2023
DOI: 10.1007/s11277-023-10201-0
|View full text |Cite
|
Sign up to set email alerts
|

Smart Channel Modelling for Cloud and Fog Attenuation Using ML for Designing of 6G Networks at D and G Bands

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…No No [5], [14], [6] Fog and cloud Yes Yes No [15], [16], [7], [8] Atmospheric Gases Yes Yes No [5], [17], [18], [9], [19] Free space Yes Yes Yes [18], [20], [19] ©International Telecommunication Union, 2024 and equivalent isotropic radiated power for the FSS, MSS and BSS to protect ixed and mobile services in the frequency bands 71-76 GHz and 81-86 GHz (Earth-to-space) item and, under agenda item 1.18, the ITU will consider possible regulatory measures regarding the protection of the EESS (passive) and the radio astronomy service in certain frequency bands above 76 GHz from unwanted emissions of active services [25].…”
Section: Yesmentioning
confidence: 99%
“…No No [5], [14], [6] Fog and cloud Yes Yes No [15], [16], [7], [8] Atmospheric Gases Yes Yes No [5], [17], [18], [9], [19] Free space Yes Yes Yes [18], [20], [19] ©International Telecommunication Union, 2024 and equivalent isotropic radiated power for the FSS, MSS and BSS to protect ixed and mobile services in the frequency bands 71-76 GHz and 81-86 GHz (Earth-to-space) item and, under agenda item 1.18, the ITU will consider possible regulatory measures regarding the protection of the EESS (passive) and the radio astronomy service in certain frequency bands above 76 GHz from unwanted emissions of active services [25].…”
Section: Yesmentioning
confidence: 99%
“…For instance, the SDN controllers used to manage and control UAV networks are easy targets. Furthermore, eavesdropping attacks, hijacking attacks, spoofing attacks, and DDoS attacks can also occur in many 6G applications [63,64].…”
Section: Figure 20: Recent Studies In 6gmentioning
confidence: 99%