نتایج جستجو برای: base station

تعداد نتایج: 295282  

Journal: :IEEE Transactions on Vehicular Technology 2021

A large-scale clustered massive MIMO network is proposed for improving the spectral efficiency of next-generation wireless infrastructure by maximizing its sum-rate. Our solution combines advantages centralized processing architecture and MIMO. Explicitly, divided into multiple clusters; each cluster handled a unit, which connects to certain number MIMO-aided BSs, where only limited information...

2012
P.Vamsi Krishna

Travel time information is a vital component of many intelligent transportation systems (ITS) applications. In recent years, the number of passengers travels in train & number of trains in India has increased tremendously. Due to the increase in number of trains the train times may be delayed and the passengers have to wait at railway stations. A desirable strategy to deal with such issues is t...

Journal: :IEEE Transactions on Communications 2015

Journal: :The Journal of The Institute of Image Information and Television Engineers 2012

Journal: :Balkan Journal of Electrical and Computer Engineering 2020

Journal: :International Journal of Preventive Medicine 2017

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2020

Journal: :Informs Journal on Computing 2021

We address a dynamic covering location problem of an Unmanned Aerial Vehicle Base Station (UAV-BS), where the sequence single UAV-BS in wireless communication network is determined to satisfy data demand arising from ground users. This especially relevant context smart grid and disaster relief. The vertical movement ability non-convex functions restrict utilizing classical planar approaches. Th...

Journal: :Bitlis Eren üniversitesi fen bilimleri dergisi 2023

False Base Stations attack raises concerns about data privacy during handover process in 5G networks. Broadcasting of measurement reports unveils the need security assessment since a false base station can send stronger signal to User Equipment (UE) establish connection with itself. This may cause leakage information. Thus, fundamental solution is protect encryption algorithms. In this paper, w...

1999
Seungwon Lee Seong-Min Hong Hyunsoo Yoon Yookun Cho

Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than xed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, the public-key based protocols are not fully utilized due to the poor computing power and the small battery capacity...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید