|
|
|
Dariusz Zmyslowski and Jan M. Kelner
The development of new telecommunication services requires the implementation of advanced technologies and the next generations of networks. Currently, the Long-Term Evolution (LTE) is a widely used standard. On the other hand, more and more mobile netwo...
ver más
|
|
|
|
|
|
|
Xiaonan Wang, Yang Guo and Yuan Gao
Non-terrestrial network (NTN) is a trending topic in the field of communication, as it shows promise for scenarios in which terrestrial infrastructure is unavailable. Unmanned autonomous intelligent systems (UAISs), as a physical form of artificial intel...
ver más
|
|
|
|
|
|
|
Adwitiya Mukhopadhyay, Aryadevi Remanidevi Devidas, Venkat P. Rangan and Maneesha Vinodini Ramesh
Addressing the inadequacy of medical facilities in rural communities and the high number of patients affected by ailments that need to be treated immediately is of prime importance for all countries. The various recent healthcare emergency situations bri...
ver más
|
|
|
|
|
|
|
Minshi Liu, Ling Zhang, Yi Long, Yong Sun and Mingwei Zhao
With the rising popularity of portable mobile positioning equipment, the volume of mobile trajectory data is increasing. Therefore, trajectory data compression has become an important basis for trajectory data processing, analysis, and mining. According ...
ver más
|
|
|
|
|
|
|
Marian Wnuk
An important element of modern telecommunications is wireless radio networks, which enable mobile subscribers to access wireless networks. The cell area is divided into independent sectors served by directional antennas. As the number of mobile network s...
ver más
|
|
|
|
|
|
|
Muhammad Sheraz, Teong Chee Chuah, Mardeni Bin Roslee, Manzoor Ahmed, Amjad Iqbal and Ala?a Al-Habashna
Data caching is a promising technique to alleviate the data traffic burden from the backhaul and minimize data access delay. However, the cache capacity constraint poses a significant challenge to obtaining content through the cache resource that degrade...
ver más
|
|
|
|
|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
|
João P. Ferreira, Vinicius C. Ferreira, Sérgio L. Nogueira, João M. Faria and José A. Afonso
The sharing of mobile network infrastructure has become a key topic with the introduction of 5G due to the high costs of deploying such infrastructures, with neutral host models coupled with features such as network function virtualization (NFV) and netw...
ver más
|
|
|
|
|
|
|
Mario E. Rivero-Angeles, Iclia Villordo-Jimenez, Izlian Y. Orea-Flores, Noé Torres-Cruz and Angel Pretelín Ricárdez
In modern and future communication systems, we expect peaks of traffic that largely exceed the capacity of the system, since they are originally designed to support normal traffic loads. Such peaks can be caused by emergency events and cultural or sporti...
ver más
|
|
|
|
|
|
|
Yi Zhao and Song-Kyoo Kim
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ...
ver más
|
|
|
|