2021
DOI: 10.33103/uot.ijccce.21.2.1
|View full text |Cite
|
Sign up to set email alerts
|

Visible Light Fidelity Technology: Survey

Abstract: Wireless Fidelity (Wi-Fi) is particularly popular today. Every place has hotspots to access the internet via Wi-Fi, including homes, offices, colleges, and other public places. This increased number of users, and hence the use of bandwidth, has led to radio spectrum congestion. Thus, in the year of 2011, Light-Fidelity (Li-Fi) was introduced, which applies a visible light region for data transmission, to solve this radio crisis problem. This visible part of the spectrum was 10,000 times big compared to the par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
(27 reference statements)
0
3
0
Order By: Relevance
“…The photodiode involves several receiver parameters, such as the physical area of the photodiode, the field of view (FOV), and detector sensitivity. At the receiver end, a large area is used for reception using an optical concentrator to increase the effective signal reception area, provide efficient and noise-free reception amplification, and avoid using a large photodiode surface area [16].…”
Section: Introductionmentioning
confidence: 99%
“…The photodiode involves several receiver parameters, such as the physical area of the photodiode, the field of view (FOV), and detector sensitivity. At the receiver end, a large area is used for reception using an optical concentrator to increase the effective signal reception area, provide efficient and noise-free reception amplification, and avoid using a large photodiode surface area [16].…”
Section: Introductionmentioning
confidence: 99%
“…Despite these precautions, sophisticated attack methods have been devised that can circumvent traditional security measures. The task of preserving sensitive information within the framework of large-scale WSN deployments demands the implementation of more robust and advanced security strategies [3].…”
Section: Introductionmentioning
confidence: 99%
“…This technology distinguishes itself by providing services to consumers and allocating cloud resources to users [10]. The resources are compensated for based on how much each user utilizes them provided typical scheduling methods, including asynchronous work management with a variety of queues for aperiodic and periodic activities When estimating the number of resources required to schedule a collection of aperiodic jobs, both execution and data transmission costs were considered [11]. The major limitation for the optimization metric was the deadline by [12]- [22].…”
mentioning
confidence: 99%