Search results

1 – 10 of over 69000
Article
Publication date: 30 April 2024

Lin Kang, Junjie Chen, Jie Wang and Yaqi Wei

In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an…

Abstract

Purpose

In order to meet the different quality of service (QoS) requirements of vehicle-to-infrastructure (V2I) and multiple vehicle-to-vehicle (V2V) links in vehicle networks, an efficient V2V spectrum access mechanism is proposed in this paper.

Design/methodology/approach

A long-short-term-memory-based multi-agent hybrid proximal policy optimization (LSTM-H-PPO) algorithm is proposed, through which the distributed spectrum access and continuous power control of V2V link are realized.

Findings

Simulation results show that compared with the baseline algorithm, the proposed algorithm has significant advantages in terms of total system capacity, payload delivery success rate of V2V link and convergence speed.

Originality/value

The LSTM layer uses the time sequence information to estimate the accurate system state, which ensures the choice of V2V spectrum access based on local observation effective. The hybrid PPO framework shares training parameters among agents which speeds up the entire training process. The proposed algorithm adopts the mode of centralized training and distributed execution, so that the agent can achieve the optimal spectrum access based on local observation information with less signaling overhead.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 3
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 4 September 2009

Virginia Corvino, Andrea Carniani, Velio Tralli and Roberto Verdone

The purpose of this paper is to study the radio resource assignment problem in the context of a heterogeneous ad hoc network, composed of 1EEE802.15.4 sensor devices, their…

Abstract

Purpose

The purpose of this paper is to study the radio resource assignment problem in the context of a heterogeneous ad hoc network, composed of 1EEE802.15.4 sensor devices, their coordinators, mobile terminals conveying vldeo streams, and sinks. This scenario also fits to the paradigm of opportunistic networks.

Design/methodology/approach

In such hierarchical heterogeneous opportunistic networks, the focus is on cross‐layer scheduling of the video and sensor traffics toward the sink. The scheduling strategy proposed takes into account information coming from both physical and application layers. Evaluations are performed via simulations.

Findings

Results show that the proposed cross‐layer strategy significantly outperforms the maximum throughput scheduling, used as a benchmark, in case of video traffic, while preseruing the same performance for 802.15.4 traffic.

Practical implications

The architecture and the relevant algorithms proposed could be used in realistic emergency‐deployed networks composed by the kind of nodes considered in the paper.

Originality/value

The novelty introduced is related to the application of a crosslayer design strategy in a very peculiar hierarchical heterogeneous opportunistic ad hoc network. This paper is believed to be the first published combining traditional tratfic sources with sensor generated data flows.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 6 November 2017

Mustafa S. Aljumaily and Ghaida A. Al-Suhail

Recently, many researches have been devoted to studying the possibility of using wireless signals of the Wi-Fi networks in human-gesture recognition. They focus on classifying…

2251

Abstract

Purpose

Recently, many researches have been devoted to studying the possibility of using wireless signals of the Wi-Fi networks in human-gesture recognition. They focus on classifying gestures despite who is performing them, and only a few of the previous work make use of the wireless channel state information in identifying humans. This paper aims to recognize different humans and their multiple gestures in an indoor environment.

Design/methodology/approach

The authors designed a gesture recognition system that consists of channel state information data collection, preprocessing, features extraction and classification to guess the human and the gesture in the vicinity of a Wi-Fi-enabled device with modified Wi-Fi-device driver to collect the channel state information, and process it in real time.

Findings

The proposed system proved to work well for different humans and different gestures with an accuracy that ranges from 87 per cent for multiple humans and multiple gestures to 98 per cent for individual humans’ gesture recognition.

Originality/value

This paper used new preprocessing and filtering techniques, proposed new features to be extracted from the data and new classification method that have not been used in this field before.

Details

International Journal of Pervasive Computing and Communications, vol. 13 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 September 2020

Bilal Alhayani and Abdallah Ali Abdallah

The manufacturing of intelligent and secure visual data transmission over the wireless sensor network is key requirement nowadays to many applications. The two-way transmission of…

Abstract

Purpose

The manufacturing of intelligent and secure visual data transmission over the wireless sensor network is key requirement nowadays to many applications. The two-way transmission of image under a wireless channel needed image must compatible along channel characteristics such as band width, energy-efficient, time consumption and security because the image adopts big space under the device of storage and need a long time that easily undergoes cipher attacks. Moreover, Quizzical the problem for the additional time under compression results that, the secondary process of the compression followed through the acquisition consumes more time.

Design/methodology/approach

Hence, for resolving these issues, compressive sensing (CS) has emerged, which compressed the image at the time of sensing emerges as a speedy manner that reduces the time consumption and saves bandwidth utilization but fails under secured transmission. Several kinds of research paved path to resolve the security problems under CS through providing security such as the secondary process.

Findings

Thus, concerning the above issues, this paper proposed the Corvus corone module two-way image transmission that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.

Originality/value

Experimental outputs shows intelligent module gives energy efficient, secured transmission along lower computational timing also decreased bit error rate.

Article
Publication date: 13 August 2021

Manju V.M. and Ganesh R.S.

Multiple-input multiple-output (MIMO) combined with multi-user massive MIMO has been a well-known approach for high spectral efficiency in wideband systems, and it was targeted to…

Abstract

Purpose

Multiple-input multiple-output (MIMO) combined with multi-user massive MIMO has been a well-known approach for high spectral efficiency in wideband systems, and it was targeted to detect the MIMO signals. The increasing data rates with multiple antennas and multiple users that share the communication channel simultaneously lead to higher capacity requirements and increased complexity. Thus, different detection algorithms were developed for the Massive MIMO.

Design/methodology/approach

This paper focuses on the various literature analyzes on various detection algorithms and techniques for MIMO detectors. Here, it reviews several research papers and exhibits the significance of each detection method.

Findings

This paper provides the details of the performance analysis of the MIMO detectors and reveals the best value in the case of each performance measure. Finally, it widens the research issues that can be useful for future researchers to be accomplished in MIMO massive detectors

Originality/value

This paper has presented a detailed review of the detection of massive MIMO on different algorithms and techniques. The survey mainly focuses on different types of channels used in MIMO detections, the number of antennas used in transmitting signals from the source to destination, and vice-versa. The performance measures and the best performance of each of the detectors are described.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 30 April 2020

Kishor Purushottam Jadhav, Amita Mahor, Anirban Bhowmick and Anveshkumar N.

Non-orthogonal multiple access (NOMA) is a much hopeful scheme, which is deployed to enhance the spectral efficiency (SE) significantly, and it also enhances the massive access…

Abstract

Purpose

Non-orthogonal multiple access (NOMA) is a much hopeful scheme, which is deployed to enhance the spectral efficiency (SE) significantly, and it also enhances the massive access that has attained substantial concern from industrial and academic domains. However, the deployment of superposition coding (SC) at the receiver side resulted in interference. For reducing this interference, “multi-antenna NOMA” seems to be an emerging solution. Particularly, by using the channel state information at the transmitter, spatial beam forming could be deployed that eliminates the interference in an effective manner.

Design/methodology/approach

This survey analyzes the literature review and diverse techniques regarding the NOMA-based spatial modulation (SM) environment. It reviews a bunch of research papers and states a significant analysis. Initially, the analysis depicts various transmit antenna selection techniques that are contributed in different papers. This survey offers a comprehensive study regarding the chronological review and performance achievements in each contribution. The analytical review also concerns on the amplitude phase modulation (APM) selection schemes adopted in several contributions. Moreover, the objective functions adopted in the reviewed works are also analyzed. Finally, the survey extends with various research issues and its gaps that can be useful for the researchers to promote improved future works on NOMA-based SM.

Findings

This paper contributes to a review related to NOMA-based SM systems. Various techniques and performance measures adopted in each paper are analyzed and described in this survey. More particularly, the selection of transmission antenna and APM are also examined in this review work. Moreover, the defined objective function of each paper is also observed and made a chronological review as well. Finally, the research challenges along with the gaps on NOMA-based SM systems are also elaborated.

Originality/value

This paper presents a brief analysis of NOMA-based SM systems. To the best of the authors’ knowledge, this is the first work that uses NOMA-based SM systems to enhance SE.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 25 January 2024

Lin Kang, Jie Wang, Junjie Chen and Di Yang

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to…

Abstract

Purpose

Since the performance of vehicular users and cellular users (CUE) in Vehicular networks is highly affected by the allocated resources to them. The purpose of this paper is to investigate the resource allocation for vehicular communications when multiple V2V links and a V2I link share spectrum with CUE in uplink communication under different Quality of Service (QoS).

Design/methodology/approach

An optimization model to maximize the V2I capacity is established based on slowly varying large-scale fading channel information. Multiple V2V links are clustered based on sparrow search algorithm (SSA) to reduce interference. Then, a weighted tripartite graph is constructed by jointly optimizing the power of CUE, V2I and V2V clusters. Finally, spectrum resources are allocated based on a weighted 3D matching algorithm.

Findings

The performance of the proposed algorithm is tested. Simulation results show that the proposed algorithm can maximize the channel capacity of V2I while ensuring the reliability of V2V and the quality of service of CUE.

Originality/value

There is a lack of research on resource allocation algorithms of CUE, V2I and multiple V2V in different QoS. To solve the problem, one new resource allocation algorithm is proposed in this paper. Firstly, multiple V2V links are clustered using SSA to reduce interference. Secondly, the power allocation of CUE, V2I and V2V is jointly optimized. Finally, the weighted 3D matching algorithm is used to allocate spectrum resources.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 9 March 2010

Xingzhong Xiong, Jianhao Hu, Feng Yang and Xiang Ling

The purpose of this paper is to introduce the analysis and performance of a hybrid multiple access scheme which combines interleave division multiple access (IDMA) and code…

Abstract

Purpose

The purpose of this paper is to introduce the analysis and performance of a hybrid multiple access scheme which combines interleave division multiple access (IDMA) and code division multiple access (CDMA), referred to as IDMA/CDMA. With experimentations, the scheme can achieve good performance with simple user ends for the system.

Design/methodology/approach

IDMA technique is employed as the uplink transmission and CDMA technique as the downlink transmission. The performance comparison of IDMA and IDMA/CDMA downlink is studied with Monte Carlo simulations to investigate the bit error rates. For IDMA/CDMA downlink, the signals are interleaved by random interleavers, spreaded by M‐sequence and orthogonal Gold sequence, respectively, and then transmitted over an AWGN with BPSK modulation. Moreover, a channel estimation approach for IDMA based on expectation maximization (EM) algorithm is also presented.

Findings

The multi‐user detection (MUD) algorithm in uplink IDMA systems is much simpler than that used in traditional CDMA systems. It is also well known that the orthogonal spreading codes in CDMA can effectively help suppress the MAI in the synchronized environments. But for the asynchronized application, the performance of CDMA systems will degrade due to the serious multiple user interference. According to traditional IDMA and orthogonal code division multiple access/IDMA signal detection algorithms, every UE has to detect all of the signals of other users for iterative detection. The advantages of IDMA and CDMA technologies can be utilized substantially.

Originality/value

The proposed hybrid multiple access scheme can achieve a very simple chip‐by‐chip iterative MUD strategy at base station, and the simplified receiving operation at UE. On the other hand, this paper also evaluates channel estimation approach for IDMA based on EM algorithm.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 29 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 11 October 2021

Y.K. Shobha and H.G. Rangaraju

The suggested work examines the latest developments such as the techniques employed for allocation of power, browser techniques, modern analysis and bandwidth efficiency of…

Abstract

Purpose

The suggested work examines the latest developments such as the techniques employed for allocation of power, browser techniques, modern analysis and bandwidth efficiency of nonorthogonal multiple accesses (NOMA) in the network of 5G. Furthermore, the proposed work also illustrates the performance of NOMA when it is combined with various techniques of wireless communication namely network coding, multiple-input multiple-output (MIMO), space-time coding, collective communications, as well as many more. In the case of the MIMO system, the proposed research work specifically deals with a less complex recursive linear minimum mean square error (LMMSE) multiuser detector along with NOMA (MIMO-NOMA); here the multiple-antenna base station (BS) and multiple single-antenna users interact with each other instantaneously. Although LMMSE is a linear detector with a low intricacy, it performs poorly in multiuser identification because of the incompatibility between LMMSE identification and multiuser decoding. Thus, to obtain a desirable iterative identification rate, the proposed research work presents matching constraints among the decoders and identifiers of MIMO-NOMA.

Design/methodology/approach

To improve the performance in 5G technologies as well as in cellular communication, the NOMA technique is employed and contemplated as one of the best methodologies for accessing radio. The above-stated technique offers several advantages such as enhanced spectrum performance in contrast to the high-capacity orthogonal multiple access (OMA) approach that is also known as orthogonal frequency division multiple access (OFDMA). Code and power domain are some of the categories of the NOMA technique. The suggested research work mainly concentrates on the technique of NOMA, which is based on the power domain. This approach correspondingly makes use of superposition coding (SC) as well as successive interference cancellation (SIC) at source and recipient. For the fifth-generation applications, the network-level, as well as user-experienced data rate prerequisites, are successfully illustrated by various researchers.

Findings

The suggested combined methodology such as MIMO-NOMA demonstrates a synchronized iterative LMMSE system that can accomplish the optimized efficiency of symmetric MIMO NOMA with several users. To transmit the information from sender to the receiver, hybrid methodologies are confined to 2 × 2 as well as 4 × 4 antenna arrays, and thereby parameters such as PAPR, BER, SNR are analyzed and efficiency for various modulation strategies such as BPSK and QAMj (j should vary from 8,16,32,64) are computed.

Originality/value

The proposed hybrid MIMO-NOMA methodologies are synchronized in terms of iterative process for optimization of LMMSE that can accomplish the optimized efficiency of symmetric for several users under different noisy conditions. From the obtained simulated results, it is found, there are 18%, 23% 16%, and 8% improvement in terms of Bit Error Rate (BER), Least Minimum Mean Squared Error (LMMSE), Peak to Average Power Ratio (PAPR), and capacity of channel respectively for Binary Phase Shift Key (BPSK) and Quadrature Amplitude Modulation (QAM) modulation techniques.

Details

International Journal of Intelligent Unmanned Systems, vol. 11 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 7 November 2023

Ashwini K. and Jagadeesh V.K.

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation…

Abstract

Purpose

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation (5 G) technology. NOMA is used for serving many mobile users, both in power and code domains. This paper considers the power-domain NOMA, which is now discussed as NOMA.

Design/methodology/approach

The first part of the paper discusses NOMA-based cooperative relay systems using different relay strategies over different channel models. In various research works, the analytical expressions of many performance metrics were derived, measured and simulated for better performance of the NOMA systems. In the second part, a brief introduction to diversity techniques is discussed. The multiple input and multiple output system merged with cooperative NOMA technology, and its future challenges were also presented in this part. In the third part, the paper surveys some new conceptions such as cognitive radio, index modulation multiple access, space-shift keying and reconfigurable intelligent surface that can be combined with NOMA systems for better performance.

Findings

The paper presents a brief survey of diverse research projects being carried out in the field of NOMA. The paper also surveyed two different relaying strategies that were implemented in cooperative NOMA over different channels and compared several performance parameters that were evaluated and derived in these implementations.

Originality/value

The paper provides a scope for recognizable future work and presents a brief idea of the new techniques that can be united with NOMA for better performance in wireless systems.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

1 – 10 of over 69000