scholarly journals Social-Aware Peer Discovery for Energy Harvesting-Based Device-To-Device Communications

Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2304 ◽  
Author(s):  
Zelalem Legese Hailemariam ◽  
Yuan-Cheng Lai ◽  
Yen-Hung Chen ◽  
Yu-Hsueh Wu ◽  
Arthur Chang

In Device-to-Device (D2D) communications, the first step is to find all of the neighboring peers in the network by performing a peer discovery process. Most previous studies use the social behaviors of the users to adjust the sending rates of the peer discovery messages (i.e., beacons) under the constraint of consumed power for increasing the Peer Discovery Ratio (PDR). However, these studies do not consider the potential for energy harvesting, which allows for the User Equipments (UEs) to procure additional power within charging areas. Accordingly, this paper proposes an Energy-Ratio Rate Decision (ERRD) algorithm that comprises three steps, namely Social Ratio Allocation (SRA), Energy Ratio Allocation (ERA), and Beacon Rate Decision (BRD). The SRA step determines the allocated power quantum for each UE from the total budget power based on the social behavior of the UE. The ERA step then adjusts this allocated power quantum in accordance with the power that is harvested by the UE. Finally, the BRD step computes the beacon rate for the UE based on the adjusted power quantum. The simulation results show that ERRD outperforms the previously-reported Social-Based Grouping (SBG) algorithm by 190% on the PDR for a budget power of one watt and 8% for a budget power of 20 watts.

2019 ◽  
Vol 60 (2) ◽  
pp. 303-305
Author(s):  
Valdir Leite da Silva ◽  
José Cândido ◽  
José Nelson Campanha ◽  
Doraci R. de Oliveira ◽  
Carla Gheler-Costa ◽  
...  

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Renad Jabarin ◽  
Nina Levy ◽  
Yasmin Abergel ◽  
Joshua H. Berman ◽  
Amir Zag ◽  
...  

AbstractIn this study we tested the hypothesis that pharmacological modulation of glutamatergic neurotransmission could rescue behavioral deficits exhibited by mice carrying a specific mutation in the Iqsec2 gene. The IQSEC2 protein plays a key role in glutamatergic synapses and mutations in the IQSEC2 gene are a frequent cause of neurodevelopmental disorders. We have recently reported on the molecular pathophysiology of one such mutation A350V and demonstrated that this mutation downregulates AMPA type glutamatergic receptors (AMPAR) in A350V mice. Here we sought to identify behavioral deficits in A350V mice and hypothesized that we could rescue these deficits by PF-4778574, a positive AMPAR modulator. Using a battery of social behavioral tasks, we found that A350V Iqsec2 mice exhibit specific deficits in sex preference and emotional state preference behaviors as well as in vocalizations when encountering a female mouse. The social discrimination deficits, but not the impaired vocalization, were rescued with a single dose of PF-4778574. We conclude that social behavior deficits associated with the A350V Iqsec2 mutation may be rescued by enhancing AMPAR mediated synaptic transmission.


1973 ◽  
Vol 36 (3) ◽  
pp. 735-738 ◽  
Author(s):  
Joaquin F. Sousa-Poza ◽  
Robert Rohrberg ◽  
Ernest Shulman

Some characteristics of the social behavior of field-dependents as well as their superior recognition of ambiguous social stimuli led to the hypothesis that they would show greater self-disclosure than field-independents. This hypothesis was tested by administering the 60-item Jourard Self-disclosure Questionnaire (JSDQ) to 13 field-dependent and 13 field-independent Ss. In terms of total self-disclosure scores, field-dependents showed significantly (.025) higher levels than field-independents. Results are discussed in light of personality theories which emphasize the role of self-conceptual transactions in the development of the self.


1959 ◽  
Vol 201 (4) ◽  
pp. 128-140 ◽  
Author(s):  
John A. King

2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Qiang Yan ◽  
Lianren Wu ◽  
Lanli Yi

Through analyzing the data about the releases, comment, and forwarding of 120,000 microblog messages in a year, this paper finds out that the intervals between information releases and comment follow a power law; besides, the analysis of data in each 24 hours reveals obvious differences between microblogging and website visit, email, instant communication, and the use of mobile phone, reflecting how people use fragments of time via mobile internet technology. The paper points out the significant influence of the user's activity on the intervals of information releases and thus demonstrates a positive correlation between the activity and the power exponent. The paper also points out that user's activity is influenced by social identity in a positive way. The simulation results based on the social identity mechanism fit well with the actual data, which indicates that this mechanism is a reasonable way to explain people's behavior in the mobile Internet.


Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1608
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols.


Sign in / Sign up

Export Citation Format

Share Document