The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although cloud storage service (CSS) is convenient to access data, the cost, security, and performance are the issues to users who consider to adopt CSS. For example, CSS could be unavailable due to technical issues or natural disaster. In order to avoid single point of failure, many users duplicate data into multiple CSS providers (CSPs). However, this will increase cost; decrease security; and is...
Mobile Crowdsensing is a promising paradigm for ubiquitous sensing, which explores the tremendous data collected by mobile smart devices with prominent spatial-temporal coverage. As a fundamental property of Mobile Crowdsensing Systems, temporally recruited mobile users can provide agile, fine-grained, and economical sensing labors, however their self-interest cannot guarantee the quality of the sensing...
Majority of existing Delay Tolerant Network (DTN) multicast routing approaches attempt to individually optimize performance indices such as message delay, forwarding cost, and required storage. Very few define composite cost factors by combining multiple such indices into a single index. This paper introduces a composite index, namely economic gain, which combines revenue from delivery and forwarding...
The more stringent requirements of many applications services — especially in terms of latency and bandwidth — is leading to the migration from data center based architecture towards a mobile-edge computing paradigm. This emerging network architecture aims to increase the overall infrastructure efficiency by delivering low-latency and bandwidth-efficient services. In this context, a not fully investigated...
In this paper, we are visualizing a military health service (MHS) platform which is based on hierarchical IoT architecture. We propose a semantic Edge based network model which plays a significant role for communicating tactical and non-tactical piece of information over the network. Further, the exchange of information and subsequent data analysis on the MHS makes the system intelligent and smart...
The proposed architecture implements a content sharing infrastructure using device-to-device wireless links towards the goal of reducing the usage cost of 3G/4G cellular links. For downloading digital content, a device can first search within the local mobile network at the edge for the requested content before downloading it from the CP's server. The expected usage of 3G/4G bandwidth in this approach...
The consideration of mobile web page and service access for optimization schemes requires a detailed interpretation that goes beyond the commonplace evaluations of HTTP-delivered objects. Evaluating mobile browser interactions with popular web sites, we note that a non-negligible amount of data is delivered with HTTPS and web site interactions could almost exclusively rely on HTTPS delivery of their...
This paper examines the challenges of using electrocardiogram (ECG) monitoring in wearable computing systems for addressing drowsiness detection while driving. The approaches for extrapolating a person's waking/sleeping state using time-series data is provided and verified against real ECG data available from the PhysioBank data archives. A system incorporating an off-the-shelf wearable ECG monitor...
In this paper, a real time detection of Medium Access Control (MAC) layer attacks in IEEE 802.11 wireless networks is proposed. There can be different kinds of Denial of Service (DoS) attacks observed at the MAC layer such as misbehaviour and selfish attacks. The malicious nodes manipulate the MAC protocol parameters such as back-off time, network allocation vector value and short inter frame space,...
In underlay heterogeneous networks (HetNets), the distance between a macro base station (MBS) and a macro user (MU) is crucial for a small-cell base station (SBS) to control the interference to the MU and achieve the coexistence. To obtain the distance between the MBS and the MU, the SBS needs a backhaul link from the macro system, such that the macro system is able to transmit the information of...
A software suite that is capable to simulate Unmanned Aerial Vehicle (UAV) dynamics and, at the same time, network-side behaviors is still lacking in literature. Despite the recent merge between the fields of networking and control, the existing solutions are either dedicated to only one between the aforementioned topics. In this demonstration paper, we describe a novel simulation architecture to...
Content Delivery Networks (CDN) interconnect several surrogate a.k.a replica servers that use geographical proximity as a criteria for delivering multimedia content. The delivered content may be enriched by value-added video services (e.g. in-stream video advertisements). The purpose of this demo is to show the prototype we developed in order to enable a cost-efficient and agile provisioning of value-added...
Interoperability is one of the key requirements in the Internet of Things considering the diverse platforms, communication standards and specifications available today. Inherent resource constraints in the majority of IoT devices makes it very difficult to use existing solutions for interoperability, thus demanding new approaches. This paper presents the process of adapting a lightweight interoperability...
With the congestion and scarcity of available spectrum resources, spectrum sharing between long-term evolution (LTE) and the IEEE 802.11 (aka. WLAN) systems is an ongoing research topic. Considering the LTE license assisted access (LAA) with the listen before talk (LBT) procedure, recent research efforts try to evaluate the performance in several LTE-LBT and WLAN coexistence scenarios. However, the...
This paper develops a brand new approach towards data transfer using position-modulated pulses. The core idea is to encode a data value in terms of the time gap between two transmitted pulses whose positions are modulated accordingly. It is shown that this concept allows sending a data value using significantly less number of pulses or logical bits as used in conventional packet-based transports....
The Sensorian Hub is a software platform designed and developed for using the Raspberry Pi Single Board Computer (SBC) as a sensor node, whether independently or in a larger network of sensors. The intention of the platform is to provide an easy to use and highly customizable system for collecting and processing sensor data in a variety of environments and applications. In this paper, the design and...
Unmanned Aerial Vehicles (UAVs) are gaining more popularity thanks to their versatility, miniaturization, and inexpensiveness. Beyond the limits of single UAV system, multi-UAV systems which can perform complex missionoriented tasks better have been recently introduced. However, previous systems are less automated in the way that human intervention is still required to execute missions, and they were...
The explosive growth in the worldwide use of Unmanned Aerial Vehicles (UAVs) has raised a critical concern with respect to the adequate management of their ad hoc network configuration as required by their mobility management process. As UAVs migrate among ground control stations, associated network services, routing and operational control must also rapidly migrate to ensure a seamless transition...
This paper studies the opportunistic routing (OR) in unmanned aerial vehicle (UAV) assisted wireless sensor networks (WSNs). We consider the scenario where a UAV collects data from randomly deployed mobile sensors that are moving with different velocities along a predefined route. Due to the dynamic topology, mobile sensors have different opportunities to communicate with the UAV. This paper proposes...
Opportunistic Mobile Social Networks (MSNs) are a type of delay-tolerant networks that are composed of mobile nodes with social characteristics. Most of current research on forwarding algorithms for MSNs leverages the properties of social networks, such as community and centrality. However, the fundamental property, interaction, has not received sufficient attention. The effects of interactions consist...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.