Results 11 to 20 of about 52,647 (260)

SalCor: A Hierarchical Saliency-Driven Segmentation Model With Local Correntropy for Medical Images

open access: yesIEEE Access, 2023
In image segmentation, noise and nonuniform intensity can lead to performance degradation in existing models, particularly when dealing with shadow artifacts.
Aditi Joshi   +3 more
doaj   +1 more source

A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks

open access: yesSensors, 2022
The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy.
Kranthi Kumar Singamaneni   +5 more
doaj   +1 more source

5G and Beyond

open access: yes, 2023
This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands. The book emphasizes the benefits and challenges associated with the integration of 5G networks with varied applications.
  +5 more sources

Proactive Caching in D2D Assisted Multitier Cellular Network

open access: yesSensors, 2022
Cache-enabled networks suffer hugely from the challenge of content caching and content delivery. In this regard, cache-enabled device-to-device (D2D) assisted multitier cellular networks are expected to relieve the network data pressure and effectively ...
Fawad Ahmad   +5 more
doaj   +1 more source

5G-ALLSTAR: Beyond 5G Satellite-Terrestrial Multi-Connectivity

open access: yes2022 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2022
This paper presents a summary of the results of the 5G-ALLSTAR project. It describes the enablers that have been developed and validated and will help make 5G and beyond satellite-terrestrial multi-connectivity (MC) a reality in the near future.We proposed and evaluated solutions for critical aspects of the integration of non-terrestrial networks into ...
Cassiau N.   +22 more
openaire   +3 more sources

Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI)

open access: yesEntropy, 2022
Encrypting pictures quickly and securely is required to secure image transmission over the internet and local networks. This may be accomplished by employing a chaotic scheme with ideal properties such as unpredictability and non-periodicity.
Mohammed Abutaha   +2 more
doaj   +1 more source

Digital Twin for 5G and Beyond [PDF]

open access: yesIEEE Communications Magazine, 2021
Although many countries have started the initial phase of rolling out 5G, it is still in its infancy with researchers from both academia and industry facing the challenges of developing to its full potential. With the support of Artificial Intelligence, development of digital transformation through the notion of a ‘Digital Twin’ has been taking off in ...
Nguyen, Huan X.   +3 more
openaire   +1 more source

Future Prospects and Challenges of On-Demand Mobility Management Solutions

open access: yesIEEE Access, 2023
Generally, mobility management (MM) solutions are centralized, which means only one entity controls the mobility-related tasks of mobile nodes connected to the network.
Muhammad Mukhtar Qureshi   +5 more
doaj   +1 more source

Overview of 5G & Beyond Security

open access: yesEAI Endorsed Transactions on Internet of Things, 2022
Network security is a crucial concern when it comes to computation, concerns like threats can have high consequences, and critical information will be shared with unauthorized persons. This paper presents a detailed survey on Fifth Generation (5G) and security aspect.
Fawad Shokoor   +2 more
openaire   +2 more sources

5G and Beyond for Contact Tracing [PDF]

open access: yesIEEE Communications Magazine, 2021
The COVID-19 pandemic has suddenly raised the need for technological solutions capable to trace contacts of people and provide location-based analytics. Several countries have adopted proximity-based (short- range) technologies, such as Bluetooth, which however appear hindered by deployment issues, security leakages, lack of reliability, and data ...
Giustiniano, D   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy