emergency communications
Recently Published Documents


TOTAL DOCUMENTS

207
(FIVE YEARS 51)

H-INDEX

14
(FIVE YEARS 4)

Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 6876
Author(s):  
Michail-Alexandros Kourtis ◽  
Thanos Sarlas ◽  
Giorgios Xilouris ◽  
Michael C. Batistatos ◽  
Charilaos C. Zarakovitis ◽  
...  

The definition of multiple slicing types in 5G has created a wide field for service innovation in communications. However, the advantages that network slicing has to offer remain to be fully exploited by today’s applications and users. An important area that can potentially benefit from 5G slicing is emergency communications for First Responders. The latter consists of heterogeneous teams, imposing different requirements on the connectivity network. In this paper, the RESPOND-A platform is presented, which provides First Responders with network-enabled tools on top of 5G on-scene planning, with enhanced service slicing capabilities tailored to emergency communications. Furthermore, a mapping of emergency services and communications to specific slice types is proposed to identify the current challenges in the field. Additionally, the proposed tentative mechanism is evaluated in terms of energy efficiency. Finally, the approach is summarized by discussing future steps in the convergence of 5G network slicing in various areas of emergency vertical applications.


2021 ◽  
pp. 1-6
Author(s):  
Jason M. Pudlo ◽  
William C. Ellis ◽  
Jamie M. Cole

ABSTRACT Increased computing capacity and the spread of computational knowledge has generated the expectation that organizations and municipalities use large quantities of data to drive decision making. However, municipalities may lack the resources to meaningfully use their data for decision making. Relatedly, political science and public administration programs face the challenge of training students for success in this environment. We believe one remedy is the adoption of coproduction as a pedagogical strategy. This article presents a case study of a partnership between a university research team and a municipal emergency communications center as a demonstration of how coproduction can be harnessed as a teaching tool. Findings from this project were presented at the Southern Political Science Association Annual Meeting, January 8–11, 2020, in San Juan, Puerto Rico.


Author(s):  
Shuo Zhang ◽  
Shuo Shi ◽  
Tianming Feng ◽  
Xuemai Gu

AbstractAt present, unmanned aerial vehicles (UAVs) have been widely used in communication systems, and the fifth-generation wireless system (5G) has further promoted the vigorous development of them. The trajectory planning of UAV is an important factor that affects the timeliness and completion of missions, especially in scenarios such as emergency communications and post-disaster rescue. In this paper, we consider an emergency communication network where a UAV aims to achieve complete coverage of potential underlaying device-to-device (D2D) users. Trajectory planning issues are grouped into clustering and supplementary phases for optimization. Aiming at trajectory length and sum throughput, two trajectory planning algorithms based on K-means are proposed, respectively. In addition, in order to balance sum throughput with trajectory length, we present a joint evaluation index. Then relying on this index, a third trajectory optimization algorithm is further proposed. Simulation results show the validity of the proposed algorithms which have advantages over the well-known benchmark scheme in terms of trajectory length and sum throughput.


2021 ◽  
Vol 136 ◽  
pp. 105121
Author(s):  
C. Natalie van der Wal ◽  
Mark A. Robinson ◽  
Wändi Bruine de Bruin ◽  
Steven Gwynne

Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Alex Shafarenko

AbstractThis paper proposes an architecture and a protocol suite for a permissioned blockchain for a local IoT network. The architecture is based on a sealed Sequencer and a Fog Server running (post-quantum) Guy Fawkes protocols. The blocks of the blockchain are stored in networked Content Addressable Storage alongside any user data and validity proofs. We maintain that a typical IoT device can, despite its resource limitations, use our blockchain protocols directly, without a trusted intermediary. This includes posting and monitoring transactions as well as off-chain (post-quantum) emergency communications without an explicit public key.


2021 ◽  
Vol 111 ◽  
pp. 102331
Author(s):  
Ameer Shakayb Arsalaan ◽  
Hung Nguyen ◽  
Andrew Coyle ◽  
Mahrukh Fida

Sign in / Sign up

Export Citation Format

Share Document