Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 58
Filtrar
Más filtros











Base de datos
Intervalo de año de publicación
1.
Nanotechnology ; 35(41)2024 Jul 25.
Artículo en Inglés | MEDLINE | ID: mdl-38991518

RESUMEN

Physical implementations of reservoir computing (RC) based on the emerging memristors have become promising candidates of unconventional computing paradigms. Traditionally, sequential approaches by time-multiplexing volatile memristors have been prevalent because of their low hardware overhead. However, they suffer from the problem of speed degradation and fall short of capturing the spatial relationship between the time-domain inputs. Here, we explore a new avenue for RC using memristor crossbar arrays with device-to-device variations, which serve as physical random weight matrices of the reservoir layers, enabling faster computation thanks to the parallelism of matrix-vector multiplication as an intensive operation in RC. To achieve this new RC architecture, ultralow-current, self-selective memristors are fabricated and integrated without the need of transistors, showing greater potential of high scalability and three-dimensional integrability compared to the previous realizations. The information processing ability of our RC system is demonstrated in asks of recognizing digit images and waveforms. This work indicates that the 'nonidealities' of the emerging memristor devices and circuits are a useful source of inspiration for new computing paradigms.

2.
Sensors (Basel) ; 24(11)2024 Jun 06.
Artículo en Inglés | MEDLINE | ID: mdl-38894484

RESUMEN

The research on high-precision and all-scenario localization using the millimeter-wave (mmWave) band is of great urgency. Due to the characteristics of mmWave, blockages make the localization task more complex. This paper proposes a cooperative localization system among user equipment (UEs) assisted by reconfigurable intelligent surfaces (RISs), which considers device-to-device (D2D) communication. RISs are used as anchor points, and position estimation is achieved through signal exchanges between UEs. Firstly, we establish a localization model based on this system and derive the UEs' positioning error bound (PEB) as a performance metric. Then, a UE-RIS joint beamforming design is proposed to optimize channel state information (CSI) with the objective of achieving the minimum PEB. Finally, simulation analysis demonstrates the advantages of the proposed scheme over RIS-assisted base station positioning, achieving centimeter-level accuracy with a 10 dBm lower transmission power.

3.
Sensors (Basel) ; 24(8)2024 Apr 11.
Artículo en Inglés | MEDLINE | ID: mdl-38676072

RESUMEN

The Internet of Things (IoT) is what we have as a great breakthrough in the 5G network. Although the 5G network can support several Internet of Everything (IoE) services, 6G is the network to fully support that. This paper is a survey research presenting the 5G and IoT technology and the challenges coming, with the 6G network being the new alternative network coming to solve these issues and limitations we are facing with 5G. A reference to the Control Plane and User Plane Separation (CUPS) is made with IPv4 and IPv6, addressing which is the foundation of the network slicing for the 5G core network. In comparison to other related papers, we provide in-depth information on how the IoT is going to affect our lives and how this technology is handled as the IoE in the 6G network. Finally, a full reference is made to the 6G network, with its challenges compared to the 5G network.

4.
Entropy (Basel) ; 26(3)2024 Mar 12.
Artículo en Inglés | MEDLINE | ID: mdl-38539761

RESUMEN

D2D coded caching, originally introduced by Ji, Caire, and Molisch, significantly improves communication efficiency by applying the multi-cast technology proposed by Maddah-Ali and Niesen to the D2D network. Most prior works on D2D coded caching are based on the assumption that all users will request content at the beginning of the delivery phase. However, in practice, this is often not the case. Motivated by this consideration, this paper formulates a new problem called request-robust D2D coded caching. The considered problem includes K users and a content server with access to N files. Only r users, known as requesters, request a file each at the beginning of the delivery phase. The objective is to minimize the average and worst-case delivery rate, i.e., the average and worst-case number of broadcast bits from all users among all possible demands. For this novel D2D coded caching problem, we propose a scheme based on uncoded cache placement and exploiting common demands and one-shot delivery. We also propose information-theoretic converse results under the assumption of uncoded cache placement. Furthermore, we adapt the scheme proposed by Yapar et al. for uncoded cache placement and one-shot delivery to the request-robust D2D coded caching problem and prove that the performance of the adapted scheme is order optimal within a factor of two under uncoded cache placement and within a factor of four in general. Finally, through numerical evaluations, we show that the proposed scheme outperforms known D2D coded caching schemes applied to the request-robust scenario for most cache size ranges.

6.
Sensors (Basel) ; 23(8)2023 Apr 13.
Artículo en Inglés | MEDLINE | ID: mdl-37112301

RESUMEN

We propose and investigate a bidirectional device-to-device (D2D) transmission scheme that exploits cooperative downlink non-orthogonal multiple access (NOMA) (termed as BCD-NOMA). In BCD-NOMA, two source nodes communicate with their corresponding destination nodes via a relaying node while exchanging bidirectional D2D messages simultaneously. BCD-NOMA is designed for improved outage probability (OP) performance, high ergodic capacity (EC) and high energy efficiency by allowing two sources to share the same relaying node for data transmission to their corresponding destination nodes while also facilitating bidirectional D2D communications exploiting downlink NOMA. Simulation and analytical expressions of the OP, EC and ergodic sum capacity (ESC) under both perfect and imperfect successive interference cancellation (SIC) are used to demonstrate the effectiveness of BCD-NOMA compared to conventional schemes.

7.
Sensors (Basel) ; 23(4)2023 Feb 20.
Artículo en Inglés | MEDLINE | ID: mdl-36850954

RESUMEN

Fifth generation (5G) is a recent wireless communication technology in mobile networks. The key parameters of 5G are enhanced coverage, ultra reliable low latency, high data rates, massive connectivity and better support to mobility. Enhanced coverage is one of the major issues in the 5G and beyond 5G networks, which will be affecting the overall system performance and end user experience. The increasing number of base stations may increase the coverage but it leads to interference between the cell edge users, which in turn impacts the coverage. Therefore, enhanced coverage is one of the future challenging issues in cellular networks. In this survey, coverage enhancement techniques are explored to improve the overall system performance, throughput, coverage capacity, spectral efficiency, outage probability, data rates, and latency. The main aim of this article is to highlight the recent developments and deployments made towards the enhanced network coverage and to discuss its future research challenges.

8.
Sensors (Basel) ; 22(24)2022 Dec 15.
Artículo en Inglés | MEDLINE | ID: mdl-36560266

RESUMEN

The fast expansion of ICT (information and communications technology) has provided rich sources of data for the analysis, modeling, and interpretation of human mobility patterns. Many researchers have already introduced behavior-aware protocols for a better understanding of architecture and realistic modeling of behavioral characteristics, similarities, and aggregation of mobile users. We are introducing the similarity analytical framework for the mobile encountering analysis to allow for more direct integration between the physical world and cyber-based systems. In this research, we propose a method for finding the similarity behavior of users' mobility patterns based on location and time. This research was conducted to develop a technique for producing co-occurrence matrices of users based on their similar behaviors to determine their encounters. Our approach, named SAA (similarity analysis approach), makes use of the device info i.e., IP (internet protocol) and MAC (media access control) address, providing an in-depth analysis of similarity behaviors on a daily basis. We analyzed the similarity distributions of users on different days of the week for different locations based on their real movements. The results show similar characteristics of users with common mobility behaviors based on location and time to showcase the efficacy. The results show that the proposed SAA approach is 33% more accurate in terms of recognizing the user's similarity as compared to the existing similarity approach.


Asunto(s)
Comunicación , Humanos
9.
Entropy (Basel) ; 24(12)2022 Nov 24.
Artículo en Inglés | MEDLINE | ID: mdl-36554127

RESUMEN

Device-to-device (D2D) technology enables direct communication between devices, which can effectively solve the problem of insufficient spectrum resources in 5G communication technology. Since the channels are shared among multiple D2D user pairs, it may lead to serious interference between D2D user pairs. In order to reduce interference, effectively increase network capacity, and improve wireless spectrum utilization, this paper proposed a distributed resource allocation algorithm with the joint of a deep Q network (DQN) and an unsupervised learning network. Firstly, a DQN algorithm was constructed to solve the channel allocation in the dynamic and unknown environment in a distributed manner. Then, a deep power control neural network with the unsupervised learning strategy was constructed to output an optimized channel power control scheme to maximize the spectrum transmit sum-rate through the corresponding constraint processing. As opposed to traditional centralized approaches that require the collection of instantaneous global network information, the algorithm proposed in this paper used each transmitter as a learning agent to make channel selection and power control through a small amount of state information collected locally. The simulation results showed that the proposed algorithm was more effective in increasing the convergence speed and maximizing the transmit sum-rate than other traditional centralized and distributed algorithms.

10.
Sensors (Basel) ; 22(23)2022 Dec 03.
Artículo en Inglés | MEDLINE | ID: mdl-36502159

RESUMEN

In this paper, a resource allocation (RA) scheme based on deep reinforcement learning (DRL) is designed for device-to-device (D2D) communications underlay cellular networks. The goal of RA is to determine the transmission power and spectrum channel of D2D links to maximize the sum of the average effective throughput of all cellular and D2D links in a cell accumulated over multiple time steps, where a cellular channel can be allocated to multiple D2D links. Allowing a cellular channel to be shared by multiple D2D links and considering performance over multiple time steps require a high level of system overhead and computational complexity so that optimal RA is practically infeasible in this scenario, especially when a large number of D2D links are involved. To mitigate the complexity, we propose a sub-optimal RA scheme based on a multi-agent DRL, which operates with shared information in participating devices, such as locations and allocated resources. Each agent corresponds to each D2D link and multiple agents perform learning in a staggered and cyclic manner. The proposed DRL-based RA scheme allocates resources to D2D devices promptly according to dynamically varying network set-ups, including device locations. The proposed sub-optimal RA scheme outperforms other schemes, where the performance gain becomes significant when the densities of devices in a cell are high.


Asunto(s)
Comunicación , Asignación de Recursos , Aprendizaje
11.
Sensors (Basel) ; 22(15)2022 Aug 02.
Artículo en Inglés | MEDLINE | ID: mdl-35957333

RESUMEN

Resource allocation (RA) has always had a prominent place in wireless communications research due to its significance for network throughput maximization, and its inherent complexity. Concurrently, graph-based solutions for RA have also grown in importance, providing opportunities for higher throughput and efficiency due to their representational capabilities, as well as challenges for realizing scalable algorithms. This article presents a comprehensive review and analysis of graph-based RA methods in three major wireless network types: cellular homogeneous and heterogeneous, device-to-device, and cognitive radio networks. The main design characteristics, as well as directions for future research, are provided for each of these categories. On the basis of this review, the concept of Graph-based Resource allocation for Integrated Space and Terrestrial communications (GRIST) is proposed. It describes the inter-connectivity and coexistence of various terrestrial and non-terrestrial networks via a hypergraph and its attributes. In addition, the implementation challenges of GRIST are explained in detail. Finally, to complement GRIST, a scheme for determining the appropriate balance between different design considerations is introduced. It is described via a simplified complete graph-based design process for resource management algorithms.


Asunto(s)
Redes de Comunicación de Computadores , Tecnología Inalámbrica , Algoritmos , Asignación de Recursos
12.
Entropy (Basel) ; 24(8)2022 Jul 27.
Artículo en Inglés | MEDLINE | ID: mdl-36010698

RESUMEN

Caching technique is a promising approach to reduce the heavy traffic load and improve user latency experience for the Internet of Things (IoT). In this paper, by exploiting edge cache resources and communication opportunities in device-to-device (D2D) networks and broadcast networks, two novel coded caching schemes are proposed that greatly reduce transmission latency for the centralized and decentralized caching settings, respectively. In addition to the multicast gain, both schemes obtain an additional cooperation gain offered by user cooperation and an additional parallel gain offered by the parallel transmission among the server and users. With a newly established lower bound on the transmission delay, we prove that the centralized coded caching scheme is order-optimal, i.e., achieving a constant multiplicative gap within the minimum transmission delay. The decentralized coded caching scheme is also order-optimal if each user's cache size is larger than a threshold which approaches zero as the total number of users tends to infinity. Moreover, theoretical analysis shows that to reduce the transmission delay, the number of users sending signals simultaneously should be appropriately chosen according to the user's cache size, and always letting more users send information in parallel could cause high transmission delay.

13.
Sensors (Basel) ; 22(13)2022 Jun 29.
Artículo en Inglés | MEDLINE | ID: mdl-35808389

RESUMEN

We investigate a power control problem for overlay device-to-device (D2D) communication networks relying on a deep deterministic policy gradient (DDPG), which is a model-free off-policy algorithm for learning continuous actions such as transmitting power levels. We propose a DDPG-based self-regulating power control scheme whereby each D2D transmitter can autonomously determine its transmission power level with only local channel gains that can be measured from the sounding symbols transmitted by D2D receivers. The performance of the proposed scheme is analyzed in terms of average sum-rate and energy efficiency and compared to several conventional schemes. Our numerical results show that the proposed scheme increases the average sum-rate compared to the conventional schemes, even with severe interference caused by increasing the number of D2D pairs or high transmission power, and the proposed scheme has the highest energy efficiency.

14.
Sensors (Basel) ; 22(7)2022 Mar 23.
Artículo en Inglés | MEDLINE | ID: mdl-35408066

RESUMEN

Recent developments in telecommunication world have allowed customers to share the storage and processing capabilities of their devices by providing services through fast and reliable connections. This evolution, however, requires building an incentive system to encourage information exchange in future telecommunication networks. In this study, we propose a mechanism to share bandwidth and processing resources among subscribers using smart contracts and a blockchain-based incentive mechanism, which is used to encourage subscribers to share their resources. We demonstrate the applicability of the proposed method through two use cases: (i) exchanging multimedia data and (ii) CPU sharing. We propose a universal user-to-user and user-to-operator payment system, named TelCash, which provides a solution for current roaming problems and establishes trust in X2X communications. TelCash has a great potential in solving the charges of roaming and reputation management (reliance) problems in telecommunications sector. We also show, by using a simulation study, that encouraging D2D communication leads to a significant increase in content quality, and there is a threshold after which downloading from base station is dramatically cut down and can be kept as low as 10%.

15.
ACS Nano ; 16(2): 2866-2876, 2022 02 22.
Artículo en Inglés | MEDLINE | ID: mdl-35143159

RESUMEN

Brain-inspired computing enabled by memristors has gained prominence over the years due to the nanoscale footprint and reduced complexity for implementing synapses and neurons. The demonstration of complex neuromorphic circuits using conventional materials systems has been limited by high cycle-to-cycle and device-to-device variability. Two-dimensional (2D) materials have been used to realize transparent, flexible, ultra-thin memristive synapses for neuromorphic computing, but with limited knowledge on the statistical variation of devices. In this work, we demonstrate ultra-low-variability synapses using chemical vapor deposited 2D MoS2 as the switching medium with Ti/Au electrodes. These devices, fabricated using a transfer-free process, exhibit ultra-low variability in SET voltage, RESET power distribution, and synaptic weight update characteristics. This ultra-low variability is enabled by the interface rendered by a Ti/Au top contact on Si-rich MoS2 layers of mixed orientation, corroborated by transmission electron microscopy (TEM), electron energy loss spectroscopy (EELS), and X-ray photoelectron spectroscopy (XPS). TEM images further confirm the stability of the device stack even after subjecting the device to 100 SET-RESET cycles. Additionally, we implement logic gates by monolithic integration of MoS2 synapses with MoS2 leaky integrate-and-fire neurons to show the viability of these devices for non-von Neumann computing.


Asunto(s)
Molibdeno , Sinapsis , Encéfalo , Neuronas/fisiología , Sinapsis/fisiología
16.
Sensors (Basel) ; 22(3)2022 Jan 29.
Artículo en Inglés | MEDLINE | ID: mdl-35161802

RESUMEN

To supporting a wider and diverse range of applications, device-to-device (D2D) communication is a key enabler in heterogeneous cellular networks (HetCNets). It plays an important role in fulfilling the performance and quality of service (QoS) requirements for 5G networks and beyond. D2D-enabled cellular networks enable user equipment (UE) to communicate directly, without any or with a partial association with base stations (eNBs). Interference management is one of the critical and complex issues in D2D-enabled HetCNets. Despite the wide adoption of D2D communications, there are very few researchers addressing the problems of mode selection (MS), as well as resource allocation for mutual interference in three-tier cellular networks. In this paper, we first identify and analyze three key factors, namely outage probability, signal-to-interference and noise ratio (SINR), and cell density that influence the performance of D2D-enabled HetCNets. We then propose a dynamic algorithm based on a distance-based approach to minimize the interference and to guarantee QoS for both cellular and D2D communication links. Results obtained show that outage probability is improved by 35% and 49% in eNB and SCeNB links, respectively, when compared with traditional neighbor-based methods. The findings reported in this paper provide some insights into interference management in D2D communications that can help network researchers and engineers contribute to further developing next-generation cellular networks.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores , Comunicación , Probabilidad , Relación Señal-Ruido
17.
Sensors (Basel) ; 22(4)2022 Feb 13.
Artículo en Inglés | MEDLINE | ID: mdl-35214350

RESUMEN

Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effective results. Although this technology offers extraordinary results, but at the same time, it also offers multifarious security perils that need to be handled effectively to preserve the trust among all engaged stakeholders. For this, the literature proposes several authentications and data preservation schemes, but somehow they fail to tackle this issue with effectual results. Keeping in view, these constraints, in this paper, we proposed a lightweight authentication and data preservation scheme for IoT based-CPS utilizing deep learning (DL) to facilitate decentralized authentication among legal devices. With decentralized authentication, we have depreciated the validation latency among pairing devices followed by improved communication statistics. Moreover, the experimental results were compared with the benchmark models to acknowledge the significance of our model. During the evaluation phase, the proposed model reveals incredible advancement in terms of comparative parameters in comparison with benchmark models.


Asunto(s)
Seguridad Computacional , Internet de las Cosas , Comunicación , Atención a la Salud , Tecnología
18.
Sensors (Basel) ; 22(4)2022 Feb 14.
Artículo en Inglés | MEDLINE | ID: mdl-35214357

RESUMEN

This paper comprehensively investigates the performance of the D2D underlaying cellular networks where D2D communications are operated concurrently with cellular networks provided that the aggregate interference measured on licensed users is strictly guaranteed. In particular, we derive the outage probability (OP), the average rate, and the amount of fading (AoF) of the D2D networks in closed-form expressions under three distinct power allocation schemes, i.e., the path-loss-based, equal, and random allocation schemes. It is noted that the considered networks take into consideration the impact of the intra-D2D networks, the inter-interference from the cellular networks and background noise, thus involving many random variables and leading to a complicated mathematical framework. Moreover, we also reveal the behavior of the OP with respect to the transmit power based on the rigorous mathematical frameworks rather than the computer-based simulation results. The derived framework shows that increasing the transmit power is beneficial for the OP of the D2D users. Regarding the cellular networks, the coverage probability (Pcov) of the cellular users is computed in closed-form expression too. Monte Carlo simulations are given to verify the accuracy of the proposed mathematical frameworks. Our findings illustrate that the power allocation method based on prior path-loss information outperforms the other methods in the average sum rate.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores , Simulación por Computador , Método de Montecarlo , Probabilidad
19.
Sensors (Basel) ; 22(4)2022 Feb 17.
Artículo en Inglés | MEDLINE | ID: mdl-35214450

RESUMEN

Ultra-reliable and low-latency communication (URLLC) is considered as one of the major use cases in 5G networks to support the emerging mission-critical applications. One of the possible tools to achieve URLLC is the device-to-device (D2D) network. Due to the physical proximity of communicating devices, D2D networks can significantly improve the latency and reliability performance of wireless communication. However, the resource management of D2D networks is usually a non-convex combinatorial problem that is difficult to solve. Traditional methods usually optimize the resource allocation in an iterative way, which leads to high computational complexity. In this paper, we investigate the resource allocation problem in the time-sensitive D2D network where the latency and reliability performance is modeled by the achievable rate in the short blocklength regime. We first design a game theory-based algorithm as the baseline. Then, we propose a deep learning (DL)-based resource management framework using deep neural network (DNN). The simulation results show that the proposed DL-based method achieves almost the same performance as the baseline algorithm, while it is more time-efficient due to the end-to-end structure.

20.
IEEE Internet Things J ; 9(22): 22173-22183, 2022 Nov 15.
Artículo en Inglés | MEDLINE | ID: mdl-37448955

RESUMEN

Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer their captured data from source towards the destination. Our evaluation results demonstrate that Hash-MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA