Results 81 to 90 of about 194,678 (236)
Random Access Protocols for Massive MIMO
5G wireless networks are expected to support new services with stringent requirements on data rates, latency and reliability. One novel feature is the ability to serve a dense crowd of devices, calling for radically new ways of accessing the network ...
Björnson, Emil +4 more
core +1 more source
Halide perovskites in wide‐spectrum photodetection
Recent advances in perovskite‐based photodetectors (PPDs), phototransistors, and photoconductors are technically discussed in this review. Moreover, the mechanism behind different harvesting processes in perovskite following the energy of photons is explained, where the gamma or x‐rays are ionizing.
Somayeh Gholipour +5 more
wiley +1 more source
Enhancing IoT Connectivity through Advanced Scheduling at 142 GHz Sub-THz in 5G and Beyond Networks
5G technology promises to revolutionize how we engage with the digital realm. 5G networks are developed in such a way to answer to the growing needs of various applications, ranging from Enhanced Mobile Broadband applications, through Massive Machine ...
Mohammed Mahfooudi +4 more
doaj +1 more source
Machine-type communications are emerging as a new paradigm for enabling a broad range of applications from the massive deployment of sensor devices to mission-critical services.
Jiantao Yuan +4 more
doaj +1 more source
Massive M2M Access with Reliability Guarantees in LTE Systems
Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a ...
Madueno, German Corrales +3 more
core +1 more source
ABSTRACT Biochar has emerged as a useful and adaptable source of carbon for supercapacitor electrodes. Its value comes from the way biomass chemistry, thermal conversion, and activation conditions shape the resulting pore network, surface groups, and degree of carbon ordering.
Soumen Mandal +6 more
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges
The Internet of Things (IoT) is a promising technology which tends to revolutionize and connect the global world via heterogeneous smart devices through seamless connectivity.
Godfrey Anuga Akpakwu +3 more
doaj +1 more source
LEO Small-Satellite Constellations for 5G and Beyond-5G Communications
The next frontier towards truly ubiquitous connectivity is the use of Low Earth Orbit (LEO) small-satellite constellations to support 5G and Beyond-5G (B5G) networks. Besides enhanced mobile broadband (eMBB) and massive machine-type communications (mMTC),
Israel Leyva-Mayorga +6 more
doaj +1 more source
Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of Things
In this paper, the problem of distributed resource allocation is studied for an Internet of Things (IoT) system, composed of a heterogeneous group of nodes compromising both machine-type devices (MTDs) and human-type devices (HTDs).
Abuzainab, Nof +3 more
core +1 more source

