The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Small Cells (SCs) are considered as a key enabling technique for future 5G cellular networks; whether they are deployed for Macro Cells networks densification or ensuring a standalone broadband access service. However, one of the critical challenges facing SCs deployments is a stable and an economical backhaul network. Particularly, if we consider SC for green-field deployments where operator transport...
the performance of multi-antenna spectrum sensing over Nakagami fading channel is analyzed when the received signals from multiple antennas are uncorrelated. Firstly, maximal ratio combining, equal-gain combining and selection combining are employed to combine multiple signals, and then the noise-normalized energy algorithm is adopted to detect the combined signal. And then, detection probability,...
This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the direct links are used to convey the source's information. Since relays act as eavesdroppers, a source-based jamming technique is proposed to keep the source's message secret from these helper nodes. We analyze the secrecy capacity of partial relay selection based on outdated...
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user device, and placing them in a trusted network node at the network's edge. Our research perspective is particularly centered around three interrelated mobility challenges, i) the allocation...
The smart grid is a complex network that aims to manage the electricity usage and reduce consumption. It is composed of a large number of intelligent devices and systems that exchange sensitive data via several networks (HAN, NAN, FAN). The Neighborhood Area Network covers communications between smart meters and the collector that transmits aggregate data to the control center. The NAN network is...
Privacy, especially source location privacy in many Wireless Sensor Networks (WSNs) applications plays an important role in the effectiveness of these applications. Exposure of source location information in these applications may put the monitored entities or subjects in danger. Many solutions are available based on various techniques, including random walk. Most existing random walk based source...
Modern mobile pervasive applications focus on context awareness that monitors a diverse range of personal domains. In order to infer contextual information, most of these applications require the collection of raw data from sensors which are either embedded in personal smartphones or worn by the user. Critical context-aware applications rely on continuous accurate monitoring of the user's current...
Mobile and wireless networks have long exploited mobility predictions, focused on predicting the future location of given users, to perform more efficient network resource management. In this paper, we present a new approach in which we provide predictions as a probability distribution of the likelihood of moving to a set of future locations. This approach provides wireless services a greater amount...
Smartphones with various embedded sensors and wirelessly connected external sensors will enable new applications across a wide variety of domains. Continuous or long-term sensing, processing, and communication of sensor data using smartphones will consume a significant amount of energy of the resource-constrained smartphones. Compression techniques, including predictive coding (PC) and compressed...
Cloud service behavior mainly in dependability terms is nowadays a highly requested feature since cloud environments are failure prone. As a matter of fact, cloud consumers are more reluctant for cloud adoption given the dramatic impacts of failures in these environments. In order to convince cloud consumers with the fulfillment of the promised dependability rates, we need to assure dependability...
Voice activity detection (VAD) is frequently used in many speech processing applications to distinguish the active voice regions from the silent intervals. In speech compression systems, the VAD represents an important build-in component to reduce the network bandwidth consumption through the discontinuous transmission mode. In this paper, we propose a VAD scheme based on adaptive threshold to maintain...
For a long time, developing empirical propagation models have been an area of interest of scientist and researchers due to their simplicity and low cost in term of used resources. Their major drawbacks reside in the lack of accuracy which can be improved by adjusting model for a given area and frequency. This operation is called model tuning or calibration. In the present work we are interested to...
With rapid development in mobile devices with high quality image and video processing capabilities, it is desirable or necessary to implement steganography technology within such devices in some applications such as source authentication. In this paper, we propose a method of implementing information hiding within a video with less processing time and memory requirement. The message to be secretly...
The success of Peer-to-Peer (P2P) systems has led to its utilization in a wide range of application domains other than file sharing. P2P media streaming is rapidly growing, consequently many P2P streaming systems have been deployed. However, peers in P2P environments are heterogeneous, and differ in resources and demands which may result in a poor streaming experience. This issue may be addressed...
Facing today's increasingly serious health problems, we designed and implemented an Android-based health and healthcare system, with a view to helping mobile users develop healthy living habits and enhance their health awareness. The system uses C/S mode and HTTP protocol as the communication protocol. The client consists of five functional modules and uses Volley to access network. The data of client...
Compressed Sensing(CS) based video coding techniques are low-complexity in general, but with marginal compression results. Also, wireless multimedia devices have serious resource constraints, with fluctuations in bandwidth(for up-link traffic) and available power. In this paper we propose a nested technique in which CS data is further compressed within the CS domain to give far better compression...
Wireless electroencephalogram (EEG) sensors have been successfully applied in many medical and computer brain interface classifications. A common characteristic of wireless EEG sensors is that they are low powered devices, and hence an efficient usage of sensor energy resources is critical for any practical application. One way of minimizing energy consumption by the EEG sensors is by reducing the...
Machine learning techniques can be used to improve the quality of experience for the end users of Content Delivery Networks (CDNs). In a CDN, the most popular video contents are cached near the end-users in order to minimize the contents delivery latency. The idea developed hereafter consists in using prediction techniques to evaluate the future popularity of video contents in order to decide which...
Robust and prompt emergency response is a crucial service that smart cities should provide to citizens, communities, and corporations. Emergency management strategies that are currently supported by cities yield pre-determined protocols that can only handle well-understood incidents. However, there are incidents whose nature, shape, scale, and timing are not as predictable. The lack of adequate data...
Traffic monitoring systems play a key role in the transition toward smart cities and more efficient transportation systems. Roads and highways are now equipped with sensors to measure traffic flow, predict congestion, and adaptively control traffic routes. Traffic planning applications rely on sensors to provide accurate information about vehicles and infrastructure status. Vehicle class is an important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.