Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 14.528
Filtrar
Mais filtros












Intervalo de ano de publicação
1.
PLoS One ; 19(7): e0305039, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38968251

RESUMO

The provision of Wireless Fidelity (Wi-Fi) service in an indoor environment is a crucial task and the decay in signal strength issues arises especially in indoor environments. The Line-of-Sight (LOS) is a path for signal propagation that commonly impedes innumerable indoor objects damage signals and also causes signal fading. In addition, the Signal decay (signal penetration), signal reflection, and long transmission distance between transceivers are the key concerns. The signals lose their power due to the existence of obstacles (path of signals) and hence destroy received signal strength (RSS) between different communicating nodes and ultimately cause loss of the packet. Thus, to solve this issue, herein we propose an advanced model to maximize the LOS in communicating nodes using a modern indoor environment. Our proposal comprised various components for instance signal enhancers, repeaters, reflectors,. these components are connected. The signal attenuation and calculation model comprises of power algorithm and hence it can quickly and efficiently find the walls and corridors as obstacles in an indoor environment. We compared our proposed model with state of the art model using Received Signal Strength (RSS) and Packet Delivery Ratio (PDR) (different scenario) and found that our proposed model is efficient. Our proposed model achieved high network throughput as compared to the state-of-the-art models.


Assuntos
Algoritmos , Tecnologia sem Fio , Tecnologia sem Fio/instrumentação , Modelos Teóricos , Humanos , Redes de Comunicação de Computadores
2.
PLoS One ; 19(7): e0306699, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38985727

RESUMO

In order to optimize the spectrum allocation strategy of existing wireless communication networks and improve information transmission efficiency and data transmission security, this study uses the independent correlation characteristics of chaotic time series to simulate the collection and control strategy of bees, and proposes an artificial bee colony algorithm based on uniform mapping and collaborative collection control. Furthermore, it proposes an artificial bee colony algorithm based on uniform mapping and collaborative collection and control. The method begins by establishing a composite system of uniformly distributed Chebyshev maps. In the neighborhood intervals where the nectar sources are firmly connected and relatively independent, the algorithm then conducts a chaotic traversal search. The research results demonstrated the great performance of the suggested algorithm in each test function as well as the positive effects of the optimization search. The network throughput rate was over 300 kbps, the quantity of security service eavesdropping was below 0.1, and the spectrum utilization rate of the algorithm-based allocation method could be enhanced to 0.8 at the most. Overall, the performance of the proposed algorithm outperformed the comparison algorithm, with high optimization accuracy and a significant amount of optimization. This is favorable for the efficient use of spectrum resources and the secure transmission of communication data, and it encourages the development of spectrum allocation technology in wireless communication networks.


Assuntos
Algoritmos , Redes de Comunicação de Computadores , Tecnologia sem Fio , Abelhas/fisiologia , Animais , Segurança Computacional
3.
PLoS One ; 19(7): e0305092, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39018273

RESUMO

This paper proposes a novel cache replacement technique based on the notion of combining periodic popularity prediction with size caching. The popularity, size, and time updates characteristics are used to calculate the value of each cache item. When it comes to content replacement, the information with the least value is first eliminated. Simulation results show that the proposed method outperforms the current algorithms in terms of cache hit rate and delay. The hit rate of the proposed scheme is 15.3% higher than GDS, 17.3% higher than MPC, 20.1% higher than LRU, 22.3% higher than FIFO, and 24.8% higher than LFU when 350 different categories of information are present. In real-world industrial applications such as including supply chain management, smart manufacturing, automation energy optimization, intelligent logistics transportation, and e-healthcare applications, it offers a foundation for the selection of caching algorithms.


Assuntos
Algoritmos , Simulação por Computador , Redes de Comunicação de Computadores
4.
Sci Rep ; 14(1): 16640, 2024 Jul 18.
Artigo em Inglês | MEDLINE | ID: mdl-39025873

RESUMO

The Internet of Things (IoT) is an extensive system of interrelated devices equipped with sensors to monitor and track real world objects, spanning several verticals, covering many different industries. The IoT's promise is capturing interest as its value in healthcare continues to grow, as it can overlay on top of challenges dealing with the rising burden of chronic disease management and an aging population. To address difficulties associated with IoT-enabled healthcare, we propose a secure routing protocol that combines a fuzzy logic system and the Whale Optimization Algorithm (WOA) hierarchically. The suggested method consists of two primary approaches: the fuzzy trust strategy and the WOA-inspired clustering methodology. The first methodology plays a critical role in determining the trustworthiness of connected IoT equipment. Furthermore, a WOA-based clustering framework is implemented. A fitness function assesses the likelihood of IoT devices acting as cluster heads. This formula considers factors such as centrality, range of communication, hop count, remaining energy, and trustworthiness. Compared with other algorithms, the proposed method outperformed them in terms of network lifespan, energy usage, and packet delivery ratio by 47%, 58%, and 17.7%, respectively.


Assuntos
Algoritmos , Lógica Fuzzy , Internet das Coisas , Atenção à Saúde , Humanos , Análise por Conglomerados , Redes de Comunicação de Computadores
5.
Sensors (Basel) ; 24(12)2024 Jun 08.
Artigo em Inglês | MEDLINE | ID: mdl-38931520

RESUMO

With the escalation in the size and complexity of modern Denial of Service attacks, there is a need for research in the context of Machine Learning (ML) used in attack execution and defense against such attacks. This paper investigates the potential use of ML in generating behavioral telemetry data using Long Short-Term Memory network and spoofing requests for the analyzed traffic to look legitimate. For this research, a custom testing environment was built that listens for mouse and keyboard events and analyzes them accordingly. While the economic feasibility of this attack currently limits its immediate threat, advancements in technology could make it more cost-effective for attackers in the future. Therefore, proactive development of countermeasures remains essential to mitigate potential risks and stay ahead of evolving attack methods.


Assuntos
Segurança Computacional , Aprendizado de Máquina , Memória de Curto Prazo/fisiologia , Humanos , Telemetria/métodos , Redes de Comunicação de Computadores , Algoritmos
6.
PLoS One ; 19(6): e0299666, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38905163

RESUMO

Computer networks face vulnerability to numerous attacks, which pose significant threats to our data security and the freedom of communication. This paper introduces a novel intrusion detection technique that diverges from traditional methods by leveraging Recurrent Neural Networks (RNNs) for both data preprocessing and feature extraction. The proposed process is based on the following steps: (1) training the data using RNNs, (2) extracting features from their hidden layers, and (3) applying various classification algorithms. This methodology offers significant advantages and greatly differs from existing intrusion detection practices. The effectiveness of our method is demonstrated through trials on the Network Security Laboratory (NSL) and Canadian Institute for Cybersecurity (CIC) 2017 datasets, where the application of RNNs for intrusion detection shows substantial practical implications. Specifically, we achieved accuracy scores of 99.6% with Decision Tree, Random Forest, and CatBoost classifiers on the NSL dataset, and 99.8% and 99.9%, respectively, on the CIC 2017 dataset. By reversing the conventional sequence of training data with RNNs and then extracting features before applying classification algorithms, our approach provides a major shift in intrusion detection methodologies. This modification in the pipeline underscores the benefits of utilizing RNNs for feature extraction and data preprocessing, meeting the critical need to safeguard data security and communication freedom against ever-evolving network threats.


Assuntos
Algoritmos , Segurança Computacional , Redes Neurais de Computação , Humanos , Redes de Comunicação de Computadores
7.
PLoS One ; 19(6): e0301078, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38900762

RESUMO

Wireless communications have lately experienced substantial exploitation because they provide a lot of flexibility for data delivery. It provides connection and mobility by using air as a medium. Wireless sensor networks (WSN) are now the most popular wireless technologies. They need a communication infrastructure that is both energy and computationally efficient, which is made feasible by developing the best communication protocol algorithms. The internet of things (IoT) paradigm is anticipated to be heavily reliant on a networking architecture that is currently in development and dubbed software-defined WSN. Energy-efficient routing design is a key objective for WSNs. Cluster routing is one of the most commonly used routing techniques for extending network life. This research proposes a novel approach for increasing the energy effectiveness and longevity of software-defined WSNs. The major goal is to reduce the energy consumption of the cluster routing protocol using the firefly algorithm and high-efficiency entropy. According to the findings of the simulation, the suggested method outperforms existing algorithms in terms of system performance under various operating conditions. The number of alive nodes determined by the proposed algorithm is about 42.06% higher than Distributed Energy-Efficient Clustering with firefly algorithm (DEEC-FA) and 13.95% higher than Improved Firefly Clustering IFCEER and 12.05% higher than another referenced algorithm.


Assuntos
Algoritmos , Redes de Comunicação de Computadores , Software , Tecnologia sem Fio , Tecnologia sem Fio/instrumentação , Internet das Coisas
8.
J Med Syst ; 48(1): 61, 2024 Jun 15.
Artigo em Inglês | MEDLINE | ID: mdl-38878183

RESUMO

The rapid development of the digital healthcare and the electronic health records (EHR) requires smooth networking infrastructure to access data using Hypertext Transfer Protocol (HTTP)-based applications. The new HTTP/3 standard should provide performance and security improvements over HTTP/2. The goal of our work was to test the performance of HTTP/2 and HTTP/3 in the context of the EHRs. We used 45,000 test FHIR Patient resources downloaded and uploaded using 20, 50, 100 and 200 resources per Bundle, which resulted in 2251, 901, 451 and 226 HTTP GET and POST requests respectively. The first test downloading 20 resources per Bundle showed that HTTP/3 outperformed HTTP/2 in the local (mean request time 16.57 ms ± 7.2 standard deviation [SD]) and in the remote network (71.45 ms ± 43.5 SD) which is almost 3 times faster. In the 50 and 100 resources per Bundle test the HTTP/3 protocol demonstrated again more than two times gain in downloading performance for remote requests with mean request time 91.13 ms ± 34.54 SD and 88.09 ms ± 21.66 SD respectively. Furthermore, HTTP/3 outperformed HTTP/2 in the constructed clinical dataset remote transfer. In the upload tests HTTP/3 showed only a slight gain in performance merely in the remote network. The HTTP/3 protocol is a relatively new development and a major improvement for the worldwide web. This new technology is still missing in the digital health and EHRs. Its use could offer a major performance gain in situations where data is gathered from multiple remote locations.


Assuntos
Registros Eletrônicos de Saúde , Registros Eletrônicos de Saúde/organização & administração , Humanos , Segurança Computacional , Redes de Comunicação de Computadores/organização & administração , Internet
9.
PLoS One ; 19(6): e0304386, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38865334

RESUMO

Rotating Polarization Wave (RPW) is a novel Low Power Wide Area Networks (LPWAN) technology for robust connectivity and extended coverage area as compared to other LPWAN technologies such as LoRa and Sigfox when no error detection and correction is employed. Since, IoT and Machine-to-Machine (M2M) communication demand high reliability, RPW with error correction can significantly enhance the communication reliability for critical IoT and M2M applications. Therefore, this study investigates the performance of RPW with single bit error detection and correction using Hamming codes to avoid substantial overhead. Hamming (7,4) coded RPW shows a remarkable improvement of more than 40% in error performance compared to uncoded RPW thereby making it a suitable candidate for IoT and M2M applications. Error performance of coded RPW outperforms coded Chirp Spread Spectrum (CSS) modulation used in LoRa under multipath conditions by 51%, demonstrating superior adaptability and robustness under dynamic channel conditions. These findings provide valuable insights into the ongoing developments in wireless communication systems whilst reporting Q-RPW model as a new and effective method to address the needs of developing LPWAN and IoT ecosystems.


Assuntos
Tecnologia sem Fio , Redes de Comunicação de Computadores , Humanos
10.
PLoS One ; 19(5): e0302513, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38718032

RESUMO

Recent advances in aerial robotics and wireless transceivers have generated an enormous interest in networks constituted by multiple compact unmanned aerial vehicles (UAVs). UAV adhoc networks, i.e., aerial networks with dynamic topology and no centralized control, are found suitable for a unique set of applications, yet their operation is vulnerable to cyberattacks. In many applications, such as IoT networks or emergency failover networks, UAVs augment and provide support to the sensor nodes or mobile nodes in the ground network in data acquisition and also improve the overall network performance. In this situation, ensuring the security of the adhoc UAV network and the integrity of data is paramount to accomplishing network mission objectives. In this paper, we propose a novel approach to secure UAV adhoc networks, referred to as the blockchain-assisted security framework (BCSF). We demonstrate that the proposed system provides security without sacrificing the performance of the network through blockchain technology adopted to the priority of the message to be communicated over the adhoc UAV network. Theoretical analysis for computing average latency is performed based on queuing theory models followed by an evaluation of the proposed BCSF approach through simulations that establish the superior performance of the proposed methodology in terms of transaction delay, data secrecy, data recovery, and energy efficiency.


Assuntos
Blockchain , Redes de Comunicação de Computadores , Segurança Computacional , Dispositivos Aéreos não Tripulados , Tecnologia sem Fio , Algoritmos
11.
Sensors (Basel) ; 24(9)2024 Apr 26.
Artigo em Inglês | MEDLINE | ID: mdl-38732888

RESUMO

In today's health-monitoring applications, there is a growing demand for wireless and wearable acquisition platforms capable of simultaneously gathering multiple bio-signals from multiple body areas. These systems require well-structured software architectures, both to keep different wireless sensing nodes synchronized each other and to flush collected data towards an external gateway. This paper presents a quantitative analysis aimed at validating both the wireless synchronization task (implemented with a custom protocol) and the data transmission task (implemented with the BLE protocol) in a prototype wearable monitoring platform. We evaluated seven frequencies for exchanging synchronization packets (10 Hz, 20 Hz, 30 Hz, 40 Hz, 50 Hz, 60 Hz, 70 Hz) as well as two different BLE configurations (with and without the implementation of a dynamic adaptation of the BLE Connection Interval parameter). Additionally, we tested BLE data transmission performance in five different use case scenarios. As a result, we achieved the optimal performance in the synchronization task (1.18 ticks as median synchronization delay with a Min-Max range of 1.60 ticks and an Interquartile range (IQR) of 0.42 ticks) when exploiting a synchronization frequency of 40 Hz and the dynamic adaptation of the Connection Interval. Moreover, BLE data transmission proved to be significantly more efficient with shorter distances between the communicating nodes, growing worse by 30.5% beyond 8 m. In summary, this study suggests the best-performing network configurations to enhance the synchronization task of the prototype platform under analysis, as well as quantitative details on the best placement of data collectors.


Assuntos
Dispositivos Eletrônicos Vestíveis , Tecnologia sem Fio , Tecnologia sem Fio/instrumentação , Humanos , Monitorização Fisiológica/instrumentação , Monitorização Fisiológica/métodos , Redes de Comunicação de Computadores/instrumentação , Software
12.
PLoS One ; 19(4): e0301470, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38578810

RESUMO

In wireless sensor networks, the implementation of clustering and routing protocols has been crucial in prolonging the network's operational duration by conserving energy. However, the challenge persists in efficiently optimizing energy usage to maximize the network's longevity. This paper presents CHHFO, a new protocol that combines a fuzzy logic system with the collaborative Harris Hawks optimization algorithm to enhance the lifetime of networks. The fuzzy logic system utilizes descriptors like remaining energy, distance from the base station, and the number of neighboring nodes to designate each cluster head and establish optimal clusters, thereby alleviating potential hot spots. Moreover, the Collaborative Harris Hawks Optimization algorithm employs an inventive coding mechanism to choose the optimal relay cluster head for data transmission. According to the results, the network throughput, HHOCFR is 8.76%, 11.73%, 8.64% higher than HHO-UCRA, IHHO-F, and EFCR. In addition, he energy consumption of HHOCFR is lower than HHO-UCRA, IHHO-F, and EFCR by 0.88%, 39.79%, 34.25%, respectively.


Assuntos
Falconiformes , Lógica Fuzzy , Animais , Tecnologia sem Fio , Redes de Comunicação de Computadores , Algoritmos
13.
PLoS One ; 19(4): e0301842, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38669218

RESUMO

The rapid development of mobile communication devices has brought challenges to wireless networks, where data packets are able to organize and maintain local area networks more freely without the constraints of wired devices. Scholars have developed diverse network protocols on how to ensure data transmission while maintaining its self-organizational nature. However, it is difficult for traditional network protocols to meet the needs of increasingly complex networks. In order to solve the problem that the better node set may not be selected when selecting the node set responsible for forwarding in the traditional OLSR protocol, a multi-objective optimized OLSR algorithm is proposed in this paper, which incorporating a new MPR mechanism and an improved NSGA-II algorithm. In the process of route discovery, the intermediate nodes responsible for forwarding packets are determined by the new MPR mechanism, and then the main parameters in the OLSR protocol are provided by the multi-objective optimization algorithm. Matlab was used to build a self-organizing network in this study. In addition, the conventional OLSR protocol, NSGA-II algorithm and multi-objective simulated annealing algorithm are selected to compare with the proposed algorithm. Simulation results show that the proposed algorithm can effectively reduce packet loss and end-to-end delay while obtaining better results in HV and Spacing, two multi-objective optimization result evaluation metrics.


Assuntos
Algoritmos , Redes de Comunicação de Computadores , Tecnologia sem Fio , Simulação por Computador
14.
PLoS One ; 19(4): e0299846, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38669264

RESUMO

The decoupling of control and forwarding layers brings Software-Defined Networking (SDN) the network programmability and global control capability, but it also poses SDN security risks. The adversaries can use the forwarding and control decoupling character of SDN to forge legitimate traffic, launching saturation attacks targeted at SDN switches. These attacks can cause the overflow of switch flow tables, thus making the switch cannot forward benign network traffic. How to effectively detect saturation attack is a research hotspot. There are only a few graph-based saturation attack detection methods. Meanwhile, the current graph generation methods may take useless or misleading information to the attack detection, thus decreasing the attack detection accuracy. To solve the above problems, this paper proposes TITAN, a bidirecTional forwardIng graph-based saturaTion Attack detectioN method. TITAN defines flow forwarding rules and topology information, and designs flow statistical features. Based on these definitions, TITAN generates nodes of the bi-forwarding graph based on the flow statistics features and edges of the bi-forwarding graph based on the network traffic routing paths. In this way, each traffic flow in the network is transformed into a bi-directional forwarding graph. Then TITAN feeds the above bidirectional forwarding graph into a Graph Convolutional Network (GCN) to detect whether the flow is a saturation attack flow. The experimental results show that TITAN can effectively detect saturation attacks in SDNs with a detection accuracy of more than 97%.


Assuntos
Algoritmos , Segurança Computacional , Software , Redes de Comunicação de Computadores
15.
PLoS One ; 19(3): e0300650, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38527025

RESUMO

As the demand for high-bandwidth Internet connections continues to surge, industries are exploring innovative ways to harness this connectivity, and smart agriculture stands at the forefront of this evolution. In this paper, we delve into the challenges faced by Internet Service Providers (ISPs) in efficiently managing bandwidth and traffic within their networks. We propose a synergy between two pivotal technologies, Multi-Protocol Label Switching-Traffic Engineering (MPLS-TE) and Diffserv Quality of Service (Diffserv-QoS), which have implications beyond traditional networks and resonate strongly with the realm of smart agriculture. The increasing adoption of technology in agriculture relies heavily on real-time data, remote monitoring, and automated processes. This dynamic nature requires robust and reliable high-bandwidth connections to facilitate data flow between sensors, devices, and central management systems. By optimizing bandwidth utilization through MPLS-TE and implementing traffic control mechanisms with Diffserv-QoS, ISPs can create a resilient network foundation for smart agriculture applications. The integration of MPLS-TE and Diffserv-QoS has resulted in significant enhancements in throughput and a considerable reduction in Jitter. Employment of the IPv4 header has demonstrated impressive outcomes, achieving a throughput of 5.83 Mbps and reducing Jitter to 3 msec.


Assuntos
Algoritmos , Redes de Comunicação de Computadores , Simulação por Computador , Tecnologia sem Fio , Agricultura
16.
Artif Intell Med ; 149: 102779, 2024 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-38462281

RESUMO

The healthcare sector, characterized by vast datasets and many diseases, is pivotal in shaping community health and overall quality of life. Traditional healthcare methods, often characterized by limitations in disease prevention, predominantly react to illnesses after their onset rather than proactively averting them. The advent of Artificial Intelligence (AI) has ushered in a wave of transformative applications designed to enhance healthcare services, with Machine Learning (ML) as a noteworthy subset of AI. ML empowers computers to analyze extensive datasets, while Deep Learning (DL), a specific ML methodology, excels at extracting meaningful patterns from these data troves. Despite notable technological advancements in recent years, the full potential of these applications within medical contexts remains largely untapped, primarily due to the medical community's cautious stance toward novel technologies. The motivation of this paper lies in recognizing the pivotal role of the healthcare sector in community well-being and the necessity for a shift toward proactive healthcare approaches. To our knowledge, there is a notable absence of a comprehensive published review that delves into ML, DL and distributed systems, all aimed at elevating the Quality of Service (QoS) in healthcare. This study seeks to bridge this gap by presenting a systematic and organized review of prevailing ML, DL, and distributed system algorithms as applied in healthcare settings. Within our work, we outline key challenges that both current and future developers may encounter, with a particular focus on aspects such as approach, data utilization, strategy, and development processes. Our study findings reveal that the Internet of Things (IoT) stands out as the most frequently utilized platform (44.3 %), with disease diagnosis emerging as the predominant healthcare application (47.8 %). Notably, discussions center significantly on the prevention and identification of cardiovascular diseases (29.2 %). The studies under examination employ a diverse range of ML and DL methods, along with distributed systems, with Convolutional Neural Networks (CNNs) being the most commonly used (16.7 %), followed by Long Short-Term Memory (LSTM) networks (14.6 %) and shallow learning networks (12.5 %). In evaluating QoS, the predominant emphasis revolves around the accuracy parameter (80 %). This study highlights how ML, DL, and distributed systems reshape healthcare. It contributes to advancing healthcare quality, bridging the gap between technology and medical adoption, and benefiting practitioners and patients.


Assuntos
Inteligência Artificial , Qualidade de Vida , Humanos , Aprendizado de Máquina , Redes de Comunicação de Computadores , Qualidade da Assistência à Saúde
17.
PLoS One ; 19(2): e0296392, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38408070

RESUMO

The quest for energy efficiency (EE) in multi-tier Heterogeneous Networks (HetNets) is observed within the context of surging high-speed data demands and the rapid proliferation of wireless devices. The analysis of existing literature underscores the need for more comprehensive strategies to realize genuinely energy-efficient HetNets. This research work contributes significantly by employing a systematic methodology, utilizing This model facilitates the assessment of network performance by considering the spatial distribution of network elements. The stochastic nature of the PPP allows for a realistic representation of the random spatial deployment of base stations and users in multi-tier HetNets. Additionally, an analytical framework for Quality of Service (QoS) provision based on D-DOSS simplifies the understanding of user-base station relationships and offers essential performance metrics. Moreover, an optimization problem formulation, considering coverage, energy maximization, and delay minimization constraints, aims to strike a balance between key network attributes. This research not only addresses crucial challenges in creating EE HetNets but also lays a foundation for future advancements in wireless network design, operation, and management, ultimately benefiting network operators and end-users alike amidst the growing demand for high-speed data and the increasing prevalence of wireless devices. The proposed D-DOSS approach not only offers insights for the systematic design and analysis of EE HetNets but also systematically outperforms other state-of-the-art techniques presented. The improvement in energy efficiency systematically ranges from 67% (min side) to 98% (max side), systematically demonstrating the effectiveness of the proposed strategy in achieving higher energy efficiency compared to existing strategies. This systematic research work establishes a strong foundation for the systematic evolution of energy-efficient HetNets. The systematic methodology employed ensures a comprehensive understanding of the complex interplay of network dynamics and user requirements in a multi-tiered environment.


Assuntos
Redes de Comunicação de Computadores , Tecnologia sem Fio , Simulação por Computador , Conservação de Recursos Energéticos , Fenômenos Físicos
19.
PLoS One ; 19(2): e0297810, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38358986

RESUMO

Ultra-reliable low-latency communication (URLLC) is a key technology in future wireless communications, and finite blocklength (FBL) coding is the core of the URLLC. In this paper, FBL coding schemes for the wireless multi-antenna channels are proposed, which are based on the classical Schalkwijk-Kailath scheme for the point-to-point additive white Gaussian noise channel with noiseless feedback. Simulation examples show that the proposed feedback-based schemes almost approach the corresponding channel capacities.


Assuntos
Redes de Comunicação de Computadores , Tecnologia sem Fio , Retroalimentação , Simulação por Computador , Comunicação
20.
IEEE Trans Nanobioscience ; 23(2): 355-367, 2024 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-38349839

RESUMO

Advancements in biotechnology and molecular communication have enabled the utilization of nanomachines in Wireless Body Area Networks (WBAN2) for applications such as drug delivery, cancer detection, and emergency rescue services. To study these networks effectively, it is essential to develop an ideal propagation model that includes the channel response between each pair of in-range nanomachines and accounts for the interference received at each receiver node. In this paper, we employ an advection-diffusion equation to obtain a deterministic channel matrix through a vascular WBAN2. Additionally, the closed forms of inter-symbol interference (ISI) and co-channel interference (CCI) are derived for both full duplex (FDX) and half duplex transmission (HDX) modes. By applying these deterministic formulations, we then present the stochastic equivalents of the ideal channel model and interference to provide an innovative communication model by simultaneously incorporating CCI, ISI, and background noise. Finally, we evaluate the results with numerous experiments and use signal-to-interference-plus-noise ratio (SINR) and capacity as metrics.


Assuntos
Biotecnologia , Comunicação , Difusão , Sistemas de Liberação de Medicamentos , Redes de Comunicação de Computadores , Tecnologia sem Fio
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...