The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article presents an analysis of correlation-based clustering procedure in cooperative spectrum sensing. The motivation is to assess if it is more beneficial in terms of energy efficiency to group nodes according to the received signal-to-noise ratio (SNR) on the link between Primary User and node or according to the distance between nodes. To this end, a merged clustering measure is introduced...
In this paper, the performance of the toroidal cellular simulation structure under users' mobility, time-varying traffic, and dynamic channel assignment is evaluated. The toroidal cellular simulation structure has been proposed to effectively eliminate the so called edge effect (elimination of the inflow/outflow of handoff traffic streams to/from the examined area). However, in the toroidal cellular...
One of the most important factors affecting the quality of service (QoS) in orthogonal frequency division multiple access (OFDMA) networks is the intercell interference (ICI). An efficient technique for mitigating ICI is the well-known fractional frequency reuse (FFR), wherein cells are partitioned into center and edge spatial regions and different frequency reuse factors are applied to both of them...
Popularity of wireless sensor networks (WSNs) is increasing day a day where hundreds or thousands of applications are explored. In most of such applications, the need of gathering data periodically about the monitored environment beside the limited, generally irreplaceable, power sensor sources make energy conservation and big data gathering reduction two fundamental challenges in such networks. In...
We investigate the problem of computing Completely Independent Spanning Trees (CIST) under a practical approach. We aim to show that despite CISTs are very challenging to exhibit in some networks, they present a real interest in ad-hoc networks and can be computed to enhance the network robustness. We propose an original ILP formulation for CISTs and we show through simulation results on representative...
Data reduction is one of the most attractive way to conserve the limited energy resources of wireless sensor networks (WSNs). It aims to remove unnecessary data transmission. Therefore, data prediction and reduction mechanisms must be deployed at the source node in order to eliminate the redundant sensed data before sending them to the sink. In this paper, an energy efficient periodic distributed...
The introduction of cognitive radio enables dynamic spectrum access for higher spectrum utilization, due to its ability of awareness of their environment. However, the introduction of cognitive radio technology brings new challenges to wireless networks security. Due to intelligent nature of the attackers, many of the radio frequency jamming attacks can be stealthy by nature. The stealthy jamming...
In this paper, we analyze the outage probability of multiple-input multiple-output cognitive cooperative radio networks (CCRNs) with multiple opportunistic amplify-and-forward relays. The CCRN applies underlay spectrum access accounting for the interference power constraint of a primary network and utilizes orthogonal space-time block coding to transmit multiple data streams across a number of antennas...
The Internet of Things (IoT), describing the Machine Type Communications (MTC), is in the center of many new technical studies and industrial projects. It is also a central topic for the future 5G technologies standardization. Pending the new generation of cellular networks, the 3rd Generation Partnership Project (3GPP) has already standardized in May 2016, an evolution of the 2G and 4G networks to...
In this paper, we present a novel transmission scheme, which consists of a hybrid transmission method combining opportunistic transmission and multiuser diversity. The proposed scheme considers a multiuser scenario, where only one of the users transmits based on their channel quality. Specifically, the proposed scheme considers that users transmit only when the fading amplitude is above a threshold...
This paper considers the layered transmission between the source and the destination over two relays using super-position coding (SC). In this two-hop decode-and-forward (DF) relaying system, because of the network topology, the receiver continuously decodes only the base layer of the direct transmission from the source; the enhancement layer is decoded with a delay based on the transmission from...
Coordinated multipoint transmission (CoMP) and soft frequency reuse (SFR) are two popular techniques used to control the deleterious effects caused by inter-cell interference in current 4G and envisaged 5G cellular networks. The performance of the combination of CoMP and SFR has been shown to be strongly influenced by the specific choice of the parameters governing the action of both mechanisms. Unfortunately,...
We examine possibilities for transmit power reduction both from the relay station (R) and the base station (S − Source) on downlink in dual-hop OFDM decode-and-forward (DF) relay system. Two solutions, known for capacity enhancement in OFDM based relay systems, are applied for improving energy efficiency, while keeping end-user capacity on the same level. In the first analyzed solution, it is assumed...
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a link failure is detected. However, we propose a new route...
Notifications can be relevant but they can also decrease productivity when delivered at the wrong point in time. Smartphones are increasingly capable of detecting relevant context information with the goal to decrease the number of these badly timed interruptions. Accordingly, research on context-aware notification management systems (CNMSs) on mobile devices has received increasing attention recently,...
After years of tremendous development and research in digital currency, the most famous Bitcoin industry chain has been gradually completed including mining, exchange, currency exchange, ATM, pervasive digital wallet design and so on. Especially, its blockchain technology has become FinTech organizations' emerging business and research directions, also been applied in the interdisciplinary medical...
Context-aware systems for smart environments can be very complex and demanding for developers especially in distributed computing and communication environments. We propose a new development infrastructure, that targets this challenge by improving the general system's scalability and traceability. The infrastructure has been developed for and tested in two research labs for smart environments and...
Internet-of-Things (IoT) is no longer just a research hype, but rather a reality in which ICT plays a fundamental role. Programming the behavior of Smart Environments not only enables designers to create innovative interactive experiences for intelligent spaces, but also empowers their inhabitants to tailor the intelligent facilities according to their preferences. To that end, this paper presents...
Future mobility management systems need to in-corporate innovative methods to improve mobile multimedia networking, such as quality-oriented decision-making functions for selecting the best Point of Attachment (PoA) for in-transit Moving Objects (MOs). Among the various correlating algorithms raised in the literature, solutions based on the Multiple Attribute Decision Making (MADM) are beneficial...
Due to the rapid growth in scale and complexity of information networks, self-organizing systems have been focused on for realizing new network control architectures that have high scalability, adaptability, and robustness. However, in self-organizing systems, the uncertainty (incompleteness, ambiguity, and dynamicity) of information observable for components in the system can lead to the slow adaptation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.