Presented at the FDP Emerging Trends in IOT Enabled Wireless Communication , 8TH – 12TH, August, 2022 (ONLINE MODE) Organized By Department of Electronics Communication Engineering In association with IQAC, Haldia Institute of Technology Haldia-721657, West Bengal.
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
The network extended not just internationally but also throughout a broad
variety of application areas in this age, with healthcare being one of the most
well-known and vital industries. Improvements in healthcare are possible if
we start using the popular internet of things (IoT) technology as a key
instead of focusing on other disciplines. Wireless body area network
(WBAN) is a field in which we communicate with a network of human
people and medical equipment that may be used in conjunction with internet
of things technology to perform any function. Additional features for
software defined networks will be added in the future. In the event of a
critical crisis, the suggested suggestions will be to take care of the patient's
life. Because the fitted equipment keeps a lot better eye on the patient than
previously advised methods. This study combines WBAN, IoT, and software
defined network (SDN) to make sense in the healthcare field.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
The network extended not just internationally but also throughout a broad
variety of application areas in this age, with healthcare being one of the most
well-known and vital industries. Improvements in healthcare are possible if
we start using the popular internet of things (IoT) technology as a key
instead of focusing on other disciplines. Wireless body area network
(WBAN) is a field in which we communicate with a network of human
people and medical equipment that may be used in conjunction with internet
of things technology to perform any function. Additional features for
software defined networks will be added in the future. In the event of a
critical crisis, the suggested suggestions will be to take care of the patient's
life. Because the fitted equipment keeps a lot better eye on the patient than
previously advised methods. This study combines WBAN, IoT, and software
defined network (SDN) to make sense in the healthcare field.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Low-cost real-time internet of things-based monitoring system for power grid ...IJECEIAES
One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in order to investigate their working status in real-time. Our monitoring system’s key functions are the gathering and display of many metrics measured at the transformer level (temperature, humidity, oil level, voltage, vibration, and pressure). The data will be collected using various sensors connected to a microcontroller with an embedded Wi-Fi module (DOIT Esp32 DevKit v1), and then supplied to a cloud environment interface with a full display of all the ongoing changes. This technology will provide the power grid maintenance center with a clear image of the transformers’ health, allowing them to intervene at the right time to prevent system breakdown. The method described above would considerably improve the efficiency of a power transformer in a smart grid system by detecting abnormalities before they become critical.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An extensive review: Internet of things is speeding up the necessity for 5GIJERA Editor
The Internet of Things (IoT) is a very large number of objects, with intensive connections and allows these smart objects to be sensed and controlled remotely across efficient network, which is breathing new capability into anything anywhere in the life. This paper presents an overview of about 4G and 5G with their important features and how will drive IoT in future to build smart cities and smart objects. Scientists are concentrates about the advance implementation of these technologies especially the 5G is the term which is not formally used for any current technology and it is still early to provide an exact definition of 5G. We also present an overview of future keys in cellular system to get better IoT such as D2D, M2M, NOMA and Massive MIMO. This work presents the exact steps in 4G and 5G which important towards IoT and the ability to establish the smart cities. Nowadays 4G LTE-A systems are getting maturity and have been installed, the challenge now is how to improve 4G to get a smooth development from 4G to 5G. Among these steps and challenges are considered as the pieces of the 5G using massive MIMO, new access techniques, millimeter wave (mm Wave) and M2M, D2D communication. The future fifth generation (5G) cellular networks have drawn great attention from scientists and companies around the world. 5G cellular networks should accomplish 1,000 times higher mobile data per geographic area. Plus 10-100 times higher number of connecting devices, with low latency and long battery life.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Low-cost real-time internet of things-based monitoring system for power grid ...IJECEIAES
One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in order to investigate their working status in real-time. Our monitoring system’s key functions are the gathering and display of many metrics measured at the transformer level (temperature, humidity, oil level, voltage, vibration, and pressure). The data will be collected using various sensors connected to a microcontroller with an embedded Wi-Fi module (DOIT Esp32 DevKit v1), and then supplied to a cloud environment interface with a full display of all the ongoing changes. This technology will provide the power grid maintenance center with a clear image of the transformers’ health, allowing them to intervene at the right time to prevent system breakdown. The method described above would considerably improve the efficiency of a power transformer in a smart grid system by detecting abnormalities before they become critical.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An extensive review: Internet of things is speeding up the necessity for 5GIJERA Editor
The Internet of Things (IoT) is a very large number of objects, with intensive connections and allows these smart objects to be sensed and controlled remotely across efficient network, which is breathing new capability into anything anywhere in the life. This paper presents an overview of about 4G and 5G with their important features and how will drive IoT in future to build smart cities and smart objects. Scientists are concentrates about the advance implementation of these technologies especially the 5G is the term which is not formally used for any current technology and it is still early to provide an exact definition of 5G. We also present an overview of future keys in cellular system to get better IoT such as D2D, M2M, NOMA and Massive MIMO. This work presents the exact steps in 4G and 5G which important towards IoT and the ability to establish the smart cities. Nowadays 4G LTE-A systems are getting maturity and have been installed, the challenge now is how to improve 4G to get a smooth development from 4G to 5G. Among these steps and challenges are considered as the pieces of the 5G using massive MIMO, new access techniques, millimeter wave (mm Wave) and M2M, D2D communication. The future fifth generation (5G) cellular networks have drawn great attention from scientists and companies around the world. 5G cellular networks should accomplish 1,000 times higher mobile data per geographic area. Plus 10-100 times higher number of connecting devices, with low latency and long battery life.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
1. Presented at the FDP
Emerging Trends in IOT Enabled Wireless Communication , 8TH – 12TH, August,
2022 (ONLINE MODE) Organized By Department of Electronics Communication
Engineering In association with IQAC, Haldia Institute of Technology Haldia-721657,
West Bengal.
2. Presented by
Dr. Sanjay Dhar Roy
Associate Professor
Department of Electronics and Communication Engineering
National Institute of Technology Durgapur, India
IoT Enabled Wireless Communication Systems
5. Introduction: IoT…
“IoT refers to the interconnection via the Internet of computing devices embedded in
everyday objects, enabling them to send and receive data”
“Internet of Things, 2nd Edition”
Shriram K Vasudevan, Abhishek S Nagarajan, & RMD Sundaram
Copyright 2020 Wiley India Pvt. Ltd.
IEEE has a definition to enhance the understanding. IEEE defines IoT as “A network of
items—each embedded with sensors—which are connected to the Internet.”
6. Introduction: XG WLCS
Exponential increase in the no. of wireless devices gives rise to massive flow
of data. [3]
The data requirement of all upcoming devices differ from each other.
Some devices need high data rate, while others need reliable connection with
sparse flow of data.
5G: IoT enabling technology: uses FR1 - below 6 GHz, and FR2- above
24 GHz (24–54 GHz). However, the speed and latency in early FR1
deployments, using 5G NR software on 4G hardware (non-standalone), are
only slightly better than 4G systems.
https://en.wikipedia.org/wiki/5G
7. Introduction: 5G and IoT
@ NR : a new air interface that brings new features for 5G which are not backward compatible to 4G.
@Device connectivity in 5G: Standalone mode- NR is connected to 5G core; non-standalone- LTE/NR
based on LTE anchored dual connectivity with NR in user plane.
@ IoT devices can connect to 5G core through enterprise LAN as a fog service.
But, 5G proposes data processing and control capabilities at the operator's core network by introducing
multi access edge computing (MEC) for quick data analysis and decision making, and to eliminate
disadvantages of high response time of cloud.
@5G enables sliced network where within one coverage area, different services, or solutions occupy
their own slice with different speeds and QoS.
For e.g. one slice can support IoT based transport system and another may support IoT based home
automation system.
#Internet of Things concept and applications, Editor K. N. Raja Rao, Wiley, 2021
8. Introduction Contd.
Fig. 3 – Commercial use of bands in USA
(Source: United States GAO)
Bands recommended to use for IoT Applications
9. Fig. 3 Sub 3 GHz radio spectrum
(Source: USA Frequency Allocation (FCC)
Sub 3GHz band is heavily crowded--> Cognitive Radio/ spectrum sharing
Introduction Contd.
10. Cellular IoT: OMA vs. NOMA
Disadvantages of orthogonal multiple access (OMA)
Dilemma to realize a better trade-off between throughput and user
fairness, illustrated in the following example: [5]
A user with a poor connection to the base station (BS) is served by using OMA.
-->Spectral efficiency is low since this user cannot utilize the allocated
bandwidth efficiently.
Since OMA is used, the bandwidth resources occupied by this user cannot be
shared by the others.
Difficult to support massive connectivity
Three key requirements for 5G are to support.:
-High throughput, low latency and massive connectivity
11. Non-orthogonal multiple access (NOMA)
Main idea: Spectrum sharing [7]
NOMA is advancing rapidly for the next generation wireless networks
In 5G, Power-domain (PD) NOMA [8]
Included in the forthcoming digital TV standard (ATSC 3.0)
https://www.intechopen.com/chapters/52822
12. NOMA:
DL NOMA: Let us consider the farthest user first. The signal it
decodes first will be its own signal since it is allocated the most power
. The signals for other users will be seen as
interference. Therefore, the signal-to-noise ratio (SNR) for UEk
And for UE1, last signal it decodes will be its own signal:
UL NOMA: Decode the signal of the nearest user first.
In the uplink, the received signal by the BS that includes all the user
signals is written as:
At the receiver, the BS implements SIC. The first signal it decodes will
be the signal from the nearest user. The SNR for the signal for the UE:
*R. C. Kizilirmak, "Non-Orthogonal Multiple Access (NOMA) for 5G Networks", in Towards 5G Wireless Networks - A Physical Layer Perspective. London, United Kingdom: IntechOpen, 2016 [Online].
Available: https://www.intechopen.com/chapters/52822 doi: 10.5772/66048
13. Two ways of Communication (HD and FD)
Full Duplex (FD)
mode
Half Duplex (HD)
mode
Bi-directional data transmission (Simultaneously).
Increases Spectrum efficiency and doubles link
throughput.
FD is different than TDD/ FDD (used till 4G). In FD case,
simultaneous TX and RX at same time and on same
frequency.
Bi-directional data
transmission (One at a time)
14. D2D-IoT
Other use cases of
communication systems
based on IoT and D2D
-V2V
-Remote healthcare
-Disaster relief
-Ubiquitous computing
- Proximity services
-Yaacoub, Elias, and Osama Kubbar. "Energy-efficient device-to-device communications in LTE public
safety networks." In 2012 IEEE Globecom Workshops, pp. 391-395. IEEE, 2012.
15. Case studies on IoT based WLC:5G-D2D-IoT
Long range MTC over resource constrained devices requires low power wide area
(LPWA) technology, for e.g., NB-IoT (3 km for urban; 15 km for rural).
D2D provides mechanism to transmit the NB-IoT UE acquired data to the BS using
nearby cellular devices, which act as relaying nodes to support D2D communication.
Deterministic D2D (2D2D) for delay sensitive
applications such as monitoring the vital sign of a heart
,regulating heavy traffic in smart city, the amount
of packet drop and delay is not permissible.
-The MBS selects a group of UEs by analysing
their channel gains and the residual energy levels to
help D2D communication.
- Using AI based ranks and the current signal to
handle the packet, the MBS allocates a relaying
UE for the NB-IoT UE.
- Ali Nauman, M.A. Jamshed, R. Ali, Y. B. Zikria, S. W. Kim, “An intelligent deterministic D2D
communication in NB-IoT,” 2019 15th International Wireless Communications & Mobile Computing
Conference (IWCMC), Tangier, Morocco, 2019, pp. 2111-2115, doi: 10.1109/IWCMC.2019.8766786. 15
16. Case studies on IoT based WLC: Smart farming
• Leaf area index of crops assessed
• Two types of PAR sensors used
-ground level (G) and above ground (R)
-The PAR (Photosynthetically Active Radiation)
Sensors (G & R) report the Photosynthetic Photon Flux
Density (PPFD)
* J. Bauer and N. Aschenbruck, "Design and implementation of an agricultural monitoring system for smart farming," 2018 IoT Vertical and Topical Summit on Agriculture - Tuscany (IOT
Tuscany), 2018, pp. 1-6, doi: 10.1109/IOT-TUSCANY.2018.8373022.
* Misra, S., Mukherjee, A., & Roy, A. (2021). Introduction to IoT. Cambridge: Cambridge University Press. doi:10.1017/9781108913560
- Clustered ground-level sensors (G) and above reference
motes (R) are connected to Raspberry Pis (RPi).
-Via PLMN communication, they are further integrated in
an MQTT-based IoT architecture, making in-situ crop
information instantaneously available.
17. Case studies on IoT based WLC: Vehicular IoT
• Internal sensors placed within vehicle for sensing parameters directly associated with the vehicle.
For e.g. GPS, proximity, accelerometer, pressure and temperature.
• External sensors: to sense vacant parking lots, on road cameras for taking still images and videos in
smart traffic system, for e.g. images for toll collection.
• Satellites images for on road congestion and road blockages.
• Wireless connectivity, for e.g. Wi-Fi, Bluetooth, GSM: for transmitting sensed data to RSU, RSUs to
cloud
• RSU : static entity equipped with sensors, communication units and fog devices; collaborates
with internal and external sensors.
• Cloud and fog computing: Fog -> the location and extent of short on road congestion from a
certain location; Cloud ->for regular on-road congestion and predictions based on historical data.
• Analytics: Strong data analytics required to predict on road traffic conditions that may occur after
an hour.
* Misra, S., Mukherjee, A., & Roy, A. (2021). Introduction to IoT. Cambridge: Cambridge University Press. doi:10.1017/9781108913560
18. Case studies on IoT based WLC: Healthcare IoT
* A. Roy, C. Roy, S. Misra, Y. Rahulamathavan and M. Rajarajan, "CARE: Criticality-Aware Data Transmission in CPS-Based Healthcare Systems," 2018 IEEE
International Conference on Communications Workshops (ICC Workshops), 2018, pp. 1-6, doi: 10.1109/ICCW.2018.8403540.
* Misra, S., Mukherjee, A., & Roy, A. (2021). Introduction to IoT. Cambridge: Cambridge University Press. doi:10.1017/9781108913560
* CARE system: decides whether to transmit the
physiological sensor data to the fog aggregation node
or the cloud, based on the patient’s criticality.
* Based on an index, which measures the health
criticality of a patient, based upon which the
physiological parameters are transmitted to the cloud
or the fog.
*Further, a Nash Bargaining process formulation done,
where the LPUs act as players and bargain among
themselves to transmit the data to a cloud or fog node.
19. Work 1
*Microcellular LTE environment having
coverage area of radius R_1=530m
*Good coverage up to radius R_2=500m
*IoT Devices (IoTDs) and CUEs are
randomly distributed inside the cell.
*IoT Gateway (IoT-GW) inside the poor
coverage region.
*Cellular mode communication: CUEs and
IoTDs inside good coverage region.
*D2D mode communication: IoTDs inside
poor coverage region.
20. •IoTDs to IoT-GW links in D2D mode.
•OFDMA for sharing physical resource block
(PRB).
•Strong fiber optic communication between
IoT-GW and eNodeB.
•For D2D and cellular communication: micro-
cellular channel, characterized by path loss,
shadowing and multi-path fading.
*SINR value at IoT-GW due
to IoTD found considering interference from
other IoTDs
*Next outage probability and sum
rate found.
21. Fig.: Outage Probability of D2D Communication link versus SINR Threshold for different
Transmit Power of IoTD
22. Work 2
IoT devices integrated into a
Cellular Network.
Independent cellular users and
IoT devices sharing resource
blocks transmit their message
signals over power domain (PD)
NOMA.
Further, relay with some power
helps in transmission of its signal
to destination.
Relay selection strategy plays a
role for signal transmission.
Fig. 6
23. The combined signal received at relay:
The signal of K-th user left at relay Y:
is due to imperfect SIC of (K-1) users.
After successfully decoding each users signals at relay, finally signals retransmitted to destination
users.
are the power coefficients allocated to transmission of the users'
signals.
24. After successfully decoding each users signals at relay as well as at destination, we have two SINR of
each users.
denotes the minimum of two hops SINR of user 1, 2, 3, and 4.
denotes the achievable data rate of each corresponding user.
The outage probability of the system can be expressed as:
25. Work 3
Two types of network are there.
primary Network (PN) and
secondary Network (SN)
In first phase of transmission
(Underlay mode), xp a primary
signal transmitted by Primary
transmitter (PT) to Secondary
transmitter (ST) and Primary
destination (PD), and xs a
secondary signal transmitted by
ST to Secondary destination
(SD).
26. The received signal at PD, ST, and SD in 1st transmission phase is given as:
The received signal at PD, and SD in 2nd transmission phase:
After applying MRC at each user, and calculating capacity of each user. The Outage probability of
each users is given as:
27. Work 4: D2D-IoT Relay Hopper
-In the first step, the IoT devices satisfying
the QoS constraint are selected and matched
with appropriate reuse candidates, that is, the
cellular user equipments (CUEs) by an optimum
resource allocation scheme.
-Next, link reliability of these links are
computed and weak links are discarded.
-Finally, the disconnected IoT devices are rerouted to the IoT
gateway via IoT devices possessing strong links following a
relay hopper model.
-A. Pradhan, S. Basu, S. Sarkar, S. Mitra and S. D. Roy, "Implementation of relay hopper model for reliable communication of IoT devices in LTE
environment through D2D link," 2018 10th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, 2018, pp. 569-572,
doi: 10.1109/COMSNETS.2018.8328275.
28. Work 5: UAV-IoT-D2D
28
An unmanned aerial vehicle (UAV) can be used as a flying base station (BS)
to provide emergency assistance and cover a part of the disaster area
Many D2D users in multi-hop mode assist the UAV for relaying the
information and extend the large disaster area
In an NFA, multiple communication services such as satellite-assisted
communication, walkie-talkie communication, etc, can exist.
Liu, Xiaonan, Zan Li, Nan Zhao, Weixiao Meng, Guan Gui, Yunfei Chen, and Fumiyuki Adachi. "Transceiver design and multi-hop
D2D for UAV IoT coverage in disasters." IEEE Internet of Things Journal 6, no. 2: 1803-1815, 2018.
A network model with inner and outer region involving Temporary
BS (T-BS), UAV, IoT users, cellular users (CUs), and D2D users is
proposed
The outage probability of IoT and D2D users in the inner and outer
regions are derived analytically
29. System Model
29
Fig. 2 System model
FA
BS
Millimeter-wave BS
Directional antenna
Temporary BS
IoT users
IoT gateway (IoT GW)
Cellular users
D2D users
UAV
NFA
30. System Model
30
Due to longer distance some D2D users (placed in the outer circle) cannot
communicate to T-BS in large disaster area
Assume the UAV to be stationary to maintain the energy consumption and
required connectivity as per the network
32. System Model
32
The received signal at the IoT GW can be expressed as:
The received signal at the T-BS can be expressed as:
The received signal to interference noise ratio (SINR) are represented as:
33. 33
System Model
Outage Probability Analysis
The outage probability of an IoT user to the IoT GW can be expressed as:
34. 34
System Model
The conditional outage probability of a user located in the outer circle
and it can be expressed as:
35. 35
System Model
The overall outage probability of a user anywhere in the NFA is found as:
37. Conclusions for Work 5
37
A temporary BS and a UAV-based D2D network is investigated in an
uplink scenario
The temporary BS and the UAV provide assistance in establishing
communication in a disaster-affected region
The UAV cannot cover the whole NFA or disaster area due to its limited
battery power
Assumed a stationary UAV, which is cost-effective than a rotating UAV
The analytical expression of outage probability for both inner region and
outer region users has been developed
The overall outage probability is observed with the variation of SINR
threshold, distance from IoT users to the IoT GW, distance from D2D users
to a UAV etc.
38. 1. Internet of Things at a glance, 2020. [Online]. Available: http://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/at-a-
glance-c45-731471.
2. L. Chettri and R. Bera, "A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems," in IEEE Internet of Things
Journal, vol. 7, no. 1, pp. 16-32, Jan. 2020, doi: 10.1109/JIOT.2019.2948888.
3. Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies,
Security, privacy, and Applications”, IEEE internet of things journal, vol. 4, no.5 5, October 2017.
4. Y. Endo, Y. Kishiyama, and H. Higuchi, ``Uplink non-orthogonal access with MMSE-SIC in the presence of inter-cell interference,'' in Proc. Int. Symp. Wireless
Commun Syst, 2011,pp. 261_265.
5. Z. Ding and R. Schober, “Recent Progress in Non-Orthogonal Multiple Access”, IEEE ICC Tutorial, 2017.
6. N. Zhang, J. Wang, G. Kang and Y. Liu, "Uplink Nonorthogonal Multiple Access in 5G Systems," in IEEE Communications Letters, vol. 20, no. 3, pp. 458-461,
March 2016, doi: 10.1109/LCOMM.2016.2521374.
7. L. Dai, B. Wang, Z. Ding, Z. Wang, S. Chen and L. Hanzo, "A Survey of Non-Orthogonal Multiple Access for 5G," in IEEE Communications Surveys & Tutorials,
vol. 20, no. 3, pp. 2294-2323, thirdquarter 2018, doi: 10.1109/COMST.2018.2835558.
8. Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, “System level performance evaluation of downlink non-orthogonal multiple access (NOMA)”, IEEE
PIMRC, 2013.
9. Z. Ding, Z. Yang, P. Fan and H. V. Poor, “On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users”, IEEE SPL,
2014.
10. L. R. Varshney, "Transporting information and energy simultaneously," 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, 2008,
pp. 1612-1616, doi: 10.1109/ISIT.2008.4595260.
11. Derrick Wing Kwan Ng; Trung Q. Duong; Caijun Zhong; Robert Schober, "The Era of Wireless Information and Power Transfer," in Wireless Information and
Power Transfer: Theory and Practice , Wiley, 2019, pp.1-16, doi: 10.1002/9781119476863.ch1.
12. A. Rauniyar, P. Engelstad and O. N. Østerb, "RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay
Systems," 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 2018, pp. 1-8, doi:
10.1109/NCA.2018.8548068.
References