Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (212)

Search Parameters:
Keywords = FiWi access network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
12 pages, 1445 KiB  
Article
Does Electromagnetic Pollution in the ART Laboratory Affect Sperm Quality? A Cross-Sectional Observational Study
by Giorgio Maria Baldini, Dario Lot, Daniele Ferri, Luigi Montano, Mario Valerio Tartagni, Antonio Malvasi, Antonio Simone Laganà, Mario Palumbo, Domenico Baldini and Giuseppe Trojano
Toxics 2025, 13(6), 510; https://doi.org/10.3390/toxics13060510 - 18 Jun 2025
Viewed by 562
Abstract
In recent decades, exposure to electromagnetic fields (EMFs) generated by standard devices has raised concerns about possible effects on reproductive health. This cross-sectional observational study examined the impact of EMFs on sperm motility in a sample of 102 healthy males aged 20–35 years [...] Read more.
In recent decades, exposure to electromagnetic fields (EMFs) generated by standard devices has raised concerns about possible effects on reproductive health. This cross-sectional observational study examined the impact of EMFs on sperm motility in a sample of 102 healthy males aged 20–35 years in the IVF laboratory. Semen samples were exposed to different sources of EMF for one hour, and motility was assessed immediately thereafter. The results showed a significant reduction in progressive sperm motility after exposure to EMFs generated by mobile phones and Wi-Fi repeaters in the laboratory. In contrast, other equipment showed no significant effects. The study demonstrated a statistically significant reduction in progressive sperm motility following in vitro exposure to electromagnetic fields (EMFs) emitted by mobile communication devices and wireless local area network access points. Conversely, other electromagnetic emitting devices evaluated did not elicit significant alterations in this parameter. These findings suggest a potential negative impact of specific EMF sources on semen quality, underscoring the necessity for further comprehensive research to elucidate the clinical implications and to develop potential mitigation strategies aimed at reducing risks to male reproductive health. This study discourages the introduction of mobile phones in IVF laboratories and recommends positioning Wi-Fi repeaters on the ceiling. Full article
(This article belongs to the Section Reproductive and Developmental Toxicity)
Show Figures

Figure 1

24 pages, 3481 KiB  
Article
Exploring the Potential of Wi-Fi in Industrial Environments: A Comparative Performance Analysis of IEEE 802.11 Standards
by Luis M. Bartolín-Arnau, Federico Orozco-Santos, Víctor Sempere-Payá, Javier Silvestre-Blanes, Teresa Albero-Albero and David Llacer-Garcia
Telecom 2025, 6(2), 40; https://doi.org/10.3390/telecom6020040 - 5 Jun 2025
Cited by 1 | Viewed by 717
Abstract
The advent of Industry 4.0 brought about digitalisation and the integration of advanced technologies into industrial processes, with wireless networks emerging as a key enabler in the interconnection of smart devices, cyber–physical systems, and data analytics platforms. With the development of Industry 5.0 [...] Read more.
The advent of Industry 4.0 brought about digitalisation and the integration of advanced technologies into industrial processes, with wireless networks emerging as a key enabler in the interconnection of smart devices, cyber–physical systems, and data analytics platforms. With the development of Industry 5.0 and its emphasis on human–machine collaboration, Wi-Fi has positioned itself as a viable alternative for industrial wireless connectivity, supporting seamless communication between robots, automation systems, and human operators. However, its adoption in critical applications remains limited due to persistent concerns over latency, reliability, and interference in shared-spectrum environments. This study evaluates the practical performance of Wi-Fi standards from 802.11n (Wi-Fi 4) to 802.11be (Wi-Fi 7) across three representative environments: residential, laboratory, and industrial. Six configurations were tested under consistent conditions, covering various frequency bands, channel widths, and traffic types. Results prove that Wi-Fi 6/6E delivers the best overall performance, particularly in low-interference 6 GHz scenarios. Wi-Fi 5 performs well in medium-range settings but is more sensitive to congestion, while Wi-Fi 4 consistently underperforms. Early Wi-Fi 7 hardware does not yet surpass Wi-Fi 6/6E consistently, reflecting its ongoing development. Despite these variations, the progression observed across generations clearly demonstrates incremental gains in throughput stability and latency control. While these improvements already provide tangible benefits for many industrial communication scenarios, the most significant leap in industrial applicability is expected to come from the effective implementation of high-efficiency mechanisms. These include OFDMA, TWT, scheduled uplink access, and enhanced QoS features. These capabilities, already embedded in the Wi-Fi 6 and 7 standards, represent the necessary foundation to move beyond conventional best-effort connectivity and toward supporting critical, latency-sensitive industrial applications. Full article
Show Figures

Figure 1

19 pages, 691 KiB  
Article
Implementation of LoRa TDMA-Based Mobile Cell Broadcast Protocol for Vehicular Networks
by Modris Greitans, Gatis Gaigals and Aleksandrs Levinskis
Information 2025, 16(6), 447; https://doi.org/10.3390/info16060447 - 27 May 2025
Viewed by 373
Abstract
With increasing vehicle density and growing demands on transport infrastructure, there is a need for resilient, low-cost communication systems capable of supporting safety-critical applications, especially in situations where primary channels like Wi-Fi or LTE are unavailable. This paper proposes a novel, real-time vehicular [...] Read more.
With increasing vehicle density and growing demands on transport infrastructure, there is a need for resilient, low-cost communication systems capable of supporting safety-critical applications, especially in situations where primary channels like Wi-Fi or LTE are unavailable. This paper proposes a novel, real-time vehicular network protocol that functions as an emergency fallback communication layer using long-range LoRa modulation and off-the-shelf hardware. The core contribution is a development of Mobile Cell Broadcast Protocol that is implemented using Long-Range modulation and time-division multiple access (TDMA)-based cell broadcast protocol (LoRA TDMA) capable of supporting up to six dynamic clients to connect and exchange lightweight cooperative awareness messages. The system achieves a sub-100 ms node notification latency, meeting key low-latency requirements for safety use cases. Unlike conventional ITS stacks, the focus here is not on full-featured data exchange but on maintaining essential communication under constrained conditions. Protocol has been tested in laboratory to check its ability to ensure real-time data exchange between dynamic network nodes having 14 bytes of payload per data packet and 100 ms network member notification latency. While focused on vehicular safety, the solution is also applicable to autonomous agents (robots, drones) operating in infrastructure-limited environments. Full article
(This article belongs to the Special Issue Advances in Telecommunication Networks and Wireless Technology)
Show Figures

Figure 1

29 pages, 662 KiB  
Article
Advanced Persistent Threats and Wireless Local Area Network Security: An In-Depth Exploration of Attack Surfaces and Mitigation Techniques
by Hosam Alamleh, Laura Estremera, Shadman Sakib Arnob and Ali Abdullah S. AlQahtani
J. Cybersecur. Priv. 2025, 5(2), 27; https://doi.org/10.3390/jcp5020027 - 22 May 2025
Viewed by 889
Abstract
Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity of WLANs also presents an expanding attack surface for [...] Read more.
Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity of WLANs also presents an expanding attack surface for adversaries—especially Advanced Persistent Threats (APTs), which operate with high levels of sophistication, resources, and long-term strategic objectives. This paper provides a holistic security analysis of WLANs under the lens of APT threat models, categorizing APT actors by capability tiers and examining their ability to compromise WLANs through logical attack surfaces. The study identifies and explores three primary attack surfaces: Radio Access Control interfaces, compromised insider nodes, and ISP gateway-level exposures. A series of empirical experiments—ranging from traffic analysis of ISP-controlled routers to offline password attack modeling—evaluate the current resilience of WLANs and highlight specific vulnerabilities such as credential reuse, firmware-based leakage, and protocol downgrade attacks. Furthermore, the paper demonstrates how APT resources significantly accelerate attacks through formal models of computational scaling. It also incorporates threat modeling frameworks, including STRIDE and MITRE ATT&CK, to contextualize risks and map adversary tactics. Based on these insights, this paper offers practical recommendations for enhancing WLAN resilience through improved authentication mechanisms, network segmentation, AI-based anomaly detection, and open firmware adoption. The findings underscore that while current WLAN implementations offer basic protections, they remain highly susceptible to well-resourced adversaries, necessitating a shift toward more robust, context-aware security architectures. Full article
Show Figures

Figure 1

23 pages, 1297 KiB  
Article
Multi-Granularity and Multi-Modal Feature Fusion for Indoor Positioning
by Lijuan Ye, Yi Wang, Shenglei Pei, Yu Wang, Hong Zhao and Shi Dong
Symmetry 2025, 17(4), 597; https://doi.org/10.3390/sym17040597 - 15 Apr 2025
Viewed by 463
Abstract
Despite the widespread adoption of indoor positioning technology, the existing solutions still face significant challenges. On one hand, Wi-Fi-based positioning struggles to balance accuracy and efficiency in complex indoor environments and architectural layouts formed by pre-existing access points (APs). On the other hand, [...] Read more.
Despite the widespread adoption of indoor positioning technology, the existing solutions still face significant challenges. On one hand, Wi-Fi-based positioning struggles to balance accuracy and efficiency in complex indoor environments and architectural layouts formed by pre-existing access points (APs). On the other hand, vision-based methods, while offering high-precision potential, are hindered by prohibitive costs associated with binocular camera systems required for depth image acquisition, limiting their large-scale deployment. Additionally, channel state information (CSI), containing multi-subcarrier data, maintains amplitude symmetry in ideal free-space conditions but becomes susceptible to periodic positioning errors in real environments due to multipath interference. Meanwhile, image-based positioning often suffers from spatial ambiguity in texture-repeated areas. To address these challenges, we propose a novel hybrid indoor positioning method that integrates multi-granularity and multi-modal features. By fusing CSI data with visual information, the system leverages spatial consistency constraints from images to mitigate CSI error fluctuations while utilizing CSI’s global stability to correct local ambiguities in image-based positioning. In the initial coarse-grained positioning phase, a neural network model is trained using image data to roughly localize indoor scenes. This model adeptly captures the geometric relationships within images, providing a foundation for more precise localization in subsequent stages. In the fine-grained positioning stage, CSI features from Wi-Fi signals and Scale-Invariant Feature Transform (SIFT) features from image data are fused, creating a rich feature fusion fingerprint library that enables high-precision positioning. The experimental results show that our proposed method synergistically combines the strengths of Wi-Fi fingerprints and visual positioning, resulting in a substantial enhancement in positioning accuracy. Specifically, our approach achieves an accuracy of 0.4 m for 45% of positioning points and 0.8 m for 67% of points. Overall, this approach charts a promising path forward for advancing indoor positioning technology. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

19 pages, 3780 KiB  
Article
Local Batch Normalization-Aided CNN Model for RSSI-Based Fingerprint Indoor Positioning
by Houjin Lu, Shuzhi Liu and Seung-Hoon Hwang
Electronics 2025, 14(6), 1136; https://doi.org/10.3390/electronics14061136 - 13 Mar 2025
Cited by 1 | Viewed by 1004
Abstract
Indoor positioning systems have become increasingly important due to the limitations of GPS in indoor environments, such as non-line-of-sight conditions and weak signal strength. Among the various indoor positioning techniques, fingerprinting-based approaches utilizing WiFi signals are highly regarded for their accessibility and convenience. [...] Read more.
Indoor positioning systems have become increasingly important due to the limitations of GPS in indoor environments, such as non-line-of-sight conditions and weak signal strength. Among the various indoor positioning techniques, fingerprinting-based approaches utilizing WiFi signals are highly regarded for their accessibility and convenience. However, existing convolutional neural network (CNN) models for fingerprinting often struggle to maintain consistent performance under diverse environmental conditions. To address these challenges, this study proposes a local batch normalization (LBN)-aided CNN model for received signal strength indicator (RSSI)-based indoor positioning. The LBN technique is designed to overcome the limitations of traditional batch normalization (BN) and layer normalization (LN) in managing location-dependent RSSI variations, thereby improving positioning accuracy. The proposed approach consists of two phases: an offline phase, where RSSI data are collected at reference points to train the model, and an online phase, where real-time RSSI data are used to estimate the device’s location. Experimental results demonstrate that the proposed LBN-aided CNN model achieves an accuracy of 92.9%, outperforming existing CNN-based methods. These findings confirm the effectiveness of LBN in enhancing CNN performance for indoor positioning, particularly in challenging environments with significant signal variability. Full article
Show Figures

Graphical abstract

24 pages, 1016 KiB  
Article
MILD: Minimizing Idle Listening Energy Consumption via Down-Clocking for Energy-Efficient Wi-Fi Communications
by Jae-Hyeon Park, Young-Joo Suh, Dongdeok Kim, Harim Lee, Hyeongtae Ahn and Young Deok Park
Sensors 2025, 25(4), 1155; https://doi.org/10.3390/s25041155 - 13 Feb 2025
Viewed by 1092
Abstract
Mobile devices, such as smartphones and laptops, face energy consumption challenges due to battery limitations, with Wi-Fi being one of the major sources of energy consumption in these devices. The IEEE 802.11 standard addresses this issue with Power Saving Mode (PSM), which reduces [...] Read more.
Mobile devices, such as smartphones and laptops, face energy consumption challenges due to battery limitations, with Wi-Fi being one of the major sources of energy consumption in these devices. The IEEE 802.11 standard addresses this issue with Power Saving Mode (PSM), which reduces power consumption but increases latency. To mitigate this latency, Adaptive-PSM (A-PSM) dynamically switches between PSM and Constantly Awake Mode (CAM); however, the associated Idle Listening (IL) process still results in high energy consumption. Various strategies have been proposed to optimize IL time; however, Medium Access Control (MAC)-level contention and network delays limit their effectiveness. To overcome these limitations, we propose MILD (Minimizing Idle Listening energy consumption via Down-clocking), a novel scheme that reduces energy consumption without compromising throughput. MILD introduces specialized preambles for Packet Arrival Detection (PAD) and Device Address Recognition (DAR), allowing the client to operate in a down-clocked state during IL and switch to full clocking only when necessary. Experimental results demonstrate that MILD reduces energy consumption by up to 23.6% while maintaining a minimal throughput loss of 12.5%, outperforming existing schemes. Full article
(This article belongs to the Special Issue Energy-Efficient Communication Networks and Systems: 2nd Edition)
Show Figures

Figure 1

23 pages, 7257 KiB  
Article
Dual-Band 802.11 RF Energy Harvesting Optimization for IoT Devices with Improved Patch Antenna Design and Impedance Matching
by Ashraf Ali, Rama Eid, Digham Emad Manaseer, Hussein Khaled AbuJaber and Andrew Ware
Sensors 2025, 25(4), 1055; https://doi.org/10.3390/s25041055 - 10 Feb 2025
Cited by 1 | Viewed by 1644
Abstract
This paper investigates the feasibility of harvesting Radio Frequency (RF) energy from the Wi-Fi frequency band to power low-power Internet-of-Things (IoT) devices. With the increasing prevalence of IoT applications and wireless sensor networks (WSNs), there is a critical need for sustainable energy sources [...] Read more.
This paper investigates the feasibility of harvesting Radio Frequency (RF) energy from the Wi-Fi frequency band to power low-power Internet-of-Things (IoT) devices. With the increasing prevalence of IoT applications and wireless sensor networks (WSNs), there is a critical need for sustainable energy sources that can extend the operational lifespan of these devices, particularly in remote locations, where access to reliable power supplies is limited. The paper describes the design, simulation, and fabrication of a dual-band antenna capable of operating at 2.4 GHz and 5 GHz, the frequencies used by Wi-Fi. The simulation and experimental results show that the proposed design is efficient based on the reflection coefficient. Using a high-frequency simulator, we developed two C-shaped and an F-shaped microstrip antenna design, optimized for impedance matching and efficient RF–DC conversion.The captured RF energy is converted into usable electrical power that can be directly utilized by low-power IoT devices or stored in batteries for later use. The paper introduces an efficient design for dual-band antennas to maximize the reception of Wi-Fi signals. It also explains the construction of an impedance-matching network to reduce signal reflection and improve power transfer efficiency. The results indicate that the proposed antennas can effectively harvest Wi-Fi energy, providing a sustainable power source for IoT devices. The practical implementation of this system offers a promising solution to the energy supply challenges faced by remote and low-power IoT applications, paving the way for more efficient and longer-lasting wireless sensor networks. Full article
(This article belongs to the Special Issue RFID and Zero-Power Backscatter Sensors)
Show Figures

Figure 1

23 pages, 7011 KiB  
Article
P-A Scheme: A Robust and Lightweight Wi-Fi Device Identification Approach for Enhancing Industrial Security
by Zaiting Xu, Qian Lu, Fei Chen, Hanlin Zhang and Hequn Xian
Electronics 2025, 14(3), 513; https://doi.org/10.3390/electronics14030513 - 27 Jan 2025
Cited by 1 | Viewed by 816
Abstract
The increasing dependence on Wi-Fi for device-to-device communication in industrial environments has introduced significant security and privacy challenges. In such wireless networks, rogue access point (RAP) attacks have become more common, exploiting the openness of wireless communication to intercept sensitive operational data, compromise [...] Read more.
The increasing dependence on Wi-Fi for device-to-device communication in industrial environments has introduced significant security and privacy challenges. In such wireless networks, rogue access point (RAP) attacks have become more common, exploiting the openness of wireless communication to intercept sensitive operational data, compromise privacy, and disrupt industrial processes. Existing mitigation schemes often rely on dedicated hardware and cryptographic methods for authentication, which are computationally expensive and impractical for the diverse and resource-limited devices commonly found in industrial networks. To address these challenges, this paper introduces a robust and lightweight Wi-Fi device identification scheme, named the P-A scheme, specifically designed for industrial settings. By extracting hardware fingerprints from the phase and amplitude characteristics of channel state information (CSI), the P-A scheme offers an efficient and scalable solution for identifying devices and detecting rogue access points. A lightweight neural network ensures fast and accurate identification, making the scheme suitable for real-time industrial applications. Extensive experiments in real-world scenarios demonstrate the effectiveness of the scheme, achieving 95% identification accuracy within 0.5 s. The P-A scheme offers a practical pathway to safeguard data integrity and privacy in complex industrial networks against evolving cyber threats. Full article
Show Figures

Figure 1

13 pages, 6831 KiB  
Article
Demonstration of a Hybrid B5G System Integrating VLC and RF-Based Technologies with Access Networks
by Tomás Powell Villena Andrade, Celso Henrique de Souza Lopes, Letícia Carneiro de Souza and Arismar Cerqueira Sodré Junior
Appl. Sci. 2025, 15(2), 955; https://doi.org/10.3390/app15020955 - 19 Jan 2025
Viewed by 1030
Abstract
Visible-light communication (VLC) has emerged as a promising technology to provide the very high-throughput wireless communications demanded by beyond-fifth-generation (B5G) applications. However, few works are found in the literature regarding the integration of VLC systems with other wireless communications technologies and with access [...] Read more.
Visible-light communication (VLC) has emerged as a promising technology to provide the very high-throughput wireless communications demanded by beyond-fifth-generation (B5G) applications. However, few works are found in the literature regarding the integration of VLC systems with other wireless communications technologies and with access networks. In this context, and as a proof of concept, we implement and experimentally evaluate a hybrid network architecture based on VLC, radio-over-fiber (RoF), free space optics (FSO), fiber-wireless (FiWi), and millimeter-waves (mm-waves) for B5G applications. Such optical networks make use of fiber-optic links based on RoF technology as backhauls, whereas their fronthauls might be either by FSO or RoF. Finally, a triple-wireless-access network is ensured by VLC, FiWi, and mm-wave links. The latter use a real 5G new radio (5G NR) signal. The system performance is evaluated in terms of a root mean square error vector magnitude (EVMRMS) parameter in accordance with the 3rd-Generation Partnership Project (3GPP) requirements. The experimental results demonstrate a total maximal theoretical throughput of approximately 1.66 Gbps, aligning with the digital performance requirements set by 3GPP. Full article
(This article belongs to the Special Issue Visible Light Communications (VLC) Networks)
Show Figures

Figure 1

36 pages, 2688 KiB  
Article
StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard
by Marek Natkaniec and Paweł Kępowicz
Energies 2025, 18(2), 330; https://doi.org/10.3390/en18020330 - 13 Jan 2025
Cited by 1 | Viewed by 949
Abstract
Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi, Zigbee, LoRaWAN or BLE. Wi-Fi are commonly used to transmit data from measurement systems, distribution control and monitoring systems, as well as network protection systems. However, since Wi-Fi networks primarily operate on [...] Read more.
Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi, Zigbee, LoRaWAN or BLE. Wi-Fi are commonly used to transmit data from measurement systems, distribution control and monitoring systems, as well as network protection systems. However, since Wi-Fi networks primarily operate on unlicensed frequency bands, this introduces significant security risks for sensitive data transmission. In this paper, we propose a novel and highly efficient covert channels that utilize IEEE 802.11 Enhanced Distributed Channel Access (EDCA) for data transmission. It is also the first ever covert channel that employ three or four independent covert mechanisms to enhance operational efficiency. The proposed mechanism is also the first to exploit the Transmission Opportunity (TXOP) period and the access categories of the EDCA function. The protocol was developed and tested using the ns-3 simulator, achieving excellent performance results. Its efficiency remains consistent even under heavy network load with additional background traffic. These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid. Full article
(This article belongs to the Special Issue Research on Security and Data Protection for Energy Systems)
Show Figures

Figure 1

30 pages, 2272 KiB  
Article
Embedding Trust in the Media Access Control Protocol for Wireless Networks
by Chaminda Alocious, Hannan Xiao, Bruce Christianson and Joseph Spring
Sensors 2025, 25(2), 354; https://doi.org/10.3390/s25020354 - 9 Jan 2025
Viewed by 845
Abstract
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative [...] Read more.
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative and trustworthy. However, the potential for non-cooperative nodes exists, nodes that may purposefully misbehave in order to, for example, obtain extra bandwidth, conserve their resources, or disrupt network performance. This issue is further compounded when receivers such as Wi-Fi hotspots, normally trusted by other module nodes, also misbehave. Such issues, their detection, and mitigation have, we believe, not been sufficiently addressed in the literature. This research proposes a novel trust-incorporated MAC protocol (TMAC) which detects and mitigates complex node misbehavior for distributed network environments. TMAC introduces three main features into the original IEEE 802.11 protocol. First, each node assesses a trust level for their neighbors, establishing a verifiable backoff value generation mechanism with an incorporated trust model involving senders, receivers, and common neighbors. Second, TMAC uses a collaborative penalty scheme to penalize nodes that deviate from the IEEE 802.11 protocol. This feature removes the assumption of a trusted receiver. Third, a TMAC diagnosis mechanism is carried out for each distributed node periodically, to reassess neighbor status and to reclassify each based on their trust value. Simulation results in ns2 showed that TMAC is effective in diagnosing and starving selfish or misbehaving nodes in distributed wireless networks, improving the performance of trustworthy well-behaving nodes. The significant feature of TMAC is its ability to detect sender, receiver, and colluding node misbehavior at the MAC layer with a high level of accuracy, without the need to trust any of the communicating parties. Full article
(This article belongs to the Special Issue Innovative Approaches to Cybersecurity for IoT and Wireless Networks)
Show Figures

Figure 1

41 pages, 37693 KiB  
Article
Digital Twin Framework Using Real-Time Asset Tracking for Smart Flexible Manufacturing System
by Asif Ullah, Muhammad Younas and Mohd Shahneel Saharudin
Machines 2025, 13(1), 37; https://doi.org/10.3390/machines13010037 - 7 Jan 2025
Cited by 3 | Viewed by 1711
Abstract
This research article proposes a new method for an enhanced Flexible Manufacturing System (FMS) using a combination of smart methods. These methods use a set of three technologies of Industry 4.0, namely Artificial Intelligence (AI), Digital Twin (DT), and Wi-Fi-based indoor localization. The [...] Read more.
This research article proposes a new method for an enhanced Flexible Manufacturing System (FMS) using a combination of smart methods. These methods use a set of three technologies of Industry 4.0, namely Artificial Intelligence (AI), Digital Twin (DT), and Wi-Fi-based indoor localization. The combination tackles the problem of asset tracking through Wi-Fi localization using machine-learning algorithms. The methodology utilizes the extensive “UJIIndoorLoc” dataset which consists of data from multiple floors and over 520 Wi-Fi access points. To achieve ultimate efficiency, the current study experimented with a range of machine-learning algorithms. The algorithms include Support Vector Machines (SVM), Random Forests (RF), Decision Trees, K-Nearest Neighbors (KNN) and Convolutional Neural Networks (CNN). To further optimize, we also used three optimizers: ADAM, SDG, and RMSPROP. Among the lot, the KNN model showed superior performance in localization accuracy. It achieved a mean coordinate error (MCE) between 1.2 and 2.8 m and a 100% building rate. Furthermore, the CNN combined with the ADAM optimizer produced the best results, with a mean squared error of 0.83. The framework also utilized a deep reinforcement learning algorithm. This enables an Automated Guided Vehicle (AGV) to successfully navigate and avoid both static and mobile obstacles in a controlled laboratory setting. A cost-efficient, adaptive, and resilient solution for real-time tracking of assets is achieved through the proposed framework. The combination of Wi-Fi fingerprinting, deep learning for localization, and Digital Twin technology allows for remote monitoring, management, and optimization of manufacturing operations. Full article
(This article belongs to the Special Issue Cyber-Physical Systems in Intelligent Manufacturing)
Show Figures

Figure 1

22 pages, 2042 KiB  
Article
Secrecy Rate Performance Analysis of Jammer-Aided Symbiotic Radio with Sensing Errors for Fifth Generation Wireless Networks
by Muhammed Yusuf Onay
Appl. Sci. 2025, 15(1), 289; https://doi.org/10.3390/app15010289 - 31 Dec 2024
Cited by 1 | Viewed by 832
Abstract
Symbiotic radio (SR), which has recently been introduced as an effective solution for 5G wireless networks, stands out with system models that include hybrid devices that share the frequency spectrum and transmit information to the same receiver. However, the low bit rate and [...] Read more.
Symbiotic radio (SR), which has recently been introduced as an effective solution for 5G wireless networks, stands out with system models that include hybrid devices that share the frequency spectrum and transmit information to the same receiver. However, the low bit rate and the small amount of energy harvested in SR, where backscatter communication systems are integrated, make the system vulnerable to eavesdropping. To ensure security, the secrecy rate is defined as the difference between the number of bits transmitted to the receiver over the information channel and the number of bits reaching the eavesdropper (ED) over the wiretap channel. This paper is the first work that aims to maximize the secrecy rate for friendly jammer-aided SR networks with EDs over time allocation and power reflection coefficient in the presence of sensing errors. The proposed model consists of a base station (BS), a hybrid transmitter (HT) in symbiotic relationship with the BS, a WiFi access point used by the HT for energy harvesting, a jammer cooperating with the HT and BS, an information receiver, and EDs trying to access the information of the HT and BS. The simulation results provide valuable insights into the impact of system parameters on secrecy rate performance. Although taking the sensing error into account degrades the system performance, the real-world applicability of the system with sensing error is more realistic. It is also observed that the proposed system has higher performance compared to the wireless powered communication networks in the literature, which only use the energy harvest-then-transmit protocol and the power reflection coefficient is assumed to be zero. Full article
Show Figures

Figure 1

21 pages, 22783 KiB  
Article
A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios
by Nick Bray, Matthew Boeding, Michael Hempel, Hamid Sharif, Tapio Heikkilä, Markku Suomalainen and Tuomas Seppälä
Future Internet 2024, 16(12), 457; https://doi.org/10.3390/fi16120457 - 4 Dec 2024
Cited by 1 | Viewed by 1730
Abstract
Telerobotics involves the operation of robots from a distance, often using advanced communication technologies combining wireless and wired technologies and a variety of protocols. This application domain is crucial because it allows humans to interact with and control robotic systems safely and from [...] Read more.
Telerobotics involves the operation of robots from a distance, often using advanced communication technologies combining wireless and wired technologies and a variety of protocols. This application domain is crucial because it allows humans to interact with and control robotic systems safely and from a distance, often performing activities in hazardous or inaccessible environments. Thus, by enabling remote operations, telerobotics not only enhances safety but also expands the possibilities for medical and industrial applications. In some use cases, telerobotics bridges the gap between human skill and robotic precision, making the completion of complex tasks requiring high accuracy possible without being physically present. With the growing availability of high-speed networks around the world, especially with the advent of 5G cellular technologies, applications of telerobotics can now span a gamut of scenarios ranging from remote control in the same room to robotic control across the globe. However, there are a variety of factors that can impact the control precision of the robotic platform and user experience of the teleoperator. One such critical factor is latency, especially across large geographical areas or complex network topologies. Consequently, military telerobotics and remote operations, for example, rely on dedicated communications infrastructure for such tasks. However, this creates a barrier to entry for many other applications and domains, as the cost of dedicated infrastructure would be prohibitive. In this paper, we examine the network latency of robotic control over shared network resources in a variety of network settings, such as a local network, access-controlled networks through Wi-Fi and cellular, and a remote transatlantic connection between Finland and the United States. The aim of this study is to quantify and evaluate the constituent latency components that comprise the control feedback loop of this telerobotics experience—of a camera feed for an operator to observe the telerobotic platform’s environment in one direction and the control communications from the operator to the robot in the reverse direction. The results show stable average round-trip latency of 6.6 ms for local network connection, 58.4 ms when connecting over Wi-Fi, 115.4 ms when connecting through cellular, and 240.7 ms when connecting from Finland to the United States over a VPN access-controlled network. These findings provide a better understanding of the capabilities and performance limitations of conducting telerobotics activities over commodity networks, and lay the foundation of our future work to use these insights for optimizing the overall user experience and the responsiveness of this control loop. Full article
(This article belongs to the Special Issue Advances and Perspectives in Human-Computer Interaction—2nd Edition)
Show Figures

Figure 1

Back to TopTop