Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Hans Dieter Schotten"'
Autor:
Kevin Herman Muraro Gularte, Jose Alfredo Ruiz Vargas, Joao Paulo Javidi da Costa, Antonio Santos da Silva, Giovanni Almeida Santos, Yuming Wang, Christian Alfons Muller, Christoph Lipps, Rafael Timoteo de Sousa Junior, Walter de Britto Vidal Filho, Philipp Slusallek, Hans Dieter Schotten
Publikováno v:
IEEE Access, Vol 12, Pp 72871-72895 (2024)
Vehicle-to-Everything (V2X) communication, essential for enhancing road safety, driving efficiency, and traffic management, must be robust against cybersecurity threats for successful deployment and acceptance. This survey comprehensively explores V2
Externí odkaz:
https://doaj.org/article/19f124b30704422b837bccbd2ebcce22
Autor:
Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten
Publikováno v:
Discover Internet of Things, Vol 3, Iss 1, Pp 1-12 (2023)
Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, th
Externí odkaz:
https://doaj.org/article/4234af62158f42669e5cea30111c5dd7
Publikováno v:
Network, Vol 2, Iss 3, Pp 440-455 (2022)
As 5G enters the application field of industrial communications, compatibility with technologies of wired deterministic communications such as Time-Sensitive Networking (TSN) needs to be considered during the standardization process. While considerat
Externí odkaz:
https://doaj.org/article/9a579a6f99a94923a7b328704ee2b80c
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 2, Pp 334-366 (2021)
As of today, the fifth generation (5G) mobile communication system has been rolled out in many countries and the number of 5G subscribers already reaches a very large scale. It is time for academia and industry to shift their attention towards the ne
Externí odkaz:
https://doaj.org/article/2bc3675debed41c5950f97bc2420baed
Autor:
Wei Jiang, Hans Dieter Schotten
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 1, Pp 320-332 (2020)
Channel state information (CSI), which enables wireless systems to adapt their transmission parameters to instantaneous channel conditions and consequently achieve great performance boost, plays an increasingly vital role in mobile communications. Ho
Externí odkaz:
https://doaj.org/article/da3fd2d99c9b4083b0bfc09769adea75
Publikováno v:
IEEE Access, Vol 8, Pp 193075-193090 (2020)
In this article, a series of convolutional-type predictive neural networks are proposed for the issue of fading channel forecasting for orthogonal frequency-division multiplexing (OFDM) transmission systems in a multiple-input and multiple-output (MI
Externí odkaz:
https://doaj.org/article/a15be5e2e82848deaff49fdca62b6657
Publikováno v:
Information, Vol 12, Iss 1, p 12 (2020)
The use of wireless communication systems in industrial environments is gaining international importance. The requirements, which are placed thereby on the communication systems, are manifold depending on the specific use. In the field of industrial
Externí odkaz:
https://doaj.org/article/0f8726e40e134081950753eaad415454
Autor:
Pedro Neves, Rui Calé, Mário Rui Costa, Carlos Parada, Bruno Parreira, Jose Alcaraz-Calero, Qi Wang, James Nightingale, Enrique Chirivella-Perez, Wei Jiang, Hans Dieter Schotten, Konstantinos Koutsopoulos, Anastasius Gavras, Maria João Barros
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 12 (2016)
To meet the challenging key performance indicators of the fifth generation (5G) system, the network infrastructure becomes more heterogeneous and complex. This will bring a high pressure on the reduction of OPEX and the improvement of the user experi
Externí odkaz:
https://doaj.org/article/9aa3ecd9d8c14afabc76b189a895b824
Publikováno v:
International Conference on Cyber Warfare and Security. 18:420-430
Physical Layer Security (PLS) based authentication schemes are an alternative to conventional security schemes such as e.g. certificates or Message Authentication Codes (MACs). They can provide a more lightweight solution compared to traditional cryp
Autor:
Hans Dieter Schotten, Wei Jiang
User experience in mobile communications is vulnerable to worse quality at the cell edge, which cannot be compensated by enjoying excellent service at the cell center, according to the principle of risk aversion in behavioral economics. Constrained b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::76dc479797783d90b1b580ed42f5c8b5
https://doi.org/10.36227/techrxiv.22574401
https://doi.org/10.36227/techrxiv.22574401