scholarly journals An Overview of Post-Disaster Emergency Communication Systems in the Future Networks

2019 ◽  
Vol 26 (6) ◽  
pp. 132-139 ◽  
Author(s):  
Deepak G.C. ◽  
Alexandros Ladas ◽  
Yusuf Abdulrahman Sambo ◽  
Haris Pervaiz ◽  
Christos Politis ◽  
...  
Author(s):  
Shuo Zhang ◽  
Shuo Shi ◽  
Tianming Feng ◽  
Xuemai Gu

AbstractAt present, unmanned aerial vehicles (UAVs) have been widely used in communication systems, and the fifth-generation wireless system (5G) has further promoted the vigorous development of them. The trajectory planning of UAV is an important factor that affects the timeliness and completion of missions, especially in scenarios such as emergency communications and post-disaster rescue. In this paper, we consider an emergency communication network where a UAV aims to achieve complete coverage of potential underlaying device-to-device (D2D) users. Trajectory planning issues are grouped into clustering and supplementary phases for optimization. Aiming at trajectory length and sum throughput, two trajectory planning algorithms based on K-means are proposed, respectively. In addition, in order to balance sum throughput with trajectory length, we present a joint evaluation index. Then relying on this index, a third trajectory optimization algorithm is further proposed. Simulation results show the validity of the proposed algorithms which have advantages over the well-known benchmark scheme in terms of trajectory length and sum throughput.


2021 ◽  
Vol 1 ◽  
pp. 4-10
Author(s):  
Jianguo Zhou ◽  
Changjia Zhou ◽  
Yuqin Kang ◽  
Shenghui Tu

2019 ◽  
Vol 34 ◽  
pp. 173-183 ◽  
Author(s):  
Dantje Sina ◽  
Alice Yan Chang-Richards ◽  
Suzanne Wilkinson ◽  
Regan Potangaroa

Author(s):  
Stavroula Vassaki ◽  
George Pitsiladis ◽  
Stavros E. Sagkriotis ◽  
Athanasios D. Panagopoulos

Machine type communications (or Machine-to-Machine / M2M) communications have emerged as an important paradigm in wireless communication networks. The current M2M standardization activities are presented and their implementation in 4G/LTE networks is described in detail. The chapter is divided in three parts that are related to the evolution of the Future M2M communication Networks. The first part focuses on existing random access management schemes for M2M communications that are presented in the literature. The second part is devoted on spectrum sharing methods and on M2M clustering and it presents the spatial distribution of heterogeneous networks and its impact on their connectivity. Finally, the last part refers to energy efficiency issues of the future M2M communication systems and their implementation using distributed power control and MAC/scheduling algorithms.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.


ETRI Journal ◽  
2011 ◽  
Vol 33 (1) ◽  
pp. 18-26 ◽  
Author(s):  
Ji Zhang ◽  
Hai Li ◽  
Shujuan Hou

Author(s):  
Alok Ranjan ◽  
Bighnaraj Panigrahi ◽  
Hemant Kumar Rath ◽  
Prasant Misra ◽  
Anantha Simha ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document