IEEE Wireless Communications
IF
9.20
Papers
1609
Papers 1607
1 page of 161 pages (1,607 results)
Newest
Published on Jan 1, 2019in IEEE Wireless Communications 9.20
Jian Su6
Estimated H-index: 6
,
Zhengguo Sheng14
Estimated H-index: 14
+ 1 AuthorsYongrui Chen3
Estimated H-index: 3
Radio-frequency identification (RFID) is widely applied in massive tag based applications, thus effective anticollision algorithms to reduce communication overhead is of great importance to RFID in achieving energy and time efficiency. Existing medium access control (MAC) algorithms are primarily focusing on improving system throughput or reducing total identification time. However, with the advancement of embedded systems and mobile applications, the energy consumption aspect is increasingly im...
Source Cite
Published on Feb 1, 2019in IEEE Wireless Communications 9.20
Zhijian Lin , Xiaojiang Du30
Estimated H-index: 30
+ 3 AuthorsDapeng Wu43
Estimated H-index: 43
Millimeter-wave (mmWave) communication is one of the most promising technologies in the fifth generation (5G) mobile networks due to its capability to access a large amount of available spectrum resources. Despite theoretical potential of a high data rate, there are still several key technical challenges to use mmWave in mobile networks, such as severe path loss, high penetration loss, and narrow beamwidth. Hence, accurate and reliable knowledge on mmWave channel propagation characteristics is e...
Source Cite
Published on Jan 1, 2019in IEEE Wireless Communications 9.20
Anwer Al-Dulaimi6
Estimated H-index: 6
,
Shahid Mumtaz12
Estimated H-index: 12
+ 2 AuthorsChih-Lin I2
Estimated H-index: 2
Source Cite
Published on Feb 1, 2019in IEEE Wireless Communications 9.20
Kui Ren56
Estimated H-index: 56
,
Zhan Qin , Zhongjie Ba
In recent years, an enormous amount of research has been carried out in an attempt to identify smartphones through modeling the manufacturing imperfections of their built-in transducers, which spawned a rich set of hardware fingerprinting methods. However, the vast majority of the work in this area has focused on device tracking and identification. For adversarial settings like forensics and authentication, it remains unclear whether these methods will provide reliable identification results whe...
Source Cite
Published on Feb 1, 2019in IEEE Wireless Communications 9.20
Furqan Jameel4
Estimated H-index: 4
,
Shurjeel Wyne16
Estimated H-index: 16
+ 1 AuthorsZheng Chang10
Estimated H-index: 10
Vehicular communications essentially support automotive applications for safety and infotainment. For this reason, industry leaders envision an enhanced role for vehicular communications in the fifth generation of mobile communications technology. Over the years, the number of vehicle- mounted sensors has increased steadily, which potentially leads to more volume of critical data communications in a short time. Also, emerging applications such as remote/autonomous driving and infotainment such a...
Source Cite
Published on Feb 1, 2019in IEEE Wireless Communications 9.20
Nan Zhao20
Estimated H-index: 20
,
Weidang Lu + 4 AuthorsKai-Kit Wong37
Estimated H-index: 37
Reliable and flexible emergency communication is a key challenge for search and rescue in the event of disasters, especially for the case when base stations are no longer functioning. Unmanned aerial vehicle (UAV)-assisted networking is emerging as a promising method to establish emergency networks. In this article, a unified framework for a UAV-assisted emergency network is established in disasters. First, the trajectory and scheduling of UAVs are jointly optimized to provide wireless service t...
Source Cite
Published on Feb 1, 2019in IEEE Wireless Communications 9.20
Wenchi Cheng15
Estimated H-index: 15
,
Wei Zhang27
Estimated H-index: 27
+ 2 AuthorsZhang Hailin19
Estimated H-index: 19
As the traditional resources (frequency, time, space, and so on) are efficiently utilized, it becomes more and more challenging to satisfy the ever-lasting capacity-growing and users-boosting demand in wireless networks. Recently, the EM wave was found to possess not only linear momentum, but also angular momentum. The OAM is a kind of wavefront with helical phase. The OAM-based vortex wave has different topological charges, which are orthogonal to each other, bridging a new way for multiple acc...
2 Citations Source Cite
Published on Jan 1, 2019in IEEE Wireless Communications 9.20
Zhijin Qin11
Estimated H-index: 11
,
Frank Y. Li13
Estimated H-index: 13
+ 2 AuthorsQiang Ni30
Estimated H-index: 30
Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa)...
Source Cite
12345678910