Results 1 to 10 of about 871,918 (286)

Energy-Efficient Interference-Aware Cognitive Machine-to-Machine Communications Underlaying Cellular Networks

open access: yesIEEE Access, 2022
Machine-to-machine (M2M) communications can effectively utilize cognitive radio (CR) to coexist with cellular users in what is known as cognitive M2M (CM2M) communications. In this system, underlay CR is used to manage spectrum sharing among machine type
Nedaa Alhussien, T. Aaron Gulliver
doaj   +1 more source

Machine Learning to Optimize TCP Communications Over High Frequency Communications Links

open access: yesIEEE Access, 2022
High Frequency communication is a proven method of beyond line of sight (BLOS) communications for decades. With the advent of Wideband HF (WBHF), the ability to communicate data and more specifically TCP over HF is being researched worldwide.
Alvin Dmello   +3 more
doaj   +1 more source

An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment

open access: yesTikrit Journal of Engineering Sciences, 2023
The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications.
Ahamd Khader Habboush   +4 more
doaj   +1 more source

Machine-to-Machine Communications [PDF]

open access: yes, 2014
With the number of machine-to-machine (M2M)-enabled devices projected to reach 20 to 50 billion by 2020, there is a critical need to understand the demands imposed by such systems. Machine-to-Machine Communications: Architectures, Technology, Standards, and Applications offers rigorous treatment of the many facets of M2M communication, including ...
Rashid A. Saeed   +2 more
openaire   +2 more sources

Patent Technology Network Analysis of Machine-Learning Technologies and Applications in Optical Communications

open access: yesPhotonics, 2020
As the Internet of Things (IoT) develops, applying machine learning on optical communications has become a prospective field of research. Scholars have mostly concentrated on algorithmic techniques or specific applications but have been unable to address
Shu-Hao Chang
doaj   +1 more source

Federated Learning for 6G: Applications, Challenges, and Opportunities

open access: yesEngineering, 2022
Standard machine-learning approaches involve the centralization of training data in a data center, where centralized machine-learning algorithms can be applied for data analysis and inference.
Zhaohui Yang   +4 more
doaj   +1 more source

Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [PDF]

open access: yes, 2014
Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves.
Alsheikh, Mohammad Abu   +3 more
core   +3 more sources

Fixed-Symbol Aided Random Access Scheme for Machine-to-Machine Communications

open access: yesIEEE Access, 2019
The massiveness of devices in crowded Machine-to-Machine (M2M) communications brings new challenges to existing random-access (RA) schemes, such as heavy signaling overhead and severe access collisions.
Zhaoji Zhang, Ying Li, Lei Liu, Wei Hou
doaj   +1 more source

Asymmetric Directional Multicast for Capillary Machine-to-Machine Using mmWave Communications

open access: yesSensors, 2016
The huge demand for high data rate machine-to-machine (M2M) services has led to the use of millimeter Wave (mmWave) band communications with support for a multi-Gbps data rate through the use of directional antennas. However, unnecessary sector switching
Jung-Hyok Kwon, Eui-Jik Kim
doaj   +1 more source

SDMA-Based Aeronautical Machine-to-Machine Communications under SINR Constraints

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In order to achieve an efficient usage on a limited spectrum for aeronautical machine-to-machine (M2M) communications, in this paper, a space division multiple access- (SDMA-) based architecture is proposed, where the random access of short messages ...
Jindong Xie   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy