IEEE Communications Surveys and Tutorials最新文献

筛选
英文 中文
Multi-Modal Fusion Sensing: A Comprehensive Review of Millimeter-Wave Radar and Its Integration With Other Modalities 多模态融合传感:毫米波雷达及其与其他模式融合的全面回顾
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-08 DOI: 10.1109/COMST.2024.3398004
Shuai Wang;Luoyu Mei;Ruofeng Liu;Wenchao Jiang;Zhimeng Yin;Xianjun Deng;Tian He
{"title":"Multi-Modal Fusion Sensing: A Comprehensive Review of Millimeter-Wave Radar and Its Integration With Other Modalities","authors":"Shuai Wang;Luoyu Mei;Ruofeng Liu;Wenchao Jiang;Zhimeng Yin;Xianjun Deng;Tian He","doi":"10.1109/COMST.2024.3398004","DOIUrl":"10.1109/COMST.2024.3398004","url":null,"abstract":"Millimeter-wave (mmWave) radar, with its high resolution, sensitivity to micro-vibrations, and adaptability to various environmental conditions, holds immense potential across multi-modal fusion sensing. Although there exist review papers on mmWave radar, there is a noticeable lack of comprehensive reviews focusing on its multi-modal fusion sensing capabilities. Addressing this gap, our review offers an extensive exploration of mmWave radar multi-modal fusion sensing, emphasizing its integration with other modalities. This review discusses the complex realm of millimeter-wave radar multi-modal fusion sensing, detailing its importance, hardware and software aspects, principles, and current potential and applications. It delves into data characteristics and datasets associated with mmWave radar, focusing on Doppler, point cloud, and multi-modal data formats. The review highlights how these data types enhance multi-modal fusion sensing and discusses methodologies, including signal processing and learning algorithms. Three categories of multi-modal fusion methodologies are proposed to optimally manage and interpret fused data. Various practical applications of mmWave radar multi-modal fusion sensing are illustrated, underlining the unique capabilities it provides when integrated with other sensors. The review concludes by identifying potential future research avenues, underscoring the immense potential of this field for further exploration and advancement.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"322-352"},"PeriodicalIF":34.4,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140895430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Human Profile Information Inference via Wireless Signals 通过无线信号推断人类特征信息的研究
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-07 DOI: 10.1109/COMST.2024.3373397
Qiuye He;Edwin Yang;Song Fang
{"title":"A Survey on Human Profile Information Inference via Wireless Signals","authors":"Qiuye He;Edwin Yang;Song Fang","doi":"10.1109/COMST.2024.3373397","DOIUrl":"10.1109/COMST.2024.3373397","url":null,"abstract":"Due to the ubiquitous deployment of wireless infrastructures, the radio signal nature of invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing attention in both academia and industry to infer various human-motion related sensitive information, called human profile information (HPI). The basic idea of these techniques is that varying human profiles (i.e., physiological characteristics and motion patterns) may lead to unique and subtle disturbances in environmental wireless signals, which can be then measured and processed to learn HPI. In this survey, we comprehensively review different categories of existing studies based on (1) how they quantize the motion-induced wireless disturbances in concrete wireless measurements; (2) the signal processing techniques for building wireless HPI inference systems; and (3) practical applications that take advantage of inferred HPI. Also, the survey discusses the emerging challenges and future directions on wireless HPI inference.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2577-2610"},"PeriodicalIF":34.4,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140063929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Conservation in Passive Optical Networks: A Tutorial and Survey 无源光网络中的节能:教程与调查
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-07 DOI: 10.1109/COMST.2024.3397690
S. H. Shah Newaz;Ehsan Ahvar;Md. Shamim Ahsan;Joarder Kamruzzaman;Gour Karmakar;Gyu Myoung Lee
{"title":"Energy Conservation in Passive Optical Networks: A Tutorial and Survey","authors":"S. H. Shah Newaz;Ehsan Ahvar;Md. Shamim Ahsan;Joarder Kamruzzaman;Gour Karmakar;Gyu Myoung Lee","doi":"10.1109/COMST.2024.3397690","DOIUrl":"10.1109/COMST.2024.3397690","url":null,"abstract":"The Passive Optical Network (PON) has been evolving continuously in terms of architecture and capacity to keep up with the demand for high-speed Internet access in the access network segment. Recently, integration of Software-Defined Networking (SDN), which provides programmable and (logically) centralized network control, with PON has attracted intensive research interest to further enhance PON performance and reduce operational and capital expenditure. Although PON is regarded as an energy-efficient access network solution, it would be a major contributor for increasing energy consumption in the access network segment because of its higher penetration rate than other access network technologies. Over the past several years, the major standardization bodies like IEEE and ITU-T, and research communities have engaged in introducing energy-efficient PON solutions. This article familiarizes readers with PON evolution in terms of capacity, architecture, and its integration with virtualization and SDN based control. We present a comprehensive survey of the energy conservation research efforts in PON starting from conventional PON to SDN based PON leveraging virtual and physical network functions. This article also presents contemporary energy-efficient standardization activities in IEEE and ITU-T. To the best of our knowledge, to date, this article is the first most comprehensive survey on energy saving research and standardization on PON. We summarize the lessons learned from the recent advancements, identify important challenges ahead and outline several future research directions that can contribute to further advancement of energy-efficient PON.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"667-724"},"PeriodicalIF":34.4,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140890359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Brain-Computer Interface-Inspired Communications: Opportunities and Challenges 脑机接口通信调查:机遇与挑战
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-06 DOI: 10.1109/COMST.2024.3396847
Honglin Hu;Zhenyu Wang;Xi Zhao;Ruxue Li;Ang Li;Yuan Si;Jiaheng Wang;Ting Zhou;Tianheng Xu
{"title":"A Survey on Brain-Computer Interface-Inspired Communications: Opportunities and Challenges","authors":"Honglin Hu;Zhenyu Wang;Xi Zhao;Ruxue Li;Ang Li;Yuan Si;Jiaheng Wang;Ting Zhou;Tianheng Xu","doi":"10.1109/COMST.2024.3396847","DOIUrl":"10.1109/COMST.2024.3396847","url":null,"abstract":"Brain-computer interfaces (BCIs) aim to directly bridge the human brain and the outside world through acquiring and processing the brain signals in real time. In recent two decades, tremendous progress has been made in terms of BCI paradigms and decoding algorithms. The information transfer rate of the BCI systems has been significantly enhanced, and the communication community are considering including the BCI technologies into the 6G networks and beyond. However, some critical problems and challenges remain. To some extent, the BCI systems resemble the wireless communication systems, as brain signals are generated and transmitted by the neurons and received by the sensors, propagating through multiple brain tissues which cause inevitable attenuation and mixing effects. Therefore, by following this idea, a systematic review of the BCI technologies is provided through comparing it with wireless communications. The main challenges of BCI lie in brain channel modelling, modulation, signal processing and detection. The latest and some classic researches are covered. In addition, typical applications of BCIs such as the Quality-of-Experience (QoE) metric and Internet-of-Brains (IoB) are predicted. Then, we present a prospect of BCIs being integrated with future wireless communication systems. Also, the technical challenges regarding communication and computation to fulfill the prospect are discussed, as well as privacy, security and ethical concerns. Therefore, this review aims to comprehensively overview BCI-inspired communication on two levels, the BCI itself being a communication system and future integration of BCI and communication as a whole system.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 1","pages":"108-139"},"PeriodicalIF":34.4,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140845696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects 从 MQTT 协议的角度确保物联网应用层的安全:挑战与研究前景
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-04 DOI: 10.1109/COMST.2024.3372630
Sujitha Lakshminarayana;Amit Praseed;P. Santhi Thilagam
{"title":"Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects","authors":"Sujitha Lakshminarayana;Amit Praseed;P. Santhi Thilagam","doi":"10.1109/COMST.2024.3372630","DOIUrl":"10.1109/COMST.2024.3372630","url":null,"abstract":"The Internet of Things (IoT) is one of the most promising new millennial technologies, having numerous applications in our surrounding environment. The fundamental goal of an IoT system is to ensure effective communication between users and their devices, which is accomplished through the application layer of IoT. For this reason, the security of protocols employed at the IoT application layer are extremely significant. Message Queuing Telemetry Transport (MQTT) is being widely adopted as the application layer protocol for resource-constrained IoT devices. The reason for the widespread usage of the MQTT protocol in IoT devices is its highly appealing features, such as packet-agnostic communication, high scalability, low power consumption, low implementation cost, fast and reliable message delivery. These capabilities of the MQTT protocol make it a potential and viable target for adversaries. Therefore, we initially emphasize on the emerging MQTT vulnerabilities and provide a classification of identified MQTT vulnerabilities for the IoT paradigm. Then, this paper reviews attacks against the MQTT protocol and the corresponding defense mechanisms for MQTT-based IoT deployments. Furthermore, MQTT attacks are categorized and investigated with reference to crucial characteristics that aid in comprehending how these attacks are carried out. The defense mechanisms are discussed in detail, with a particular focus on techniques for identifying vulnerabilities, detecting and preventing attacks against the MQTT protocol. This work also discloses lessons learned by identifying and providing insightful findings, open challenges, and future research directions. Such a discussion is anticipated to propel more research efforts in this burgeoning area and pave a secure path toward expanding and fully realizing the MQTT protocol in IoT technology.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2510-2546"},"PeriodicalIF":34.4,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visible Light Positioning as a Next-Generation Indoor Positioning Technology: A Tutorial 作为新一代室内定位技术的可见光定位:教程
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-01 DOI: 10.1109/COMST.2024.3372153
Sander Bastiaens;Morteza Alijani;Wout Joseph;David Plets
{"title":"Visible Light Positioning as a Next-Generation Indoor Positioning Technology: A Tutorial","authors":"Sander Bastiaens;Morteza Alijani;Wout Joseph;David Plets","doi":"10.1109/COMST.2024.3372153","DOIUrl":"10.1109/COMST.2024.3372153","url":null,"abstract":"Indoor positioning technology has become undisputedly pervasive in modern society. It can be used for numerous applications in various environments, ranging from agriculture to smart industry. Among the different indoor positioning technologies, the development of the indoor visible light positioning (VLP) system has gained momentum recently thanks to its low cost and centimetre-order accuracy. Moreover, VLP is a promising candidate technology for integration with Light Fidelity (Li-Fi), which relies on the optical spectrum to build future wireless networks and plays a significant role in sixth-generation (6G) wireless networks. This tutorial investigates VLP as a novel positioning technology in depth. The inherent characteristics and fundamentals of this technology are extensively described with the components of a VLP system and possible localization approaches being discussed. Furthermore, a mathematical and technical discussion of a simple minimum retrofit of the single photodiode (PD) received signal strength (RSS) VLP systems is provided. Finally, the paper concludes with open challenges and a future roadmap for VLP.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2867-2913"},"PeriodicalIF":34.4,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10457033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Slicing-Based Learning Techniques for IoV in 5G and Beyond Networks 基于网络切片的学习技术,用于 5G 及其他网络中的物联网
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-01 DOI: 10.1109/COMST.2024.3372083
Wafa Hamdi;Chahrazed Ksouri;Hasan Bulut;Mohamed Mosbah
{"title":"Network Slicing-Based Learning Techniques for IoV in 5G and Beyond Networks","authors":"Wafa Hamdi;Chahrazed Ksouri;Hasan Bulut;Mohamed Mosbah","doi":"10.1109/COMST.2024.3372083","DOIUrl":"10.1109/COMST.2024.3372083","url":null,"abstract":"The effects of transport development on people’s lives are diverse, ranging from economy to tourism, health care, etc. Great progress has been made in this area, which has led to the emergence of the Internet of Vehicles (IoV) concept. The main objective of this concept is to offer a safer and more comfortable travel experience through making available a vast array of applications, by relying on a range of communication technologies including the fifth-generation mobile networks. The proposed applications have personalized Quality of Service (QoS) requirements, which raise new challenging issues for the management and allocation of resources. Currently, this interest has been doubled with the start of the discussion of the sixth-generation mobile networks. In this context, Network Slicing (NS) was presented as one of the key technologies in the 5G architecture to address these challenges. In this article, we try to bring together the effects of NS implications in the Internet of Vehicles field and show the impact on transport development. We begin by reviewing the state of the art of NS in IoV in terms of architecture, types, life cycle, enabling technologies, network parts, and evolution within cellular networks. Then, we discuss the benefits brought by the use of NS in such a dynamic environment, along with the technical challenges. Moreover, we provide a comprehensive review of NS deploying various aspects of Learning Techniques for the Internet of Vehicles. Afterwards, we present Network Slicing utilization in different IoV application scenarios through different domains; terrestrial, aerial, and marine. In addition, we review Vehicle-to-Everything (V2X) datasets as well as existing implementation tools; besides presenting a concise summary of the Network Slicing-related projects that have an impact on IoV. Finally, in order to promote the deployment of Network Slicing in IoV, we provide some directions for future research work. We believe that the survey will be useful for researchers from academia and industry. First, to acquire a holistic vision regarding IoV-based NS realization and identify the challenges hindering it. Second, to understand the progression of IoV powered NS applications in the different fields (terrestrial, aerial, and marine). Finally, to determine the opportunities for using Machine Learning Techniques (MLT), in order to propose their own solutions to foster NS-IoV integration.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1989-2047"},"PeriodicalIF":34.4,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Intelligence Algorithms for UAV Swarm Networking and Collaboration: A Comprehensive Survey and Future Directions 无人机群联网与协作的计算智能算法:全面调查与未来方向
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-03-01 DOI: 10.1109/COMST.2024.3395358
Pan Cao;Lei Lei;Shengsuo Cai;Gaoqing Shen;Xiaojiao Liu;Xinyi Wang;Lijuan Zhang;Liang Zhou;Mohsen Guizani
{"title":"Computational Intelligence Algorithms for UAV Swarm Networking and Collaboration: A Comprehensive Survey and Future Directions","authors":"Pan Cao;Lei Lei;Shengsuo Cai;Gaoqing Shen;Xiaojiao Liu;Xinyi Wang;Lijuan Zhang;Liang Zhou;Mohsen Guizani","doi":"10.1109/COMST.2024.3395358","DOIUrl":"10.1109/COMST.2024.3395358","url":null,"abstract":"Unmanned aerial vehicle (UAV) swarm networking and collaboration have significant prospects in both civilian and military applications, due to its remarkable properties in cooperative efficiency, reduced risks, and operational cost. Traditional algorithms have challenging issues of high computational complexity and low efficiency in UAV swarm networking and collaboration, while computational intelligence (CI) has attracted increasing attention since it has advantages in solving complex optimization problems. The networking of UAV swarms serves as an essential foundation for collaboration, and intelligent collaboration is a crucial means of enhancing the performance of UAV swarm systems. To date, extensive CI-based algorithms have been proposed to improve the networking and collaboration capabilities of UAV swarms, and several relevant surveys have also been presented. However, existing surveys either review networking or collaboration. To the best of our knowledge, there is no survey that simultaneously concentrates on CI-based UAV swarm networking and collaboration. In this survey, we provide a comprehensive overview of CI-based networking and collaboration algorithms from six typical aspects including channel access, network routing, cooperative task assignment, cooperative path planning, cooperative search, and cooperative jamming. More importantly, to help researchers choose appropriate algorithms to satisfy the requirements of different missions, we classify CI-based algorithms into four categories, namely heuristic behavior search-based algorithms, policy design-based algorithms, policy learning-based algorithms, and hybrid algorithms. Finally, we discuss open issues and future directions that may influence future research on UAV swarm intelligence networking and collaboration. This review may provide new insights and valuable references for researchers in this field.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 4","pages":"2684-2728"},"PeriodicalIF":34.4,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140819336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle as a Service (VaaS): Leverage Vehicles to Build Service Networks and Capabilities for Smart Cities 车辆即服务(VaaS):利用车辆为智慧城市构建服务网络和能力
IF 34.4 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-27 DOI: 10.1109/COMST.2024.3370169
Xianhao Chen;Yiqin Deng;Haichuan Ding;Guanqiao Qu;Haixia Zhang;Pan Li;Yuguang Fang
{"title":"Vehicle as a Service (VaaS): Leverage Vehicles to Build Service Networks and Capabilities for Smart Cities","authors":"Xianhao Chen;Yiqin Deng;Haichuan Ding;Guanqiao Qu;Haixia Zhang;Pan Li;Yuguang Fang","doi":"10.1109/COMST.2024.3370169","DOIUrl":"10.1109/COMST.2024.3370169","url":null,"abstract":"Smart cities demand resources for rich immersive sensing, ubiquitous communications, powerful computing, large storage, and high intelligence (SCCSI) to support various kinds of applications, such as public safety, connected and autonomous driving, smart and connected health, and smart living. At the same time, vehicles equipped with significantly powerful SCCSI capabilities are expected to become ubiquitous in future smart cities. By observing the convergence of these two trends, this article advocates the use of vehicles to build a cost-effective service network, where SCCSI-empowered vehicles form a web of mobile sensors, a grid of mobile servers, a network of mobile routers, a fleet of mobile storage, and a set of AI toolboxes, to provide SCCSI services in smart cities. This paradigm is called Vehicle as a Service (VaaS). Towards this goal, this article first examines the potential use cases in smart cities and possible upgrades required for the transition from traditional vehicular ad hoc networks (VANETs) to VaaS. Then, the system architecture and use cases of the VaaS paradigm are comprehensively elaborated. Finally, the open problems of this paradigm and future research directions, including architectural design, service provisioning, incentive design, and security & privacy, are identified. This position paper is expected to pave the way towards developing a cost-effective and sustainable approach for smart cities and offer a complementary alternative for 5G and beyond.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"2048-2081"},"PeriodicalIF":34.4,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139988167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial First Quarter 2024 IEEE Communications Surveys and Tutorials 编辑 2024 年第一季度《IEEE 通信概览与教程
IF 35.6 1区 计算机科学
IEEE Communications Surveys and Tutorials Pub Date : 2024-02-26 DOI: 10.1109/COMST.2024.3356268
Dusit Niyato
{"title":"Editorial First Quarter 2024 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2024.3356268","DOIUrl":"https://doi.org/10.1109/COMST.2024.3356268","url":null,"abstract":"I welcome you to the first issue of the IEEE Communications Surveys and Tutorials in 2024. This issue includes 18 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Vehicular and Sensor Communications”, “Internet Technologies”, “Network Virtualization” and “Network and Service Management and Green Communications”. A brief account for each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 1","pages":"i-vi"},"PeriodicalIF":35.6,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10445398","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139976293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信