Applied Sciences,
Journal Year:
2024,
Volume and Issue:
14(22), P. 10395 - 10395
Published: Nov. 12, 2024
This
paper
explores
6G
technology
for
indoor
positioning,
focusing
on
accuracy
and
reliability
using
convolutional
neural
networks
(CNN)
with
channel
state
information
(CSI).
Indoor
positioning
is
critical
smart
applications
the
Internet
of
Things
(IoT).
expected
to
significantly
enhance
performance
through
use
higher
frequency
bands,
such
as
terahertz
frequencies
wider
bandwidth.
Preliminary
results
show
that
6G-based
systems
are
achieve
centimeter-level
due
integration
advanced
artificial
intelligence
algorithms
frequencies.
In
addition,
this
also
investigates
impact
self-attention
(SA)
attention
(CA)
mechanisms
systems.
The
combination
these
conventional
CNNs
has
been
proposed
further
improve
robustness
localization
CNN
SA
demonstrates
a
50%
reduction
in
RMSE
compared
by
capturing
spatial
dependencies
more
effectively.
International Journal of Applied Research in Social Sciences,
Journal Year:
2024,
Volume and Issue:
6(3), P. 254 - 266
Published: March 8, 2024
Cybersecurity
is
a
critical
concern
in
satellite
telecommunications
networks,
given
their
vulnerability
to
cyber
threats.
This
abstract
presents
conceptual
development
of
current
trends,
challenges,
and
strategic
responses
using
cybersecurity
analytics
protect
these
networks.
The
paper
discusses
the
increasing
reliance
on
telecommunications,
making
them
attractive
targets
for
attacks.
It
explores
role
detecting
mitigating
threats,
highlighting
importance
proactive
monitoring
threat
intelligence.
Challenges
networks
are
identified,
including
complexity
systems,
limited
visibility
into
network
traffic,
evolving
nature
such
as
use
advanced
techniques,
machine
learning,
artificial
intelligence
enhance
detection
response
capabilities.
Key
trends
examined,
growing
adoption
cloud-based
security
solutions,
rise
insider
need
collaboration
between
operators
experts.
also
regulatory
compliance
industry
standards
ensuring
In
conclusion,
emphasizes
protecting
recommends
approach
that
includes
continuous
monitoring,
sharing,
with
experts.
Keywords:
Cybersecurity,
Analytics,
Satellite,
Telecommunications,
Conceptual
Development.
IEEE Transactions on Intelligent Transportation Systems,
Journal Year:
2024,
Volume and Issue:
25(9), P. 10564 - 10580
Published: Feb. 19, 2024
With
the
emergence
of
communication
services
with
stringent
requirements
such
as
autonomous
driving
or
on-flight
Internet,
sixth-generation
(6G)
wireless
network
is
envisaged
to
become
an
enabling
technology
for
future
transportation
systems.
In
this
paper,
two
ways
interactions
between
6G
networks
and
are
extensively
investigated.
On
one
hand,
new
usage
scenarios
capabilities
over
existing
cellular
firstly
highlighted.
Then,
its
potential
in
seamless
ubiquitous
connectivity
across
heterogeneous
space-air-ground
systems
demonstrated,
where
railways,
airplanes,
high-altitude
platforms
satellites
other
we
reveal
that
introduction
guarantees
a
more
intelligent,
efficient
secure
system.
Specifically,
technical
analysis
on
how
can
empower
provided,
based
latest
research
standardization
progresses
localization,
integrated
sensing
communications,
security.
The
challenges
insights
road
ahead
also
summarized
possible
inspirations
enabled
advanced
transportation.
Sustainability,
Journal Year:
2024,
Volume and Issue:
16(16), P. 7039 - 7039
Published: Aug. 16, 2024
The
deployment
of
fifth-generation
(5G)
wireless
networks
has
already
laid
the
ground-work
for
futuristic
smart
cities
but
along
with
this,
it
also
triggered
rapid
growth
a
wide
range
applications,
example,
Internet
Everything
(IoE),
online
gaming,
extended/virtual
reality
(XR/VR),
telemedicine,
cloud
computing,
and
others,
which
require
ultra-low
latency,
ubiquitous
coverage,
higher
data
rates,
extreme
device
density,
ultra-high
capacity,
energy
efficiency,
better
reliability.
Moreover,
predicted
explosive
surge
in
mobile
traffic
until
2030
envisioned
potential
use-cases/scenarios
city
context
will
far
exceed
capabilities
5G
was
designed.
Therefore,
there
is
need
to
harness
6th
Generation
(6G)
capabilities,
not
only
meet
stringent
requirements
megacities
can
open
up
new
applications.
Other
crucial
concerns
that
be
addressed
are
related
network
security,
privacy,
interoperability,
digital
divide,
other
integration
issues.
In
this
article,
we
examine
current
emerging
trends
implementation
6G
arena.
Firstly,
give
an
inclusive
comprehensive
review
communication
technologies
find
use
cities.
discussion
each
technology
covers
its
benefits,
challenges
future
research
direction.
Secondly,
explore
promising
applications
these
technologies,
such
as,
grids,
healthcare,
waste
management,
etc.
conclusion
part,
have
highlighted
suggestions
possible
directions.
So,
single
paper,
attempted
provide
wider
perspective
on
6G-enabled
by
including
both
their
This
paper
help
readers
gain
holistic
view
ascertain
opportunities
bring
diverse,
massive
Journal of Economy and Technology,
Journal Year:
2024,
Volume and Issue:
2, P. 190 - 199
Published: June 1, 2024
Quantum
computing
is
a
new
paradigm
that
will
revolutionize
various
areas
of
computing,
especially
cloud
computing.
still
in
its
infancy,
costly
technology
can
operate
highly
isolated
environments
because
rapid
response
to
environmental
factors.
This
makes
quantum
challenging
for
researchers
access.
These
problems
be
solved
by
integrating
into
an
remote
server,
such
as
cloud,
and
making
it
available
users.
Furthermore,
experts
predict
with
ability
swiftly
resolve
complex
computationally
intensive
operations,
offer
significant
benefits
systems
process
large
amounts
data,
like
article
presents
the
vision
challenges
emerge
integration
Next,
we
present
advantages
over
classical
applications.
We
analyze
effects
on
systems,
cost,
security,
scalability.
Besides
all
these
advantages,
highlight
research
gaps
qubit
stability
efficient
resource
allocation.
identifies
future
research,
highlighting
gaps.
IET Quantum Communication,
Journal Year:
2024,
Volume and Issue:
unknown
Published: March 19, 2024
Abstract
Entanglement‐assisted
quantum
key
distribution
(QKD)
has
attracted
significant
attention
for
its
ability
to
provide
highly
secure
wireless
systems.
This
work
explores
the
employment
of
teleportation
and
Fourier
transform
(QFT)
in
entanglement‐assisted
QKD
enhance
security.
By
integrating
concepts
entanglement,
teleportation,
QFT,
strategy
is
significantly
improved,
leading
more
communication.
The
system
been
thoroughly
tested
bit
error
rate,
reconciliation
efficiency.
results
show
that
this
technique
outperforms
standard
BB84
protocol.
Based
on
their
simulations,
protocol
appears
be
a
promising
providing
quantum‐level
security
next‐generation
communication
IET Quantum Communication,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Jan. 13, 2024
Abstract
Quantum
key
distribution
(QKD)
is
one
of
the
major
applications
quantum
information
technology.
It
can
provide
ultra‐secure
with
security
guaranteed
by
laws
physics.
necessary
to
protect
data
transmission
from
computing
attacks
in
future
communication
networks.
The
mechanics
dictate
that
as
opposed
microwave
frequencies,
coherence
preserved
at
room
temperatures
for
terahertz
(THz)
frequencies.
This
makes
THz
band
a
promising
solution
room‐temperature
QKD
implementation
wireless
authors
present
principles
continuous
variable
(CV‐QKD)
systems
and
review
latest
developments
design
analysis
CV‐QKD
operating
also
discuss
how
multiple‐input
multiple‐output
be
incorporated
into
communications
framework
improve
secret
rates
increase
coverage
distances
system.
Furthermore,
hardware
challenges
must
surmounted
practically
realise
are
highlighted.
Advances in marketing, customer relationship management, and e-services book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 191 - 238
Published: Dec. 27, 2024
This
article
explores
the
transformative
role
of
Artificial
Intelligence
(AI)
in
urban
development,
focusing
on
Dubai
as
a
pioneering
smart
city
at
epicenter
global
technological
trends.
Through
comprehensive
case
study,
this
research
investigates
Dubai's
integration
AI
within
its
socio-economic
and
infrastructural
frameworks,
illustrating
evolution
from
regional
hub
to
leader
innovations.
The
study
highlights
multifaceted
applications
public
services,
transportation,
healthcare,
environmental
management,
demonstrating
how
these
initiatives
enhance
functionality
set
new
standards
for
development.
findings
offer
insights
into
strategic
implementation
AI,
showcasing
approach
model
future
cities
providing
framework
that
blends
advancements
with
sustainable
planning.
Journal of Machine and Computing,
Journal Year:
2025,
Volume and Issue:
unknown, P. 496 - 508
Published: Jan. 3, 2025
Advanced
connection
and
autonomous
features
are
being
made
possible
by
the
Internet
of
Vehicles
(IoV),
which
is
causing
a
revolution
in
transportation.
Strong
security
measures
required,
however,
because
prevalence
connected
devices
also
increases
likelihood
cyberattacks
data
breaches.
This
study
introduces
new
method
for
protecting
IoV
networks,
combines
Blockchain
technology
with
Quantum
Key
Distribution
(QKD),
creating
architecture
two
layers.
(IoV)
technologies
enable
driving
real-time
exchange
connecting
vehicles
to
infrastructure
one
another.
These
advancements
make
things
safer
more
efficient,
but
they
put
sensitive
information
at
risk
cyberattacks.
Modern
essential
since
traditional
encryption
methods
becoming
insecure.
To
provide
that
theoretically
unbreakable,
suggested
system
uses
QKD
create
distribute
cryptographic
keys
based
on
principles
quantum
mechanics.
improve
trust
transparency,
blockchain
used
record
these
any
subsequent
transactions
an
immutable,
distributed
ledger.
A
hybrid
architecture,
securing
key
ensuring
integrity
authenticity
communication,
designed
as
part
integration
process.
Improved
speed
have
been
shown
simulations
prototype
implementations
QKD-Blockchain
networks.
By
preventing
eavesdropping
interception,
technique
kept
communication
channel
secure.
With
average
delay
only
about
2
milliseconds,
performed
admirably
was
well
below
permitted
range
vehicular
communications.
On
average,
validation
durations
were
5
little
overhead
due
integration.
The
efficiently
handled
up
10,000
per
second
without
affecting
or
performance,
proving
it
can
serve
massive
according
scalability
testing.
Under
high-load
scenarios,
framework
maintained
consistent
performance
security,
its
robustness
stress
tests.
Together,
scalable
trustworthy
option
future
results
show
how
feasible
robust
use
them
protect
systems.
An
intriguing
approach
issues
plaguing
systems
technology.
unparalleled
level
protection
against
cyber
threats
provided
dual-layered
system,
guarantees
strong
integrity.
fresh
may
lead
improved
networks
establishing
benchmarks
secure
communication.
In
order
optimize
implementation
tackle
arise,
research
development
should
be
conducted.