The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Licensed-Assisted Access Long-Term Evolution (LAA- LTE) framework can offload excessive data stream to the unlicensed spectrum. Devices from different operators will compete for the same band and have to endure a more complex and congested channel conditions. Therefore a rapid and efficient access mechanism should be introduced in the LAA framework. Based on the Type B LBT channel access scheme, this...
Recent advances in the field of ultra wide band (UWB) localization system has brought renewed interest to the problem of indoor localization system, which has a wide range of applications, such as localization in mine, commodity localization in market or factory and other fields. However, in real scenario, the time synchronization and the limited located users problems are widely existed. An indoor...
The surveillance for data collection in wireless sensor networks (WSNs) setting is recognized as an important application of WSNs. Given an area of interest and a number of wireless sensors, typical problems to be addressed are covering the whole area while prolonging the network lifetime. It is explicitly observed that most existing studies focus on limited case in which the interested area is static...
Characterizing mobile traffic is important to network operators from a network performance and security standpoint. In many cases, such as a performance degradation or security threat, it is useful to know that traffic is being generated by a specific mobile application. Recent methods for identifying mobile traffic have relied on computationally expensive detailed inspection of HTTP flows which may...
The paper addresses the problem of state estimation using the measurement output of a mobile pointwise sensor for a class of nonlinear distributed parameter systems, which are modeled by a scalar semi-linear parabolic partial differential equation. A Lyapunov-based co-design method is proposed for simultaneous design of the guidance law of the mobile sensor and the distributed-parameter Luenberger...
Downlink Carrier Aggregation is a promising LTE-Advanced technology which is introduced in 3GPP LTE Release 10. Meanwhile, it introduces some challenges since more uplink control information needs to be fed backed from UE to eNB to enable the carrier aggregation. In this paper, we firstly introduce the CA feature in LTE-Advanced, and present the PUCCH format 1b with channel selection and PUCCH format...
Service Providers (SPs) typically set data price according to flat rate, the time or the usage. However, the importance of multimedia content is different among various packets, and such diversity has largely been ignored in the past. In this paper, we propose a fundamentally new framework named Smart Media Pricing (SMP), to allocate price according to multimedia packet importance in terms of distortion...
Intelligence has become more and more popular, especially in smart grid. Nowadays, the inspection for power elements has changed from a traditional method to a more intelligent way using mobile terminals, which has greatly improved the work efficiency. However, this new method may reveal individual privacy such as workplace, work hours and personal habits, which may become background knowledge for...
In this paper, we introduce a new strategy of using VANET nodes with visual sensors and wireless transceivers to build an instant camera barrier for a given mission period. Given a set of properly equipped VANET nodes whose drivers voluntarily join the protocol by exposing their future travel plans and use onboard equipment to transmit realtime video to the authority, we aim to maintain the barrier...
The surging deployment of WiFi hotspots in public places drives the blossoming of location-based services (LBSs) available. A recent measurement reveals that a large portion of the reported locations are either forged or superfluous, which calls attention to location authentication. However, existing authentication approaches breach user's location privacy, which is of wide concern of both individuals...
The Internet of Things (IoT) paradigm connects everyday objects to the Internet and enables a multitude of applications with the real world data collected from those objects. In the city environment, real world data sources include fixed installations of sensor networks by city authorities as well as mobile sources, such as citizens' smartphones, taxis and buses equipped with sensors. This kind of...
Existing work on localization in wireless rechargeable sensor networks (WRSNs) assumes that the charger is equipped with an omnidirectional antenna. We notice that the current available COTS (Commercial off-the-shelf) energy harvesting kit such as the one manufactured by Powercast includes wireless charger with directional antenna. We consider the localization problem in a wireless rechargeable sensor...
Device-to-device (D2D) communication is known as a promising way to cope with the growing mobile video traffic, which may suffer from the short duration caused by the limited energy supply. In this paper, we propose a practical D2D cooperation framework based on distributed optimization to extend the video transmission duration. In the multi-path multi-hop D2D communication scenario, we effectively...
In this paper, beam steerable antenna is deployed in mobile relay station (MRS) on vehicles to increase the link reliability and system flexibility in mobility. With only a single radio frequency (RF) chain, various beam patterns can be formed and selected electronically in a simple and low cost way. We proposed beam switching mechanism to mitigate neighboring interference and improve handover performance...
Many people share photos and their locations using applications such as Foursquare, Facebook and Twitter when attending an event or activity, as a means for promoting an activity, for conversation and as an archive to create a sense of community. People find events to attend using applications such as Event Brite and Meet Up, and exchange contact information using applications such as Whats App or...
Distributive service data storage at the caching-enabled base stations (BSs) can reduce the traffic load in future cellular networks. Taking the limited caching space into account, it is necessary for the BSs to adjust their caching data based on service popularity in order to achieve better caching efficiency. In this paper, we investigate the cache replacement strategy for BSs to minimize the transmission...
With the rapid proliferation of RFID-based applications, RFID tags have been deployed into pervasive spaces in increasingly large numbers, e.g., the shelves of super markets are filled with tag-labeled items. Conventional localization schemes usually leverage precise anchor nodes to help compute the position of objects. However, it is usually difficult to find or deploy enough anchor nodes for accurate...
Opportunistic forwarding assisted by mobile relays is an effective way of improving network capacity and packet delivery ratio in delay tolerant networks (DTNs). However, such performance gain comes at the price of increased energy consumption due to the duplicated transmissions at relays. In this paper, we investigate how energy harvesting, a promising technique of enabling sustainable communications,...
Current research environments are witnessing high enormities of presentations occurring in different sessions at academic conferences. This situation makes it difficult for researchers (especially juniors) to attend the right presentation session(s) for effective collaboration. In this paper, we propose an innovative venue recommendation algorithm to enhance smart conference participation. Our proposed...
TD-LTE mobile communication systems use MIMO technology. In this paper, a mobile phone MIMO antenna design with two elements having high isolation is presented. The antenna can work in 2300/2500MHz frequency bands. The method of distance isolation is used to reduce the coupling between the two antenna elements. HFSS is used in the simulation analysis and optimization of the antenna. Test results show...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.