Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
92,302 result(s) for "CELLULAR NETWORK"
Sort by:
MEC/Cloud Orchestrator to Facilitate Private/Local Beyond 5G with MEC and Proof-of-Concept Implementation
The emergence of 5G-IoT opens up unprecedented connectivity possibilities for new service use cases and players. Multi-access edge computing (MEC) is a crucial technology and enabler for Beyond 5G, supporting next-generation communications with service guarantees (e.g., ultra-low latency, high security) from an end-to-end (E2E) perspective. On the other hand, one notable advance is the platform that supports virtualization from RAN to applications. Deploying Radio Access Networks (RAN) and MEC, including third-party applications on virtualization platforms, and renting other equipment from legacy telecom operators will make it easier for new telecom operators, called Private/Local Telecom Operators, to join the ecosystem. Our preliminary studies have discussed the ecosystem for private and local telecom operators regarding business potential and revenue and provided numerical results. What remains is how Private/Local Telecom Operators can manage and deploy their MEC applications. In this paper, we designed the architecture for fully virtualized MEC 5G cellular networks with local use cases (e.g., stadiums, campuses). We propose an MEC/Cloud Orchestrator implementation for intelligent deployment selection. In addition, we provide implementation schemes in several cases held by either existing cloud owners or private and local operators. In order to verify the proposal’s feasibility, we designed the system level in E2E and constructed a Beyond 5G testbed at the Ōokayama Campus of the Tokyo Institute of Technology. Through proof-of-concept in the outdoor field, the proposed system’s feasibility is verified by E2E performance evaluation. The verification results prove that the proposed approach can reduce latency and provide a more stable throughput than conventional cloud services.
Automatic Fault Detection and Diagnosis in Cellular Networks and Beyond 5G: Intelligent Network Management
Handling faults in a running cellular network can impair the performance and dissatisfy the end users. It is important to design an automatic self-healing procedure to not only detect the active faults, but also to diagnosis them automatically. Although fault detection has been well studied in the literature, fewer studies have targeted the more complicated task of diagnosing. Our presented method aims to tackle fault detection and diagnosis using two sets of data collected by the network: performance support system data and drive test data. Although performance support system data is collected automatically by the network, drive test data are collected manually in three mode call scenarios: short, long and idle. The short call can identify faults in a call setup, the long call is designed to identify handover failures and call interruption, and, finally, the idle mode is designed to understand the characteristics of the standard signal in the network. We have applied unsupervised learning, along with various classified algorithms, on performance support system data. Congestion and failures in TCH assignments are a few examples of the detected and diagnosed faults with our method. In addition, we present a framework to identify the need for handovers. The Silhouette coefficient is used to evaluate the quality of the unsupervised learning approach. We achieved an accuracy of 96.86% with the dynamic neural network method.
Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular
The fifth-generation mobile networks (5G) will not only enhance mobile broadband services, but also enable connectivity for a massive number of Internet-of-Things devices, such as wireless sensors, meters or actuators. Thus, 5G is expected to achieve a 1000-fold or more increase in capacity over 4G. The use of the millimeter-wave (mmWave) spectrum is a key enabler to allowing 5G to achieve such enhancement in capacity. To fully utilize the mmWave spectrum, 5G is expected to adopt a heterogeneous network (HetNet) architecture, wherein mmWave small cells are overlaid onto a conventional macro-cellular network. In the mmWave-integrated HetNet, splitting of the control plane (CP) and user plane (UP) will allow continuous connectivity and increase the capacity of the mmWave small cells. mmWave communication can be used not only for access linking, but also for wireless backhaul linking, which will facilitate the installation of mmWave small cells. In this study, a proof-of-concept (PoC) was conducted to demonstrate the practicality of a prototype mmWave-integrated HetNet, using mmWave technologies for both backhaul and access.
Building trust via blockchain in UAV‐assisted ultra‐dense 6G cellular networks
The ultra‐dense deployment of unmanned aerial vehicles (UAVs) as mobile small cell base stations (SBS) is expected to support ultra‐high‐speed, ultra‐reliable, and ultra‐low‐latency wireless connections in sixth generation (6G) wireless cellular networks. Inevitably, the explosively increasing number of SBSs each with ever‐shrinking cell size will result in the spectrum scarcity and pose critical challenges to the spectrum management. Towards the centralized spectrum management system, a third‐party authority is employed to coordinate the spectrum sensing, sharing, and allocation among participants. However, a centralized authority is vulnerable to numerous security threats, such as single point of failure, denial of service attacks, and privacy disclosure, and cannot guarantee fair and efficient spectrum management without mutual trusts among participants. To address these problems, a novel framework of blockchain‐aided spectrum management is designed to securely record the spectrum auction data and spectrum allocation data in the decentralized spectrum sharing. Moreover, a trust management scheme is proposed to evaluate the trusts of all UAVs participating in the decentralized spectrum sharing, where the trust increase depends on legal use of spectrum allocation and honest report of spectrum sensing. In particular, it is shown that the proposed trust management can not only incentivize the UAVs to comply with the legal rule of spectrum sharing in blockchain, but also punish the malicious behaviour that either violates the spectrum sharing rule or provides misleading spectrum sensing results.
A Low-Cost Open-Source Architecture for a Digital Signage Emergency Evacuation System for Cruise Ships, Based on IoT and LTE/4G Technologies
During a ship evacuation, many people panic as they do not know the direction that leads to the emergency muster station. Moreover, sometimes passengers get crowded in corridors or stairs, so they cannot save their lives. This paper proposes an IoT-enabled architecture for digital signage systems that directs passengers to the muster stations of a cruise ship by following the less dangerous route. Thus, crews’ and passengers’ safety risks during a ship evacuation can be low, and human health hazards may be limited. The system is based on a low-cost and open-source architecture that can also be used in a variety of fields in industrial IoT applications. The proposed modular digital signage architecture utilizes Light Emitting Diode (LED) strips that are remotely managed through a private Long-Term Evolution (LTE)/Fourth Generation (4G) cellular network. Publish–subscribe communication protocols were used for the control of the digital strips and particularly through a Message Queuing Telemetry Transport (MQTT) broker who publishes/subscribes every message to specific topics of the realized IoT platform, while the overall digital signage system centralization was implemented with an appropriate dashboard supported from an open-source RESTful API.
On the meta distribution in spatially correlated non-Poisson cellular networks
In this paper, we consider a cellular network in which the locations of the base stations are spatially correlated. We introduce an analytical framework for computing the distribution of the conditional coverage probability given the point process, which is referred to as the meta distribution and provides one with fine-grained information on the performance of cellular networks beyond spatial averages. To this end, we approximate, from the typical user standpoint, the spatially correlated (non-Poisson) cellular network with an inhomogeneous Poisson point process. In addition, we employ a new and recently proposed definition of the coverage probability and introduce an efficient numerical method for computing the meta distribution. The accuracy of the proposed approach is validated with the aid of numerical simulations.
On muting mobile terminals for uplink interference mitigation in HetNets—system-level analysis via stochastic geometry
We investigate the performance of a scheduling algorithm where the mobile terminals (MTs) may be turned off if they cause a level of interference greater than a given threshold. This approach, which is referred to as interference aware muting (IAM), may be regarded as an interference-aware scheme that is aimed to reduce the level of interference. We analyze its performance with the aid of stochastic geometry and compare it against other interference-unaware and interference-aware schemes, where the level of interference is kept under control in the power control scheme itself rather than in the scheduling process. IAM is studied in terms of average transmit power, mean and variance of the interference, coverage probability, spectral efficiency (SE), and binary rate (BR), which accounts for the amount of resources allocated to the typical MT. Simplified expressions of SE and BR for adaptive modulation and coding schemes are proposed, which better characterize practical communication systems. Our system-level analysis unveils that IAM increases the BR and reduces the mean and variance of the interference. It is proved that an operating regime exists, where the performance of IAM is independent of the cell association criterion, which simplifies the joint design of uplink and downlink transmissions.
A Survey on Machine-Learning Techniques for UAV-Based Communications
Unmanned aerial vehicles (UAVs) will be an integral part of the next generation wireless communication networks. Their adoption in various communication-based applications is expected to improve coverage and spectral efficiency, as compared to traditional ground-based solutions. However, this new degree of freedom that will be included in the network will also add new challenges. In this context, the machine-learning (ML) framework is expected to provide solutions for the various problems that have already been identified when UAVs are used for communication purposes. In this article, we provide a detailed survey of all relevant research works, in which ML techniques have been used on UAV-based communications for improving various design and functional aspects such as channel modeling, resource management, positioning, and security.
A survey on the handover management in 5G-NR cellular networks: aspects, approaches and challenges
With the purpose of providing higher data rate and ultra-reliable and low-latency communications for the users, employing the small cells in the upcoming Fifth-Generation-New Radio (5G-NR) cellular networks and beyond is leading to the serious challenges in mobility management due to dynamicity of the user equipments (UEs). Among different issues related to the mobility of the UEs, the handover management is one of the key procedures to let the UEs experience a high quality of service (QoS)/quality of experience (QoE). So far, many protocols and algorithms have been proposed to enhance the mobility management in 5G-NR from various aspects, but still a thorough survey has not been incorporated to summarize the recent advances and future directions of the mentioned issue. Thus, the handover management and the corresponding challenges stand in the center of concentrations in this paper, with a glance on 4G to the advancements of 5G-NR. The challenges include QoS/QoE, throughput, delay, traffic load, the attacks during authentication process and resource allocation. To overcome the mentioned challenges, the handover procedure is evaluated by some key performance indicators such as handover ratio, handover failure, radio link failure and such like which depend on the received signal quality. The lack of new advancements and novel aspects of handover plus the separation of security and handover issues in previous works are perceived as research gaps and motivations for the current paper. In this regard, this paper aims to specify and analyze the technical issues, to provide an overview on the proposed methods and recent advances and to bring the future directions into the limelight. We categorize the concurrent standards and methods about the handover, and then, we survey the proposed algorithms including theoretical, algorithm-based and pattern-capturing approaches following the authentication process along with the vulnerabilities and the algorithms to counteract the attacks during handover. Also, we study various issues corresponding to network performance during the handover procedure. Finally, we discuss the open problems and future research directions.
Notes on the Localization of Generalized Hexagonal Cellular Networks
The act of accessing the exact location, or position, of a node in a network is known as the localization of a network. In this methodology, the precise location of each node within a network can be made in the terms of certain chosen nodes in a subset. This subset is known as the locating set and its minimum cardinality is called the locating number of a network. The generalized hexagonal cellular network is a novel structure for the planning and analysis of a network. In this work, we considered conducting the localization of a generalized hexagonal cellular network. Moreover, we determined and proved the exact locating number for this network. Furthermore, in this technique, each node of a generalized hexagonal cellular network can be accessed uniquely. Lastly, we also discussed the generalized version of the locating set and locating number.