Martingales-based ALOHA-type grant-free access algorithms for multi-channel networks with mMTC/URLLC terminals co-existence
As a simple single-phase transmission strategy, grant-free access is believed to be an
effective way to guarantee the stringent quality of service (QoS) requirements for ultra …
effective way to guarantee the stringent quality of service (QoS) requirements for ultra …
Calculation of packet jitter for correlated traffic
I Kartashevskiy, M Buranova - International Conference on Next …, 2019 - Springer
Here we present a jitter calculation for correlated traffic. As a model, we consider a general-
type queuing system, where the distribution of packet interarrival time and service time are …
type queuing system, where the distribution of packet interarrival time and service time are …
QoS-aware energy and jitter-efficient downlink predictive scheduler for heterogeneous traffic LTE networks
Energy-efficient communications have become one fundamental aspect for today's cutting-
edge wireless technologies due to its valuable impact on the environment. In this paper, we …
edge wireless technologies due to its valuable impact on the environment. In this paper, we …
An experimental evaluation and characterization of VoIP over an LTE-A network
M Di Mauro, A Liotta - IEEE Transactions on Network and …, 2020 - ieeexplore.ieee.org
Mobile telecommunications are converging towards all-IP solutions. This is the case of the
Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support …
Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support …
End-to-end uplink delay jitter in LTE systems
M Sahu, S Damle, AA Kherani - Wireless Networks, 2021 - Springer
For a single LTE interface on a mobile bonding router, we study end-to-end delay jitter seen
by a constant bit rate (CBR) traffic under the uplink (synchronous non-adaptive) hybrid …
by a constant bit rate (CBR) traffic under the uplink (synchronous non-adaptive) hybrid …
Delay jitter modeling for low-latency wireless communications in mobility scenarios
A Sawabe, Y Shinohara, T Iwai - GLOBECOM 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Understanding the delay jitter of mobile communications becomes important because of
widely spreading delay-sensitive applications such as remote control of mobile robots with …
widely spreading delay-sensitive applications such as remote control of mobile robots with …
Quality of service‐aware coexistence in unlicensed 5G new radio based on time‐domain virtualization
The deployment of mobile systems is facing several challenges. Precisely, the lack of
available licensed bands limits the network capacity, affecting the quality of service (QoS) …
available licensed bands limits the network capacity, affecting the quality of service (QoS) …
DCM: Delay as component model based on hidden striping structure in mobile networks
A Sawabe, S Yasuda, Y Shinohara… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Understanding communication delay in mobile networks is becoming more important as
delay-sensitive scenarios become more prevalent. Round-trip time measurement, the …
delay-sensitive scenarios become more prevalent. Round-trip time measurement, the …
Delay Jitter Analysis for VLC Under Indoor Industrial Internet of Things Scenarios
S Chang, S Wu, N Huang, YY Zhang… - IEEE Photonics …, 2024 - ieeexplore.ieee.org
The delay jitter in the visible light communication (VLC) network is analyzed in this work.
First, the delay jitter under single-user and multi-user scenarios is investigated and a closed …
First, the delay jitter under single-user and multi-user scenarios is investigated and a closed …
Looping for Encryption Key Generation Over the Internet: A New Frontier in Physical Layer Security
AK Khandani - 2023 Biennial Symposium on Communications …, 2023 - ieeexplore.ieee.org
Current key sharing techniques rely on the hardness of solving a solvable, but complex,
mathematical problem. This entails, in Information Theoretical sense, the encryption key is …
mathematical problem. This entails, in Information Theoretical sense, the encryption key is …