The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Body Sensor Networks (WBSNs) are a low-cost solution allowing remote patient monitoring and continuous health assessment, thus reducing healthcare expenditure. In such networks, sensor nodes periodically collect vital signs and send them to the coordinator for fusion. However, sensor nodes have limited energy and processing resources and transmission is the most power-hungry task. In this...
Industrial IoT networks are typically used for monitoring systems and supporting control loops, as well as for movement detection systems, process control and factory automation. To this end, data generated by monitoring IoT devices are collected, elaborated and sent to controllers and actuators. The routing of data from IoT sensors to actuators is an integral part of any large-scale industrial network...
Human activity recognition through posture identification is increasingly used for medical, surveillance and entertainment applications. This paper proposes a ubiquitous solution to activity recognition through the use of tri-axial accelerometers of smartphones. Use of smartphones for activity recognition poses new challenges such as variation in hardware configuration and usage behavior like where...
LoRa-based (Long Range Communication based) localization systems make use of RSSI (Received Signal Strength Indicator) to locate an object properly in an outdoor environment for IoT (Internet of Things) applications in smart environment and urban networking. The accuracy of localization is highly degraded, however, by noisy environments (e.g., electronic interference, blocking). To address this issue,...
In this paper, we present an NDN-based architecture for the dissemination of roadside information to cars. Our focus is on flooding events which are often caused by severe weather which also impacts the communication infrastructure. We compare the performance of different message forwarding strategies in VANETs (Vehicular Adhoc Networks) through simulation. In addition, we analyze how our approach...
After years of tremendous development and research in digital currency, the most famous Bitcoin industry chain has been gradually completed including mining, exchange, currency exchange, ATM, pervasive digital wallet design and so on. Especially, its blockchain technology has become FinTech organizations' emerging business and research directions, also been applied in the interdisciplinary medical...
Due to continuous and unplanned urbanization, biases and probability of occurrences of non-line-of-sight (NLOS) errors can be drastically enlarged in macro-cellular smart urban environments. This paper presents a new robust estimation approach to mobile tracking improvements based on adequately tackling NLOS errors. To cover the dynamics of a mobile station, we cast a wireless localization problem...
Poor air quality in urban areas is becoming an important problem that needs to be addressed. This paper presents the system architecture of project Urb@nEcoLife for compilation of environmental data using low-cost data sensors. Although there are several proposals dealing with sensor networks, most of them focus on solving partial problems. Urb@nEcoLife is a comprehensive proposal that develops a...
We propose a signal-channel, adaptive threshold selection technique for binary mask construction, namely APHONIC, (AdaPtive tHreshOlding for NoIse Cancellation) for smart mobile environments. Using this mask, we introduce two noise cancellation techniques that perform robustly in the presence of real-world interfering signals that are typically encountered by mobile users: a violin busker, a subway...
Carrier Aggregation started to appear since release 10 of LTE, and offers higher data rates, but at the cost of increased Peak-to-Average-Power-Ratio (PAPR). This paper studies the distribution of PAPR through analyzing the Crest Factor (CF) which is the square root of the PAPR of the Carrier Aggregated OFDM (CA-OFDM) signals used in the downlink of LTE-A. Although the base station is not power constrained,...
DDoS attack is one of the major concerns for network and cloud service providers, due to its substantial impact on revenue/cost and especially on their reputation. Also, network administrators are looking for solutions to manage voluminous data traffic. SDN is an emerging networking paradigm that provides a flexible network management. Hence, SDN is being widely adopted for wired, wireless, and mobile...
The introduction of cognitive radio enables dynamic spectrum access for higher spectrum utilization, due to its ability of awareness of their environment. However, the introduction of cognitive radio technology brings new challenges to wireless networks security. Due to intelligent nature of the attackers, many of the radio frequency jamming attacks can be stealthy by nature. The stealthy jamming...
The LoRa technology has emerged as an interesting solution for low power, long range loT applications by proposing multiple “degrees of freedom” at the physical layer. This flexibility provides either a long range at the cost of a lower data rate or higher throughput at the cost of low sensitivity, so a shorter range. In this paper, we analyze the flexibility of LoRa and propose various strategies...
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
We investigate the problem of computing Completely Independent Spanning Trees (CIST) under a practical approach. We aim to show that despite CISTs are very challenging to exhibit in some networks, they present a real interest in ad-hoc networks and can be computed to enhance the network robustness. We propose an original ILP formulation for CISTs and we show through simulation results on representative...
Novel wireless systems are often first evaluated by simulation, before prototypes are tested and the concepts are standardized. In order to ensure relevant simulation results, the wireless channel has to be modelled properly and application oriented. Currently, only few considerable industrial channel models are available. The IEEE 802.15.4a model is the most commonly used. CM 7 applies for LOS modelling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.