Results 11 to 20 of about 69,666 (207)

Optimized Reinforcement Learning for Resource Allocation in Vehicular Ad Hoc Networks

open access: yesIEEE Access
The vehicular ad hoc networks VANET is an essential part of intelligent transportation systems (ITSs) since it may offer various multimedia services and safety services to pedestrians, passengers, and even drivers.
Spandana Mande   +3 more
doaj   +2 more sources

Contribution of non‐orthogonal multiple access signalling to practical multibeam satellite deployments

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView., 2023
The potential gains of NOMA were evaluated in a satellite system with heterogeneous receivers, after considering the use of specific DVB‐S2X MODCODs, along with the impact of non‐linearities. It was concluded that a judicious power allocation in NOMA, jointly optimized with the IBO of the PAs, can yield significant sum‐rate gains.
Tomás Ramírez, Carlos Mosquera
wiley   +1 more source

A hybrid approach for energy‐efficient routing in IoT using duty cycling and improved ant colony

open access: yesIET Communications, EarlyView., 2022
The proposed approach poses the empirical notion to manage the energy consumption of the IoT network by considering the key performance indicators (KPI) like energy consumption, average residual energy, mobility factor, distance, throughput, and network lifespan to accomplish the tangible outputs.The proposed approach is modelled using DFD's and ...
Bharti Rana   +4 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

The capability of the EDCA mechanism to support voice traffic in a mixed voice/data transmission over 802.11e WLANs - an experimental investigation [PDF]

open access: yes32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
—We analyze IEEE 802.16e medium access control (MAC) sublayer and provides a simple analytical model to compute the 802.16e MAC throughput. Our approach is to begin with a key approximation made by [1] in IEEE 802.11. This study leads to a fixed point equation, which characterizes the operating point of system.
Tim Stevens   +6 more
openaire   +22 more sources

Improving Fairness and Utilisation in Ad Hoc Networks [PDF]

open access: yes, 2012
Ad hoc networks represent the current de-facto alternative for infrastructure-less environments, due to their self-configuring and resilience characteristics.
Arabi, Mohamed
core   +2 more sources

A Rapid Development Approach for Signal Strength Based Location Systems [PDF]

open access: yesThe 2007 International Conference on Intelligent Pervasive Computing (IPC 2007), 2007
Pervasive computing calls for applications which are often composed from independent and distributed components using facilities from the environment. This paradigm has evolved into task based computing where the application composition relies on explicit user task descriptions.
Il-Jin Oh   +5 more
openaire   +22 more sources

Home - About - Disclaimer - Privacy