2018
DOI: 10.1109/access.2018.2818790
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Collaborative Charging Algorithm for Mobile Power Distribution in 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 41 publications
(28 citation statements)
references
References 34 publications
0
28
0
Order By: Relevance
“…Furthermore, due to the strict layering principles, MPTCP-LM 3 can only use the networking parameters at the transport layer to estimate each path's transmission quality and thereby make a "best-effort" transmission behavior. Considering the fact that variations of the wireless channel, such as channel fading and co-channel interference, are the extremely influencing factors in the wireless transmission, our future work will be devoted to the optimization of our MPTCP-LM 3 solution by jointly considering the cross-layer design and "smart collaborative networking" method [36][37][38][39]. Then, a comprehensive wireless network environment including many and promising wireless technologies (i.e., Bluetooth, LoRaWAN, SigFox, etc.)…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, due to the strict layering principles, MPTCP-LM 3 can only use the networking parameters at the transport layer to estimate each path's transmission quality and thereby make a "best-effort" transmission behavior. Considering the fact that variations of the wireless channel, such as channel fading and co-channel interference, are the extremely influencing factors in the wireless transmission, our future work will be devoted to the optimization of our MPTCP-LM 3 solution by jointly considering the cross-layer design and "smart collaborative networking" method [36][37][38][39]. Then, a comprehensive wireless network environment including many and promising wireless technologies (i.e., Bluetooth, LoRaWAN, SigFox, etc.)…”
Section: Discussionmentioning
confidence: 99%
“…Next, the moving vectors of the smartphone and the vehicle will be calculated to see if they will have a collision. If the two carriers collide, the time required for the pedestrian and the vehicle to reach the intersection will be measured [14]. If the absolute time difference is lower than the safety intersection time threshold and the pedestrian crossing time is lower than the safety reaction time threshold, it is assumed that the pedestrian is at risk of being run over.…”
Section: Pedestrian Safety Applicationmentioning
confidence: 99%
“…Fortunately, smartphones are becoming increasingly present and intelligent in people's daily lives [14,15]. It is also true that particular applications have been developed to provide proper alarms for pedestrians by using vehicle-to-pedestrian (V2P) communications [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…Opportunities in transportation IoT are investigated to propose high-speed mobile network for railway [8] [9]. Researchers dedicated to ubiquitous power IoT are more concerned about the accurate positioning [10], billing issues [11] and deployment optimization [12]. Moreover, secure IoT includes attack defense [13], authentication [14] and data privacy are discussed via different perspectives.…”
Section: Introductionmentioning
confidence: 99%