The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cardiovascular diseases are the leading cause of mortality worldwide and impose a tremendous burden on socio-economic costs. At present, prevention strategies based on personalized lifestyle interventions are considered the best way to contain the epidemics of these diseases. In this view, availability of innovative technological systems able to assist people in self-monitoring and self-coaching is...
The increasing occurrence of large scale disasters calls out for a collaborative approach to crisis management, where multiple and heterogeneous organizations of first responders are deployed within the damaged area and must interact with each others in order to cooperate in the damage assessment and recovery actions. Such an approach requires a suitable communication platform to allow these organizations...
The IEEE802.15.4e standard for Iow power wireless sensor networks defines a new mode called Time Slotted Channel Hopping (TSCH) as Medium Access Control (MAC). TSCH allows highly efficient deterministic time-frequency schedules that are built and maintained by the 6TiSCH operation sublayer (6top). In this paper, we propose a solution to limit the allocation of identical cells to co-located pair of...
Due to the ubiquitous presence of cellular networks and their exemplary success, they have been pushed forward to provide connectivity for Internet-of-things (IoT) applications with mass deployments of sensors and machines. Nevertheless, existing transmission protocols, e.g., orthogonal allocation or spectrum sharing, can be detrimental for both existing cellular users and IoT devices due to increased...
Dynamic Adaptive Streaming over HTTP (DASH) is a predominant technology for delivering video in wired and wireless networks. With DASH, clients can adaptively select the quality (bitrate) of the downloaded video. To improve Quality of Experience (QoE), a recently standardized framework, called Server and Network Assisted DASH (SAND), allows the client and the server to exchange control information...
More email is opened on mobile devices today than on other platforms [1]. At the same time, enterprises are constantly investing in approaches to improve employee productivity. In this paper, we consider the problem of automated information suggestions to assist in reply construction. The basic premise of the work is that a significant portion of the information content of a reply is likely to be...
Various large-scale failures and attacks (e.g., natural disasters, high-altitude electromagnetic pulses (HEMPs), weapons of mass destruction (WMDs), etc.) can instigate initial failures of critical network components (e.g., router, generator) in a cyber-physical infrastructure. In addition, the intra-dependency among various components inside a communication network and the inter-dependency with supporting...
Future mobility management systems need to in-corporate innovative methods to improve mobile multimedia networking, such as quality-oriented decision-making functions for selecting the best Point of Attachment (PoA) for in-transit Moving Objects (MOs). Among the various correlating algorithms raised in the literature, solutions based on the Multiple Attribute Decision Making (MADM) are beneficial...
Edge computing, which is a fundamental component of emerging 5G architectures, involves onloading or offloading multiple virtual network functions from mobile devices to an edge network substrate. In this paper, we present a model for the complete edge function onloading problem, which consists of three main phases: (1) Cyber foraging, which involves discovery of resources monitoring the state of...
The rapid increase of connected devices and the major advances in information and communication technologies have led to great emergence in the Internet of Things (IoT). IoT devices require software adaptation as they are in continuous transition. Multi-agent based solutions offer adaptable composition for IoT systems. Mobile agents can also be used to enable interoperability and global intelligence...
The ever-growing population of smartphone» connected to mobile networks is changing the cellular traffic ecosystem. The traffic volumes and patterns generated by smartphone apps pose complex challenges to cellular network operators, particularly in terms of detection and diagnosis of network anomalies caused by specific apps. The high-dimensionality of network data provided by current network monitoring...
Data reduction is one of the most attractive way to conserve the limited energy resources of wireless sensor networks (WSNs). It aims to remove unnecessary data transmission. Therefore, data prediction and reduction mechanisms must be deployed at the source node in order to eliminate the redundant sensed data before sending them to the sink. In this paper, an energy efficient periodic distributed...
Backscatter wireless communication (BWC) is a promising research area for the low power Internet of Things (IoT) devices. A substantial number of research works have been conducted in this area to increase the range of BWC. Along with physical layer achievements in BWC, an efficient medium access control (MAC) protocol is mandatory to attain the optimal benefit. In this paper, a novel MAC protocol...
With the spread of social networks and mobile applications (apps), the amount of sensitive information shared across Internet increased considerably. Although the majority of this information is encrypted, many apps still transmit sensitive data in plain text, e.g., using HTTP (HyperText Transfer Protocol). Seemingly trivial information, if collected together, can leak out important data about a user...
Recently, 5G systems started to explore the usage of mmWave bands both for access and backhaul. Cellular systems operating at such frequencies would achieve a significantly higher capacity than current systems due to the large frequency block available. Due to the propagation characteristics, highly directional mmWave links may frequently switch between Line-of-sight, Non Line-of-sight and outage...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
The problem of managing the scarce radio spectrum resource is addressed in this paper; based upon the Worldwide Interoperability for Microwave Access (WiMAX) network. Emerging and innovative techniques such as spectrum virtualization and network federation are adopted to enable the sharing of spectrum amongst mobile operators. A novel entity known as the Virtual Spectrum Hypervisor (VS-Hypervisor)...
This paper presents an experimental investigation of ultra-wideband (UWB) radio propagation through glass in the (3–8 GHz) frequency range using compact and cost-effective planar microstrip antennas. Channel parameters such as path loss magnitude, rms delay spread, received signal amplitude and multipath have been analyzed from the measured data. Results and analyses highlight the variation of the...
During recent years, we have witnessed an explosion in the Internet of Thing (IoT) in terms of the number and types of physical devices. However, there are many limitations of these devices regarding their computing power, storage, and connection capabilities. They affect on-device processing of sensed data significantly. Centralized treatment of IoT data has proven challenging for many use cases...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.