Results 151 to 160 of about 15,258 (188)
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. [PDF]
Singh G +3 more
europepmc +1 more source
Health Workers' Perspectives on Mobile Health Care Learning Stickiness: Mixed Methods Study.
Nurwardani S, Handayani PW.
europepmc +1 more source
Self-rectifying memristors with high rectification ratio for attack-resilient autonomous driving systems. [PDF]
Zhang G +11 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Modeling DRX for D2D Communication
IEEE Internet of Things Journal, 2021Discontinuous reception (DRX) has been included in 4G-LTE as the main power saving mechanism for user equipment (UE). However, the existing 3-state DRX model is not sufficient for new use cases introduced by 4G and 5G. For example, the device discovery process in device to device (D2D) communication has a significant impact on delay and power ...
Farnaz Moradi +2 more
openaire +1 more source
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications
Mobile Networks and Applications, 2017Device-to-Device (D2D) communications have emerged as a promising technology for the next generation mobile communication networks and wireless systems (5G). As an underlay network of conventional cellular networks (LTE or LTE-Advanced), D2D communications have shown great potential in improving communication capability and fostering multifarious new ...
Mingjun Wang, Zheng Yan, Valtteri Niemi
openaire +2 more sources
D2D group communications security
2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), 2015Proximity Services (ProSe) discovery or communications using LTE-based Device-to-Device (D2D) communications have been recently in the heart of the discussions about the advent of 5G networks. Meanwhile, their related security aspects are of a major concern especially when dealing with direct radio communications and large-scale deployment of D2D ...
Emad Abd-Elrahman +2 more
openaire +1 more source
Feasible D2D communication distance in D2D-enabled cellular networks
2014 IEEE International Conference on Communication Systems, 2014In D2D-enabled cellular networks, data communications between user equipments (UEs) can be completed by two modes: the cellular mode and the D2D mode where UEs bypass the base station and directly communicate with each other. Usually the transmission mode is selected based on the distance between the UEs.
Haichuan Ding, Shaodan Ma, Chengwen Xing
openaire +1 more source
IOT based efficient D2D communication
2018 Moscow Workshop on Electronic and Networking Technologies (MWENT), 2018Drastic increase in number of users have put cellular operators in trouble. Researchers found the way in internet of things (IoT). Device to device communication(D2D) is a basic part of IoT. In this paper, a device is installed between cellular and device users that will act as a gate between the two.
Abrar, Muhammad +3 more
openaire +1 more source
Energy-Efficient Mutual Learning Over D2D Communications
IEEE Transactions on Vehicular Technology, 2023Mutual learning (ML) is a promising technique for sharing knowledge in data while keeping the data privacy and preserving the individual characteristics of the local model. In this article, we design a novel decentralized mutual learning (DML) system, where bidirectional device-to-device (D2D) communications are employed to facilitate the knowledge ...
Rui Yin +4 more
openaire +2 more sources

