Sort by
Communication Security for UAV in military
Rashid Alshamsi,
Mohammad Naouss
Posted: 18 April 2025
Neural Network-Based Interference Cancellation for MRC and EGC Receivers in Large Intelligent Surfaces for 6G
Mário Marques da Silva,
Gelson Pembele,
Rui Dinis
Posted: 15 April 2025
e-FlowPrint: Enhanced FlowPrint for Robust Unknown Traffic Detection Using Uncertainty Measures Inspired by Active Learning
Marziyeh Bayat,
Zhino Naghshbandi,
Mehdi Teimouri
Posted: 14 April 2025
Performance Assessment of a Smart GNSS Antenna Array with Digital Beamforming Supported by a FPGA Platform
Gonçalo Dores,
Hugo Dinis,
Diogo Baptista,
Paulo M. Mendes
Posted: 14 April 2025
Network-Integrated Civilian Drones: A Public Policy Framework for Smart Cities in the GCC and Egypt
Rami Ahmed Kamel Elsayed,
Ibrahim Fawzy,
Abdul Hadi Abu Almal
Posted: 10 April 2025
A Review on the Challenges in Digital Literacy and Accessibility in Rural Communities: A Case Study of Salempur Village
Ranya Riti,
Sandeep Kumar
Posted: 07 April 2025
Automated Real-Time Uplink and Downlink Data Acquisition in LoRaWAN Base Stations
Manuel Quiñones-Cuenca,
Esteban Briceño-Sánchez,
Hoswel Jiménez-Salcedo,
Santiago Quiñones-Cuenca,
Leslye Estefania Castro Eras,
Carlos Carrión Betancourt
Posted: 31 March 2025
6G Self-Evolution Based on Digital Twin Network
Yuhong Huang,
Mancong Kang,
Yanhong Zhu,
Na Li,
Guangyi Liu,
Qixing Wang
Posted: 24 March 2025
A Comprehensive Study of IPTV: Challenges, Opportunities, and Future Trends
Georgios Giannakopoulos,
Maria Antonnette Perez,
Peter Adegbenro
Posted: 14 March 2025
Outage Probability Analysis of Relay Communication Systems for Semantic Transmission
Yangyang Cui,
Xiaowei Wang
This paper focuses on relay semantic communication systems and deeply investigates their outage probability performance under different conditions. First, a three-point, two-link communication transmission model is constructed, which includes the source node, relay node, and destination node. The relay operates in half-duplex mode and is based on the DeepSC communication transmission model, with semantic and channel encoding/decoding implemented at both the source and relay nodes. Next, depending on the computational capabilities of the destination node, background knowledge, and channel conditions, the channel transmission strategies are classified into four scenarios: 1) Both the SR and RD links use semantic transmission, with the source and destination nodes having either the same or different background knowledge; 2) Both the SR and RD links use semantic transmission, but the signal is impaired, preventing the destination node from decoding; 3) The SR link uses semantic transmission, while the RD link performs bit transmission. For each scenario, the channel capacity formula and outage probability expressions are derived. In calculating the outage probability, the results are obtained by analyzing and deriving the distributions and conditions of relevant variables. Finally, Monte Carlo simulations are used to validate the theoretical analysis. The research results provide a theoretical basis for comprehensively understanding the performance of relay semantic communication systems and are of significant importance for advancing semantic communication technology.
This paper focuses on relay semantic communication systems and deeply investigates their outage probability performance under different conditions. First, a three-point, two-link communication transmission model is constructed, which includes the source node, relay node, and destination node. The relay operates in half-duplex mode and is based on the DeepSC communication transmission model, with semantic and channel encoding/decoding implemented at both the source and relay nodes. Next, depending on the computational capabilities of the destination node, background knowledge, and channel conditions, the channel transmission strategies are classified into four scenarios: 1) Both the SR and RD links use semantic transmission, with the source and destination nodes having either the same or different background knowledge; 2) Both the SR and RD links use semantic transmission, but the signal is impaired, preventing the destination node from decoding; 3) The SR link uses semantic transmission, while the RD link performs bit transmission. For each scenario, the channel capacity formula and outage probability expressions are derived. In calculating the outage probability, the results are obtained by analyzing and deriving the distributions and conditions of relevant variables. Finally, Monte Carlo simulations are used to validate the theoretical analysis. The research results provide a theoretical basis for comprehensively understanding the performance of relay semantic communication systems and are of significant importance for advancing semantic communication technology.
Posted: 12 March 2025
Multilingual Speech and Text Translation for Indian Regional Languages
Navya Sharma,
Uma Chauhan,
Sandeep Kumar
Posted: 07 March 2025
A Path Towards Green Cellular Networks Leveraging SDN, NFV, and C-RAN
Radheshyam Singh,
Line M.P. Larsen,
Eder Ollora Zaballa,
Michael Stübert Berger,
Christian Kloch,
Lars Dittmann
Posted: 06 March 2025
Comprehensive Optical Inter-Satellite Communication Model for Low Earth Orbit Constellations: Analyzing Transmission Power Requirements
Michail Gioulis,
Thomas Kamalakis,
Dimitris Alexandropoulos
Posted: 05 March 2025
Design and Analysis of a Compact MIMO Microstrip Antenna for IoT and 5G Wireless Communication
Samar I. Farghaly,
Ali M. El-Rifaie,
Kamel E. Abo-Ela,
Abdelaziz Y. Zaki,
Hager S. Fouda
Posted: 03 March 2025
A Survey on Architectural Approaches for 6G Networks: Implementation Challenges, Current Trends, and Future Directions
Panagiotis K. Gkonis,
Anastasios Giannopoulos,
Nikolaos Nomikos,
Panagiotis Trakadas,
Lambros Sarakis,
Xavi Masip-Bruin
As the discussions on sixth generation (6G) wireless networks progress at a rapid pace, various approaches have emerged over the last years regarding new architectural concepts that can support the 6G vision. Therefore, the goal of this work is to highlight the most important technological efforts in relation to the definition of a 6G architectural concept. To this end, the primary challenges are firstly described, which can be viewed as the driving forces for the 6G architectural standardization. Afterwards, novel technological approaches are discussed to support the 6G concept, such as the introduction of artificial intelligence and machine learning for resource optimization and threat mitigation, cell-free deployments and novel physical layer techniques to leverage high data rates, open access protocols for flexible resource integration, security and privacy protection in the 6G era, as well as the digital twin concept. Finally, recent research efforts are analyzed with emphasis on the combination of the aforementioned aspects towards a unified 6G architectural approach. To this end, limitations and open issues are highlighted as well.
As the discussions on sixth generation (6G) wireless networks progress at a rapid pace, various approaches have emerged over the last years regarding new architectural concepts that can support the 6G vision. Therefore, the goal of this work is to highlight the most important technological efforts in relation to the definition of a 6G architectural concept. To this end, the primary challenges are firstly described, which can be viewed as the driving forces for the 6G architectural standardization. Afterwards, novel technological approaches are discussed to support the 6G concept, such as the introduction of artificial intelligence and machine learning for resource optimization and threat mitigation, cell-free deployments and novel physical layer techniques to leverage high data rates, open access protocols for flexible resource integration, security and privacy protection in the 6G era, as well as the digital twin concept. Finally, recent research efforts are analyzed with emphasis on the combination of the aforementioned aspects towards a unified 6G architectural approach. To this end, limitations and open issues are highlighted as well.
Posted: 28 February 2025
Lightweight Periodic Scheduler in Wearable Devices for Real-Time Biofeedback Systems in Sports and Physical Rehabilitation
Anton Kos,
Arpad Buerman,
Matevž Hribernik,
Sašo Tomažič,
Anton Umek,
Iztok Fajfar,
Janez Puhan
Posted: 27 February 2025
Secure Communications for UAV Relay Networks: A MPC-Based Trajectory Tracking Approach
Shizhan Lan,
Lei Zhong,
Bin Tan,
Yeyu Liang,
Shan Chen,
Hanghang Xie
Posted: 24 February 2025
What Are the Optimal Sampling Time of Environmental Parameters? Fourier Analysis and Energy Harvesting to Reduce Sensors Consumption in Smart Greenhouses
Cristian Bua,
Davide Adami,
Stefano Giordano
Posted: 21 February 2025
Integration of Owl Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols
Yair Rivera Julio,
Angel Pinto Mangones,
Juan Torres Tovio,
María Clara Gómez,
Dixon Salcedo
The exponential growth of the Internet of Things (IoT) has revolutionized connectivity, generating vast amounts of data, and introducing significant challenges in security and privacy. Traditional security protocols often fail to meet the demands of IoT environments due to the limited computational and energy capacities of devices, as well as the need for scalability and adaptability in dynamic networks. This study evaluates IoT application protocols to identify those lacking native key-exchange mechanisms and examines the integration of Owl, a password-authenticated key-exchange protocol, to improve security from the initial stages of communication. By focusing on lightweight and resource-efficient designs, this research demonstrates how Owl addresses critical security gaps, reinforces authentication, and ensures robust session establishment in IoT systems. The findings provide a road-map for incorporating Owl into IoT architectures, offering practical solutions to achieve seamless, scalable, and secure communication in constrained environments.
The exponential growth of the Internet of Things (IoT) has revolutionized connectivity, generating vast amounts of data, and introducing significant challenges in security and privacy. Traditional security protocols often fail to meet the demands of IoT environments due to the limited computational and energy capacities of devices, as well as the need for scalability and adaptability in dynamic networks. This study evaluates IoT application protocols to identify those lacking native key-exchange mechanisms and examines the integration of Owl, a password-authenticated key-exchange protocol, to improve security from the initial stages of communication. By focusing on lightweight and resource-efficient designs, this research demonstrates how Owl addresses critical security gaps, reinforces authentication, and ensures robust session establishment in IoT systems. The findings provide a road-map for incorporating Owl into IoT architectures, offering practical solutions to achieve seamless, scalable, and secure communication in constrained environments.
Posted: 21 February 2025
Semantic Communication on Digital Wireless Communication System
Binhong Huang,
Hao Chen,
Cheng Guo,
Xiaodong Xu,
Nan Ma,
Ping Zhang
Semantic communication is an effective technological approach for the integration of intelligence and communication, enabling more efficient and context-aware data transmission. In this paper, we propose a bit-conversion-based semantic communication transmission framework to ensure the compatibility with existing wireless system. Specifically, a series of physical-layer processing modules in the end-to-end transmission are designed. Additionally, we develop a semantic communication simulator to implement and evaluate this framework. To optimize the performance of this framework, we introduce a novel physical-layer metric, termed Integer Error Rate (IER), which provides a more suitable evaluation criterion for semantic communication compared to the conventional Bit Error Rate (BER). On the basis of IER, a minimum Manhattan distance constellation mapping scheme is proposed, which can improve the transmission quality of semantic communication under the same BER condition. Furthermore, we propose a hybrid Joint Source-Channel Coding (JSCC) and Separate Source-Channel Coding (SSCC) transmission scheme. This scheme decouples the semantic quantization output from the modulation order by segmenting the bits to be transmitted. Simulation results demonstrate that the hybrid JSCC/SSCC transmission scheme can improve the semantic performance such as Peak Signal-to-Noise Ratio (PSNR) at the low Signal-to-Noise Ratio (SNR) environment while reducing bandwidth usage by up to 50% compared to the benchmark scheme.
Semantic communication is an effective technological approach for the integration of intelligence and communication, enabling more efficient and context-aware data transmission. In this paper, we propose a bit-conversion-based semantic communication transmission framework to ensure the compatibility with existing wireless system. Specifically, a series of physical-layer processing modules in the end-to-end transmission are designed. Additionally, we develop a semantic communication simulator to implement and evaluate this framework. To optimize the performance of this framework, we introduce a novel physical-layer metric, termed Integer Error Rate (IER), which provides a more suitable evaluation criterion for semantic communication compared to the conventional Bit Error Rate (BER). On the basis of IER, a minimum Manhattan distance constellation mapping scheme is proposed, which can improve the transmission quality of semantic communication under the same BER condition. Furthermore, we propose a hybrid Joint Source-Channel Coding (JSCC) and Separate Source-Channel Coding (SSCC) transmission scheme. This scheme decouples the semantic quantization output from the modulation order by segmenting the bits to be transmitted. Simulation results demonstrate that the hybrid JSCC/SSCC transmission scheme can improve the semantic performance such as Peak Signal-to-Noise Ratio (PSNR) at the low Signal-to-Noise Ratio (SNR) environment while reducing bandwidth usage by up to 50% compared to the benchmark scheme.
Posted: 19 February 2025
of 11