The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the openness of the physical layer, the physical layer security has been widely discussed. It is considered as an effective way to improve the secrecy rate that we add artificial noise to D2D communications underlaying cellular networks. Compared to previous studies, in this paper we not only think of the situation where artificial noise is added to the original communication signal between...
With the increasing of mobile devices, Device-to-Device(D2D) communication is considered as a promising technology for achieving direct communication of devices. But the security issues still remain to be solved. In this paper, We utilize D2D communication between UEs in proximity to share epidemic media contents. We propose a Secure Content Sharing Protocol(SCSP) that combine with the credibility...
With the combination of device-to-device (D2D) communication and millimeter wave (mmWave) technology, the density of communication devices increases greatly and the communication environment becomes more complicated. A key challenge in such networks is interference, which is not only from main lobe, but also from the sidelobe power accumulation. However, the approaches for resource allocation in traditional...
This work explores the true user QoE according to the users' preferences and behaviors when the users know that they are being observed and concern about their privacy. We propose a systematic privacy-aware QoE evaluation scheme based on the observable user data. Firstly, we translate the subjective privacy- aware QoE evaluation problem into the objective rational user analysis procedure. Then, a...
To achieve the flexible and efficient transmission of files in the video on demand system, this paper proposed a three-tier fragmentation strategy which provided a unfiled method of fragmentation for video of HTTP Live Streaming and large file. In order to prove the rationality of the three-tier fragmentation strategy, we compared it with the two layers fragmentation strategy and the fragmentation...
On the basis of studying the principle and application technology of P2P protocol, we design the private protocol of P2P application layer to meet the needs of P2P communication. This application layer protocol splits up video into three types of blocks in order to improve transmission efficiency. Besides, the protocol can be expanded when needed since there are some invalid bits in the state list.
Currently, all kinds of Location-based Services (LBS) are gradually demanding more location information of mobile users. The WiFi-based indoor positioning technologies have been investigated intensely. However, both positioning accuracy and stability are often degraded by RSS detection variance between different devices. To solve the two problems, this paper proposes a compensation strategy for RSS...
Device-to-device (D2D) communication has been widely studied to improve network performance and it has been considered as a potential technological component for the next generation of communication. Targeting the video distribution, a significant challenge in D2D communication network is to efficiently provide media services with the constraints of limited resources, user's mobility, opportunistic...
Atmospheric turbulence (AT) induced crosstalk can significantly impair performance of free-space optical (FSO) communication link using orbital angular momentum (OAM) multiplexing. OAM-multiplexed communication is equivalent to the Multiple-input Multiple-output(MIMO) system. And MIMO equalization is a good method to mitigate the crosstalk existing in MIMO system. Based on the reason above, we propose...
With the emerging demands for the large-scale services, Device-to-Device (D2D) communication has been viewed as a promising technology to improve the network capacity and user experience. In particular, the peer discovery is the first step to establish a D2D communication. Considering that quality of experience (QoE) is an important metric in video services, We propose a QoE-driven peer discovery...
The Information Fidelity Criterion (IFC) of image assessment metric is based on the statistical mutual information shared by reference image and distorted image. IFC is parameterless and superior to traditional methods. However, human vision system (HVS) is adaptive to different scale feature of image. A multi-scale IFC approach to model the characteristics of HVS was proposed in this paper, in which...
The inherent randomness of wireless radio channels can be employed to extract secrets, whenever the channel reciprocity holds. Privacy amplification is an ingredient step for removing the redundancy of key, of which, the mount of information leaked to potential eavesdroppers, is often difficult to determine. In this paper, we propose a secret-key generation scheme without privacy amplification, of...
Cloud computing offers utility-oriented services to users, which is supported by large-scale data center. Although virtualized data centers provide high performance computing service, they also consume enormous amount of power. To solve the problem, dynamic consolidation of Virtual Machines (VMs) is considered as an efficient way to reduce power consumption and guarantee Quality of Service (QoS)....
Fall detection is one of the feasible solutions for solving the problem of aging of population. This paper presents an algorithm to detect falling for the elderly with one wrist-worn device. The algorithm has lower computation complexity to determine the fall event according to the inclination gradient. Experimental results show that it performs better than another similar devices with the average...
Recently, attracted by the abundant computation and networking resources in the cloud, an increased number of mobile media services have been hosted by the cloud computing platforms. These mobile media clouds (MMCs) run hundreds of thousands of servers and consume megawatts of power with massive carbon emission. Virtualization is adopted to allocate resources elastically from a shared resource pool...
Wireless communications employing 60 GHz millimeter wave are quite attractive recently due to the huge clean unlicensed bandwidth (up to 7 GHz) in this frequency band. In this paper, aiming at increasing channel capacity and improving the reliability of non-line-of-sight (NLOS) indoor wireless communications, we focus on a first-order-reflection multiple input multiple output (MIMO) model for 60 GHz...
The existing spectrum sensing schemes based on free probability theory (FPT) have a high sensing performance especially in cases of low signal to noise ratio (SNR) and a small number of samples. However they all based on data fusion rule when performing cooperative spectrum sensing. The secondary users (SUs), in this case, have to transmit large amounts of sensing data to a fusion center (FC). It...
In the practical application of cognitive radio network, it is especially important to improve the energy efficiency for those energy-constrained cognitive users. From the perspective of maximizing the energy efficiency in cognitive radio networks, this paper considers the case that the sudden appearance of the primary user can lead to data collision when the cognitive user is transmitting data. Then...
In this paper, in order to properly evaluate the relative importance of priors and observed data in the Bayesian framework, we propose an extended Gaussian mixture model (EGMM) and design the corresponding learning inference algorithms. First, we define the likelihood function of the EGMM and then propose the variational learning algorithm for this EGMM. Moreover, the proposed model and approach are...
We propose a low-rate turbo-Hadamard coding approach for narrow-band interference (NBI) suppression. The proposed approach can be viewed as the employment of a coded spread-spectrum signalling with time-varying spreading sequences and the NBI suppression is naturally achieved in iterative decoding. Compared with the traditional code-aided NBI suppression with direct-sequence spread-spectrum (DS-SS)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.