Academia.eduAcademia.edu

Telecommunication Systems

description2,754 papers
group559 followers
lightbulbAbout this topic
Telecommunication systems refer to the integrated technologies and infrastructures that enable the transmission, reception, and processing of information over distances through various mediums, including wired and wireless channels. These systems encompass hardware, software, protocols, and services that facilitate communication across diverse platforms and devices.
lightbulbAbout this topic
Telecommunication systems refer to the integrated technologies and infrastructures that enable the transmission, reception, and processing of information over distances through various mediums, including wired and wireless channels. These systems encompass hardware, software, protocols, and services that facilitate communication across diverse platforms and devices.

Key research themes

1. How can telecommunications infrastructure frameworks address rural-urban disparities in access and socio-economic development?

This theme investigates the development of structured frameworks combining telecommunications network indicators with socioeconomic metrics to guide infrastructure deployment for equitable access. It matters because bridging the digital divide influences economic growth, social inclusion, and technological advancement, especially in developing countries with significant rural-urban disparities.

Key finding: The paper proposes a novel framework that categorizes Indonesian districts into four grids (fostered, developing, developed, independent-advanced) using 17 indicators spanning telecommunications infrastructure elements and... Read more

2. How do programmable data planes and advanced hardware improve the speed and reliability of link failure detection and recovery in communication networks?

This theme addresses innovations in network hardware architecture, particularly Programmable Data Planes (PDP) with P4 programming, that enable ultrafast reaction times to link failures at the microsecond scale. This is vital for carrier-grade networks requiring near-zero packet loss and delay in failure recovery, thus enhancing overall communication reliability and supporting stringent service requirements.

Key finding: The study experimentally measures link failure reaction times on Intel Tofino P4-programmable switches, demonstrating average reaction times of approximately 472.88 microseconds. This rapid hardware-level responsiveness... Read more

All papers in Telecommunication Systems

Today, cyber deception is an essential element of proactive and reactive defense systems. Military equipment is increasingly connected to the Internet, and next-generation network security is becoming increasingly complex. This vast... more
Today, cyber deception is an essential element of proactive and reactive defense systems. Military equipment is increasingly connected to the Internet, and next-generation network security is becoming increasingly complex. This vast... more
We carried out modeling and simulation of the noise properties associated with types of modal oscillations induced by scaling the asymmetric gain suppression (AGS) in multimode semiconductor lasers. The study is based on numerical... more
This paper introduces analysis ofmode dynamics in multiple-quantum well (MQW) laser as a promising device for high-speed photonics. The study is based on a multimode model of semiconductor laser under direct intensity modulation. The... more
This paper introduces a theoretical study on the influence of intermodal asymmetric gain suppression (AGS) on dynamics and output of multimode semiconductor lasers. The study includes comprehensive and intensive simulations of the... more
We consider the joint carrier frequency offset (CFO) and channel estimation for OFDM systems. A novel frequency offset estimator is derived based on maximum likelihood principles by using the pilot symbols embedded in each OFDM symbol. An... more
Quality of Experience (QoE) is a metric that quantifies the quality experienced while using a service. This is a subjective metric that is crucial for determining the level of satisfaction with the quality of services, such as multimedia... more
We investigate the problem o f designing reconfigurable embedding schemes for a fixed hypercube (without redundant processors and links). The fundamental idea for these schemes is to embed a basic network on the hypercube without fully... more
In this paper, an expression for the channel capacity (CC) of the combined L-branch (SC) selection receiver is derived in the presence of Rayleigh small fading and co-channel interference (CCI) also by Rayleigh distribution. Rayleigh... more
In today’s competitive market, the customer retention represents one of the focal concern for telecommunications companies. The telecommunications sector can be considered on the top of the list with an annual churn rate of approximately... more
Relaying is a promising enhancement to current radio access networks. Relay enhanced LTE-Advanced networks are expected to fulfill the demanding coverage and capacity requirements in a cost-efficient way. However, due to low transmit... more
Software Defined Network (SDN) is a developing innovation which actualizes the decoupling of the control plane from the system components, for example, switches or switches and keeps just the information plane with them. This separation... more
Internet radio broadcasting emerged as a dynamic media that enables the delivery of audio content through various devices and network conditions. This paper investigates the technical foundations of Internet radio, focusing on the... more
This paper addresses the problem of capacity pro- visioning in a QoS enabled IP network, subject to satisfying varying performance requirements for different traffic classes. These performance requirements are viewed in terms of mean... more
Mobile ad hoc networks typically use a common transmission power approach for the discovery of routes and the transmission of data packets. In this paper we present PCQoS; a power-controlled Quality of Service (QoS) scheme for wireless ad... more
Traditional data acquisition methods for wireless sensor networks (WSNs) require all sensor nodes to transmit at least once to the sink node to obtain a full view of the network. In this paper we present Disagree, a different data... more
New paradigms are being proposed to cope with the increasing traffic demand in the access networks. One alternative is to leverage cost-efficient VCSEL-based Sliceable Bandwidth Variable Transceivers (S-BVTs) near the edge. In this work,... more
Wireless communications are radically changing the way we communicate and live. While wireless communications for, e.g., computers communications and cellular telephony are a commodity nowadays, another important paradigm (an extension of... more
The network field has been very popular in recent times and has aroused much of the attention of researchers. The network must keep working with the varying infrastructure and must adapt to rapid topology changes. Graphical representation... more
Full bibliographic details must be given when referring to, or quoting from full items including the author's name, the title of the work, publication details where relevant (place, publisher, date), pagination, and for theses or... more
Researchers are directing enormous efforts to achieve the aim of global mobility by enhancing the standard mobile IP with various routing schemes focusing on best routes and least cost while ignoring the facts of the organizations usual... more
The Internet Exchange Point (IXP), an Ethernet fabric central to the structure of the global Internet, is largely absent from community-driven collaborative network infrastructure. IXPs exist in central, typically urban, environments... more
Modern communication systems adopt the principle of wireless communication as a basic choice in life in the city and nearby offices. Systems are often expensive and monopolized by governments and regimes, so many researchers around the... more
In this paper, we propose a novel evolutionary algorithm called Genetic Algorithm with Asexual Reproduction (GAwAR) to solve Maximum Lifetime Coverage (MLC) Problem in Wireless Sensor Networks (WSN). We use for GAwAR a binary coding of... more
This paper deals with optical packet switching in a full-IP transport network scenario. Given the technological limits of accomplishing packet buffering in the optical domain, deflection routing is here explored as an alternative... more
Inter-Autonomous System (AS) links represent nowadays the real bottleneck of the Internet. Internet carriers may coordinate to efficiently balance the load, but the current practice is often based on an uncoordinated selfish routing.... more
a n 802.16 network environment can be provided. Mobility management and handoff schemes as well as the associated cache structure for 802.16 middle-domain are presented in the paper.
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data... more
Wireless body area networks (WBANs) have seen an increase in popularity in recent years. Electromagnetic waves created by the body have the capacity to connect nodes all over the epidermis and throughout the body. If the gadget does not... more
Vehicular Ad-hoc NETworks (VANETs) is a special form of Mobile Ad-hoc NETworks (MANETs). The continuous developments in wireless networks have paved the way for the adoption of wireless data exchange for onroad vehicles. The application... more
Cloud computing is an emerging market place in which computing resources are treated as the utilities and priced for their usage. A huge competition prevails among the cloud Service Providers (SPs) to offer eco-friendly and economically... more
Prior laboratory studies have shown that PhishGuru, an embedded training system, is an effective way to teach users to identify phishing scams. PhishGuru users are sent simulated phishing attacks and trained after they fall for the... more
There exist a lot of methods for vision through an opaque medium. At present UWB (Ultra-Wideband) technology is used more and more because it is suitable for localization and detection of a human body behind a wall. First of all this... more
In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, the main threats, vulnerabilities, the possible types of attacks and the security issues that are associated with computer systems. Our main... more
Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis... more
A VANET is type of MANET that allows vehicles to communicate with roadside equipment. The vehicles may not have a direct Internet connection the wireless roadside equipment may be connected to the Internet that allows data from the... more
An optimal cooperation strategy, decode-tocooperate, is proposed and investigated for performance improvements in dual-hop wireless relay networks. Based on decode-and-forward (DF) strategy with multiple relay selection, we design a novel... more
Effective emergency management of a disaster at a single point of failure is vital if the effects of the disaster are to be mitigated. The immediate impacts of a disaster highlight stakeholder perspectives. There is no one-size-fits-all... more
A new optically controlled reconfigurable antenna for cognitive radio is presented. The antenna can operate at an ultra-wideband and three narrow bands by controlling four photoconductive switches. The bandwidth of the ultra-wideband is... more
The behavior of IP based network traffic has been the subject of several works. In this paper we compare two modeling approaches and their ability to capture two basic traffic features: packet size distribution and interarrival times.... more
Law on Electronic Communications and its additional rules should provide conditions for Internet access and using the Internet services, by the principles of transparency and non discrimination, and these conditions determines the... more
A novel framework for the analysis and optimization of cognitive wireless networks with unslotted time operations and reactive primary users is proposed. In the considered network setting, primary users' channel access is regulated by a... more
In this paper we compare two traffic models based on Markov modulated Poisson processes (MMPPs), that were designed to capture self-similar behavior over multiple time scales. These models are both constructed by fitting the distribution... more
For reducing the energy consumption of the Mobile Station in mobile Broadband Wireless Access networks, IEEE 802.16 offers three kinds of sleep mode operations called power saving classes type I, type II and type III. In order to... more
An ultra-wideband planar four-element multiple-input multiple-output (MIMO) antenna array for millimeter wave (mmWave) 5G applications is presented in this article, characterized by a simple structure and diverse performance capabilities.... more
Most work on Differentiated Services (DiffServ) handles Quality of Service (QoS) provisioning on a per node basis, which assumes that this strategy would provide QoS in the entire domain. Nevertheless, this approach could fail in large... more
The authors report measurement of the radio-frequency (RF) transport electromagnetic properties of chemical vapour deposition graphene over the direct current (DC) to 110 MHz frequency range at room temperature. Graphene on Si/SiO 2... more
We report on the challenges faced in the implementation and simulation of a side-channel communication based on frames with an intentionally corrupted Frame Check Sequence (FCS). Systematically corrupted FCSs can be used to enable covert... more
Download research papers for free!