Advances in technology are not only changing the world around us but also driving the wireless industry to develop the next generation of network technology. There is a lot of buzz building over the advent of 5G that will facilitate the entire planet through continuous and ubiquitous communication connecting anybody to anything, anywhere, anytime, and anyhow regardless of the device, service, network, or geographical existence. 5G will also prove to be a paradigm shift including high carrier frequencies with massive bandwidths, having a large number of antennas, and with an extreme base station and device densities. In this paper, we investigate the potential beneficiaries of 5G and identify the use-cases, where 5G can make an impact. In particular, we consider three main use-cases: vehicle-to-everything (V2X) communication, drones, and healthcare. We explore and highlight the problems and deficiencies of current cellular technologies with respect to these use-cases and identify how 5G will overcome those deficiencies. We also identified the open research problems and provide possible future directions to cope with those issues. 5G, V2X communication, drones, healthcare, ultra-low-latency, ultra-high-reliability.
INDEX TERMS
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.
Abstract-In recent years, Unmanned Aerial Vehicles (UAVs) have attracted the attention of both the military and civilians because of their deployment in situations where part of the communication infrastructure is destroyed due to bomb blast, earthquake, flood, military operations or landslides. Also UAVs can be used in operations such as search and rescue, surveillance, forest fire monitoring, and border patrolling. Deployment of a UAV in a position where it can provide maximum coverage and high throughput is one of the vital problem that needs to be addressed. In this paper, we have proposed an optimal UAV deployment algorithm (OUDA) in order to bridge communication between two static nodes on the ground. In the proposed algorithm the UAV deploys to a position where it can provide the best communication facilities to both the nodes based on the received signal strength (RSS), and distance between nodes and UAV. Simulation results showed that the algorithm provides maximum throughput and low bit error rate (BER) once the UAV is fixed to an optimal position.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.