Results 21 to 30 of about 10,351,223 (373)

Deep Dyna-Reinforcement Learning Based on Random Access Control in LEO Satellite IoT Networks

open access: yesIEEE Internet of Things Journal, 2022
Random access schemes in satellite Internet-of-Things (IoT) networks are being considered a key technology of new-type machine-to-machine (M2M) communications. However, the complicated situations and long-distance transmission can make the current random
Xiangnan Liu   +4 more
semanticscholar   +1 more source

Resistive Random Access Memory (RRAM): an Overview of Materials, Switching Mechanism, Performance, Multilevel Cell (mlc) Storage, Modeling, and Applications

open access: yesNanoscale Research Letters, 2020
In this manuscript, recent progress in the area of resistive random access memory (RRAM) technology which is considered one of the most standout emerging memory technologies owing to its high speed, low cost, enhanced storage density, potential ...
Furqan Zahoor   +2 more
semanticscholar   +1 more source

Random Access Procedure Over Non-Terrestrial Networks: From Theory to Practice [PDF]

open access: yesIEEE Access, 2021
Non-terrestrial Networks (NTNs) have become an appealing concept over the last few years and they are foreseen as a cornerstone for the next generations of mobile communication systems.
O. Kodheli   +6 more
semanticscholar   +1 more source

Performance optimization for mMTC in 5G network with multiple random access schemes

open access: yes物联网学报, 2022
To optimize the support for massive machine type communication (mMTC) services with different traffic characteristics, packet-based random access (PBRA) scheme coexists with the connection-based random access (CBRA) scheme in 5G networks.Yet, given the ...
Wen ZHAN   +3 more
doaj   +2 more sources

An Efficient Backoff Procedure for IEEE 802.11ax Uplink OFDMA-Based Random Access

open access: yesIEEE Access, 2022
IEEE 802.11ax stations can use multi-user (MU) uplink OFDMA-based random access (UORA) to improve per-station throughput in dense deployments in comparison to legacy IEEE 802.11 single-user access.
Katarzyna Kosek-Szott, Krzysztof Domino
semanticscholar   +1 more source

Age-of-Information Dependent Random Access for Massive IoT Networks [PDF]

open access: yesConference on Computer Communications Workshops, 2020
As the most well-known application of the Internet of Things (IoT), remote monitoring is now pervasive. In these monitoring applications, information usually has a higher value when it is fresher.
H. Chen, Yifan Gu, S. Liew
semanticscholar   +1 more source

Two-Step Random Access for 5G System: Latest Trends and Challenges

open access: yesIEEE Network, 2021
The 3rd Generation Partnership Project (3GPP) finalized Release 15 specifications for the 5th Generation New Radio (5G NR) in June 2018. In Release 16, the 3GPP worked on not only technical improvements over the previous release but also the introduction
Junseok Kim   +5 more
semanticscholar   +1 more source

User Activity Detection and Channel Estimation for Grant-Free Random Access in LEO Satellite-Enabled Internet of Things [PDF]

open access: yesIEEE Internet of Things Journal, 2020
With recent advances on the dense low-Earth orbit (LEO) constellation, the LEO satellite network has become one promising solution for providing global coverage for Internet-of-Things (IoT) services.
Zhaoji Zhang   +6 more
semanticscholar   +1 more source

Collision Resolution for Random Access [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2022
As a building block toward a simple and scalable solution for massive random access, we introduce collision-resolution algorithms using successive interference cancellation (SIC) based on the received signals, with no need for any coordination or codebook differentiation. We first consider two-user multiple access with the ZigZag algorithm.
Mohammad Kazemi   +2 more
openaire   +5 more sources

Unsourced Multiple Access: A Coding Paradigm for Massive Random Access [PDF]

open access: yesProceedings of the IEEE
This article is a tutorial introduction to the field of unsourced multiple access (UMAC) protocols. We first provide a historical survey of the evolution of random access protocols, focusing specifically on the case in which uncoordinated users share a ...
G. Liva, Yury Polyanskiy
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy