to embed MQTT-SN packets into SIP packets. The module is developed in Go language using the...
Article
Full-text available
In this paper, we present a new MAC (Medium Access Control) protocol, called Hybrid ALOHA (H-ALOHA), which is a combination of two existing protocols: Pure ALOHA (P-ALOHA) protocol and Slotted ALOHA (S-ALOHA) protocol. The idea behind it is to design a MAC protocol that could meet some specific requirements in wireless networks, such as reducing en...
Article
Full-text available
Intelligent management of power and spectrum is the most important ingredient in creating wireless sensor networks with high reliability and longevity. The main application under study in this paper is accurate monitoring of forest ecosystems using high spatio-temporal resolution. High cost of the current systems and their power consumption limits...
Article
Full-text available
As the processing power of mobile terminals increases, wireless network applications such as voice assistants can put more context-sensitive tasks on the mobile terminals, thus reducing the wireless network bandwidth needed and the cost of data storage in the cloud. Co-reference annotation, identifying the same semantics in context, is one of the c...
Article
Full-text available
The fifth generation (5G) of telecommunications networks is currently commercially deployed. One of their core enabling technologies is cellular Massive Multiple-Input-Multiple-Output (M-MIMO) systems. However, future wireless networks are expected to serve a very large number of devices and the current MIMO networks are not scalable, highlighting...
Article
Full-text available
Accurate and efficient real-time detection of orchard pests was essential and could improve the economic benefits of the fruit industry. The orchard pest dataset, PestImgData, was built through a series of methods such as web crawler, specimen image collection and data augmentation. PestImgData was composed of two parts, PestImgData-1 and PestImgDa...
Technical Report
Full-text available
In this paper, long distance coverage is noted to be favorable for FixedRssLossModel and NakagamiPropagation- LossModel. Even when other propagation loss models were already sinking to zero throughput or extremely poor signals, Nakagami maintained a very high continuous throughput and signal strength Short-distance coverage may be achieved with Fri...
Preprint
Full-text available
Multi-functional wireless networks are rapidly evolving and aspire to become a promising attribute of the upcoming 6G networks. Enabling multiple simultaneous networking functions with a single radio fosters the development of more integrated and simpler equipment, overcoming design and technology barriers inherited from radio systems of the past....
Preprint
Full-text available
We investigate a data quality-aware dynamic client selection problem for multiple federated learning (FL) services in a wireless network, where each client has dynamic datasets for the simultaneous training of multiple FL services and each FL service demander has to pay for the clients with constrained monetary budgets. The problem is formalized as...
Article
Full-text available
A Key management system plays an important role in the process of wireless communication between the nodes of a Wireless Sensor Network (WSN). Unlike the wired networks, WSNs are more vulnerable to attacks from the malicious nodes. To overcome the shortcomings of the existing key management systems, this paper proposes an adaptive multilevel locati...
Preprint
Full-text available
This paper analyzes the energy efficiency of a novel system model where unmanned aerial vehicles (UAVs) are used to provide coverage for user hotspots (user clusters) and are deployed on charging pads to enhance the flight time. We introduce a new notion of "cluster pairs" to capture the dynamic nature of the users spatial distribution in order to...
Preprint
Full-text available
Reflecting intelligent surfaces (RIS) has gained significant attention due to its high energy and spectral efficiency in next-generation wireless networks. By using low-cost passive reflecting elements, RIS can smartly reconfigure the signal propagation to extend the wireless communication coverage. This letter proposes a new optimization scheme in...
Article
Full-text available
Due to the rapid growth in mobile data traffic, academia and industry are considering Li-Fi (Light Fidelity) as an alternative to Wi-Fi (Wireless Fidelity). Li-Fi is a high-speed, two-way wireless network system that has several advantages over traditional radio frequency systems. To fully exploit the potential of Li-Fi systems, users must be provi...
Conference Paper
Full-text available
Mobile Botnet is an interconnected collection of smart devices involved in cyber-attacks. It is capable enough to launch various types of cyberattacks, including fraud, phishing, stealing bank credentials, and distributed denial-of-service (DDoS). Although there are surveys on the Botnet, there is no comprehensive study on mobile Botnet architectur...
Article
Full-text available
This article presents a four-element multiple-input multiple-output (MIMO) antenna design for next-generation millimeter-wave (mmWave) communication systems. The single antenna element of the MIMO systems consists of a T-shaped and plow-shaped patch radiator designed on an ultra-thin Rogers RT/Duroid 5880 substrate. The dimensions of the single ant...
Article
Full-text available
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jell...
Preprint
Full-text available
The sixth generation (6G) wireless networks aim to achieve ultra-high data transmission rates, very low latency and enhanced energy-efficiency. To this end, terahertz (THz) band is one of the key enablers of 6G to meet such requirements. The THz-band systems are also quickly merging as high-resolution sensing devices because of their ultra-wide ban...
Article
Full-text available
We propose a resource allocation policy for intelligent reflective surface (IRS)-assisted wireless powered communication network (WPCN) where the energy harvesting (EH) users (EHUs) have finite energy storage and data buffers, for storing the harvested energy and the input (sensory) data, respectively. The IRS reflecting coefficients for uplink and...
Research Proposal
Full-text available
https://www.mdpi.com/journal/sustainability/special_issues/E5I2JNH3NE Dear Colleagues, All global cities are in the process of transforming from classical cities to sustainable smart cities. In this process, people face many urgent challenges in sustainable urban living, such as urban safety, urban living quality, urban energy usage, urban traff...
Article
Full-text available
Resource allocation (RA) has always had a prominent place in wireless communications research due to its significance for network throughput maximization, and its inherent complexity. Concurrently, graph-based solutions for RA have also grown in importance, providing opportunities for higher throughput and efficiency due to their representational c...
Preprint
Full-text available
We develop a simple model for the timely monitoring of correlated sources over a wireless network. Using this model, we study how to optimize weighted-sum average Age of Information (AoI) in the presence of correlation. First, we discuss how to find optimal stationary randomized policies and show that they are at-most a factor of two away from opti...
Preprint
Full-text available
Emerging six generation (6G) is the integration of heterogeneous wireless networks, which can seamlessly support anywhere and anytime networking. But high Quality-of-Trust should be offered by 6G to meet mobile user expectations. Artificial intelligence (AI) is considered as one of the most important components in 6G. Then AI-based trust management...
Article
Full-text available
Existing studies on pilot contamination attack often assume that the attack and jamming strategies of adversaries are fixed. The enemy has not made any strategic corrections to the detection plan. In this paper, we analyze how an intelligent malicious user considers the role of legitimate user and adjusts attacking strategy during training phase in...
Article
Full-text available
Wireless Networks (WNs) is a widely used technology that has found application in many fields due to their mobile and flexible nature. Many attempts have been made to secure the standard of WNs by utilizing useful security features. But due to the absence of an external robust defense mechanism such as Intrusion Detection Scheme (IDS), most of the...
Article
Full-text available
Achieving communication security, along with high computational efficiency, is one of the challenging issues in the advancement of modern resource constraint wireless networks. Wireless physical layer secure key extraction in conjunction with suitable preprocessing techniques may be a possible way out. Principal component analysis (PCA) is one of t...
Article
Full-text available
The use of mobile phones has experienced a huge growth over the last few years. The rise in its usage has been linked to the cheap cost of such services. Security has, been a major issue in such networks due to a number of reasons. The use of Mobile Ad Hoc Networks (MANETs) does not involve any set rules or infrastructure. The mobile ad hoc network...
Article
Full-text available
Heterogeneous cellular networks are a viable solution in response to the growing demand for broadband services in the new-generation wireless networks. The dense deployment of small cell networks is a key feature of next-generation heterogeneous networks aimed at providing the necessary capacity increase. However, the approach to apply green networ...
Article
Full-text available
With the support of wireless network, tourists in tourism areas could enjoy various tourism information search and smart tourism–related services. However, due to the limited capacity of wireless networks, in peaking seasons, tourism area crowding in local areas could result in emergency and temporary wireless network congestion. While increasing i...
Article
Full-text available
The constant increase in the required user capacity and the evolution of wireless network technologies impact the exposure that users experience from wireless networks. This paper evaluates various 5G network topologies regarding human exposure, mobile communication quality, and sustainability. We assess human exposure, based on a novel Exposure Ra...
Article
Full-text available
The demand for more radio spectrum bandwidths has risen as a result of recent developments in wireless technology from every field of the wireless industry. It’s getting faster by the day, and we’re on our way to greater mobility as the market for higher data rates grows. The growth of the internet has increase demand for wireless networks, causing...
Article
Full-text available
The next generation 6G wireless systems are envisioned to have higher reliability and capacity than the existing cellular systems. The reconfigurable intelligent surfaces (RISs)-assisted wireless networks are one of the promising solutions to control the wireless channel by altering the electromagnetic properties of the signal. The dual connectivit...
Article
Full-text available
Reconfigurable intelligent surfaces (RISs) are envisioned to transform the propagation space into a smart radio environment (SRE) to realize the diverse applications of sixth-generation (6G) wireless communication. By smartly tuning the massive number of elements via controller, an RIS can passively phase-shift the electromagnetic (EM) waves to enh...
Article
Full-text available
In this article, a novel ultra-high frequency radio frequency identification (UHF RFID) reader antenna is proposed and experimentally investigated. The proposed RFID antenna design consists of three layers; the first layer has a ring shape with a feeding line at the center, the second layer has a small periodic structure that affects the radiation...
Article
Full-text available
Connectivity and strength has a major role in the field of network connecting with real world life. Complexity function is one of these parameter which has manifold number of applications in molecular chemistry and the theory of network. Firstly, this paper introduces the thought of complexity function of fuzzy graph with its properties. Second, ba...
Article
Full-text available
Recently, many population-dependent methods have been proposed. Despite their acceptance in many applications, we are still exploring suggested methods to solve actual problems. Consequently, researchers need to change and refine their procedures significantly based on the major evolutionary processes to achieve quicker convergence, more consistent...
Article
Full-text available
In this paper, a new resource allocation framework for unmanned aerial vehicle (UAV) assisted multicast wireless networks is proposed in which the network users according to their request are divided into several multicast groups. Power domain non‐orthogonal multiple access is adopted as the transmission technology using which the dedicated signals...
Article
Full-text available
In the dense data communication environment of 5G wireless networks, with the dramatic increase in the amount of request computation tasks generated by intelligent wireless mobile nodes, its computation ability cannot meet the requirements of low latency and high reliability. Mobile edge computing (MEC) can utilize its servers with mighty computati...
Article
Full-text available
The deployment of the millimeter (mmWave) frequency spectrum by fifth-generation (5G) device-to-device (D2D) wireless networks is anticipated to meet the growing demands for increased capacity. The antenna is regarded of as an important determinant that guarantees the maximum performance of wireless communication. This paper presents a low-profile...
Article
Full-text available
The cognitive radio network (CRN) is an emerging technology where communication among secondary users (SUs) takes place in an opportunistic manner. Since, a backbone eases the routing, reduces communication overhead, and efficiently handles the dynamic changes in the network. Therefore, we intend to propose a backbone formation algorithm in CRN. Ho...
Article
Full-text available
The demand of high data rate, high quality of service (QoS), and seamless connectivity are growing continuously for vehicular communication over the last few years. Moving relay (MR) is one of the promising techniques to achieve these demands. In the past, heterogeneous network (HetNet) models with one MR on the top of the train have been proposed...
Preprint
Full-text available
Clock skew compensation is essential for accurate time synchronization in wireless networks. However, contemporary clock skew estimation is based on inaccurate transmission time measurement, which makes credible estimation challenging. Based on one-way broadcast synchronization, this study presents a novel maximum likelihood estimation (MLE) with a...
Article
Full-text available
Wireless sensor network is a network that integrates sensor technology, computer technology, information processing technology, and communication technology. This paper aims to study how to analyze and study the routing optimization of wireless sensor network based on deep learning and describe the neural network. This paper puts forward the proble...
Article
Full-text available
In Smart Cities’ applications, Multi-node cooperative spectrum sensing (CSS) can boost spectrum sensing efficiency in cognitive wireless networks (CWN), although there is a non-linear interaction among number of nodes and sensing efficiency. Cooperative sensing by nodes with low computational cost is not favorable to improving sensing reliability a...
Preprint
Full-text available
The fifth-generation (5G) wireless networks are expected to provide various services compared to the 4G and previous generations of networks. The Quality of Service requirements can be quite different in terms of latency, bandwidth, reliability, and availability. 5G technology allows the fragmentation of the network into small pieces, known as netw...
Preprint
Full-text available
Next-generation wireless networks will deploy UAVs dynamically as aerial base stations (UAV-BSs) to boost the wireless network coverage in the out of reach areas. To provide an efficient service in stochastic environments, the optimal number of UAV-BSs, their locations, and trajectories must be specified appropriately for different scenarios. Such...
Article
Full-text available
This paper presents a 130nm SiGe HBT process variable gain low noise amplifier (VGLNA) with low phase variation that can be used in phased array systems. The transmission phase variations in the proposed VGLNA are compensated by optimizing the passive micro-strip components in the current steering control circuit. Phase variation of less than 3∘\do...
Article
Full-text available
This paper investigates the combined uplink and downlink energy efficiency via optimal user association for sum-rate maximization in an interference-based channel for current wireless networks operating in the gigahertz/terahertz spectrum while supporting a variety of wireless access devices and proposes an energy-efficient resource allocation algo...