Mostrando 10 resultados de: 15
Filtros aplicados
Publisher
IEEE Access(3)
IEEE Transactions on Green Communications and Networking(2)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(2)
2022 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2022(1)
Applied Sciences (Switzerland)(1)
Área de conocimiento
Comunicación(6)
Red inalámbrica(4)
Aprendizaje automático(3)
Energía(3)
Algoritmo(2)
Origen
scopus(15)
Cluster-Head Selection for Energy-Harvesting IoT Devices in Multi-tier 5G Cellular Networks
Conference ObjectAbstract: Fifth-generation cellular networks promise to interconnect a wide variety of wireless devices, suchPalabras claves:5g networks, internet of things, LEACH, Multilayer Perceptron, Network lifetimeAutores:Koo I., Mario R. Camana, Moreta C.E.G.Fuentes:scopusAnalysis of QoS for the EDCA and HCCA mechanisms by simulation in a WLAN for voice, video, and data
Conference ObjectAbstract: This paper's main objective is to analyze the quality of service using the network simulator NS2, inPalabras claves:Access Category, CFB, EDCA, HCCA, IEEE 802.11e, TXOP limitAutores:Garcia Carla, Mario R. Camana, Pablo HidalgoFuentes:scopusDNN aided PSO based-scheme for a Secure Energy Efficiency Maximization in a cooperative NOMA system with a non-linear EH
Conference ObjectAbstract: Physical layer security is an emerging security area to tackle wireless security communications issuPalabras claves:Deep neural network (DNN), Non-Orthogonal Multiple Access (NOMA), Particle Swarm Optimization (PSO), physical layer security, Secrecy energy efficiency (SEE)Autores:Koo I., Mario R. Camana, Moreta C.E.G.Fuentes:scopusExtremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks
ArticleAbstract: Smart grids have become susceptible to cyber-attacks, being one of the most diversified cyber-physicPalabras claves:Cyber-attacks, Cyber-security, extra-trees, KPCA, Machine learningAutores:Ahmed S., Koo I., Mario R. Camana, Moreta C.E.G.Fuentes:scopusEnsemble Learning aided QPSO–Based Framework for Secrecy Energy Efficiency in FD CR-NOMA Systems
ArticleAbstract: Cognitive radio (CR), non-orthogonal multiple access (NOMA), and full-duplex (FD) communications havPalabras claves:Cognitive Radio (CR), ensemble learning, NOMA, Non-Orthogonal Multiple Access (NOMA), Optimization, Particle Swarm Optimization, quantum particular swarm optimization (QPSO), Relays, Resource Management, Secrecy energy efficiency (SEE), security, wireless networksAutores:Koo I., Mario R. Camana, Moreta C.E.G.Fuentes:scopusOptimal energy beamforming to minimize transmit power in a multi-antenna wireless powered communication network
ArticleAbstract: In this paper, we study the transmit power minimization problem with optimal energy beamforming in aPalabras claves:Sequential parametric convex approximation, Transmit power control, wireless energy transfer, Wireless information transferAutores:Hameed I., Koo I., Mario R. Camana, Tuan P.V.Fuentes:scopusOptimized Power Allocation for a Cooperative NOMA System with SWIPT and an Energy-Harvesting User
ArticleAbstract: This paper investigates the solution to an optimisation problem to minimise the total transmission pPalabras claves:convex optimisation, energy harvesting, NOMA, OMA, power splitting, SWIPTAutores:Koo I., Mario R. Camana, Moreta C.E.G., Tuan P.V.Fuentes:scopusParticle Swarm Optimization-Based Power Allocation Scheme for Secrecy Sum Rate Maximization in NOMA with Cooperative Relaying
Conference ObjectAbstract: In this paper, we study a particle swarm optimization (PSO)-based power allocation scheme for physicPalabras claves:Cooperative relaying, Non-orthogonal multiple-access, Orthogonal multiple access, Particle Swarm Optimization, Physical-layer security, Secrecy sum rateAutores:Koo I., Mario R. Camana, Moreta C.E.G., Rahman M.Fuentes:scopusPaticle swarm optimization-based secure computation efficiency maximization in a power beacon-assisted wireless-powered mobile edge computing NOMA system
ArticleAbstract: In this paper, we aim to provide reliable user connectivity and enhanced security for computation taPalabras claves:Energy harvesting (EH), Mobile edge computing (MEC), Non-Orthogonal Multiple Access (NOMA), Particle Swarm Optimization (PSO), Secure computation efficiency (SCE), Wireless power transfer (WPT)Autores:Koo I., Mario R. Camana, Moreta C.E.G.Fuentes:scopusLow-Complexity PSO-Based Resource Allocation Scheme for Cooperative Non-Linear SWIPT-Enabled NOMA
ArticleAbstract: Cooperative networks integrating non-orthogonal multiple access (NOMA) and simultaneous wireless infPalabras claves:Cuckoo search, non-linear simultaneous wireless information power transfer, Non-orthogonal multiple access, Particle Swarm Optimization, Resource allocationAutores:Koo I., Mario R. Camana, Moreta C.E.G.Fuentes:scopus