Gotowa bibliografia na temat „Routing - D2D Communication”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Routing - D2D Communication”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Routing - D2D Communication"

1

Yang, BaoPing, i Kun Jiang. "Automatic Repair Method for D2D Communication Routing Buffer Overflow Vulnerability in Cellular Network". Scientific Programming 2021 (20.12.2021): 1–12. http://dx.doi.org/10.1155/2021/3963574.

Pełny tekst źródła
Streszczenie:
Repairing D2D communication routing buffer overflow in a cellular network is of great significance in improving communication quality and security. Due to the increase of user usage, the communication data are easy to exceed the boundary of the buffer, resulting in the reduction of covered data information. The traditional repair methods mainly repair through the characteristics of covered data information, ignoring the impact of network topology information transmission delay and packet loss during calculation, resulting in the problem of low communication security. A cellular network routing buffer overflow repair algorithm based on the homomorphic analysis of node residual energy is proposed; the cellular network D2D communication routing protocol is designed; the cellular network D2D communication protocol path index is determined; then, the cellular network D2D communication routing protocol is designed by analyzing node residual energy; and the cellular network D2D communication network routing optimization method based on AHP is designed. Big constructs the energy model of cellular network D2D communication network, solves and sets the routing optimization objective function, realizes the control of network routing, and repairs the buffer overflow. The experiment results show that the improved method can effectively reduce the packet loss rate of communication data, improve the anti-interference ability of the system, and ensure the security of network communication.
Style APA, Harvard, Vancouver, ISO itp.
2

M. Balakrishna, Yashoda, i Vrinda Shivashetty. "Energy-efficient device-to-device communication in internet of things using hybrid optimization technique". International Journal of Electrical and Computer Engineering (IJECE) 13, nr 5 (1.10.2023): 5418. http://dx.doi.org/10.11591/ijece.v13i5.pp5418-5430.

Pełny tekst źródła
Streszczenie:
<span lang="EN-US">Device-to-device (D2D) communication has grown into notoriety as a critical component of the internet of things (IoT). One of the primary limitations of IoT devices is restricted battery source. D2D communication is the direct contact between the participating devices that improves the data rate and delivers the data quickly by consuming less battery. An energy-efficient communication method is required to enhance the communication lifetime of the network by reducing the node energy dissipation. The clustering-based D2D communication method is maximally acceptable to boom the durability of a network. The oscillating spider monkey optimization (OSMO) and oscillating particle swarm optimization (OPSO) algorithms are used in this study to improve the selection of cluster heads (CHs) and routing paths for D2D communication. The CHs and D2D communication paths are selected depending on the parameters such as energy consumption, distance, end-to-end delay, link quality and hop count. A simulation environment is designed to evaluate and test the performance of the OSMO-OPSO algorithm with existing D2D communication algorithms (such as the GAPSO-H algorithm, adaptive resource-aware split-learning (ARES), bio-inspired cluster-based routing scheme (Bi-CRS), and European society for medical oncology (ESMO) algorithm). The results proved that the proposed technique outperformed with respect to traditional routing strategies regarding latency, packet delivery, energy efficiency, and network lifetime.</span>
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Jiatong, Zhibo Li, Xuanying Li i Cheng Wang. "Energy-Saving D2D Wireless Networking Based on ACO and AIA Fusion Algorithm". Security and Communication Networks 2021 (6.09.2021): 1–9. http://dx.doi.org/10.1155/2021/5781166.

Pełny tekst źródła
Streszczenie:
Lower energy consumption and higher data rate have been becoming the key factors of modern wireless mobile communication for the improvement of user experiences. At present, the commercialization of 5G communications is gradually promoting the development of Internet of things (IoT) techniques. Due to the limited coverage capability of direct wireless communications, the indirect device-to-device (D2D) communications using information relay, in addition to the single 5G base station deployment, have been introduced. Along with the increase of information nodes, the relay devices have to undertake the nonnegligible extra data traffic. In order to adjust and optimize the information routing in D2D services, we present an algorithmic investigation referring to the ant colony optimization (ACO) algorithm and the artificial immune algorithm (AIA). By analyzing the characteristics of these algorithms, we propose a combined algorithm that enables the improved the iterative convergence speed and the calculation robustness of routing path determination. Meanwhile, the D2D optimization pursuing energy saving is numerically demonstrated to be improved than the original algorithms. Based on the simulation results under a typical architecture of 5G cellular network including various information nodes (devices), we show that the algorithmic optimization of D2D routing is potentially valid for the realization of primitive wireless IoT networks.
Style APA, Harvard, Vancouver, ISO itp.
4

Rakhimov, Adel F., i Anna A. Bukharina. "Increasing the Throughput of LTE Using Device-to-Device Communication by Reducing Intra-System Interference Flow". SYNCHROINFO JOURNAL 6, nr 4 (2020): 31–35. http://dx.doi.org/10.36724/2664-066x-2020-6-4-31-35.

Pełny tekst źródła
Streszczenie:
This article focuses on the using collective dynamic route method for D2D LTE networks. It provides algorithms for the analysis stage, taking into account the availability of D2D users and the routing stage, as well as their implementation. The dependencies of the D2D communication routes quantity fraction for various cases of user location are shown.
Style APA, Harvard, Vancouver, ISO itp.
5

Tilwari, Valmik, Taewon Song i Sangheon Pack. "An Improved Routing Approach for Enhancing QoS Performance for D2D Communication in B5G Networks". Electronics 11, nr 24 (10.12.2022): 4118. http://dx.doi.org/10.3390/electronics11244118.

Pełny tekst źródła
Streszczenie:
Device-to-device (D2D) communication is one of the eminent promising technologies in Beyond Fifth Generation (B5G) wireless networks. It promises high data rates and ubiquitous coverage with low latency, energy, and spectral efficiency among peer-to-peer users. These advantages enable D2D communication to be fully realized in a multi-hop communication scenario. However, to ideally implement multi-hop D2D communication networks, the routing aspect should be thoroughly addressed since a multi-hop network can perform worse than a conventional mobile system if wrong routing decisions are made without proper mechanisms. Thus, routing in multi-hop networks needs to consider device mobility, battery, link quality, and fairness, which issues do not exist in orthodox cellular networking. Therefore, this paper proposed a mobility, battery, link quality, and contention window size-aware routing (MBLCR) approach to boost the overall network performance. In addition, a multicriteria decision-making (MCDM) method is applied to the relay devices for optimal path establishment, which provides weights according to the evaluated values of the devices. Extensive simulation results under various device speed scenarios show the advantages of the MBLCR compared to conventional algorithms in terms of throughput, packet delivery ratio, latency, and energy efficiency.
Style APA, Harvard, Vancouver, ISO itp.
6

Tilwari, Valmik, MHD Hindia, Kaharudin Dimyati, Dushantha Jayakody, Sourabh Solanki, Rashmi Sinha i Effariza Hanafi. "MBMQA: A Multicriteria-Aware Routing Approach for the IoT 5G Network Based on D2D Communication". Electronics 10, nr 23 (26.11.2021): 2937. http://dx.doi.org/10.3390/electronics10232937.

Pełny tekst źródła
Streszczenie:
With the rapid development of future wireless networks, device-to-device (D2D) technology is widely used as the communication system in the Internet of Things (IoT) fifth generation (5G) network. The IoT 5G network based on D2D communication technology provides pervasive intelligent applications. However, to realize this reliable technology, several issues need to be critically addressed. Firstly, the device’s energy is constrained during its vital operations due to limited battery power; thereby, the connectivity will suffer from link failures when the device’s energy is exhausted. Similarly, the device’s mobility alters the network topology in an arbitrary manner, which affects the stability of established routes. Meanwhile, traffic congestion occurs in the network due to the backlog packet in the queue of devices. This paper presents a Mobility, Battery, and Queue length Multipath-Aware (MBMQA) routing scheme for the IoT 5G network based on D2D communication to cope with these key challenges. The back-pressure algorithm strategy is employed to divert packet flow and illuminate the device selection’s estimated value. Furthermore, a Multiple-Attributes Route Selection (MARS) metric is applied for the optimal route selection with load balancing in the D2D-based IoT 5G network. Overall, the obtained simulation results demonstrate that the proposed MBMQA routing scheme significantly improves the network performance and quality of service (QoS) as compared with the other existing routing schemes.
Style APA, Harvard, Vancouver, ISO itp.
7

Raja, S., J. Logeshwaran, S. Venkatasubramanian, M. Jayalakshmi, N. Rajeswari, N. G. Olaiya i Wubishet Degife Mammo. "OCHSA: Designing Energy-Efficient Lifetime-Aware Leisure Degree Adaptive Routing Protocol with Optimal Cluster Head Selection for 5G Communication Network Disaster Management". Scientific Programming 2022 (25.08.2022): 1–11. http://dx.doi.org/10.1155/2022/5424356.

Pełny tekst źródła
Streszczenie:
As an underlayment to cellular 5G communication network, device-to-device (D2D) communications will not only boost capacity utilization and power efficiency but also provide public health and public safety services. One of the most important requirements for these businesses is to have alternate access to cellular networks in the event that they are partially or completely disrupted as a result of a natural disaster. Despite limited communication coverage and bandwidth scarcity, the 3rd Generation Partnership Project (3GPP) must have developed a new device-to-device (D2D) communication method fundamental enhanced mobile that can strengthen spectral efficiencies besides allowing direct communication of gadgets in close propinquity devoid of transitory by elevated-node B (eNB). Unfortunately, enabling data transmission on a cellular connection offers a challenge in terms of two-way radio source administration, because D2D associates recycle cellular users’ uplink radio resources, which might create interference to D2D user equipment’s (DUE) receiving channels. In this study, we concentrate on optimal cluster head selection using the binary flower pollination optimization algorithm by designing an energy-efficient lifetime-aware leisure degree adaptive routing protocol named OptCH_L-LDAR. This topology is constructed with a multi-hop obliging communication system, instructed on the way to wrap an extensive remoteness connecting source and destination. The proposed OptCH_L-LDAR is compared with three state-of-art methods such as binary flower pollination (BFP) algorithm, time division multiple access (TDMA), and data-driven technique (DDT). As a result, the proposed OptCH_L-LDAR achieves 96% of energy efficiency, 89% of lifetime, 97% of outage probability, and 98% of spectral efficiency.
Style APA, Harvard, Vancouver, ISO itp.
8

Bulashenko, А. V. "COMBINED CRITERION FOR THE CHOICE OF ROUTING BASED ON D2D TECHNOLOGY". Radio Electronics, Computer Science, Control 1, nr 1 (23.03.2021): 7–13. http://dx.doi.org/10.15588/1607-3274-2021-1-1.

Pełny tekst źródła
Streszczenie:
Context. 5G network is able to improve existing services and provide a new quality of services. 5G communication networks combine various radio technologies and technologies of fixed communication networks, therefore they are often called heterogeneous, which emphasizes their difference from other networks. One of the main features of such networks is over-density and ultra-low latency. It is the Internet of things that is the basic component of the concept of super dense networks. 3GPP suggests planning 5G networks based on the condition that 1 million devices is 1 km2. Also, ultra-low latency communications networks have a big impact on networking methods, especially for the tactile Internet concept. Such networks require decentralization through 1 ms delay requirements. This requires new approaches to building a new generation of networks, which is the reason for the development of new technologies. One such technology is D2D (device-to-device) technology. This technology allows you to reduce the load on the core of the network due to the use of a significant proportion of the traffic directly between devices and reduces the delay in providing services. Objective. The goal of the work is to create an optimal combined criterion for choosing effective traffic routes in a wireless network based on D2D technology. Method. Many modern works are devoted to the study of D2D technology, but they are not exhaustive in the study of routing in such networks. It is objective enough to study networks built on the basis of the interaction of devices with each other using D2D technology, since such interactions have proven to be effective technologies. This, in turn, involves the development of appropriate routing methods in networks using D2D technology, especially taking into account the property of over-density 5G networks. The paper proposes a criterion for selecting routes, taking into account interference within the channels forming the network nodes. This criterion combines the choice of routes according to the length criteria and the criterion of maximum throughput. Results. A developed combined criterion for selecting traffic routing in a wireless network that uses D2D technology. The results of the study are shown in graphic data. Conclusions. The experiments confirmed the efficiency and effectiveness of the developed method and allow us to recommend this method for practical use as a result of route selection, taking into account those network properties that are more likely to affect the quality of the route.
Style APA, Harvard, Vancouver, ISO itp.
9

Kim, Sungwook. "A New Cooperative Dual-Level Game Approach for Operator-Controlled Multihop D2D Communications". Mobile Information Systems 2019 (4.07.2019): 1–11. http://dx.doi.org/10.1155/2019/6276872.

Pełny tekst źródła
Streszczenie:
With the development of wireless communications and the intellectualization of mobile devices, device-to-device (D2D) communications are considered as a standard part of future 5G networks. This new paradigm can provide better user experiences while improving the system performance such as network throughput, latency, fairness, and energy efficiency. In this study, we investigate a new dual-level D2D communication scheme consisting of multiple D2D operators and a group of mobile devices. To model the interaction among D2D operators and devices, we adopt two cooperative game approaches based on the incentive mechanism design and r-egalitarian Shapley value. At the upper level, routing paths and incentive payments for multihop relay services are decided using the incentive mechanism. At the lower level, mobile devices share the given incentive based on the r-egalitarian Shapley value. Both level control procedures are mutually dependent on each other by the proper coordination and collaboration. According to the main features of two cooperative game models, the proposed scheme takes various benefits in a fair-efficient way. Through the derived simulation results, we can verify the superiority of our proposed scheme comparing to the existing protocols. Finally, we propose further challenges and future opportunities in the research area of operator-controlled multihop D2D communications.
Style APA, Harvard, Vancouver, ISO itp.
10

Wang, Tong, Yongzhe Zhou, Yunfeng Wang i Mengbo Tang. "Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication". Journal of Computer Networks and Communications 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2717403.

Pełny tekst źródła
Streszczenie:
In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G) mobile communication networks, among which device-to-device (D2D) communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT) is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT) over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Routing - D2D Communication"

1

Yang, Chao-ping, i 楊超評. "Routing Policy for D2D Group Communication". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b4y59r.

Pełny tekst źródła
Streszczenie:
碩士
國立中山大學
資訊工程學系研究所
106
Cisco predicted that mobile traffic will reach over 120 exabytes per month in 2018. Because of that, the Third Generation Partnership Project (3GPP) proposed a technology called “Device-to-Device (D2D)” communication. The first mention of this technology is in 3GPP release12. D2D communications is a novel technology allowing user exchanges of their data over direct links instead of through base stations. D2D can improve system capacity, system throughput and data rate. It also can provide lower latency for user. Moreover, D2D communications play an important role in traffic offloading. In recent years, there are serval research indicating that people will construct stable social structures when they are geographically close. People would like to help each other when they are in the same group. It means that they would help relay data and cache data for other group members. In this paper, we designed an utility function, which consider delay and throughput at the same time, to evaluate the path. Because of the unit of delay and throughput are different, we defined how to standardize them. We also combine the advantages of Bidirectional search and Lifelong Planning A*, propose a new routing policy for group members, which can meet their demands with lower latency and better throughput. Furthermore, we device an utility function in our algorithm to select paths. Our simulation results have shown that the proposed mechanism can choose the path which has better throughput and lower latency. In addition, the proposed mechanism can apply to dynamic topology efficiently.
Style APA, Harvard, Vancouver, ISO itp.
2

Madabhushi, Sireesha. "Optimal Routing and Data Transmission for Multi-Hop D2D Communications". Thesis, 2018. http://etd.iisc.ac.in/handle/2005/4145.

Pełny tekst źródła
Streszczenie:
Device-to-Device (D2D) communication, which enables direct link communication between nodes without going through the infrastructure, has received considerable attention in recent years, particularly in the context of Internet-of-Things (IoT) and machine-to-machine (M2M) communications. It is also slated to be part of the 5G communication standards. The primary advantages of D2D are enhanced spatial frequency reuse leading to better spectral efficiency, reduced out-of-cell interference, better cell-edge coverage, etc. Once implemented, the D2D mode of communication opens up new and interesting avenues for improving the spectral efficiency of a cellular system. A particularly interesting problem in this context is that of routing data over multiple D2D nodes to maximize the end-to-end throughput between a source and destination, while ensuring that the D2D nodes do not cause detrimental interference to the ongoing transmissions in the cellular network. This can potentially result in significantly higher D2D throughput compared to the hitherto-considered single-hop D2D communications paradigm. The main focus of this thesis is to determine a throughput-optimal route between a given source-destination pair under a probabilistic interference constraint imposed by the cellular network, and to analytically characterize the throughput improvement obtainable by multi-hop D2D communications. The first part of the thesis proposes an easy-to-implement routing algorithm to maximize the end-to-end throughput of a given source-destination pair. Next, in order to further increase the throughput on the determined route, a link activation algorithm is proposed, which enables links opportunistically, based on the buffer states of the relay nodes and the link feasibility. Theoretical expressions for throughput, delay and system idle probability are derived by modeling the relay buffer state evolution as a Discrete Time Markov Chain (DTMC). Theory and simulation showcase the performance gains obtained by opportunistic link activation compared to the baseline sequential link activation scheme, where the links are enabled in a round-robin fashion. The second part of the thesis proposes a routing algorithm to maximize the end-to-end throughput between D2D source-destination pair, under an additional per-hop delay constraint. The analytical expression derived for throughput on the multi-hop route facilitates the application of Dijkstra's algorithm, again leading to an easy-to-implement optimal routing algorithm. The tradeoff between throughput and delay is illustrated through simulations. Overall, the results in the thesis are useful for (a) determining throughput optimal and delay-constrained throughput optimal routes between a given source and destination communicating in the D2D mode; (b) analytically characterizing the gains obtainable via multi-hop D2D communications; and (c) performance characterization and comparison of opportunistic link activation (which entails data buffering at the individual nodes) and sequential link activation, in terms of both delay and the throughput achieved
Style APA, Harvard, Vancouver, ISO itp.
3

Elsemary, Hadeer. "Secure Routing in Intelligent Device-to-Device Communications". Doctoral thesis, 2016. http://hdl.handle.net/11858/00-1735-0000-002B-7CC7-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

"Adaptive routing in data communication networks through reinforcement learning". Tese, MAXWELL, 2000. http://www.maxwell.lambda.ele.puc-rio.br/cgi-bin/db2www/PRG_0991.D2W/SHOW?Cont=1348:pt&Mat=&Sys=&Nr=&Fun=&CdLinPrg=pt.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Routing - D2D Communication"

1

Yashoda, M. B., i Vrinda Shivashetty. "Bi-CRS: Bio-Inspired Cluster-Based Routing Scheme for D2D Communication in IoT". W Proceedings of International Conference on Recent Trends in Computing, 187–99. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7118-0_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

James, Simon. "How Did the Base Work?" W The Roman Military Base at Dura-Europos, Syria. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198743569.003.0028.

Pełny tekst źródła
Streszczenie:
We now consider how the military base area operated, as a zone where a large number of people lived and worked on a routine basis. On one hand, to function it required the affordances of its internal communications, connections with the civil town, and access to roads, river, and lands beyond the walls; on the other, there was a need for surveillance and control of activities within the base, and of movements across its boundary. The most obvious part of the base boundary (Plate XXII) is the substantial mud brick wall ploughed across four blocks from the city defences just S of Tower 21, and blocking Wall, A, C, and D Sts, with a gate established at B St. How the S boundary was defined E of D St has always remained an issue. If it was necessary to build a wall at the W end, why was this not simply continued all the way to, e.g., the S end of the Citadel? Across blocks F7 and F5 it seems that the boundary of the military zone simply comprised party walls between military and civilian-occupied structures. The same was true within block B2, by the Citadel, although the boundary probably comprised building frontages along Lower Main St. On the plateau, as the camp wall may have been a subsequent local enhancement, except where the amphitheatre formed part of it, the boundary may generally have comprised the rear walls of military-held houses lining the S side of 8th St—probably all properties from the city wall to H St. The course of the boundary along the W side of the inner wadi is unknown, but the base is suggested, as along 8th St, to have incorporated at least all properties lining the S side of the Wadi Ascent Road, if not encompassing all blocks on the wadi slope—in which case the boundary here may rather have comprised property frontages on K St. The base area was split by site topography into two major zones, the flat plateau, and the N branch of the inner wadi around the Citadel. Each was further subdivided.
Style APA, Harvard, Vancouver, ISO itp.
3

Krolow, Priscila Jaekel, Patrícia Dias i Sara Manuela Lopes Oliveira. "How Small Companies Used Shopstreaming in Their Fight for Survival in a COVID-19 Scenario". W Navigating Digital Communication and Challenges for Organizations, 76–92. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9790-3.ch005.

Pełny tekst źródła
Streszczenie:
The digital acceleration triggered by COVID-19 was a disruptive transformation of society, which was not prepared for such quick changes in socialization, work, and consumption, among other activities. We were forced to reinvent ourselves, to pursue the continuity of our daily routines using tools already available, because there was no time to invent better ones. In this context, live performances on social media became very successful as a zero-cost (both for content producers and audiences) and highly engaging format. Brands, and particularly small companies, quickly took over this new tool, adopting a practice that had already emerged a few years ago, consisting of using live streaming as a channel for showcasing products and selling, thus being an alternative to the mandatory closure of stores. In order to better understand this emergent practice, this chapter looks into two examples: Mh2, a Brazilian fashion accessories company which used lives on Instagram to sell its products, and São Costureira, a Portuguese clothing brand which did the same using Facebook.
Style APA, Harvard, Vancouver, ISO itp.
4

Dhar, Subhankar. "Mobile Ad Hoc Network". W Mobile Computing, 952–60. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch077.

Pełny tekst źródła
Streszczenie:
A mobile ad hoc network (MANET) is a temporary, self-organizing network of wireless mobile nodes without the support of any existing infrastructure that may be readily available on conventional networks. It allows various devices to form a network in areas where no communication infrastructure exists. Although there are many problems and challenges that need to be solved before the large-scale deployment of an MANET, small and medium-sized MANETs can be easily deployed. The motivation and development of MANET was mainly triggered by Department of Defense (DoD)-sponsored research work for military applications (Freebersyser and Leiner, 2002). In addition, ad hoc applications for mobile and dynamic environments are also driving the growth of these networks (Illyas, 2003; Perkins, 2002; Toh, 2002). As the number of applications of wireless ad hoc networks grows, the size of the network varies greatly from a network of several mobile computers in a classroom to a network of hundreds of mobile units deployed in a battlefield, for example. The variability in the network size is also true for a particular network over the course of time; a network of a thousand nodes may be split into a number of smaller networks of a few hundred nodes or vice versa as the nodes dynamically move around a deployed area. Ad hoc networks not only have the traditional problems of wireless communications like power management, security, and bandwidth optimization, but also the lack of any fixed infrastructure, and their multihop nature poses new research problems. For example, routing, topology maintenance, location management, and device discovery, to name a few, are important problems and are still active areas of research (Wu & Stojmenovic, 2004).
Style APA, Harvard, Vancouver, ISO itp.
5

Hynes, Deirdre, Tarja Tiainen, Emma-Reetta Koivunen i Minna-Kristiina Paakki. "Articulating ICT Use Narratives in Everyday Life". W Information Communication Technologies, 2341–49. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch170.

Pełny tekst źródła
Streszczenie:
The most common definition of the information society lays emphasis upon spectacular technological innovation and the transformative effects of new information and communication technologies. The key idea is that breakthroughs in information processing, storage, and transmission have led to the application of information technology in virtually all, public and private, sectors of society (Webster, 1995). By the 1990s, to admire and indeed enthuse over new ICTs had become highly fashionable and popular. Such technological enthusiasm has become so pervasive that it has seeped not only into political and policy discourses, but also into the whole spectrum of the media and fora of public communication (Preston, 2001). In addition, discourses of the information society are often dominated and shaped by male commentators (e.g., Castells, 2000; Gates, 1995; Kelly, 1999; Negroponte, 1995). For example, when compiling a collection of the dominant players of international information-society discourse, Cawley and Trench (2004) were hard-pressed to find female commentators, succeeding only in finding 3 out of a total of 18 critics.1 We argue that the focus on the artefact, and thus technological celebration, takes precedence over the largely ignored field of technological uses and consumption issues. Hence, we present a study that analyses the individual user experiences to challenge the stereotypical user traditions represented by the information-society discourse. We wish to present a counternarrative that shifts the emphasis from technical expertise, and technological and transformative benefits of artefacts to more individual-user-focused narratives. As a result, this brought about a dual-narrative process through which the respondents described their experiences. We found that when people described their uses, consumption patterns, and domestication2 experiences of ICTs, they tended to do so by employing contrasting frames of reference. These frames of reference we have termed the objective lens (or narratives) and subjective lens (or narratives). Through what we term objective narratives, we found that some respondents would describe their use through official and technical frames of reference. For example, they employed primarily dominant information-society jargon to frame how they made sense of technologies and their use experiences. Through subjective narratives, we found that respondents would describe their use and experiences from primarily a personal perspective to explain how the technology fitted their lives, the role it played in their everyday routines and habits, and the associated meaning and significance of the artefact. While these contrasting narratives are not mutually exclusive or contradictory, it became clear from the interviews that a pattern of use narratives was emerging. We found that such narratives slightly reinforced traditional gender roles in which men tend to talk about technologies in highly technical terms of reference, while women portray themselves as technologically helpless or ignorant (Gill & Grint, 1995; Gray, 1992; Lie, 1995). Although we did not look for or find stable gender categories, the emergent gender narratives seem to renew the existing gender roles that link masculinity and technology (Vehviläinen, 2002). With the development of computer technologies, we have witnessed a shift from IT to ICTs. This has resulted in a redefinition of the computer as an artefact: from a mere computational device to the newly emergent multimedia-enhanced computers, or what Paul Mayer (1999, p. 1) calls a “meta-medium.” Today, the conceptualisation of the computer is more problematic. It may be thought of as the Web or Internet, computer games, CD-ROMs (compact disc read-only memory), reference works, e-mail, and a diverse range of applications for displaying and manipulating text, images, graphics, music, databases, and the like. Spilker and Sørenson (2000, p. 270) argue that computers are no longer “primarily about programming, systems, control and calculation,” but instead “a gateway to communication and cultural activities.” The shift in identity has opened up or unlocked the conceptualisation of the computer. Therefore, it is possible for wider audiences and previously excluded groups (such as the elderly and women) to translate the computer into something meaningful in their everyday lives. As a result, we were not solely focused on the computer as a separate technology, but instead on the wide range of information and communication technologies that are available in the domestic setting.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Routing - D2D Communication"

1

Shaikh, Farrukh Salim, i Roland Wismuller. "Interference-Conscious routing in multihop D2D communications". W 2017 2nd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2017. http://dx.doi.org/10.1109/ccoms.2017.8075285.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Shaikh, Farrukh Salim, i Roland Wismuller. "Centralized adaptive routing in multihop cellular D2D communications". W 2017 2nd International Conference on Computer and Communication Systems (ICCCS). IEEE, 2017. http://dx.doi.org/10.1109/ccoms.2017.8075287.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Bastos, Alex Vidigal, Cristiano M. Silva i Diogenes C. da Silva. "Assisted routing algorithm for D2D communication in 5G wireless networks". W 2018 Wireless Days (WD). IEEE, 2018. http://dx.doi.org/10.1109/wd.2018.8361688.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Ahmed, Rana E. "A Novel Multi-Hop Routing Protocol for D2D Communications in 5G". W 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2021. http://dx.doi.org/10.1109/ccwc51732.2021.9375946.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Li, Yuhong, Haoyue Xue, Zhihui Gai, Xirong Que, Xiang Su i Jukka Riekki. "A cluster-based routing method for D2D communication oriented to vehicular networks". W 2017 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2017. http://dx.doi.org/10.1109/smc.2017.8123046.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Wang, Sai, Oh-Soon Shin i Yoan Shin. "Social-Aware Routing for Multi-hop D2D Communication in Relay Cellular Networks". W 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2019. http://dx.doi.org/10.1109/icufn.2019.8806134.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Nematy, Hoda. "Secure Protocol for Four D2D Scenarios". W 2nd International Conference on Machine Learning &Trends (MLT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.111102.

Pełny tekst źródła
Streszczenie:
In traditional cellular infrastructure, cellular devices communicate with each other directly even when they are close together. This strategy causes massive traffic to the cellular network therefore D2D communication has introduced to overcome this issue, bring more bandwidth and also higher rates to the cellular network. One of the major challenges for D2D Communication is to have one single secure protocol that can adapt in four D2D scenarios defined in references. These scenarios are Direct D2D and relaying D2D communication with and without cellular infrastructure. In this paper, we propose a Secure D2D protocol based on ARIADNE with TESLA. Also we use LTE-A AKA protocol for authentication and key agreement procedure between Source and Destination. Next, we adapt this scenario to be applicable in without cellular infrastructure ones. This protocol could be used in direct D2D also. Based on the results, our proposed protocol has a few computation overhead compare to recent works and have less communication overhead than SODE with preserve many security properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, Secure Routing Transmission…. We check Authentication, Confidentiality, Reachability and Secure Key Agreement of the proposed protocol with ProVerif verification tools.
Style APA, Harvard, Vancouver, ISO itp.
8

Fang, Yujian, Yuezhi Zhou, Xiaohong Jiang, Di Zhang i Yaoxue Zhang. "Game Theoretic D2D Content Sharing: Joint Participants Selection, Routing and Pricing". W 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2017. http://dx.doi.org/10.1109/icccn.2017.8038368.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bunu, Sanusi Mohammed, Mo Saraee i Omar Alani. "Machine Learning-Based Optimized Link State Routing Protocol for D2D Communication in 5G/B5G". W 2022 International Conference on Electrical Engineering and Informatics (ICELTICs). IEEE, 2022. http://dx.doi.org/10.1109/iceltics56128.2022.9932126.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bhardwaj, Vinnu, i Chandra R. Murthy. "On optimal routing and power allocation for D2D communications". W ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2015. http://dx.doi.org/10.1109/icassp.2015.7178534.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii