Cory Beard

ORCID: 0000-0003-0134-9848
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Network Traffic and Congestion Control
  • Advanced Wireless Network Optimization
  • Wireless Communication Networks Research
  • Software-Defined Networks and 5G
  • Wireless Networks and Protocols
  • Cooperative Communication and Network Coding
  • Network Security and Intrusion Detection
  • Advanced Queuing Theory Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • IoT and Edge/Fog Computing
  • Advanced Optical Network Technologies
  • Advanced Wireless Communication Techniques
  • Infrastructure Resilience and Vulnerability Analysis
  • Mobile Agent-Based Network Management
  • Millimeter-Wave Propagation and Modeling
  • Software System Performance and Reliability
  • IPv6, Mobility, Handover, Networks, Security
  • Caching and Content Delivery
  • Advanced Neural Network Applications
  • Advanced Wireless Communication Technologies
  • Satellite Communication Systems
  • Power Line Communications and Noise
  • Cloud Computing and Resource Management

University of Missouri–Kansas City
2015-2024

University of Missouri
2003-2007

University of Kansas
2003

Existing cellular communications and the upcoming 5G mobile network requires meeting high-reliability standards, very low latency, higher capacity, more security, high-speed user connectivity. Mobile operators are looking for a programmable solution that will allow them to accommodate multiple independent tenants on same physical infrastructure networks end-to-end resource allocation using concept of Network Slicing (NS). Data-driven decision making be vital in future communication due...

10.1109/uemcon47517.2019.8993066 article EN 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) 2019-10-01

Network Slicing will play a vital role in enabling multitude of 5G applications, use cases, and services. slicing functions provide an end-to-end isolation between slices with ability to customize each slice based on the service demands (bandwidth, coverage, security, latency, reliability, etc.). Maintaining resources, traffic flow, network is critical protecting infrastructure system from Distributed Denial Service (DDoS) attack. The new feature sets support ever-growing complex business...

10.1109/ccwc47524.2020.9031158 article EN 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020-01-01

This paper demonstrates exceptional performance of approximately 10.0 dB learning-based gain using the Deep Convolutional Neural Network (DCNN) for demodulation a Rayleigh-faded wireless data signal. We simulate FSK over an AWGN Rayleigh fading channel with average signal to noise ratios (SNR) from 10 20 dB. The most recent and accurate classifier is which resulted in lowest error bit probabilities between 0.00128 0.00019 range SNRs. A comparative study has been applied DCNN other machine...

10.1109/ccwc.2018.8301731 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2018-01-01

The Internet of Things (IoT) is poised to revolutionize how people, industries, and enterprises connect customers individuals. Network Protocols, Technology Standards such as Narrowband IoT (NB-IoT), LTE-M, 5G, LoRaWAN, Message Queue Telemetry Transport (MQTT), Constrained Application Protocol (CoAP), Device management Open Mobile Alliance (OMA) for Machine (M2M) are being developed support a variety applications services. ecosystem creating tremendous business opportunities opening the...

10.1109/ithings/greencom/cpscom/smartdata.2019.00183 article EN 2019-07-01

The purpose of this paper is to present a new method for the study competition and co- operation relationships among nodes in network us- ing CSMA (Carrier Sense Multiple Access) proto- col implemented with an exponential backoff process. Self-organized behavior proposed. Standard topolo- gies, such as tandem, traffic splitting merging, are studied variables: 1) rate, 2) topology po- sition, 3) splitting. Several interesting phenom- ena reported. We propose “Channel Utilization Model”...

10.47164/ijngc.v3i3.166 article EN INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING 2012-11-18

5G cellular networks are being deployed all over the world and this architecture supports ultra-dense network (UDN) deployment. Small cells have a very important role in providing connectivity to end users. Exponential increases devices, data demands make it mandatory for service providers manage handovers better, cater services that user desire. In contrast any traditional handover improvement scheme, we develop 'Deep-Mobility' model by implementing deep learning neural (DLNN) mobility,...

10.1109/wispnet54241.2022.9767158 preprint EN 2022-03-24

Overloads that occur during times of network stress result in blocked access to all users, independent importance. These overloads can because degraded resource availability or abnormally high demand. Public broadband networks must dynamically recognize some multimedia connections as having greater importance than others and allocate resources accordingly. A new approach connection admission control is proposed uses an upper limit policy optimize the based on weighted sum blocking across...

10.1109/90.958330 article EN IEEE/ACM Transactions on Networking 2001-01-01

The purpose of this paper is to present a new method for the study competition and cooperation relationships among nodes in network with CSMA (Carrier Sense Multiple Access) protocol implemented an exponential backoff process. Self-organized behavior proposed. We propose "Channel Utilization Model" derived variable "channel access rate" which applies all traffic loads. These models are applied different optimization methods.

10.1145/2069063.2069084 article EN 2011-11-03

In wireless ad-hoc and wireline networks used for search rescue, military operations, emergency communications; many failure modes are geographic in nature. They include jammers, explosions, enemy attacks, terrain issues, natural causes like floods, storms, fires. This paper proposes two methods to gain valuable insights into the physical topography vulnerabilities of networks. The 2-Terminal method All-Terminal find areas that given a threat certain radius can disconnect either source...

10.1109/cqr.2011.5996078 article EN 2011-05-01

Fifth-generation (5G) wireless technology promises to be the critical enabler of use cases far beyond smartphones and other connected devices. This next-generation 5G standard represents changing face connectivity by enabling elevated levels automation through continuous optimization several Key Performance Indicators (KPIs) such as latency, reliability, connection density, energy efficiency. Mobile Network Operators (MNOs) must promote implement innovative technologies solutions reduce...

10.3390/s22228614 article EN cc-by Sensors 2022-11-08

In this paper, we introduce a threshold-based preemption strategy for supporting emergency traffic in cellular networks. Compared with current commercially used policies, our scheme can not only guarantee certain amount of resources to public customers but also provide immediate access users and flexibility providers adapt different requirements operating scenarios. addition, under the combined queuing framework, interesting analytical relationships among channel occupancy, gross service...

10.1109/tvt.2009.2014634 article EN IEEE Transactions on Vehicular Technology 2009-02-13

During large geographic events in networks, the routing churn that occurs has been shown to cause significant impacts stabilization following event. This work proposes a set of algorithms is based on Multi-Topology Routing (MTR) for pre-planning geographically correlated failures. Thus, event failure, our approach, Geographic MTR, switches virtual topologies reduce impact changes can result dropped connections until new link state and shortest path trees be established. We propose two...

10.1109/drcn.2014.6816134 article EN 2014-04-01

In this article, we propose a multi-stage AI-based framework called “open Fault Management” or “openFM,” for end-to-end autonomous fault management of the open radio access network (open RAN) that is also applicable to 5G and beyond next-generation networks. Open RAN subsequent stage evolution RAN. A unified vendor-independent system architecture can be seamlessly integrated with other parallel evolving networks outlined in article. An optimized combination classical machine learning...

10.1109/mwc.004.2200244 article EN IEEE Wireless Communications 2023-02-01

Handovers in a cellular system provide mobility and freedom to connect any desired cell at instance. It is necessary manage handovers better, cater the services that user desires. In given cell, newly originating connections incoming handover both have been mostly treated as exponential arrivals from queueing model perspective. However, such models no flexibility match real-world scenarios, other than one rate parameter. contrast, this paper, we propose matrix modeling of potential much more...

10.1109/sarnof.2017.8080381 article EN 2017-09-01

Nodes using standardized, contention-based CSMA protocols are susceptible to the misbehavior of other nodes and, also have little flexibility in controlling quality service. The problem is addressed this paper by proposing use continuous-time instead slotted-time protocols. introducing concept "MAC friendliness" where can adjust arrival and backoff rates while maintaining a fixed share channel. system modeled an iterative method matrix exponential distributions. model itself very useful...

10.1109/wcnc.2007.71 article EN IEEE Wireless Communications and Networking Conference 2007-01-01

A new analytical model for multihop CSMA networks is presented, using matrix exponential methods that node queueing and backoff processes. This also captures in a way the collisions between nodes then provides performance analysis not just throughput, but packet dropping, end-to-end delay, jitter. All metrics are shown to be very accurate compared simulation results. The used propose controlling of by different traffic rates or paths, depending on their network location.

10.1109/milcom.2008.4753376 article EN 2008-11-01

Mission-critical communication is one of the central design aspects 5G communications. But there are numerous challenges and explicit requirements for development a successful mission-critical system. Reliability delay optimization two most crucial among them. Achieving reliability influenced by several difficulties, including but not limited to fading, mobility, interference, inefficient resource utilization. may cost critical features mission communication, which delay. This paper...

10.1109/wts.2017.7943546 article EN 2017-04-01

The current cellular network and the upcoming 5G mobile requires meeting high reliability standards, very low latency high-speed user connectivity. In some mission critical communications, availability requirements may exceed five or even six nines (99.9999%). To meet such a requirement minimize impact of mobility during handover, Fade Duration Outage Probability (FDOP) based multiple link connectivity handover method has been proposed. This best captures experience, because duration fade...

10.1109/iccnc.2019.8685530 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2019-02-01

In Fifth Generation (5G), wireless cellular networks, smartphone battery efficiency, and optimal utilization of power have become a matter utmost importance. Battery are an area significant challenges considering smartphones these days equipped with advanced technological network features systems. These require much simultaneous to make decisions transfer information between devices provide best the user experience. Furthermore, meet demands increased data capacity, rate, quality service,...

10.1109/uemcon47517.2019.8993067 article EN 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) 2019-10-01
Coming Soon ...