The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
TCH codes are a class of binary nonlinear cyclic codes that have been used in several systems (e.g. mobile satellite, Ultra-Wideband) for tasks like coding and synchronization. The original generating method of this class of codes restricts the length (or period) of the codewords to the set {2, 4, 16, 256, 65536}. In this paper we use an alternative generation method based on the algebraic properties...
This paper presents a comprehensive non-exhaustive comparative study of hard disk drive read-channel equalization techniques used in the readback process of magnetically stored information. The main read channel architectures: partial-response maximum likelihood (PRML) and decision feedback equalization (DFE) based systems, are compared in power consumption, layout area, data signalling rate and data...
Wireless video transmission is one of the main applications of wireless local area networks. And high-speed video transmission can be achieved with the application of MIMO-OFDM technologies. But the conventional digital video transmission in MIMO has to degrade performances of all the antennas to be the same as the antenna with the worst channel gain. Based on H.264/AVC and ParCast, a hybrid digital-analog...
Dynamic adaptive streaming over HTTP (DASH) has gained a significant momentum for multimedia streaming due to its ability in crossing firewalls and availability of infrastructure. In the mean time scalable video coding (SVC) is building a similar momentum as it enables efficient media storage and caching. In this work, we identify the main components of adaptive SVC-DASH client and propose an streaming...
The gap between the traffic demand and the link capacity, along with time-varying link conditions, results in poor service quality of video streaming services over the mobile networks. Leveraging the mobile cloud computing and wireless Device to Device (D2D) technology, we propose and discuss a framework to improve the quality of video services in a special scenario that adjacent mobile devices desire...
Virtualisation of cellular networks can be seen as a way to significantly reduce the complexity of processes, required nowadays to provide reliable cellular networks. The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN) is a EU FP7 Large-scale Integrating Project (IP) funded by the European Commission that is focusing on how cloud computing and network function...
Infrastructure-as-a-Service (IaaS), which is offered by cloud computing, has focused on providing computing and storage resources, considering network mostly as a required communication accessory and not as a resource itself. In other words, the ability to define network resources (e.g. routing/switching elements, bandwidth, delay) is still very limited. However, the need to have more robust solutions...
Leveraging the resemblances between two areas explored so far independently enables to provide a theoretical framework for distributed systems where global behaviors emerge from a set of local interactions. The contribution of this paper arise from the observation that population protocols and multi-agent systems (MAS) bear many resemblances. Particularly, some subclasses of MAS seem to fit the same...
In Content-centric Networking (CCN), in-network caching can enhance content delivery at a global scale without requiring special infrastructure. In this paper, we propose a lifetime-based greedy caching approach (LBGC) which involves both caching decision and cache replacement. Contents are preferred to be stored in nodes with high betweenness centrality, and only expired cache items can be replaced...
Network operators — being it fixed or mobile — are in continuous need to keep up with a variety of customer requirements while seeking efficient ways to interconnect with other networks. This issue raises several, not only technical challenges that are addressed differently depending on the legacy of operators. This paper conducts a holistic comparison of two interconnection models used for global...
The key factors for a routing protocol in Ad Hoc networks include route discovery, route maintenance and route destroy. Our laboratory has done a lot of researches based on our Ad Hoc hardware platform applying the classical AODV protocol. We found out that an essential cause for unsuccessful route discovery, instable route or even the limitation of hop numbers can be summarized as the bad channel...
An empirical investigation on the dependence of TCP upstream throughput against signal to noise ratio (SNR) in an IEEE802.11b WLAN system was carried out in various environments and varieties of QoS traffic. The TCP upstream throughput (TCPupT) was measured for various SNR observed. An Infrastructure based IEEE802.11b WLAN system having networked computers on which measurement software were installed,...
In power system, consumers' power demand are highly desirable information by grid operators for asset management and grid operation. However, users may hesitate to report such private information due to the potential privacy leakage risk and other extra cost. A compulsory-based scheme which forces consumers to reveal private data, or a punishment scheme in which consumers get penalty for unwillingness...
The explosive increasing data on mobile terminals has multiple perspective of value for users and service providers, such as improving user experience, resource allocation and mobile devices marketing, etc. However, it lacks massive fine scale mobile data for studies. Previous research still limited in a grain scale, making analysis in a static way to the data obtained from Internet Service Providers...
The increasing popularity of mobile devices, such as smartphones, has changed the way people access and manage data. In particular, with the increased capabilities of mobile phones, many services are now available and routinely used on the go (e.g., home banking, e-commerce, remote work, internet access and entertainment). As a result, more and more confidential data is now stored on these devices,...
Nowadays, mobile communication devices allow ubiquitous access to a plethora of rich contents and services, intended to make life easier. As a consequence, almost everyone carries a mobile phone almost everywhere. These devices can unobtrusively capture data from a multitude of built-in sensors, which may help detect and keep a record of relevant activity taking place. This is the starting point of...
In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to tackle the issue of spam botnet detection. We add a new line of defense to the defense-in-depth model called the third line. This line is represented by a security framework, named the Spam Trapping System (STS) and adopts the prevent-then-detect approach to fight against spam botnets. The framework...
End-to-end delay is an important metric for network performance. This paper studis the end-to-end delay in a two-hop Cognitive Machine-to-Machine (CM2M) network, where a pair of primary users (PUs) coexist with a secondary (SR) network with many two-hop line M2M communication links. The occupancy of the licensed channel by PUs is modelled as a continuous-time two-state (busy and idle) Markov process...
With the widespread deployment of LTE 4G systems and large number of connected devices due to the Internet of Things, M2M services using LTE is under consideration by many cellular operators. In LTE Rel-12, low cost M2M devices with material cost comparable to EGPRS devices are being introduced. In addition, coverage enhancement techniques, which would be required to support M2M, will be standardized...
With the widespread deployment of LTE 4G systems and large number of connected devices due to the Internet of Things, M2M services using LTE is under consideration by many cellular operators. To provide ubiquitous network coverage for M2M services, 3GPP will introduce coverage enhancement feature in Rel-13. In this paper we analyze features which will extend the range of an LTE system by up to 15dB...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.