The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the rapid development of mobile communication technology, smartphones have become indispensable elements in our daily life. Particularly, the increasingly rich smartphone applications (apps) bring great convenience to people while the defects generated in app designing and coding may pose unexpected threats to users. In this paper, we focus on the issue of data leakage between the app client and...
The Altimeters have been more and more used in ocean forecast. They have been used not only in ocean forecast validation but also be assimilated in ocean forecast model. Since August 2011, the HY-2 satellite has been launched successfully, and now it has been used in ocean wave model. This paper is armed to use the Jason-2 altimeter significant wave height (SWH) data to validate the accuracy of wave...
With the advance of wireless technologies, the rapid mobile data traffic growth will lead to severe network resource consumption and exceptionally long latency to access services, especially for cloud-based applications. To tackle these issues, Fog Radio Access Network (F-RAN) is recently emerged for next generation cellular networks. F-RAN is considered as an extension of the cloud computing paradigm...
Due to limited resource, noise and unreliable link, data loss and sensor faults are common in medical body sensor networks (BSN). Most available works used data reconstruction to improve data quality in traditional wireless sensor networks (WSN). However, existing data reconstruction schemes using redundant information of WSN can not provide a satisfactory accuracy for BSN. In light of this, a Bayesian...
In this paper, we present a stochastic geometry based framework to analyze the coverage probability and ergodic rate with different channel allocations for device-to-device (D2D) communications. Different from existing works, we assume there are two different kinds of users, cellular users and D2D users, in the muti-channel uplink cellular network. Specifically, cellular users can upload data to the...
In this paper, a new framework based on the tool of stochastic geometry is proposed to analyze the coverage probability and average rate with different channel allocations in a D2D multi-channel downlink cellular network. We consider a network with two types of users: cellular users and D2D users, where each D2D user has its own D2D relay and can only receive data from the relay. Cellular users and...
This paper investigates cooperative jamming for secure connection in wireless networks. A cooperative jamming strategy is proposed to thwart eavesdroppers anywhere in the network, even if they are located close to the source or the destination. The basic idea is to defeat eavesdroppers by a divide and conquer strategy, and exploit the helpful interference from the source and the destination to circumvent...
This paper investigates divide-and-conquer based cooperative jamming for physical-layer security enhancement in the presence of multiple eavesdroppers. Different from previous works, we consider a scenario where the eavesdroppers can be located anywhere inside the communication region of the source, no location information of the eavesdroppers is available and no constraint on the number of eavesdroppers...
One of the China's ocean energy special fund projects named Integration of investigation and assessment of ocean energy resource and selection of prior utilizing area, from which plentiful measured data and other kind of achievement have been accumulated and settled, has been launched since 2012. In order to visualize the historical and simulated data and exhibit to customers as a display window and...
We propose a Bayesian network based method for the fault diagnosis problem of medical body sensor networks used to collect physiological signs to monitor the health of patients. We formalize a Bayesian network to describe the body sensor network considering both the spatial and temporal correlation in measurements at different sensors. Then we give the theoretical analysis of the fault detection,...
Data veracity ensures that the data used are trusted, authentic and protected from unauthorized access and modification. In order to implement the veracity of big data, specific trust models and approaches must be designed and developed. In this paper, a category based context aware and recommendation incentive based reputation mechanism (CCRM) is proposed to defend against the internal attacks to...
In this paper, we focus on how to solve complex traditional game problems with quantum technology. Quantum game prompts the emergence of cooperation by introducing the quantum strategy to traditional game. We analyze three important factors of the evolutionary quantum game on lattice networks: steps, temptation and entanglement. Results of the experimental applications of analysis procedure are given...
In this paper, we present a model for average rate analysis in a D2D communication overlaying two-tier downlink cellular network. Each mobile UE is able to establish D2D link with adjacent UEs or connect to a nearby macro or pico base station. Stochastic geometry analysis is adopted to characterize the medium contentions within macro and pico cells, as well as the D2D pair distributions, based on...
Based on the tool of stochastic geometry, we present in this paper a framework for analyzing the coverage probability and ergodic rate in a D2D overlaying multi-channel downlink cellular network. Different from previous works, 1) we consider a flexible new scheme for mobile UEs to select operation mode individually, under which a mobile UE decides to establish a cellular link (with a BS) or a D2D...
How to minimize the energy dissipation and extend the lifetime of wireless sensor networks (WSNs) is still an active research topic nowadays. Hierarchical routing based on node clustering is an effective method, while using mobile elements (MEs) to gather data can prevent huge energy consumption of the sensors from long-distance transmission. Considering that both methods have pros and cons, this...
In this paper, we focus on medical body sensor networks collecting physiological signs to monitor the health of patients. We propose a Hidden Markov Model (HMM) based method for fault diagnosis of ECG sensor data. We firstly verify the Markov property of heart rate sequences by medical datasets. Then we use the Baum-Welch algorithm to estimate parameters of HMMs by history training data, and the Viterbi...
Reference Point Group Mobility (RPGM) has been a practical mobility model used to efficiently capture the potential correlation among mobile nodes in many important applications. In this paper, we explore the throughput-delay tradeoff in a mobile ad hoc network (MANET) operating under the RPGM model and also a general setting of node moving speed. In particular, we consider a MANET with unit area...
In recent years, HETerogeneous NETworks (HET-NET) arises as a promising network technique to manage a large number of mobile devices. By using the networks having different coverage size in the HETNET, it enables to increase the network capacity drastically. However, sometimes variations in user distribution causes inhomogeneous traffic load among the networks having different coverage size in the...
In relay communications, the system performances depend heavily on the statistical distances between the source, relay(s) and destination, since the signal strength decays superlinearly with distance. The capacity analysis of relay systems is non-trivial as the relay node(s) is(are) usually randomly located in the network. In this paper, a stochastic geometric approach is presented to analytically...
In the last decade, there has been a tremendous increase in both the number of mobile devices and the consumer demand for mobile data communication. As a general network architecture, ad hoc mobile networks are expected to offload a large amount of mobile traffic in lots of promising application scenarios. However, how to achieve a good balance between delivery performances (like delivery delay and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.