The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern cities are blanketed with Wi-Fi Hotspots. Such network access points can be utilised by Internet of Thing devices to enable wireless sensor network data mining deployments to report to the cloud. Vehicles are such devices that can provide valuable data sensing platforms for both internal operational properties such as speed, fuel and engine heat as well as external environmental features including...
An emergency can possess an immediate risk to life and may require urgent intervention to prevent or mitigate the further causalities. However, the level of mitigation depends on the response to address an emergency. The current practice of emergency frameworks includes different medical teams to improve the response time. In some cases, it is possible to achieve a reasonable performance with an additional...
This paper presents a ray tracing approach to optimise the position of a relay in a static environment such that the signal-to-noise ratio (SNR) is maximised at the receiver. The underlying principles behind the ray tracing wireless channel model are summarised. An implementation of a ray tracing algorithm is developed in MATLAB to calculate the channel state information (CSI) of a relay-assisted...
In order to effectively extend the coverage of an eNodeB (eNB), a simple relay node (RN) is the efficient solution with fiber-wireless connectivity as the interface between eNB and RN. The optimum coverage enhancement can be achieved by connecting many RNs to a single eNB, which requires high splitting ratio at the optical access layer. Therefore, high optical launch power (OLP) is a primary requirement...
With the advent of smart devices and lowering prices of sensing devices, adoption of Internet of Things (IoT) is gaining momentum. These IoT devices come with greater threat of being attacked or compromised that could lead to Denial of Service (DoS) and Distributed Denial of Service (DDoS). The high volume of IoT devices with high level of heterogeneity, magnify the possibility of security threats...
Selecting an efficient classifier for medical data is considered as one of the most important part of today's computer aided diagnosis. The performance of single classifiers such as decision tree classifier can be increased by ensemble method. However, this approach relies on the data quality and missing values. In this paper, we propose a new ensemble classifier to overcome overfitting and biasness...
Centralized mobility management (CMM) is widely used in current long-term evolution (LTE) networks. The rapidly-growing number of mobile subscribers has led to the creation of a large number of signaling messages. This makes it difficult to efficiently manage mobile networks and the mobility of subscribers simultaneously. One of the problems related to CMM is a single point of failure. To solve the...
In this study, a concept of the Internet of People based augmented smart home system is proposed. Compared with the standard smart house concept, an electronic smart caretaker is introduced into this system as a virtual family member to care for family members and house. The caretaker monitors the house status and reports to users. He also intuitively provides reminder and suggestion mechanism for...
We propose an adaptive error control implementation framework for software defined wireless sensor network (SDWSN). This scheme exploits the features provided by both software defined network (SDN) and forward error correction (FEC). The framework supports adaptability at both transmitter and receiver. Additionally, the scheme allows using different FECs in different sections of a network or a link...
We propose a business model to compute the monthly subscription fee for users served by an innovative 5G network architecture that is designed to serve rural zones. We consider two possible options to deploy the 5G cells. In the first case, the connectivity is provided by means of small cells mounted on top of Unmanned Aerial Vehicles (UAVs). In the second case, large cells, covering wider portions...
A simple model for extrapolating customer demand for broadband access services is introduced. The concept of “Equivalent Urgent Download” is proposed as a means for modelling customers' perception of the utility of the bitrate of broadband access services. Some implications for the possible future roadmap of the Australian national broadband network are explored. Sample analysis is provided to illustrate...
Coverage holes (CHs) due to the correlated node failures, if not appropriately addressed in a timely manner, not only disrupt network's operation but also can compromise its integrity. In the absence of centralised control, distributed node relocation can be an effective solution to recover CHs. Relocation algorithms that mainly applied to all nodes to address networks' coverage and unbalanced deployments...
The Device-to-Device communication (D2D) is believed to be one of promising paradigm for 5G wireless communication networks. D2D networks are based on a distributed peer to peer (P2P) network architecture where the nodes are self-organized. Moreover, as the devices are controlled by humans, their behaviours become unpredictable. Trust and reputation management (TRM) emerges as a significant research...
The femtocell is a promising technology that can be employed to enhance next generation wireless network coverage. It possesses the potential to reduce network deployment risk, improve network operation efficiency and capacity. By utilizing femtocells spectrum utilization can be improved. Due to its key features, including low cost, high speed, and plug and play capability, network operators should...
We consider a single-input-single-output (SISO) system with quadrature phase shift keying (QPSK) modulation and derive an easy-to-evaluate expression for the symbol error probability (SEP) when a general n-bit phase quantization is used at the receiver. We further evaluate the expressions asymptotically to characterize the diversity order and the quantization penalty at high signal-to-noise ratios...
Low Power Wide Area Networks (LPWAN) are used in a number of applications, including disaster monitoring and recovery networks. LPWAN sensors capture data bits and transmit them via dedicated gateways, which are connected to public carrier networks (e.g., cellular networks). One of the challenges encountered in disaster management scenarios revolves around the carry/forward sensed data and geographical...
Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastructures and industrial facilities. Cyber-attacks to SCADA networks may cause equipment damage or even fatalities. Identifying risks in SCADA networks is critical to ensuring the normal operation of these industrial systems. In this paper we propose a Bayesian network-based cyber-security risk assessment...
When analyzing competition in telecommunication markets it is fundamental to take into account their specific characteristics. Moreover, it is important to understand the temporal evolution of competition as a result of multiple contextual factors. For these reasons the present study analyzes competition in mobile telecommunications, measured through the Lerner Index, and explains its evolution through...
Mobile Social Network (MSN) can enable many services, such as letting people in an MSN share some useful information during the touring journey. In this work, a clustering scheme is proposed to allow a group of persons, who are in the same MSN and are within the WiFi hot spot' signal coverage of the cluster leader who enables his handheld device's WiFi hot spot function, to share the nearby Point...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.