Special lssues
Table of Content

Intelligent Technologies and Applications for Future Wireless Communications

Submission Deadline: 01 August 2023 (closed)

Guest Editors

Dr. Savarimuthu Robinson, Mount Zion College of Engineering and Technology, India.
Dr. Dorota Mozyrska, Bialystok University of Technology, Poland.
Prof. Yunjian Jia, Chongqing University, Chongqing, China.

Summary

For future wireless communications, the demands for intelligent terminals and related applications, such as smart cities, smart transportation, virtual reality and augmented reality are growing rapidly. According to the diverse demands, 5G networks have become inadequate and 6G networks are coming into our sight. However, efficiently exploring the resources still plays a significant role in the exploration and utilization of future 6G networks.

On the basis of 5G networks, 6G networks would leapfrog the Internet of people and things to the Internet of everything, it is an advanced mobile communication system. Like a huge distributed neural network, 6G integrates communication, perception, computing and other capabilities, deeply integrating the physical place, the biological place as well as the digital place, truly opening a new era of Internet of everything. More specifically, resource management for spectrum, energy, power, latency etc, as an emerging paradigm, would be considered as one of the key enabling technologies for future networks.

The increasing number of mobile users brings great pressures on limited sensing, communication, computing and caching (SCC&C) resources. By considering the shortage of network resources, realizing efficient intelligent resource management (ISM) is very important to the development and utilization of 6G networks. Moreover, ISL would unleash the full potential of SCC&C with the capability of various methods, such as AI algorithm, game theory, matching theory and optimization algorithm. Therefore, how to implement intelligent resource management to meet the requirements of SCC&C for mobile devices is very challenging. This special issue aims to collect contributions on intelligent resource management in wireless 6G networks from a variety of perspectives, including fundamental theoretical, algorithm design and analytical as well as practical considerations. We solicit original papers of high quality on topics including, but not limited to:

- Resource management methods in symbiotic radio networks

- Optimization, matching, and novel game methods for cognitive radio networks

- Novel methods for be-forming design in reconfigurable intelligent surface (RIS) networks

- AI algorithms for integrated sensing and communication ISAC)

- Network resource allocation methods for Terahertz networks

- Resource management in communication, computing and integrated 6G networks

- Advances in medium access control technique for 6G networks

- Algorithms of designing OTFS waveform

- OTFS modulation in next wireless frontier


Keywords

Wireless Communications, symbiotic radio networks, reconfigurable intelligent surface (RIS) networks, integrated 6G networks, OTFS waveform

Published Papers


  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran
    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534
    (This article belongs to this Special Issue: Intelligent Technologies and Applications for Future Wireless Communications)
    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles

    Halah Hasan Mahmoud, Marwan Kadhim Mohammed Al-Shammari, Gehad Abdullah Amran, Elsayed Tag eldin, Ala R. Alareqi, Nivin A. Ghamry, Ehaa ALnajjar, Esmail Almosharea
    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 573-589, 2023, DOI:10.32604/cmc.2023.039363
    (This article belongs to this Special Issue: Intelligent Technologies and Applications for Future Wireless Communications)
    Abstract Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol… More >

Share Link