Academic literature on the topic 'Routing - D2D Communication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Routing - D2D Communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Routing - D2D Communication"

1

Yang, BaoPing, and Kun Jiang. "Automatic Repair Method for D2D Communication Routing Buffer Overflow Vulnerability in Cellular Network." Scientific Programming 2021 (December 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/3963574.

Full text
Abstract:
Repairing D2D communication routing buffer overflow in a cellular network is of great significance in improving communication quality and security. Due to the increase of user usage, the communication data are easy to exceed the boundary of the buffer, resulting in the reduction of covered data information. The traditional repair methods mainly repair through the characteristics of covered data information, ignoring the impact of network topology information transmission delay and packet loss during calculation, resulting in the problem of low communication security. A cellular network routing buffer overflow repair algorithm based on the homomorphic analysis of node residual energy is proposed; the cellular network D2D communication routing protocol is designed; the cellular network D2D communication protocol path index is determined; then, the cellular network D2D communication routing protocol is designed by analyzing node residual energy; and the cellular network D2D communication network routing optimization method based on AHP is designed. Big constructs the energy model of cellular network D2D communication network, solves and sets the routing optimization objective function, realizes the control of network routing, and repairs the buffer overflow. The experiment results show that the improved method can effectively reduce the packet loss rate of communication data, improve the anti-interference ability of the system, and ensure the security of network communication.
APA, Harvard, Vancouver, ISO, and other styles
2

M. Balakrishna, Yashoda, and Vrinda Shivashetty. "Energy-efficient device-to-device communication in internet of things using hybrid optimization technique." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (October 1, 2023): 5418. http://dx.doi.org/10.11591/ijece.v13i5.pp5418-5430.

Full text
Abstract:
<span lang="EN-US">Device-to-device (D2D) communication has grown into notoriety as a critical component of the internet of things (IoT). One of the primary limitations of IoT devices is restricted battery source. D2D communication is the direct contact between the participating devices that improves the data rate and delivers the data quickly by consuming less battery. An energy-efficient communication method is required to enhance the communication lifetime of the network by reducing the node energy dissipation. The clustering-based D2D communication method is maximally acceptable to boom the durability of a network. The oscillating spider monkey optimization (OSMO) and oscillating particle swarm optimization (OPSO) algorithms are used in this study to improve the selection of cluster heads (CHs) and routing paths for D2D communication. The CHs and D2D communication paths are selected depending on the parameters such as energy consumption, distance, end-to-end delay, link quality and hop count. A simulation environment is designed to evaluate and test the performance of the OSMO-OPSO algorithm with existing D2D communication algorithms (such as the GAPSO-H algorithm, adaptive resource-aware split-learning (ARES), bio-inspired cluster-based routing scheme (Bi-CRS), and European society for medical oncology (ESMO) algorithm). The results proved that the proposed technique outperformed with respect to traditional routing strategies regarding latency, packet delivery, energy efficiency, and network lifetime.</span>
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Jiatong, Zhibo Li, Xuanying Li, and Cheng Wang. "Energy-Saving D2D Wireless Networking Based on ACO and AIA Fusion Algorithm." Security and Communication Networks 2021 (September 6, 2021): 1–9. http://dx.doi.org/10.1155/2021/5781166.

Full text
Abstract:
Lower energy consumption and higher data rate have been becoming the key factors of modern wireless mobile communication for the improvement of user experiences. At present, the commercialization of 5G communications is gradually promoting the development of Internet of things (IoT) techniques. Due to the limited coverage capability of direct wireless communications, the indirect device-to-device (D2D) communications using information relay, in addition to the single 5G base station deployment, have been introduced. Along with the increase of information nodes, the relay devices have to undertake the nonnegligible extra data traffic. In order to adjust and optimize the information routing in D2D services, we present an algorithmic investigation referring to the ant colony optimization (ACO) algorithm and the artificial immune algorithm (AIA). By analyzing the characteristics of these algorithms, we propose a combined algorithm that enables the improved the iterative convergence speed and the calculation robustness of routing path determination. Meanwhile, the D2D optimization pursuing energy saving is numerically demonstrated to be improved than the original algorithms. Based on the simulation results under a typical architecture of 5G cellular network including various information nodes (devices), we show that the algorithmic optimization of D2D routing is potentially valid for the realization of primitive wireless IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Rakhimov, Adel F., and Anna A. Bukharina. "Increasing the Throughput of LTE Using Device-to-Device Communication by Reducing Intra-System Interference Flow." SYNCHROINFO JOURNAL 6, no. 4 (2020): 31–35. http://dx.doi.org/10.36724/2664-066x-2020-6-4-31-35.

Full text
Abstract:
This article focuses on the using collective dynamic route method for D2D LTE networks. It provides algorithms for the analysis stage, taking into account the availability of D2D users and the routing stage, as well as their implementation. The dependencies of the D2D communication routes quantity fraction for various cases of user location are shown.
APA, Harvard, Vancouver, ISO, and other styles
5

Tilwari, Valmik, Taewon Song, and Sangheon Pack. "An Improved Routing Approach for Enhancing QoS Performance for D2D Communication in B5G Networks." Electronics 11, no. 24 (December 10, 2022): 4118. http://dx.doi.org/10.3390/electronics11244118.

Full text
Abstract:
Device-to-device (D2D) communication is one of the eminent promising technologies in Beyond Fifth Generation (B5G) wireless networks. It promises high data rates and ubiquitous coverage with low latency, energy, and spectral efficiency among peer-to-peer users. These advantages enable D2D communication to be fully realized in a multi-hop communication scenario. However, to ideally implement multi-hop D2D communication networks, the routing aspect should be thoroughly addressed since a multi-hop network can perform worse than a conventional mobile system if wrong routing decisions are made without proper mechanisms. Thus, routing in multi-hop networks needs to consider device mobility, battery, link quality, and fairness, which issues do not exist in orthodox cellular networking. Therefore, this paper proposed a mobility, battery, link quality, and contention window size-aware routing (MBLCR) approach to boost the overall network performance. In addition, a multicriteria decision-making (MCDM) method is applied to the relay devices for optimal path establishment, which provides weights according to the evaluated values of the devices. Extensive simulation results under various device speed scenarios show the advantages of the MBLCR compared to conventional algorithms in terms of throughput, packet delivery ratio, latency, and energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
6

Tilwari, Valmik, MHD Hindia, Kaharudin Dimyati, Dushantha Jayakody, Sourabh Solanki, Rashmi Sinha, and Effariza Hanafi. "MBMQA: A Multicriteria-Aware Routing Approach for the IoT 5G Network Based on D2D Communication." Electronics 10, no. 23 (November 26, 2021): 2937. http://dx.doi.org/10.3390/electronics10232937.

Full text
Abstract:
With the rapid development of future wireless networks, device-to-device (D2D) technology is widely used as the communication system in the Internet of Things (IoT) fifth generation (5G) network. The IoT 5G network based on D2D communication technology provides pervasive intelligent applications. However, to realize this reliable technology, several issues need to be critically addressed. Firstly, the device’s energy is constrained during its vital operations due to limited battery power; thereby, the connectivity will suffer from link failures when the device’s energy is exhausted. Similarly, the device’s mobility alters the network topology in an arbitrary manner, which affects the stability of established routes. Meanwhile, traffic congestion occurs in the network due to the backlog packet in the queue of devices. This paper presents a Mobility, Battery, and Queue length Multipath-Aware (MBMQA) routing scheme for the IoT 5G network based on D2D communication to cope with these key challenges. The back-pressure algorithm strategy is employed to divert packet flow and illuminate the device selection’s estimated value. Furthermore, a Multiple-Attributes Route Selection (MARS) metric is applied for the optimal route selection with load balancing in the D2D-based IoT 5G network. Overall, the obtained simulation results demonstrate that the proposed MBMQA routing scheme significantly improves the network performance and quality of service (QoS) as compared with the other existing routing schemes.
APA, Harvard, Vancouver, ISO, and other styles
7

Raja, S., J. Logeshwaran, S. Venkatasubramanian, M. Jayalakshmi, N. Rajeswari, N. G. Olaiya, and Wubishet Degife Mammo. "OCHSA: Designing Energy-Efficient Lifetime-Aware Leisure Degree Adaptive Routing Protocol with Optimal Cluster Head Selection for 5G Communication Network Disaster Management." Scientific Programming 2022 (August 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/5424356.

Full text
Abstract:
As an underlayment to cellular 5G communication network, device-to-device (D2D) communications will not only boost capacity utilization and power efficiency but also provide public health and public safety services. One of the most important requirements for these businesses is to have alternate access to cellular networks in the event that they are partially or completely disrupted as a result of a natural disaster. Despite limited communication coverage and bandwidth scarcity, the 3rd Generation Partnership Project (3GPP) must have developed a new device-to-device (D2D) communication method fundamental enhanced mobile that can strengthen spectral efficiencies besides allowing direct communication of gadgets in close propinquity devoid of transitory by elevated-node B (eNB). Unfortunately, enabling data transmission on a cellular connection offers a challenge in terms of two-way radio source administration, because D2D associates recycle cellular users’ uplink radio resources, which might create interference to D2D user equipment’s (DUE) receiving channels. In this study, we concentrate on optimal cluster head selection using the binary flower pollination optimization algorithm by designing an energy-efficient lifetime-aware leisure degree adaptive routing protocol named OptCH_L-LDAR. This topology is constructed with a multi-hop obliging communication system, instructed on the way to wrap an extensive remoteness connecting source and destination. The proposed OptCH_L-LDAR is compared with three state-of-art methods such as binary flower pollination (BFP) algorithm, time division multiple access (TDMA), and data-driven technique (DDT). As a result, the proposed OptCH_L-LDAR achieves 96% of energy efficiency, 89% of lifetime, 97% of outage probability, and 98% of spectral efficiency.
APA, Harvard, Vancouver, ISO, and other styles
8

Bulashenko, А. V. "COMBINED CRITERION FOR THE CHOICE OF ROUTING BASED ON D2D TECHNOLOGY." Radio Electronics, Computer Science, Control 1, no. 1 (March 23, 2021): 7–13. http://dx.doi.org/10.15588/1607-3274-2021-1-1.

Full text
Abstract:
Context. 5G network is able to improve existing services and provide a new quality of services. 5G communication networks combine various radio technologies and technologies of fixed communication networks, therefore they are often called heterogeneous, which emphasizes their difference from other networks. One of the main features of such networks is over-density and ultra-low latency. It is the Internet of things that is the basic component of the concept of super dense networks. 3GPP suggests planning 5G networks based on the condition that 1 million devices is 1 km2. Also, ultra-low latency communications networks have a big impact on networking methods, especially for the tactile Internet concept. Such networks require decentralization through 1 ms delay requirements. This requires new approaches to building a new generation of networks, which is the reason for the development of new technologies. One such technology is D2D (device-to-device) technology. This technology allows you to reduce the load on the core of the network due to the use of a significant proportion of the traffic directly between devices and reduces the delay in providing services. Objective. The goal of the work is to create an optimal combined criterion for choosing effective traffic routes in a wireless network based on D2D technology. Method. Many modern works are devoted to the study of D2D technology, but they are not exhaustive in the study of routing in such networks. It is objective enough to study networks built on the basis of the interaction of devices with each other using D2D technology, since such interactions have proven to be effective technologies. This, in turn, involves the development of appropriate routing methods in networks using D2D technology, especially taking into account the property of over-density 5G networks. The paper proposes a criterion for selecting routes, taking into account interference within the channels forming the network nodes. This criterion combines the choice of routes according to the length criteria and the criterion of maximum throughput. Results. A developed combined criterion for selecting traffic routing in a wireless network that uses D2D technology. The results of the study are shown in graphic data. Conclusions. The experiments confirmed the efficiency and effectiveness of the developed method and allow us to recommend this method for practical use as a result of route selection, taking into account those network properties that are more likely to affect the quality of the route.
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Sungwook. "A New Cooperative Dual-Level Game Approach for Operator-Controlled Multihop D2D Communications." Mobile Information Systems 2019 (July 4, 2019): 1–11. http://dx.doi.org/10.1155/2019/6276872.

Full text
Abstract:
With the development of wireless communications and the intellectualization of mobile devices, device-to-device (D2D) communications are considered as a standard part of future 5G networks. This new paradigm can provide better user experiences while improving the system performance such as network throughput, latency, fairness, and energy efficiency. In this study, we investigate a new dual-level D2D communication scheme consisting of multiple D2D operators and a group of mobile devices. To model the interaction among D2D operators and devices, we adopt two cooperative game approaches based on the incentive mechanism design and r-egalitarian Shapley value. At the upper level, routing paths and incentive payments for multihop relay services are decided using the incentive mechanism. At the lower level, mobile devices share the given incentive based on the r-egalitarian Shapley value. Both level control procedures are mutually dependent on each other by the proper coordination and collaboration. According to the main features of two cooperative game models, the proposed scheme takes various benefits in a fair-efficient way. Through the derived simulation results, we can verify the superiority of our proposed scheme comparing to the existing protocols. Finally, we propose further challenges and future opportunities in the research area of operator-controlled multihop D2D communications.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Tong, Yongzhe Zhou, Yunfeng Wang, and Mengbo Tang. "Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication." Journal of Computer Networks and Communications 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2717403.

Full text
Abstract:
In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G) mobile communication networks, among which device-to-device (D2D) communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT) is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT) over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Routing - D2D Communication"

1

Yang, Chao-ping, and 楊超評. "Routing Policy for D2D Group Communication." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b4y59r.

Full text
Abstract:
碩士
國立中山大學
資訊工程學系研究所
106
Cisco predicted that mobile traffic will reach over 120 exabytes per month in 2018. Because of that, the Third Generation Partnership Project (3GPP) proposed a technology called “Device-to-Device (D2D)” communication. The first mention of this technology is in 3GPP release12. D2D communications is a novel technology allowing user exchanges of their data over direct links instead of through base stations. D2D can improve system capacity, system throughput and data rate. It also can provide lower latency for user. Moreover, D2D communications play an important role in traffic offloading. In recent years, there are serval research indicating that people will construct stable social structures when they are geographically close. People would like to help each other when they are in the same group. It means that they would help relay data and cache data for other group members. In this paper, we designed an utility function, which consider delay and throughput at the same time, to evaluate the path. Because of the unit of delay and throughput are different, we defined how to standardize them. We also combine the advantages of Bidirectional search and Lifelong Planning A*, propose a new routing policy for group members, which can meet their demands with lower latency and better throughput. Furthermore, we device an utility function in our algorithm to select paths. Our simulation results have shown that the proposed mechanism can choose the path which has better throughput and lower latency. In addition, the proposed mechanism can apply to dynamic topology efficiently.
APA, Harvard, Vancouver, ISO, and other styles
2

Madabhushi, Sireesha. "Optimal Routing and Data Transmission for Multi-Hop D2D Communications." Thesis, 2018. http://etd.iisc.ac.in/handle/2005/4145.

Full text
Abstract:
Device-to-Device (D2D) communication, which enables direct link communication between nodes without going through the infrastructure, has received considerable attention in recent years, particularly in the context of Internet-of-Things (IoT) and machine-to-machine (M2M) communications. It is also slated to be part of the 5G communication standards. The primary advantages of D2D are enhanced spatial frequency reuse leading to better spectral efficiency, reduced out-of-cell interference, better cell-edge coverage, etc. Once implemented, the D2D mode of communication opens up new and interesting avenues for improving the spectral efficiency of a cellular system. A particularly interesting problem in this context is that of routing data over multiple D2D nodes to maximize the end-to-end throughput between a source and destination, while ensuring that the D2D nodes do not cause detrimental interference to the ongoing transmissions in the cellular network. This can potentially result in significantly higher D2D throughput compared to the hitherto-considered single-hop D2D communications paradigm. The main focus of this thesis is to determine a throughput-optimal route between a given source-destination pair under a probabilistic interference constraint imposed by the cellular network, and to analytically characterize the throughput improvement obtainable by multi-hop D2D communications. The first part of the thesis proposes an easy-to-implement routing algorithm to maximize the end-to-end throughput of a given source-destination pair. Next, in order to further increase the throughput on the determined route, a link activation algorithm is proposed, which enables links opportunistically, based on the buffer states of the relay nodes and the link feasibility. Theoretical expressions for throughput, delay and system idle probability are derived by modeling the relay buffer state evolution as a Discrete Time Markov Chain (DTMC). Theory and simulation showcase the performance gains obtained by opportunistic link activation compared to the baseline sequential link activation scheme, where the links are enabled in a round-robin fashion. The second part of the thesis proposes a routing algorithm to maximize the end-to-end throughput between D2D source-destination pair, under an additional per-hop delay constraint. The analytical expression derived for throughput on the multi-hop route facilitates the application of Dijkstra's algorithm, again leading to an easy-to-implement optimal routing algorithm. The tradeoff between throughput and delay is illustrated through simulations. Overall, the results in the thesis are useful for (a) determining throughput optimal and delay-constrained throughput optimal routes between a given source and destination communicating in the D2D mode; (b) analytically characterizing the gains obtainable via multi-hop D2D communications; and (c) performance characterization and comparison of opportunistic link activation (which entails data buffering at the individual nodes) and sequential link activation, in terms of both delay and the throughput achieved
APA, Harvard, Vancouver, ISO, and other styles
3

Elsemary, Hadeer. "Secure Routing in Intelligent Device-to-Device Communications." Doctoral thesis, 2016. http://hdl.handle.net/11858/00-1735-0000-002B-7CC7-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Adaptive routing in data communication networks through reinforcement learning." Tese, MAXWELL, 2000. http://www.maxwell.lambda.ele.puc-rio.br/cgi-bin/db2www/PRG_0991.D2W/SHOW?Cont=1348:pt&Mat=&Sys=&Nr=&Fun=&CdLinPrg=pt.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Routing - D2D Communication"

1

Yashoda, M. B., and Vrinda Shivashetty. "Bi-CRS: Bio-Inspired Cluster-Based Routing Scheme for D2D Communication in IoT." In Proceedings of International Conference on Recent Trends in Computing, 187–99. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7118-0_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

James, Simon. "How Did the Base Work?" In The Roman Military Base at Dura-Europos, Syria. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198743569.003.0028.

Full text
Abstract:
We now consider how the military base area operated, as a zone where a large number of people lived and worked on a routine basis. On one hand, to function it required the affordances of its internal communications, connections with the civil town, and access to roads, river, and lands beyond the walls; on the other, there was a need for surveillance and control of activities within the base, and of movements across its boundary. The most obvious part of the base boundary (Plate XXII) is the substantial mud brick wall ploughed across four blocks from the city defences just S of Tower 21, and blocking Wall, A, C, and D Sts, with a gate established at B St. How the S boundary was defined E of D St has always remained an issue. If it was necessary to build a wall at the W end, why was this not simply continued all the way to, e.g., the S end of the Citadel? Across blocks F7 and F5 it seems that the boundary of the military zone simply comprised party walls between military and civilian-occupied structures. The same was true within block B2, by the Citadel, although the boundary probably comprised building frontages along Lower Main St. On the plateau, as the camp wall may have been a subsequent local enhancement, except where the amphitheatre formed part of it, the boundary may generally have comprised the rear walls of military-held houses lining the S side of 8th St—probably all properties from the city wall to H St. The course of the boundary along the W side of the inner wadi is unknown, but the base is suggested, as along 8th St, to have incorporated at least all properties lining the S side of the Wadi Ascent Road, if not encompassing all blocks on the wadi slope—in which case the boundary here may rather have comprised property frontages on K St. The base area was split by site topography into two major zones, the flat plateau, and the N branch of the inner wadi around the Citadel. Each was further subdivided.
APA, Harvard, Vancouver, ISO, and other styles
3

Krolow, Priscila Jaekel, Patrícia Dias, and Sara Manuela Lopes Oliveira. "How Small Companies Used Shopstreaming in Their Fight for Survival in a COVID-19 Scenario." In Navigating Digital Communication and Challenges for Organizations, 76–92. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9790-3.ch005.

Full text
Abstract:
The digital acceleration triggered by COVID-19 was a disruptive transformation of society, which was not prepared for such quick changes in socialization, work, and consumption, among other activities. We were forced to reinvent ourselves, to pursue the continuity of our daily routines using tools already available, because there was no time to invent better ones. In this context, live performances on social media became very successful as a zero-cost (both for content producers and audiences) and highly engaging format. Brands, and particularly small companies, quickly took over this new tool, adopting a practice that had already emerged a few years ago, consisting of using live streaming as a channel for showcasing products and selling, thus being an alternative to the mandatory closure of stores. In order to better understand this emergent practice, this chapter looks into two examples: Mh2, a Brazilian fashion accessories company which used lives on Instagram to sell its products, and São Costureira, a Portuguese clothing brand which did the same using Facebook.
APA, Harvard, Vancouver, ISO, and other styles
4

Dhar, Subhankar. "Mobile Ad Hoc Network." In Mobile Computing, 952–60. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch077.

Full text
Abstract:
A mobile ad hoc network (MANET) is a temporary, self-organizing network of wireless mobile nodes without the support of any existing infrastructure that may be readily available on conventional networks. It allows various devices to form a network in areas where no communication infrastructure exists. Although there are many problems and challenges that need to be solved before the large-scale deployment of an MANET, small and medium-sized MANETs can be easily deployed. The motivation and development of MANET was mainly triggered by Department of Defense (DoD)-sponsored research work for military applications (Freebersyser and Leiner, 2002). In addition, ad hoc applications for mobile and dynamic environments are also driving the growth of these networks (Illyas, 2003; Perkins, 2002; Toh, 2002). As the number of applications of wireless ad hoc networks grows, the size of the network varies greatly from a network of several mobile computers in a classroom to a network of hundreds of mobile units deployed in a battlefield, for example. The variability in the network size is also true for a particular network over the course of time; a network of a thousand nodes may be split into a number of smaller networks of a few hundred nodes or vice versa as the nodes dynamically move around a deployed area. Ad hoc networks not only have the traditional problems of wireless communications like power management, security, and bandwidth optimization, but also the lack of any fixed infrastructure, and their multihop nature poses new research problems. For example, routing, topology maintenance, location management, and device discovery, to name a few, are important problems and are still active areas of research (Wu & Stojmenovic, 2004).
APA, Harvard, Vancouver, ISO, and other styles
5

Hynes, Deirdre, Tarja Tiainen, Emma-Reetta Koivunen, and Minna-Kristiina Paakki. "Articulating ICT Use Narratives in Everyday Life." In Information Communication Technologies, 2341–49. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch170.

Full text
Abstract:
The most common definition of the information society lays emphasis upon spectacular technological innovation and the transformative effects of new information and communication technologies. The key idea is that breakthroughs in information processing, storage, and transmission have led to the application of information technology in virtually all, public and private, sectors of society (Webster, 1995). By the 1990s, to admire and indeed enthuse over new ICTs had become highly fashionable and popular. Such technological enthusiasm has become so pervasive that it has seeped not only into political and policy discourses, but also into the whole spectrum of the media and fora of public communication (Preston, 2001). In addition, discourses of the information society are often dominated and shaped by male commentators (e.g., Castells, 2000; Gates, 1995; Kelly, 1999; Negroponte, 1995). For example, when compiling a collection of the dominant players of international information-society discourse, Cawley and Trench (2004) were hard-pressed to find female commentators, succeeding only in finding 3 out of a total of 18 critics.1 We argue that the focus on the artefact, and thus technological celebration, takes precedence over the largely ignored field of technological uses and consumption issues. Hence, we present a study that analyses the individual user experiences to challenge the stereotypical user traditions represented by the information-society discourse. We wish to present a counternarrative that shifts the emphasis from technical expertise, and technological and transformative benefits of artefacts to more individual-user-focused narratives. As a result, this brought about a dual-narrative process through which the respondents described their experiences. We found that when people described their uses, consumption patterns, and domestication2 experiences of ICTs, they tended to do so by employing contrasting frames of reference. These frames of reference we have termed the objective lens (or narratives) and subjective lens (or narratives). Through what we term objective narratives, we found that some respondents would describe their use through official and technical frames of reference. For example, they employed primarily dominant information-society jargon to frame how they made sense of technologies and their use experiences. Through subjective narratives, we found that respondents would describe their use and experiences from primarily a personal perspective to explain how the technology fitted their lives, the role it played in their everyday routines and habits, and the associated meaning and significance of the artefact. While these contrasting narratives are not mutually exclusive or contradictory, it became clear from the interviews that a pattern of use narratives was emerging. We found that such narratives slightly reinforced traditional gender roles in which men tend to talk about technologies in highly technical terms of reference, while women portray themselves as technologically helpless or ignorant (Gill & Grint, 1995; Gray, 1992; Lie, 1995). Although we did not look for or find stable gender categories, the emergent gender narratives seem to renew the existing gender roles that link masculinity and technology (Vehviläinen, 2002). With the development of computer technologies, we have witnessed a shift from IT to ICTs. This has resulted in a redefinition of the computer as an artefact: from a mere computational device to the newly emergent multimedia-enhanced computers, or what Paul Mayer (1999, p. 1) calls a “meta-medium.” Today, the conceptualisation of the computer is more problematic. It may be thought of as the Web or Internet, computer games, CD-ROMs (compact disc read-only memory), reference works, e-mail, and a diverse range of applications for displaying and manipulating text, images, graphics, music, databases, and the like. Spilker and Sørenson (2000, p. 270) argue that computers are no longer “primarily about programming, systems, control and calculation,” but instead “a gateway to communication and cultural activities.” The shift in identity has opened up or unlocked the conceptualisation of the computer. Therefore, it is possible for wider audiences and previously excluded groups (such as the elderly and women) to translate the computer into something meaningful in their everyday lives. As a result, we were not solely focused on the computer as a separate technology, but instead on the wide range of information and communication technologies that are available in the domestic setting.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Routing - D2D Communication"

1

Shaikh, Farrukh Salim, and Roland Wismuller. "Interference-Conscious routing in multihop D2D communications." In 2017 2nd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2017. http://dx.doi.org/10.1109/ccoms.2017.8075285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shaikh, Farrukh Salim, and Roland Wismuller. "Centralized adaptive routing in multihop cellular D2D communications." In 2017 2nd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2017. http://dx.doi.org/10.1109/ccoms.2017.8075287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bastos, Alex Vidigal, Cristiano M. Silva, and Diogenes C. da Silva. "Assisted routing algorithm for D2D communication in 5G wireless networks." In 2018 Wireless Days (WD). IEEE, 2018. http://dx.doi.org/10.1109/wd.2018.8361688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmed, Rana E. "A Novel Multi-Hop Routing Protocol for D2D Communications in 5G." In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2021. http://dx.doi.org/10.1109/ccwc51732.2021.9375946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Yuhong, Haoyue Xue, Zhihui Gai, Xirong Que, Xiang Su, and Jukka Riekki. "A cluster-based routing method for D2D communication oriented to vehicular networks." In 2017 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2017. http://dx.doi.org/10.1109/smc.2017.8123046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Sai, Oh-Soon Shin, and Yoan Shin. "Social-Aware Routing for Multi-hop D2D Communication in Relay Cellular Networks." In 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2019. http://dx.doi.org/10.1109/icufn.2019.8806134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nematy, Hoda. "Secure Protocol for Four D2D Scenarios." In 2nd International Conference on Machine Learning &Trends (MLT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.111102.

Full text
Abstract:
In traditional cellular infrastructure, cellular devices communicate with each other directly even when they are close together. This strategy causes massive traffic to the cellular network therefore D2D communication has introduced to overcome this issue, bring more bandwidth and also higher rates to the cellular network. One of the major challenges for D2D Communication is to have one single secure protocol that can adapt in four D2D scenarios defined in references. These scenarios are Direct D2D and relaying D2D communication with and without cellular infrastructure. In this paper, we propose a Secure D2D protocol based on ARIADNE with TESLA. Also we use LTE-A AKA protocol for authentication and key agreement procedure between Source and Destination. Next, we adapt this scenario to be applicable in without cellular infrastructure ones. This protocol could be used in direct D2D also. Based on the results, our proposed protocol has a few computation overhead compare to recent works and have less communication overhead than SODE with preserve many security properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, Secure Routing Transmission…. We check Authentication, Confidentiality, Reachability and Secure Key Agreement of the proposed protocol with ProVerif verification tools.
APA, Harvard, Vancouver, ISO, and other styles
8

Fang, Yujian, Yuezhi Zhou, Xiaohong Jiang, Di Zhang, and Yaoxue Zhang. "Game Theoretic D2D Content Sharing: Joint Participants Selection, Routing and Pricing." In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2017. http://dx.doi.org/10.1109/icccn.2017.8038368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bunu, Sanusi Mohammed, Mo Saraee, and Omar Alani. "Machine Learning-Based Optimized Link State Routing Protocol for D2D Communication in 5G/B5G." In 2022 International Conference on Electrical Engineering and Informatics (ICELTICs). IEEE, 2022. http://dx.doi.org/10.1109/iceltics56128.2022.9932126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhardwaj, Vinnu, and Chandra R. Murthy. "On optimal routing and power allocation for D2D communications." In ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2015. http://dx.doi.org/10.1109/icassp.2015.7178534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography