Academic literature on the topic 'Private mobile radio networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Private mobile radio networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Private mobile radio networks"

1

Gruet, Christophe, Xavier Pons-Masbernat, and Pierre Force. "The LTE Evolution: Private Mobile Radio Networks." IEEE Vehicular Technology Magazine 8, no. 2 (June 2013): 64–70. http://dx.doi.org/10.1109/mvt.2013.2252291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palanisamy, Ramesh, Senthil Jayapal, Anand M, and Jeelani Basha. "ENHANCED HYBRID COGNITIVE RADIO AD HOC NETWORKS (CRAHNs) FOR MOBILE NETWORK." International Journal of Computer Science and Mobile Computing 11, no. 11 (November 30, 2022): 237–46. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.020.

Full text
Abstract:
In sensor networks, a very crucial aspect of the maintenance of the communications of secure data is the data, which is the most difficult of all tasks. The sensor network consists of hierarchical elements like the Base Station (BS), the Cluster Head (CH) and the Sensor Nodes (SNs), and this will have three different keys, which are the public and private, the cluster and the master keys. Through the opportunistic use of the currently available wireless spectrum, cognitive radio (CR) technology is intended to address the issues in wireless networks brought on by the limited amount of range accessible and the inefficient use of spectrum. With the inherent capabilities of cognitive radio, CR networks will offer the most advanced spectrum-aware communication paradigm in wireless communications. However, the significant spectral fluctuation and various quality-of-service (QoS) requirements faced by CR networks provide unique difficulties. The distributed multihop design, the dynamic network topology, and the time- and location-varying spectrum availability are essential differentiating elements in cognitive radio ad hoc networks (CRAHNs).
APA, Harvard, Vancouver, ISO, and other styles
3

Canales, María, Ángela Hernández, and Antonio Valdovinos. "Trunking capacity estimation for wide area multicell private mobile radio networks." AEU - International Journal of Electronics and Communications 64, no. 1 (January 2010): 8–16. http://dx.doi.org/10.1016/j.aeue.2008.09.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Haldorai, Anandakumar, Jeevanandham Sivaraj, Munivenkatappa Nagabushanam, and Michaelraj Kingston Roberts. "Cognitive Wireless Networks Based Spectrum Sensing Strategies: A Comparative Analysis." Applied Computational Intelligence and Soft Computing 2022 (October 30, 2022): 1–14. http://dx.doi.org/10.1155/2022/6988847.

Full text
Abstract:
Because of numerous dormant application fields, wireless sensor networks (WSNs) have emerged as an important and novel area in radio and mobile computing research. These applications range from enclosed system configurations in the home and office to alfresco enlistment in an opponent’s landmass in a strategic flashpoint. Cognitive radio networks (CRNs) can be created by integrating radio link capabilities with network layer operations utilizing cognitive radios. The goal of CRN design is to optimize the general system operations to meet customer requirements at any location worldwide by much more efficiently addressing CRNs instead of simply connecting spectrum utilization. When compared to conventional radio networks, CRNs are more versatile and susceptible to wireless connections. Recent advancements in wireless communication have resulted in increasing spectrum scarcity. As a modern innovation, cognitive radio aims to tackle this challenge by proactively utilizing the spectrum. Because cognitive radio (CR) technology gives assailants additional possibilities than a normal wireless network, privacy in a CRN becomes a difficult challenge. We concentrate on examining the surveillance system at a societal level, in which both defense and monitoring are critical components in assuring the channel’s privacy. The current state of investigation into spectrum sensing and potential risks in cognitive radios is reviewed in this study.
APA, Harvard, Vancouver, ISO, and other styles
5

Imanbayev, A. Zh, S. Tynymbayev, R. S. Odarchenko, and Zh Alikhankyzy. "ANALYSIS OF THE SECURITY PROBLEMS OF FIFTH GENERATION MOBILE NETWORKS." BULLETIN Series of Physics & Mathematical Sciences 76, no. 4 (December 15, 2021): 21–28. http://dx.doi.org/10.51889/2021-4.1728-7901.03.

Full text
Abstract:
For now, the development of 5G mobile networks will have a significant impact on security. The 3GPP 5G standard is independent in the sense that it is flexible enough to allow for different types of physical and virtual overlap between the radio access network and the core of the network. The separation of functions between the radio access network and the core raises questions about competitiveness and performance. This article first looks at the security requirements of 5G, including security requirements for business applications, network architecture, air interface, and user privacy. On this basis, the challenges faced by the current mobile security architecture are analyzed and internal security elements are examined from a network architecture perspective. Subsequently, taking into account the security resources and technical characteristics brought by innovations in 5G network and radio interface technologies, the current state of research and development trends of the main technologies for additional 5G security support, including physical layer security, encryption and the use of blockchain technology in 5G, are presented, as well as some countermeasures and proposals to protect 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Daeuble, Stephane, and Carlijn Williams. "PRIVATE WIRELESS MARKET." SYNCHROINFO JOURNAL 8, no. 3 (2022): 12–17. http://dx.doi.org/10.36724/2664-066x-2022-8-3-12-17.

Full text
Abstract:
Label switching technoloIndustry 4.0 operations enable you to fuse physical and digital processes by connecting everything from vehicles to sensors and mobile workers in the most flexible, affordable, secure and reliable way. By digitalizing operations, enterprises can easily transform data into insights and become more agile and proactive. To meet the requirements of AI, machine learning and automation, industries need highly reliable, low latency and secure wireless connectivity with high bandwidth. 4.9G/LTE and 5G industrial-grade private wireless networks are the only wireless solutions available that have proven records to meet the demands of Industry 4.0 mission and business-critical applications. They provide robust, secure and reliable connectivity for everything that is critical to your operations, from people and machines to sensors and analytics. Radio access points provide coverage of your outdoor and indoor spaces, similar to Wi-Fi, but you will need far fewer. Unlike Wi-Fi, there is a core network, which is the key to enabling mobility, ensuring security and maintaining quality-of-service parameters. The backhaul network is no different than what you would use to connect Wi-Fi access points, whether cabled Ethernet, passive optical LAN and/or microwave depending on the application and the distances served.gy, MPLS, Multiprotocol label switching, MPLS TE, Routing problems, BGP “Blackhole”.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Chuan, Shuhui Chen, and Zhiping Cai. "LTE Phone Number Catcher: A Practical Attack against Mobile Privacy." Security and Communication Networks 2019 (September 30, 2019): 1–10. http://dx.doi.org/10.1155/2019/7425235.

Full text
Abstract:
Phone number is a unique identity code of a mobile subscriber, which plays a more important role in the mobile social network life than another identification number IMSI. Unlike the IMSI, a mobile device never transmits its own phone number to the network side in the radio. However, the mobile network may send a user’s phone number to another mobile terminal when this user initiating a call or SMS service. Based on the above facts, with the help of an IMSI catcher and 2G man-in-the-middle attack, this paper implemented a practicable and effective phone number catcher prototype targeting at LTE mobile phones. We caught the LTE user’s phone number within a few seconds after the device camped on our rogue station. This paper intends to verify that mobile privacy is also quite vulnerable even in LTE networks as long as the legacy GSM still exists. Moreover, we demonstrated that anyone with basic programming skills and the knowledge of GSM/LTE specifications can easily build a phone number catcher using SDR tools and commercial off-the-shelf devices. Hence, we hope the operators worldwide can completely disable the GSM mobile networks in the areas covered by 3G and 4G networks as soon as possible to reduce the possibility of attacks on higher-generation cellular networks. Several potential countermeasures are also discussed to temporarily or permanently defend the attack.
APA, Harvard, Vancouver, ISO, and other styles
8

Lorenz, Vinzenz. "Use of Wireless Technologies in the Industrial Environment With Blockchain." Open Conference Proceedings 2 (December 15, 2022): 143–49. http://dx.doi.org/10.52825/ocp.v2i.146.

Full text
Abstract:
This paper presents the development of an OpenThread network within the framework of a BMBF project, which is intended to transfer production data to a private blockchain in order to store the data in a tamper-proof and transparent manner. Among other things, special radio modules were developed for this purpose which support the OpenThread and Bluetooth Low Energy radio standards and thus additionally enable the connection of mobile devices to the private blockchain. During the conception and development of the radio modules as well as the communication protocols, emphasis was placed on ensuring that the radio network meets the high requirements for its use in an industrial environment, such as commissioning through plug & play,robustness, availability, data transfer rate, latency and, above all, IT security.
APA, Harvard, Vancouver, ISO, and other styles
9

Patalbansi, Vikram, and Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 19, 2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.

Full text
Abstract:
The ubiquitous network like Mobile Cloud Computing (MCC) provides a high quality of wireless services depending upon the wireless communication system network security level. And so many researches are carried out by the researcher on security algorithms for wireless communication system constructed in different network reliability. In our proposed thesis paper, on a theoretical basis, we developed the theory of MCC Security Layer Protocol security system in which we used the cryptographic hash function SHA-256 to generate a private key for entities, RC5 encryption, and decryption algorithm, Temporal Key Integrity Protocol (TKIP) generating a dynamic sequential key and CRC-32 checksum to detecting the error in our packets. The MSLP uses the stored symmetric secret key calculated on the basis of the Diffie-Hellman Key sharing scheme to generate keystream for cryptography functions. The secret key stored in the device’s filesystem our database prior to the deployment on Mobile Cloud Computing and remains the same throughout the session of communication. These systems use the dynamic initialization vector to avoid reply attacks and message integrity code calculated on source and destination devices addresses and actual frame contents. In the proposed thesis paper we analyze the security measures at the MSLP level and before transmitting information over the mobile networks, the information is encrypted in the form of frames and at the physical layer, this frame converted into its equivalent radio signals.
APA, Harvard, Vancouver, ISO, and other styles
10

Math, Sa, Lejun Zhang, Seokhoon Kim, and Intae Ryoo. "An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment." Security and Communication Networks 2020 (October 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/8881640.

Full text
Abstract:
The existence of Mobile Edge Computing (MEC) provides a novel and great opportunity to enhance user quality of service (QoS) by enabling local communication. The 5th generation (5G) communication is consisting of massive connectivity at the Radio Access Network (RAN), where the tremendous user traffic will be generated and sent to fronthaul and backhaul gateways, respectively. Since fronthaul and backhaul gateways are commonly installed by using optical networks, the bottleneck network will occur when the incoming traffic exceeds the capacity of the gateways. To meet the requirement of real-time communication in terms of ultralow latency (ULL), these aforementioned issues have to be solved. In this paper, we proposed an intelligent real-time traffic control based on MEC to handle user traffic at both gateways. The method sliced the user traffic into four communication classes, including conversation, streaming, interactive, and background communication. And MEC server has been integrated into the gateway for caching the sliced traffic. Subsequently, the MEC server can handle each user traffic slice based on its QoS requirements. The evaluation results showed that the proposed scheme enhances the QoS and can outperform on the conventional approach in terms of delays, jitters, and throughputs. Based on the simulated results, the proposed scheme is suitable for improving time-sensitive communication including IoT sensor’s data. The simulation results are validated through computer software simulation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Private mobile radio networks"

1

Ballapuram, Vijayanand Sreenivasan. "Impact of Queuing Schemes and VPN on the Performance of a Land Mobile Radio VoIP System." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33033.

Full text
Abstract:
Land mobile radio (LMR) systems are used for communication by public safety and other government and commercial organizations. LMR systems offer mission-critical or even life-critical service in the day-to-day activities of such organizations. Traditionally, a variety of different LMR systems have been deployed by different organizations, leading to a lack of radio interoperability. A voice application that connects LMR systems via a packet-switched network is called an LMR Voice over IP (LMRVoIP) system and is a potential solution to the interoperability problem. LMRVoIP systems are time critical, i.e., are delay and jitter sensitive. Transmission of LMRVoIP traffic in a congested packet-switched network with no quality of service (QoS) or priority mechanisms in place could lead to high delays and extreme variations in delay, i.e., high jitter, thus resulting in poor application performance. LMRVoIP systems may also have performance issues with the use of virtual private networks (VPNs). To the best of our knowledge, there has been no prior thorough investigation of the performance of an LMRVoIP system with different queuing schemes for QoS and with the use of VPN. In this thesis, we investigate the performance of an LMRVoIP system with different queuing schemes and with the use of VPN.

An experimental test bed was created to evaluate four QoS queuing schemes: first-in first-out queuing (FIFO), priority queuing (PQ), weighted fair queuing (WFQ), and class-based weighted fair queuing (CBWFQ). Quantitative results were obtained for voice application throughput, delay, jitter, and signaling overhead. Results show that, compared to a baseline case with no background traffic, LMRVoIP traffic suffers when carried over links with heavy contention from other traffic sources when FIFO queuing is used. There is significant packet loss for voice and control traffic and jitter increases. FIFO queuing provides no QoS and, therefore, should not be used for critical applications where the network may be congested. The situation can be greatly improved by using one of the other queuing schemes, PQ, WFQ, or CBWFQ, which perform almost equally well with one voice flow. Although PQ has the best overall performance, it tends to starve the background traffic. CBWFQ was found to have some performance benefits over WFQ in most cases and, thus, is a good candidate for deployment.

The LMRVoIP application was also tested using a VPN, which led to a modest increase in latency and bandwidth utilization, but was found to perform well.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
2

Adouane, Amine Mohamed. "Dynamic management of spectral resources in LTE networks." Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS007V/document.

Full text
Abstract:
La croissance exponentielle du nombre de dispositifs communicants et des services sans fils émergents fixe des objectifs toujours plus haut pour répondre à la demande de capacité sans cesse croissante des utilisateurs. Cela pose des défis constants pour atteindre les objectifs envisagés. La réutilisation spectrale élevée (High efficiency spectral reuse) a été adopté, cependant, elle conduit à des interférences accrues sur le réseau, ce qui dégrade les performances. L'OFDM (Orthogonal Frequency Division Multiplexing) est utilisé comme solution dans les réseaux de 4 G. Grâce à son orthogonalité, l'OFDM élimine l'interférence intra-cellulaire, mais l'interférence inter-cellule reste importante. Plusieurs méthodes connues sous le nom d'Inter-Cell interférences coordination (ICIC) ont été proposées pour les diminuer. L'ICIC permet la gestion des ressources radio coordonnée entre plusieurs cellules appelées ENodeB. Ces eNodeB peuvent partager les informations nécessaires grâce à l'interface X2 qui les relient, ces informations sont transmises par des messages LTE normalisés. Lorsque les ENodeBs sélectionnent égoïstement les ressources, la théorie de jeux non-coopératifs est largement appliquée pour trouver un juste équilibre. Dans cette thèse, nous mettons l'accent sur l'ICIC pour la liaison descendante d'un système OFDMA cellulaire dans le contexte du projet SOAPS (Spectrum opportuniste accès à la Sécurité publique). Ce projet a pour but l'amélioration de la planification des ressources de fréquences pour fournir des services à large bande dans les systèmes PMR (radiocommunications mobiles privées) en utilisant les technologies LTE. Nous adressons le problème d'ICIC en proposant quatre solutions différentes sous forme d'algorithmes entièrement décentralisés, ces algorithmes se basent sur la théorie des jeux non-coopératifs avec des équilibres de Nash purs des jeux considérés
The exponential growth in the number of communications devices has set out new ambitious targets to meet the ever-increasing demand for user capacity in emerging wireless systems. However, the inherent impairments of communication channels in cellular systems pose constant challenges to meet the envisioned targets. High spectral reuse efficiency was adopted as a solution to higher data rates. Despite its benefits, high spectral reuse leads to increased interference over the network, which degrades performances of mobile users with bad channel quality. To face this added interfence, OFDM (Orthogonal Frequency Division Multiplexing) is used for the new 4th generation network. Thanks to its orthogonality OFDM eliminates the intra-cellular interference, but when the same resources are used in two adjacents cells, the inter-cell interference becomes severe. To get rid of the latter, several methods for Inter-Cell Interference Coordination (ICIC) have been proposed. ICIC allows coordinated radio resources management between multiple cells. The eNodeBs can share resource usage information and interference levels over the X2 interface through LTE-normalized messages. Non-cooperative game theory was largely applied were eNodeBs selfishly selects resource blocks (RBs) in order to minimize interference. In this thesis, we stress on ICIC for the downlink of a cellular OFDMA system in the context of the SOAPS (Spectrum Opportunistic Access in Public Safety) project. This project focuses on the improvement of frequency resource scheduling for Broadband Services provision by PMR (Private Mobile Radio) systems using LTE technologies. We addressed this problem with four different solutions based on Non-cooperative game theory, three algorithms are devoted to RB selection in order to manage the interference, while the last one is a power control scheme with power economy and enhanced system performances
APA, Harvard, Vancouver, ISO, and other styles
3

Sakai, Kazuya. "Security and Privacy in Large-Scale RFID Systems." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1386006971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Duan, Jialong. "Coordination inside centralized radio access networks with limited fronthaul capacity." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0052/document.

Full text
Abstract:
Le réseau d'accès radio centralisé (C-RAN) peut fortement augmenter la capacité des réseaux mobiles. Cependant, la faisabilité de C-RAN est limitée par le débit considérable engendré sur les liaisons de transport, appelées également fronthaul. L'objectif de cette thèse est d'améliorer les performances de C-RAN tout en considérant les limitations du débit sur le frontaul, l'allocation de ressources et l'ordonnancement des utilisateurs.Nous étudions d'abord les séparations fonctionnelles possibles entre les têtes radios distantes (RRH) et les unités de traitement en bande de base (BBU) sur la liaison montante pour réduire le débit de transmission sur le fronthaul : certaines fonctions de couche basse sont déplacées du BBU vers les RRH. Nous fournissons une analyse quantitative des améliorations de performances ainsi obtenues.Nous nous concentrons ensuite sur la transmission coordonnée Multi-point (CoMP) sur le lien descendant. CoMP peut améliorer l'efficacité spectrale mais nécessite une coordination inter-cellule, ce qui est possible uniquement si une capacité fronthaul élevée est disponible. Nous comparons des stratégies de transmission avec et sans coordination inter-cellule. Les résultats de simulation montrent que CoMP doit être préféré pour les utilisateurs situés en bordure de cellule et lorsque la capacité du fronthaul est élevée. Nous en déduisons une stratégie hybride pour laquelle Les utilisateurs sont divisés en deux sous-ensembles en fonction de la puissance du signal. Les utilisateurs situés dans les zones centrales sont servis par un seul RRH avec une coordination simple et ceux en bordure de cellule sont servis en mode CoMP. Cette stratégie hybride constitue un bon compromis entre les débits offerts aux utilisateurs et les débits sur le fronthaul
Centralized/Cloud Radio Access Network (C-RAN) is a promising mobile network architecture, which can potentially increase the capacity of mobile networks while reducing operators¿ cost and energy consumption. However, the feasibility of C-RAN is limited by the large bit rate requirement in the fronthaul. The objective of this thesis is to improve C-RAN performance while considering fronthaul throughput reduction, fronthaul capacity allocation and users scheduling.We first investigate new functional split architectures between Remote Radio Heads (RRHs) and Baseband Units (BBU) on the uplink to reduce the transmission throughput in fronthaul. Some low layer functions are moved from the BBU to RRHs and a quantitative analysis is provided to illustrate the performance gains. We then focus on Coordinated Multi-point (CoMP) transmissions on the downlink. CoMP can improve spectral efficiency but needs tight coordination between different cells, which is facilitated by C-RAN only if high fronthaul capacity is available. We compare different transmission strategies without and with multi-cell coordination. Simulation results show that CoMP should be preferred for users located in cell edge areas and when fronthaul capacity is high. We propose a hybrid transmission strategy where users are divided into two parts based on statistical Channel State Informations (CSIs). The users located in cell center areas are served by one transmission point with simple coordinated scheduling and those located in cell edge areas are served with CoMP joint transmission. This proposed hybrid transmission strategy offers a good trade-off between users¿ transmission rates and fronthaul capacity cost
APA, Harvard, Vancouver, ISO, and other styles
5

Kurien, Anish Mathew. "Approches pour la classification du trafic et l’optimisation des ressources radio dans les réseaux cellulaires : application à l’Afrique du Sud." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1090/document.

Full text
Abstract:
Selon l'Union Internationale des Télécommunications (UIT), la progression importante du nombre de téléphones mobiles à travers le monde a dépassé toutes les prévisions avec un nombre d'utilisateurs estimé à 6 Mds en 2011 dont plus de 75% dans les pays développés. Cette progression importante produit une pression forte sur les opérateurs de téléphonie mobile concernant les ressources radio et leur impact sur la qualité et le degré de service (GoS) dans le réseau. Avec des demandes différenciées de services émanant de différentes classes d'utilisateurs, la capacité d'identifier les types d'utilisateurs dans le réseau devient donc vitale pour l'optimisation de l'infrastructure et des ressources. Dans la présente thèse, une nouvelle approche de classification des utilisateurs d'un réseau cellulaire mobile est proposée, en exploitant les données du trafic réseau fournies par deux opérateurs de téléphonie mobile en Afrique du Sud. Dans une première étape, celles-ci sont décomposées en utilisant deux méthodes multi-échelles ; l'approche de décomposition en mode empirique (Empirical Mode Decomposition approach - EMD) et l'approche en Ondelettes Discrètes (Discrete Wavelet Packet Transform approach - DWPT). Les résultats sont ensuite comparés avec l'approche dite de Difference Histogram qui considère le nombre de segments de données croissants dans les séries temporelles. L'approche floue de classification FCM (Fuzzy C-means) est utilisée par la suite pour déterminer les clusters, ou les différentes classes présentes dans les données, obtenus par analyse multi-échelles et par différence d'histogrammes. Les résultats obtenus montrent, pour la méthode proposée, une séparation claire entre les différentes classes de trafic par rapport aux autres méthodes. La deuxième partie de la thèse concerne la proposition d'une approche d'optimisation des ressources réseau, qui prend en compte la variation de la demande en termes de trafic basée sur les classes d'abonnés précédemment identifiés dans la première partie. Une nouvelle approche hybride en deux niveaux pour l'allocation des canaux est proposée. Le premier niveau considère un seuil fixe de canaux alloués à chaque cellule en prenant en considération la classe d'abonnés identifiée par une stratégie statique d'allocation de ressources tandis que le deuxième niveau considère une stratégie dynamique d'allocation de ressources. Le problème d'allocation de ressources est formulé comme un problème de programmation linéaire mixte (Mixed-Integer Linear programming - MILP). Ainsi, une approche d'allocation par période est proposée dans laquelle un groupe de canaux est alloué de façon dynamique pour répondre à la variation de la demande dans le réseau. Pour résoudre le problème précédent, nous avons utilisé l'outil CPLEX. Les résultats obtenus montrent qu'une solution optimale peux être atteinte par l'approche proposée (MILP)
The growth in the number of cellular mobile subscribers worldwide has far outpaced expected rates of growth with worldwide mobile subscriptions reaching 6 Billion subscribers in 2011 according to the International Telecommunication Union (ITU). More than 75% of this figure is in developing countries. With this rate of growth, greater pressure is placed on radio resources in mobile networks which impacts on the quality and grade of service (GOS) in the network. With varying demands that are generated from different subscriber classes in a network, the ability to distinguish between subscriber types in a network is vital to optimise infrastructure and resources in a mobile network. In this study, a new approach for subscriber classification in mobile cellular networks is proposed. In the proposed approach, traffic data extracted from two network providers in South Africa is considered. The traffic data is first decomposed using traditional feature extraction approaches such as the Empirical Mode Decomposition (EMD) and the Discrete Wavelet Packet Transform (DWPT) approach. The results are then compared with the Difference Histogram approach which considers the number of segments of increase in the time series. Based on the features extracted, classification is then achieved by making use of a Fuzzy C-means algorithm. It is shown from the results obtained that a clear separation between subscriber classes based on inputted traffic signals is possible through the proposed approach. Further, based on the subscriber classes extracted, a novel two-level hybrid channel allocation approach is proposed that makes use of a Mixed Integer Linear Programming (MILP) model to consider the optimisation of radio resources in a mobile network. In the proposed model, two levels of channel allocation are considered: the first considers defining a fixed threshold of channels allocated to each cell in the network. The second level considers a dynamic channel allocation model to account for the variations in traffic experienced in each traffic class identified. Using the optimisation solver, CPLEX, it is shown that an optimal solution can be achieved with the proposed two-level hybrid allocation model
APA, Harvard, Vancouver, ISO, and other styles
6

Florea, Alina Alexandra. "Optimisation de la transmission de phonie et vidéophonie sur les réseaux à larges bandes PMR." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00873686.

Full text
Abstract:
Cet exposé analyse les perspectives large bande des réseaux PMR, à travers l'évaluation du candidat LTE, et la proposition d'une possible évolution du codage canal, la solution brevetée des codes turbo à protection non uniforme. Une première étude dans le chapitre 2 se concentre sur l'analyse multi-couche et l'identification des problèmes clé des communications de voix et de vidéo sur un réseau LTE professionnel. Les capacités voix et vidéo sont estimées pour les liens montant et descendant de la transmission LTE, et l'efficacité spectrale de la voix en lien descendant est comparée à celle de PMR et GSM. Ce chapitre souligne certains points clé de l'évolution de LTE. S'ils étaient pas résolus par la suite, LTE se verrait perdre de sa crédibilité en tant que candidat à l'évolution de la PMR. Une telle caractéristique clé des réseaux PMR est le codage canal à protection non uniforme, qui pourrait être adapté au système LTE pour une évolution aux contraintes de la sécurité publique. Le chapitre 3 introduit cette proposition d'évolution, qui a été brevetée: les turbo codes à protection non uniforme intégrée. Nous proposons une nouvelle approche pour le codage canal à protection non uniforme à travers les codes turbo progressives hiérarchiques. Les configurations parallèles et séries sont analysées. Les mécanismes de protection non uniformes sont intégrés dans la structure de l'encodeur même à travers l'insertion progressif et hiérarchique de nouvelles données de l'utilisateur. Le turbo décodage est modifié pour exploiter de façon optimale l'insertion progressive de données dans le processus d'encodage et estimer hiérarchiquement ces données. Les propriétés des structures parallèles et séries sont analysées à l'aide d'une analogie aux codes pilotes, ainsi qu'en regardant de plus près leurs caractéristiques de poids de codage. Le taux de transmission virtuel et les représentations des graphs factor fournissent une meilleure compréhension de ces propriétés. Les gains de codage sont évalués à l'aide de simulations numériques, en supposant des canaux de transmission radio statiques et dynamiques, et en utilisant des codes de référence. Enfin, dans le chapitre 4, l'idée breveté du code turbo parallal progressif et hiérarchique (PPHTC) est évaluée sur la plateforme LTE. Une description détaillée de l'architecture des bearers de LTE est donnée, et ses conséquences sont discutées. Le nouveau codage canal est inséré et évalué sur cette plateforme, et ses performances sont comparées avec des schémas de transmission typique à LTE. L'analyse de la qualité de la voix aide à conclure sur l'efficacité de la solution proposée dans un système de transmission réel. Pourtant, même si cette dernière donne les meilleurs résultats, d'avantage d'optimisations devraient être envisagées pour obtenir des gains améliorés et mieux exploiter le potentiel du codage proposé. L'exposé se conclut dans le chapitre 5 et une courte discussion présente les futures perspectives de recherche
APA, Harvard, Vancouver, ISO, and other styles
7

Taylor, Randy Lyle. "Radio networks and the redefinition of local private radio." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0001/MQ37643.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karaminas, Panagiotis D. "Array processing in mobile radio networks." Thesis, Imperial College London, 2001. http://hdl.handle.net/10044/1/11483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Giortzis, Athanasios. "Channel assignment in mobile radio networks." Thesis, Imperial College London, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Toh, Chai-Keong. "Protocol aspects of mobile radio networks." Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/273055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Private mobile radio networks"

1

Narrowband land-mobile radio networks. Boston: Artech House, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Colloquium on Mobile Radio Networks (1988 London). Colloquium on Mobile Radio Networks. London: IEE Electronics Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Handbook of mobile radio networks. Boston: Artech House, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Walke, Bernhard. Mobile radio networks: Networking and protocols. Chichester: John Wiley & Sons, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marriwala, Nikhil, C. C. Tripathi, Shruti Jain, and Dinesh Kumar, eds. Mobile Radio Communications and 5G Networks. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7018-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marriwala, Nikhil, C. C. Tripathi, Dinesh Kumar, and Shruti Jain, eds. Mobile Radio Communications and 5G Networks. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-7130-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, F. Richard, ed. Cognitive Radio Mobile Ad Hoc Networks. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6172-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, F. Richard. Cognitive radio mobile ad hoc networks. Edited by Tang Helen. New York: Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rehmani, Mubashir Husain, and Riadh Dhaou, eds. Cognitive Radio, Mobile Communications and Wireless Networks. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91002-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Walke, Bernhard. Mobile radio networks: Networking, protocols and traffic performance. 2nd ed. West Sussex, UK: Wiley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Private mobile radio networks"

1

Zhou, Chi. "Mobile Radio Communications." In Handbook of Computer Networks, 616–29. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hewitt, M. T. H. "Radio Spectrum for Mobile Networks." In Mobile Systems, 14–35. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4615-6377-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dunlop, John, Demessie Girma, and James Irvine. "The Private Mobile Radio Environment." In Digital Mobile Communications and the Tetra System, 107–28. West Sussex, England: John Wiley & Sons, Ltd., 2013. http://dx.doi.org/10.1002/9781118832585.ch3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Parsons, J. D., and J. G. Gardiner. "Using the radio channel in cellular radio networks." In Mobile Communication Systems, 244–52. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4684-1526-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Benmammar, Badr, and Asma Amraoui. "Wireless and Mobile Networks." In Radio Resource Allocation and Dynamic Spectrum Access, 1–22. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118575116.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hayashi, Tatsuya, Koji Nakano, and Stephan Olariu. "Randomized initialization protocols for packet radio networks." In Mobile Networks and Computing, 221–35. Providence, Rhode Island: American Mathematical Society, 2000. http://dx.doi.org/10.1090/dimacs/052/14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Yaling, Chuan Han, and Bo Gao. "Delay in Cognitive Radio Networks." In Cognitive Radio Mobile Ad Hoc Networks, 249–84. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6172-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eliodorou, Michalis, Tafseer Akhtar, Muhammad Tayyab, and Subin Narayanan. "Radio Resource Management and Access Polices for B5G." In Enabling 6G Mobile Networks, 71–121. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74648-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adigun, Olayinka, Mahdi Pirmoradian, and Christos Politis. "Cognitive Radio for 5G Wireless Networks." In Fundamentals of 5G Mobile Networks, 149–63. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118867464.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ephremides, Anthony. "Distributed Protocols for Mobile Radio Networks." In The Impact of Processing Techniques on Communications, 287–306. Dordrecht: Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5113-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Private mobile radio networks"

1

Ktari, Salma, Stefano Secci, and Damien Lavaux. "Bayesian diagnosis and reliability analysis of Private Mobile Radio networks." In 2017 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2017. http://dx.doi.org/10.1109/iscc.2017.8024695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shin, Seonghan, Mohamed Imine, Hanane Fathi, Kazukuni Kobara, Neeli Prasad, and Hideki Imai. "A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks." In 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2006. http://dx.doi.org/10.1109/pimrc.2006.254066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ailas, M., N. Hakem, and N. Kandil. "Analysis of EM reflections in a undergound mine for the CBRS band of Private mobile networks." In 2022 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting (AP-S/USNC-URSI). IEEE, 2022. http://dx.doi.org/10.1109/ap-s/usnc-ursi47032.2022.9887293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Petrov, Daniel, and Taieb Znati. "Location privacy preserving protocols in database-enabled cognitive radio networks." In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2017. http://dx.doi.org/10.1109/iwcmc.2017.7986277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hylamia, Abdullah, Ambuj Varshney, Andreas Soleiman, Panagiotis Papadimitratos, Christian Rohner, and Thiemo Voigt. "Towards Battery-free Radio Tomographic Imaging." In WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212480.3226107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moser, Daniel, Vincent Lenders, and Srdjan Capkun. "Digital radio signal cancellation attacks." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3319720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khaledi, Mojgan, Mehrad Khaledi, Sneha Kumar Kasera, and Neal Patwari. "Preserving Location Privacy in Radio Networks Using a Stackelberg Game Framework." In MSWiM '16: 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2988272.2988277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Haipeng, Chenggang Wang, Nirnimesh Ghose, and Boyang Wang. "Robust deep-learning-based radio fingerprinting with fine-tuning." In WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3448300.3468253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tucker, Zhanel, and Chutima Boonthum-Denecke. "Security, privacy, and ethical concerns on human radio-frequency identification (RFID) implants." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3317549.3326312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Zhikun, Heng Zhang, Shibo He, and Peng Cheng. "Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks." In 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). IEEE, 2015. http://dx.doi.org/10.1109/mass.2015.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Private mobile radio networks"

1

Pursley, Michael B. Adaptive Transmission Protocols for Mobile Frequency-Hop Radio Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2003. http://dx.doi.org/10.21236/ada416509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

DEFENSE SCIENCE BOARD WASHINGTON DC. Wideband Radio Frequency Modulation: Dynamic Access to Mobile Information Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2003. http://dx.doi.org/10.21236/ada417214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soroushnejad, Mohsen, and Evaggelos Geraniotis. Performance Comparison of Different Spread-Spectrum Signaling Schemes for Cellular Mobile Radio Networks. Fort Belvoir, VA: Defense Technical Information Center, January 1988. http://dx.doi.org/10.21236/ada452365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

DEFENSE SCIENCE BOARD WASHINGTON DC. Report of the Defense Science Board Task Force on Wideband Radio Frequency Modulation: Dynamic Access to Mobile Information Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2003. http://dx.doi.org/10.21236/ada428978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography