Journal Description
Telecom
Telecom
is an international, peer-reviewed, open access journal on communications and networks published quarterly online by MDPI. FITCE Hellas - Hellenic Branch of FITCE is affiliated with Telecom and its members receive a discount on the article processing charge.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions.
- High Visibility: indexed within ESCI (Web of Science), Scopus, and other databases.
- Journal Rank: CiteScore - Q2 (Computer Networks and Communications)
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 26.1 days after submission; acceptance to publication is undertaken in 12.8 days (median values for papers published in this journal in the second half of 2023).
- Recognition of Reviewers: APC discount vouchers, optional signed peer review and reviewer names are published annually in the journal.
Latest Articles
A Wide Bandwidth Vivaldi Antenna Suitable for 5G/6G Communication Utilizing a CMOS 0.18 μm Process
Telecom 2024, 5(2), 400-415; https://doi.org/10.3390/telecom5020020 - 14 May 2024
Abstract
►
Show Figures
This text proposes a Vivaldi structure array antenna, using a power divider structure. The composition includes an antenna array with four antennas, suitable for a wideband array structure antenna in the 100 GHz frequency band. The goal is to address the challenges faced
[...] Read more.
This text proposes a Vivaldi structure array antenna, using a power divider structure. The composition includes an antenna array with four antennas, suitable for a wideband array structure antenna in the 100 GHz frequency band. The goal is to address the challenges faced by monolithic systems in modern wireless communications, particularly the issue of the inapplicability of antennas on silicon substrates. The Vivaldi antenna was chosen for its wide bandwidth, high efficiency, and stable radiation pattern. It combines the characteristics of a wide scanning angle and ultra-wide bandwidth. Through integration with CMOS technology, the developed antenna achieved a bandwidth of 85.47–102.40 GHz. The peak gain reached −4 dBi, corresponding to a bandwidth of 17.7%. And the antenna volume was only 1.2 mm × 1.2 mm, demonstrating its immense potential in high-frequency wireless applications.
Full article
Open AccessReview
Emerging Industrial Internet of Things Open-Source Platforms and Applications in Diverse Sectors
by
Eyuel Debebe Ayele, Stylianos Gavriel, Javier Ferreira Gonzalez, Wouter B. Teeuw, Panayiotis Philimis and Ghayoor Gillani
Telecom 2024, 5(2), 369-399; https://doi.org/10.3390/telecom5020019 - 14 May 2024
Abstract
Revolutionary advances in technology have been seen in many industries, with the IIoT being a prime example. The IIoT creates a network of interconnected devices, allowing smooth communication and interoperability in industrial settings. This not only boosts efficiency, productivity, and safety but also
[...] Read more.
Revolutionary advances in technology have been seen in many industries, with the IIoT being a prime example. The IIoT creates a network of interconnected devices, allowing smooth communication and interoperability in industrial settings. This not only boosts efficiency, productivity, and safety but also provides transformative solutions for various sectors. This research looks into open-source IIoT and edge platforms that are applicable to a range of applications with the aim of finding and developing high-potential solutions. It highlights the effect of open-source IIoT and edge computing platforms on traditional IIoT applications, showing how these platforms make development and deployment processes easier. Popular open-source IIoT platforms include DeviceHive and Thingsboard, while EdgeX Foundry is a key platform for edge computing, allowing IIoT applications to be deployed closer to data sources, thus reducing latency and conserving bandwidth. This study seeks to identify potential future domains for the implementation of IIoT solutions using these open-source platforms. Additionally, each sector is evaluated based on various criteria, such as development requirement analyses, market demand projections, the examination of leading companies and emerging startups in each domain, and the application of the International Patent Classification (IPC) scheme for in-depth sector analysis.
Full article
(This article belongs to the Topic Electronic Communications, IOT and Big Data)
►▼
Show Figures
Figure 1
Open AccessArticle
Low-Cost, Open-Source, Experimental Setup Communication Platform for Emergencies, Based on SD-WAN Technology
by
Vasileios Cheimaras, Spyridon Papagiakoumos, Nikolaos Peladarinos, Athanasios Trigkas, Panagiotis Papageorgas, Dimitrios D. Piromalis and Radu A. Munteanu
Telecom 2024, 5(2), 347-368; https://doi.org/10.3390/telecom5020018 - 2 May 2024
Abstract
►▼
Show Figures
The rapid advancement of communication technologies underscores the urgent need for robust and adaptable emergency communication systems (ECSs), particularly crucial during crises and natural disasters. Although network-based ECSs have been extensively studied, integrating open-source technologies, such as software-defined wide area networks (SD-WAN) with
[...] Read more.
The rapid advancement of communication technologies underscores the urgent need for robust and adaptable emergency communication systems (ECSs), particularly crucial during crises and natural disasters. Although network-based ECSs have been extensively studied, integrating open-source technologies, such as software-defined wide area networks (SD-WAN) with private long-term evolution (LTE) base stations, is a relatively unexplored domain. This study endeavors to fill this gap by introducing an experimental ECS platform that utilizes a hybrid network, incorporating a VoIP network to enhance open-source and on-premises communications in targeted areas. Our hypothesis posits that a hybrid network architecture, combining SD-WAN and private LTE, can substantially improve the reliability and efficiency of ECSs. Our findings, supported by the open-source OMNeT++ simulator, illuminate the enhanced communication reliability of the network. Moreover, the proposed platform, characterized by autonomous wireless 4G/LTE base stations and an Asterisk VoIP server, demonstrates improved quality of service (QoS) and quality of experience (QoE), with minimal data loss. This research not only has immediate practical applications but also bears significant implications for the development of cost-effective, open-source communication networks, optimized for emergencies, critical infrastructure, and remote areas.
Full article
Figure 1
Open AccessArticle
Feature-Selection-Based DDoS Attack Detection Using AI Algorithms
by
Muhammad Saibtain Raza, Mohammad Nowsin Amin Sheikh, I-Shyan Hwang and Mohammad Syuhaimi Ab-Rahman
Telecom 2024, 5(2), 333-346; https://doi.org/10.3390/telecom5020017 - 17 Apr 2024
Abstract
►▼
Show Figures
SDN has the ability to transform network design by providing increased versatility and effective regulation. Its programmable centralized controller gives network administration employees more authority, allowing for more seamless supervision. However, centralization makes it vulnerable to a variety of attack vectors, with distributed
[...] Read more.
SDN has the ability to transform network design by providing increased versatility and effective regulation. Its programmable centralized controller gives network administration employees more authority, allowing for more seamless supervision. However, centralization makes it vulnerable to a variety of attack vectors, with distributed denial of service (DDoS) attacks posing a serious concern. Feature selection-based Machine Learning (ML) techniques are more effective than traditional signature-based Intrusion Detection Systems (IDS) at identifying new threats in the context of defending against distributed denial of service (DDoS) attacks. In this study, NGBoost is compared with four additional machine learning (ML) algorithms: convolutional neural network (CNN), Stochastic Gradient Descent (SGD), Decision Tree, and Random Forest, in order to assess the effectiveness of DDoS detection on the CICDDoS2019 dataset. It focuses on important measures such as F1 score, recall, accuracy, and precision. We have examined NeTBIOS, a layer-7 attack, and SYN, a layer-4 attack, in our paper. Our investigation shows that Natural Gradient Boosting and Convolutional Neural Networks, in particular, show promise with tabular data categorization. In conclusion, we go through specific study results on protecting against attacks using DDoS. These experimental findings offer a framework for making decisions.
Full article
Figure 1
Open AccessFeature PaperArticle
Simple Compact UWB Vivaldi Antenna Arrays for Breast Cancer Detection
by
Sahar Saleh, Tale Saeidi and Nick Timmons
Telecom 2024, 5(2), 312-332; https://doi.org/10.3390/telecom5020016 - 8 Apr 2024
Abstract
►▼
Show Figures
In this study, at ultra-wideband (UWB) frequency band (3.1–10.6 GHz), we propose the use of compact 2:1 and 3:1 nonuniform transmission line Wilkinson power dividers (NTL WPDs) as feeding networks for simple 2 × 1 linear UWB Vivaldi tapered and nonuniform slot antenna
[...] Read more.
In this study, at ultra-wideband (UWB) frequency band (3.1–10.6 GHz), we propose the use of compact 2:1 and 3:1 nonuniform transmission line Wilkinson power dividers (NTL WPDs) as feeding networks for simple 2 × 1 linear UWB Vivaldi tapered and nonuniform slot antenna (VTSA and VNSA) arrays. The 2:1 and 3:1 tapered transmission line (TTL) WPDs are designed and tested in this work as benchmarks for NTL WPDs. The VTSA array provides measured S11 < −10.28 dB at 2.42–11.52 GHz, with a maximum gain of 8.61 dBi, which is 24.39% higher than the single element. Using the VNSA array, we achieve 52% compactness and 6.76% bandwidth enhancement, with good measured results of S11 < −10.2 dB at 3.24–13 GHz and 15.11% improved gain (8.14 dBi) compared to the VNSA single element. The findings show that the NTL and Vivaldi nonuniform slot profile antenna (VNSPA) theories are successful at reducing the size of the UWB WPD and VTSA without sacrificing performance. They also emphasize the Vivaldi antenna’s compatibility with other circuits. These compact arrays are ideal for high-resolution medical applications like breast cancer detection (BCD) because of their high gain, wide bandwidth, directive stable radiation patterns, and low specific absorption rate (SAR). A simple BCD simulation scenario is addressed in this work. Detailed parametric studies are performed on the two arrays for impedance-matching enhancement. The computer simulation technology (CST) software is used for the simulation. Hardware measurement results prove the validity of the proposed arrays.
Full article
Figure 1
Open AccessFeature PaperArticle
Horn Antenna on Chip Operating at 180 GHz Using the SiGe CMOS Process
by
Ming-An Chung, Zi-Yu Huang and Yu-Hsun Chen
Telecom 2024, 5(2), 296-311; https://doi.org/10.3390/telecom5020015 - 8 Apr 2024
Abstract
►▼
Show Figures
This article proposes a chip antenna on millimeter-Waves. This antenna combined with TSMC 180 nm SiGe CMOS technology has the advantage of being small in size and is suitable for wireless communications. The multilayer architecture Horn antenna implemented on M4–M6 can meet both
[...] Read more.
This article proposes a chip antenna on millimeter-Waves. This antenna combined with TSMC 180 nm SiGe CMOS technology has the advantage of being small in size and is suitable for wireless communications. The multilayer architecture Horn antenna implemented on M4–M6 can meet both process reliability specifications and radiation performance. The results of the simulation show that the maximum gain is −4.2 dBi. The return loss measurement results are almost consistent with the simulation results, and the bandwidth range is 177.4–183 GHz. This article first describes the antenna production process and measurement results, analyses the impact of the parameters on the antenna, and further compares it with other designs. The excellence of this article is that it proposes a design that solves the problem of large millimeter wave loss and successfully reduces the area. At the same time, this article can contribute to readers’ future optimization and continued research directions, and at the same time contribute simulation and measurement trends to let readers understand the stability of CMOS chip antenna simulation and measurement.
Full article
Figure 1
Open AccessArticle
Optimization of Signal Detection Using Deep CNN in Ultra-Massive MIMO
by
Chittapon Keawin, Apinya Innok and Peerapong Uthansakul
Telecom 2024, 5(2), 280-295; https://doi.org/10.3390/telecom5020014 - 29 Mar 2024
Abstract
►▼
Show Figures
This paper addresses the evolving landscape of communication technology, emphasizing the pivotal role of 5G and the emerging 6G networks in accommodating the increasing demand for high-speed and accurate data transmission. We delve into the advancements in 5G technology, particularly the implementation of
[...] Read more.
This paper addresses the evolving landscape of communication technology, emphasizing the pivotal role of 5G and the emerging 6G networks in accommodating the increasing demand for high-speed and accurate data transmission. We delve into the advancements in 5G technology, particularly the implementation of millimeter wave (mmWave) frequencies ranging from 30 to 300 GHz. These advancements are instrumental in enhancing applications requiring massive data transmission and reception, facilitated by massive MIMO (multiple input multiple output) systems. Looking towards the future, this paper forecasts the necessity for faster data transmission technologies, shifting the focus toward the development of 6G networks. These future networks are projected to employ ultra-massive MIMO systems in the terahertz band, operating within 0.1–10 THz frequency ranges. A significant part of our research is dedicated to exploring advanced signal detection techniques, helping to mitigate the impact of interference and improve accuracy in data transmission and enabling more efficient communication, even in environments with high levels of noise, and including zero forcing (ZF) and minimum mean square error (MMSE) methods, which form the cornerstone of our proposed approach. Additionally, signal detection contributes to the development of new communication technologies such as 5G and 6G, which require a high data transmission efficiency and rapid response speeds. The core contribution of this study lies in the application of deep learning to signal detection in ultra-massive MIMO systems, a critical component of 6G technology. We compare this approach with existing ELMx-based machine learning methods, focusing on algorithmic efficiency and computational performance. Our comparative analysis included the regularized extreme learning machine (RELM) and the outlier robust extreme learning machine (ORELM), juxtaposed with ZF and MMSE methods. Simulation results indicated the superiority of our convolutional neural network for signal detection (CNN-SD) over the traditional ELMx-based, ZF, and MMSE methods, particularly in terms of channel capacity and bit error rate. Furthermore, we demonstrate the computational efficiency and reduced complexity of the CNN-SD method, underscoring its suitability for future expansive MIMO systems.
Full article
Figure 1
Open AccessArticle
Analysis of Carrier Aggregation as a Diversity Technique for Improved Spectral Efficiency and Secrecy Performance in Mobile Communications
by
Paul Ushiki Adamu and Miguel López-Benítez
Telecom 2024, 5(1), 255-279; https://doi.org/10.3390/telecom5010013 - 19 Mar 2024
Abstract
►▼
Show Figures
Carrier aggregation (CA) was introduced in mobile communication systems in response to the demand for higher network capacity. CA was conceived as a technique to achieve higher data rates by aggregating multiple blocks of spectrum from the same or different frequency bands. This
[...] Read more.
Carrier aggregation (CA) was introduced in mobile communication systems in response to the demand for higher network capacity. CA was conceived as a technique to achieve higher data rates by aggregating multiple blocks of spectrum from the same or different frequency bands. This work explores a different point of view, where CA is employed not as a way to increase capacity through using more bandwidth, but as a diversity technique in order to increase the spectral efficiency of the existing spectrum, and therefore, achieve higher capacity without needing additional spectrum. A mathematical model and set of closed-form expressions are provided, which can be used to characterise the performance of CA as a diversity technique (in terms of both ergodic capacity and secrecy capacity) and determine the impact of various relevant configuration parameters. The numerical results obtained by evaluating the mathematical expressions derived in this work are in line with our previous simulation studies and demonstrate that CA can be effectively exploited as a diversity technique to improve the capacity and performance of mobile communication systems compared to the case of single-carrier transmission over the same amount of bandwidth.
Full article
Figure 1
Open AccessArticle
TinyGS vs. SatNOGS: A Comparative Analysis of Open-Source Satellite Ground Station Networks
by
João Sá Gomes and Alexandre Ferreira da Silva
Telecom 2024, 5(1), 228-254; https://doi.org/10.3390/telecom5010012 - 7 Mar 2024
Abstract
In recent years, two of the largest open-source ground station (GS) networks capable of enabling Earth–satellite communication have emerged: TinyGS and SatNOGS. These open-source projects enable anyone to build their own GS inexpensively and easily, integrate into a GS network, and receive data
[...] Read more.
In recent years, two of the largest open-source ground station (GS) networks capable of enabling Earth–satellite communication have emerged: TinyGS and SatNOGS. These open-source projects enable anyone to build their own GS inexpensively and easily, integrate into a GS network, and receive data from satellites listed in the database. Additionally, it enables satellite developers to add satellites to the databases of these projects and take advantage of this GS network to receive data from the satellites. This article introduces the TinyGS and SatNOGS projects and conducts a comparative analysis between them. Generally, the TinyGS project seems to have simpler implementation as well as lower associated costs. In a deeper analysis, it was observed that on the 29 July 2023, the TinyGS project had a higher number of online GSs and a more favorable geographic distribution. On the other hand, the SatNOGS project managed to communicate and decode a larger number of satellites up to 29 July 2023. Additionally, in both projects, it was noted that frequencies between 436 and 437 had the highest number of satellites with decoded data. Ultimately, the choice between these projects depends on critical parameters defined by the reader.
Full article
(This article belongs to the Topic Electronic Communications, IOT and Big Data)
►▼
Show Figures
Figure 1
Open AccessArticle
Transceiver Optimization for Multiuser Multiple-Input Multiple-Output Full-Duplex Amplify-and-Forward Relay Downlink Communications
by
Yunlong Shao and Thomas Aaron Gulliver
Telecom 2024, 5(1), 216-227; https://doi.org/10.3390/telecom5010011 - 6 Mar 2024
Abstract
This paper considers the transceiver design in a multiuser multiple-input multiple-output (MIMO) full-duplex (FD) amplify-and-forward (AF) relay downlink communication system, where users simultaneously transmit data via an FD relay node. The design incorporates an imperfect loop interference (LI) cancellation which results in a
[...] Read more.
This paper considers the transceiver design in a multiuser multiple-input multiple-output (MIMO) full-duplex (FD) amplify-and-forward (AF) relay downlink communication system, where users simultaneously transmit data via an FD relay node. The design incorporates an imperfect loop interference (LI) cancellation which results in a residual LI. Linear precoders are employed at the sources and relay, and minimum mean-squared-error (MMSE) combiners are employed at the destinations to mitigate the effect of the residual LI. The corresponding design problem is highly nonconvex, so a closed-form solution is intractable. Thus, an iterative method is developed to solve this optimization problem. Simulation results are presented which show that the proposed iterative algorithm provides better performance than the corresponding half-duplex (HD) solution in terms of the achievable rate under residual LI.
Full article
(This article belongs to the Special Issue Advances in Wireless Communication: Applications and Developments)
►▼
Show Figures
Figure 1
Open AccessArticle
Maximizing the Downlink Data Rates in Massive Multiple Input Multiple Output with Frequency Division Duplex Transmission Mode Using Power Allocation Optimization Method with Limited Coherence Time
by
Marwah Abdulrazzaq Naser, Munstafa Ismael Salman and Muntadher Alsabah
Telecom 2024, 5(1), 198-215; https://doi.org/10.3390/telecom5010010 - 29 Feb 2024
Abstract
►▼
Show Figures
The expected development of the future generation of wireless communications systems such as 6G aims to achieve an ultrareliable and low-latency communications (URLLCs) while maximizing the data rates. These requirements push research into developing new advanced technologies. To this end, massive multiple input
[...] Read more.
The expected development of the future generation of wireless communications systems such as 6G aims to achieve an ultrareliable and low-latency communications (URLLCs) while maximizing the data rates. These requirements push research into developing new advanced technologies. To this end, massive multiple input multiple output (MMIMO) is introduced as a promising transmission approach to fulfill these requirements. However, maximizing the downlink-achievable sum rate (DASR) in MMIMO with a frequency division duplex (FDD) transmission mode and limited coherence time (LCT) is very challenging. To address this challenge, this paper proposes a DASR maximization approach using a feasible power allocation optimization method. The proposed approach is based on smartly allocating the total transmit power between the data transmission and training sequence transmission for channel estimation. This can be achieved by allocating more energy to the training signal than the data transmission during the channel estimation process to improve the quality of channel estimation without compromising more training sequence length, thus maximizing the DASR. Additionally, the theory of random matrix approach is exploited to derive an asymptotic closed-form expression for the DASR with a regularized zero-forcing precoder (RZFP), which allows the power optimization process to be achieved without the need for computationally complex Monte Carlo simulations. The results provided in this paper indicate that a considerable enhancement in the DASR performance is achieved using the proposed power allocation method in comparison with the conventional uniform power allocation method.
Full article
Figure 1
Open AccessArticle
Dual Data Streaming on Tropospheric Communication Links Based on the Determination of Beam Pointing Dynamics Using a Modified Ray-Based Channel Model
by
Amit Garg, Ranjan Mishra, Ashok Kumar Kalra and Ankush Kapoor
Telecom 2024, 5(1), 176-197; https://doi.org/10.3390/telecom5010009 - 16 Feb 2024
Abstract
►▼
Show Figures
Tropospheric systems are widely used by military forces as they provide long-distance, real-time communication. Slow-fading propagation loss reduces link availability and limits its data-carrying capacity. Beam pointing dynamics provides knowledge of favorable heights at different times of the day in different seasons and
[...] Read more.
Tropospheric systems are widely used by military forces as they provide long-distance, real-time communication. Slow-fading propagation loss reduces link availability and limits its data-carrying capacity. Beam pointing dynamics provides knowledge of favorable heights at different times of the day in different seasons and a useful steering range. Beam steering, based on the beam pointing dynamics of the link, can overcome slow fading. The main contributions of this paper are the derivation of a realistic and accurate tropospheric channel model obtained by making important modifications to Dinc’s ray-based model. This paper also presents a method for determining beam pointing dynamics using the modified model. Beam pointing dynamics for two different links located in India have been determined in this paper using real-world data obtained from the Indian Meteorological Department. Another significant contribution of the paper is presenting the prospect of dual data streaming on tropospheric links using a fixed beam and a dynamically steered beam, based on the examination of beam pointing dynamics obtained for the two links. The main result presented in this paper is the comparison of powers received from the most favorable heights in a steerable beam system with the powers received in conventional fixed-beam systems for different days of the year. It has been shown that a higher received power can be achieved with beam steering. Another important result shown is the comparison of the achievable data rates for a single fixed-beam system and a dual-beam (one fixed beam and one dynamically steered beam) system. It has been shown that almost double the data rate is achievable in a dual-beam system. The method for the determination of beam pointing dynamics and the possibility of dual data streaming presented in this paper can significantly enhance the availability and capacity of tropospheric links.
Full article
Figure 1
Open AccessArticle
The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
by
Aleksey Meleshko and Vasily Desnitsky
Telecom 2024, 5(1), 145-175; https://doi.org/10.3390/telecom5010008 - 9 Feb 2024
Abstract
►▼
Show Figures
This article discusses the modeling and detection of attacks in self-organizing decentralized wireless sensor networks (WSNs) that can be applied to various critical scenarios in practice. Security issues in this type of network have previously been studied to a rather poor extent. In
[...] Read more.
This article discusses the modeling and detection of attacks in self-organizing decentralized wireless sensor networks (WSNs) that can be applied to various critical scenarios in practice. Security issues in this type of network have previously been studied to a rather poor extent. In particular, existing attack detection approaches and algorithms do not rely on the properties of self-organization and decentralization, which an attacker is able to exploit to compromise the network and its services. We propose, first, a model of a self-organizing decentralized wireless sensor network; second, a model of the attacks on such networks; third, algorithms for data collection and attack detection; and, finally, a technique for their application. The WSN model represents a formal specification of this type of network, defining the conditions and limitations of network self-organization and decentralization. The model is characterized by a proposed underlying role-based operation of network nodes and a set of their functional states. The proposed attack model covers the possible types of attacks that are relevant to a given type of WSN and are based on the exploitation of the self-organization and decentralization of the network. The developed algorithm for collecting data for attack detection presents specific types of data and their sources. The developed combined attack detection algorithm is formed of actions that detect relevant attacks on self-organizing decentralized WSNs using machine learning methods. The distinctive element of this algorithm is a set of highly specific features that are obtained by analyzing the data collected in the WSN and used to detect attacks. The proposed technique combines the constructed models and algorithms for the sake of tuning and deploying the attack detection module and the effective detection of attacks in practice. This technique specifies the main steps for the joint use of the models and algorithms and the assignment of data collection and detection parameters. The results of the experiments confirm the correctness of the constructed models, algorithms and technique due to the high values of the attack detection quality indicators. Therefore, the practical application of the proposed apparatus will facilitate improvements in the security of self-organizing decentralized WSNs. Experimental research has confirmed the practical applicability of our proposed solutions. In particular, it has shown that the proposed algorithms and the detection technique can detect both attacks implemented through the exploitation of the network’s properties of decentralization/self-organization and common variations in these attacks (i.e., without exploiting the decentralization property). In general, the experimental results expose a high quality of detection, with an f1-score equal to 0.99.
Full article
Figure 1
Open AccessArticle
Underlay Loosely Coupled Model for Public Safety Networks Based on Device-to-Device Communication
by
Wajdi Elleuch
Telecom 2024, 5(1), 122-144; https://doi.org/10.3390/telecom5010007 - 1 Feb 2024
Abstract
In several emergency situations, during natural or human-caused disasters, frontline responders need to be able to communicate and collaborate to properly carry out relief missions. Some countries build their national Public Safety Mobile Broadband based on cellular LTE technology to provide fast, safe,
[...] Read more.
In several emergency situations, during natural or human-caused disasters, frontline responders need to be able to communicate and collaborate to properly carry out relief missions. Some countries build their national Public Safety Mobile Broadband based on cellular LTE technology to provide fast, safe, and secure emergency services. However, in several emergency situations, cellular antennas can be overloaded or partially damaged in a manner that affects group communication services. In the last few years, direct device-to-device (D2D) communications have been proposed by the 3GPP as an underlay of long-term evolution (LTE) networks based on proximity, reuse, and hop gains. This paper focuses on a loosely coupled model based on direct D2D communication in a public safety context. Many scenarios related to user membership and network management are detailed. Both the “less cost” and “optimized tree” approaches are proposed and implemented, and their performance is evaluated in terms of the network update number and the resulting average Channel Quality Indicator (CQI). Other optimization approaches, with different CQI thresholds and optimization interval parameters, are simulated to compare their performance with the “optimized tree” approach. By conducting simulations that combine a CQI threshold = 1 and optimization interval = 2 s, it becomes possible to keep an average CQI level close to the “optimized tree” approach, while the costs related to network updates significantly decrease by almost 35%. Other simulations are also carried out to measure the bandwidth required by the control messages between the server and active users. It was found that both inbound and outbound traffic on the server side can be well supported with LTE and 5G networks.
Full article
(This article belongs to the Special Issue Joint Application of Telecom and Internet Services)
►▼
Show Figures
Figure 1
Open AccessReview
An Evaluation Survey of Knowledge-Based Approaches in Telecommunication Applications
by
Georgios P. Koudouridis, Serveh Shalmashi and Reza Moosavi
Telecom 2024, 5(1), 98-121; https://doi.org/10.3390/telecom5010006 - 26 Jan 2024
Abstract
►▼
Show Figures
The purpose of this survey study is to shed light on the importance of knowledge usage and knowledge-driven applications in telecommunication systems and businesses. To this end, we first define a classification of the different knowledge-based approaches in terms of knowledge representations and
[...] Read more.
The purpose of this survey study is to shed light on the importance of knowledge usage and knowledge-driven applications in telecommunication systems and businesses. To this end, we first define a classification of the different knowledge-based approaches in terms of knowledge representations and reasoning formalisms. Further, we define a set of qualitative criteria and evaluate the different categories for their suitability and usefulness in telecommunications. From the evaluation results, we could conclude that different use cases are better served by different knowledge-based approaches. Further, we elaborate and showcase our findings on three different knowledge-based approaches and their applicability to three operational aspects of telecommunication networks. More specifically, we study the utilization of large language models in network operation and management, the automation of the network based on knowledge-graphs and intent-based networking, and the optimization of the network based on machine learning-based distributed intelligence. The article concludes with challenges, limitations, and future steps toward knowledge-driven telecommunications.
Full article
Figure 1
Open AccessArticle
6G Goal-Oriented Communications: How to Coexist with Legacy Systems?
by
Mattia Merluzzi, Miltiadis C. Filippou, Leonardo Gomes Baltar, Markus Dominik Mueck and Emilio Calvanese Strinati
Telecom 2024, 5(1), 65-97; https://doi.org/10.3390/telecom5010005 - 24 Jan 2024
Abstract
6G will connect heterogeneous intelligent agents to make them natively operate complex cooperative tasks. When connecting intelligence, two main research questions arise to identify how artificial intelligence and machine learning models behave depending on (i) their input data quality, affected by errors induced
[...] Read more.
6G will connect heterogeneous intelligent agents to make them natively operate complex cooperative tasks. When connecting intelligence, two main research questions arise to identify how artificial intelligence and machine learning models behave depending on (i) their input data quality, affected by errors induced by interference and additive noise during wireless communication; (ii) their contextual effectiveness and resilience to interpret and exploit the meaning behind the data. Both questions are within the realm of semantic and goal-oriented communications. With this paper, we investigate how to effectively share communication spectrum resources between a legacy communication system (i.e., data-oriented) and a new goal-oriented edge intelligence one. Specifically, we address the scenario of an enhanced Mobile Broadband (eMBB) service, i.e., a user uploading a video stream to a radio access point, interfering with an edge inference system, in which a user uploads images to a Mobile Edge Host that runs a classification task. Our objective is to achieve, through cooperation, the highest eMBB service data rate, subject to a targeted goal effectiveness of the edge inference service, namely the probability of confident inference on time. We first formalize a general definition of a goal in the context of wireless communications. This includes the goal effectiveness, (i.e., the goal achievability rate, or the probability of achieving the goal), as well as goal cost (i.e., the network resource consumption needed to achieve the goal with target effectiveness). We argue and show, through numerical evaluations, that communication reliability and goal effectiveness are not straightforwardly linked. Then, after a performance evaluation aiming to clarify the difference between communication performance and goal effectiveness, a long-term optimization problem is formulated and solved via Lyapunov stochastic network optimization tools to guarantee the desired target performance. Finally, our numerical results assess the advantages of the proposed optimization and the superiority of the goal-oriented strategy against baseline 5G-compliant legacy approaches, under both stationary and non-stationary communication (and computation) environments.
Full article
(This article belongs to the Topic Next Generation Intelligent Communications and Networks)
►▼
Show Figures
Figure 1
Open AccessArticle
5G Physical Layer-Based Procedure to Support Time-Sensitive Networking
by
Faiza Bouchmal, Oscar Carrasco, Yang Fu, Jaime Rodrigo, Jose F. Monserrat and Narcís Cardona
Telecom 2024, 5(1), 49-64; https://doi.org/10.3390/telecom5010004 - 24 Jan 2024
Cited by 1
Abstract
►▼
Show Figures
Deploying 5G in new and diverse use cases, such as Industry 4.0 and factory automation, requires 5G systems to harmonize with the communication technologies used in these industries. To this end, 3GPP Release 16 and Release 17 have made significant progress in integrating
[...] Read more.
Deploying 5G in new and diverse use cases, such as Industry 4.0 and factory automation, requires 5G systems to harmonize with the communication technologies used in these industries. To this end, 3GPP Release 16 and Release 17 have made significant progress in integrating 5G systems with the IEEE 802.1 working group specifications on Time-Sensitive Networking (TSN). This paper explains a method and architecture for supporting TSN over a wireless channel in a 5G network that adds the TSN synchronization function in a Small Cell gNB implementing the TSN Translator function (SC-TT). This TSN-capable small cell provides TSN over the wireless network to synchronize UEs with the Grand Master (GM) using the physical layer signal of the 5G radio frame and the transmission of the GM reference time to provide high-precision synchronization. This paper explores the pivotal role of a Slot Indicator Signal in enhancing synchronization precision, ensuring that the UE-GM synchronization occurs within an exceptionally narrow timeframe as small as 10 ns.
Full article
Figure 1
Open AccessCorrection
Correction: Tsakalidis et al. Design and Implementation of a Versatile OpenHAB IoT Testbed with a Variety of Wireless Interfaces and Sensors. Telecom 2023, 4, 597–610
by
Sotirios Tsakalidis, George Tsoulos, Dimitrios Kontaxis and Georgia Athanasiadou
Telecom 2024, 5(1), 48; https://doi.org/10.3390/telecom5010003 - 19 Jan 2024
Abstract
There was an error in the original publication [...]
Full article
Open AccessArticle
An Emergency Message Routing Protocol for Improved Congestion Management in Hybrid RF/VLC VANETs
by
Noha Hassan, Xavier Fernando and Isaac Woungang
Telecom 2024, 5(1), 21-47; https://doi.org/10.3390/telecom5010002 - 25 Dec 2023
Abstract
►▼
Show Figures
Unexpected traffic incidents cause safety concerns and intense traffic congestion on crowded urban road networks. Vehicular ad-hoc network (VANET)-aided Intelligent Transport Systems (ITS) aim to mitigate these risks through timely dissemination of alert messages. However, conventional Radio frequency (RF) mobile ad-hoc routing protocols
[...] Read more.
Unexpected traffic incidents cause safety concerns and intense traffic congestion on crowded urban road networks. Vehicular ad-hoc network (VANET)-aided Intelligent Transport Systems (ITS) aim to mitigate these risks through timely dissemination of alert messages. However, conventional Radio frequency (RF) mobile ad-hoc routing protocols are ill-suited for dynamic VANET environments due to high mutual interference, packet collisions, high end-to-end delay from frequent route discoveries, and periodic beaconing requirements. Fortunately, the quickly emerging Visible Light Communications (VLC) provide complementary short-range connectivity with high bandwidth and low interference. This paper proposes an efficient adaptive routing protocol for emergency messages in dense VANET scenarios leveraging a hybrid RF/VLC system. When an incident or congestion happens, the source vehicle disseminates the information to the incoming vehicles as quickly as possible using a combination of VLC and RF communication networks. Multi-hop relays extend the connectivity if the direct links are blocked. The coverage area is partitioned into zones based on road segments, intersections, and traffic flows. The Road Side Units (RSU)s are intelligently assigned to zones and they analyze the historical traffic data to characterize each zone and decide a response strategy. We also propose a congestion detection scheme that utilizes traffic simulations to forecast the clearance times under different response strategies. The highest-scoring strategy is selected based on the predicted impacts on travel time, emissions, and driver stress levels. The proposed algorithm adaptively uses the selected strategy to proactively alleviate the predicted congestion through optimized routing and control. Overall, the protocol maximizes safety and efficiency during emergencies by leveraging the hybrid RF/VLC, incorporating real-time congestion forecasting and dynamic rerouting into the response strategies.
Full article
Figure 1
Open AccessArticle
Smart Detection System of Safety Hazards in Industry 5.0
by
Stavroula Bourou, Apostolos Maniatis, Dimitris Kontopoulos and Panagiotis A. Karkazis
Telecom 2024, 5(1), 1-20; https://doi.org/10.3390/telecom5010001 - 22 Dec 2023
Cited by 1
Abstract
Safety management is a priority to guarantee human-centered manufacturing processes in the context of Industry 5.0, which aims to realize a safe human–machine environment based on knowledge-driven approaches. The traditional approaches for safety management in the industrial environment include staff training, regular inspections,
[...] Read more.
Safety management is a priority to guarantee human-centered manufacturing processes in the context of Industry 5.0, which aims to realize a safe human–machine environment based on knowledge-driven approaches. The traditional approaches for safety management in the industrial environment include staff training, regular inspections, warning signs, etc. Despite the fact that proactive measures and procedures have exceptional importance in the prevention of safety hazards, human–machine–environment coupling requires more sophisticated approaches able to provide automated, reliable, real-time, cost-effective, and adaptive hazard identification in complex manufacturing processes. In this context, the use of virtual reality (VR) can be exploited not only as a means of human training but also as part of the methodology to generate synthetic datasets for training AI models. In this paper, we propose a flexible and adjustable detection system that aims to enhance safety management in Industry 5.0 manufacturing through real-time monitoring and identification of hazards. The first stage of the system contains the synthetic data generation methodology, aiming to create a synthetic dataset via VR, while the second one concerns the training of AI object detectors for real-time inference. The methodology is evaluated by comparing the performance of models trained on both real-world data from a publicly available dataset and our generated synthetic data. Additionally, through a series of experiments, the optimal ratio of synthetic and real-world images is determined for training the object detector. It has been observed that even with a small amount of real-world data, training a robust AI model is achievable. Finally, we use the proposed methodology to generate a synthetic dataset of four classes as well as to train an AI algorithm for real-time detection.
Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
►▼
Show Figures
Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, Electronics, Remote Sensing, Sensors, Technologies, Telecom
Recent Advances in PNT Technology with GNSS as the Core and Its Application in Emerging Fields
Topic Editors: Liang Chen, Zhiguo Deng, Guanwen Huang, Huizhong ZhuDeadline: 31 August 2024
Topic in
Coatings, Electronics, Energies, Sensors, Telecom
Condition Monitoring and Diagnostic Methods for Power Equipment in New Energy Power Systems
Topic Editors: Shuaibing Li, Guoqiang Gao, Guochang Li, Yi Cui, Jiefeng Liu, Guangya Zhu, Jin LiDeadline: 15 September 2024
Topic in
Applied Sciences, Electronics, IoT, JSAN, Network, Sensors, Telecom, Technologies
Wireless Energy Harvesting and Power Transfer for Communications and Networks
Topic Editors: Yichuang Sun, Arooj Mubashara Siddiqui, Xiaojing Chen, Oluyomi SimpsonDeadline: 31 December 2024
Topic in
Applied Sciences, Electronics, JSAN, Photonics, Sensors, Telecom
Machine Learning in Communication Systems and Networks, 2nd Edition
Topic Editors: Yichuang Sun, Haeyoung Lee, Oluyomi SimpsonDeadline: 20 July 2025
Conferences
Special Issues
Special Issue in
Telecom
Joint Application of Telecom and Internet Services
Guest Editors: Arianit Maraj, Dardan MarajDeadline: 31 May 2024
Special Issue in
Telecom
Digitalization, Information Technology and Social Development
Guest Editor: Przemysław Falkowski-GilskiDeadline: 10 June 2024
Special Issue in
Telecom
Advances in Wireless Communication: Applications and Developments
Guest Editor: Mario E. Rivero-AngelesDeadline: 31 July 2024
Special Issue in
Telecom
Modern Circuits and Systems Technologies on Communications (MOCAST 2024)
Guest Editors: Sotirios K. Goudos, Valeri Mladenov, Spyridon NikolaidisDeadline: 31 December 2024