The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A simple model for extrapolating customer demand for broadband access services is introduced. The concept of “Equivalent Urgent Download” is proposed as a means for modelling customers' perception of the utility of the bitrate of broadband access services. Some implications for the possible future roadmap of the Australian national broadband network are explored. Sample analysis is provided to illustrate...
Considering the time-varying power consumption of users and cost of generation over a day, demand side management (DSM) has become essential to meet the excessive need of users with the limited source of power. In this paper, we propose a utility based optimal Real-Time Pricing (RTP) mechanism for the future smart grid communication systems such that the electricity price corresponds to the optimum...
Security threats in the Internet have been ever increasing, in number, type and means used for attacks. In the face of large-scale attacks, such as DDoS attacks, networks take unacceptable time to respond and mitigate the attacks, resulting in disruption to connections and the losses due to it. In this work, we look into the problem of dynamically mitigating attacks from the perspective of an ISP...
Mobile edge computing is an emerging technology required to meet the very low latency requirement of 5G communication systems, where application resources are embedded within access networks. Edge computing resources can be deployed very close to end users, e.g., attachment points (AP). In such cases, the edge servers are likely to have a relatively smaller computing capacity than servers deeper in...
The RPL routing protocol has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed to secure the RPL protocol, and simulation studies have been put forward as the main research method while testbed experiments though an authentic research and testing method has been ignored. Although Testbed experiments...
Decreasing network downtime for wireless telecommunication systems is becoming more and more important. Therefore, degrading system performance needs to be identified long before key performance indicators pick up on it. As a lot of information about what is going on in the telecommunication network can be found in counter readings, exploratory data analysis, such as unsupervised clustering algorithms...
In this paper, we aimed to build the Abnormal Behavior Profiling (ABP) of IoT devices to supplement other studies that focused on the abnormal behavior detection of IoT devices with a high accuracy rate by a wide variety of machine learning algorithms. ABP will integrate all types of abnormal behavior detection and possess a key role for the purpose of IoT security in the future. Our technical motivation...
In this paper, we explore the concept of flow-based load balancing of network traffic on multi-homed hosts. In contrast to existing approaches such as MPTCP, our approach is a client-side-only solution, and can therefore easily be deployed. We specifically explore flow-based load balancing for the web traffic use case. Experimental evaluations of our OpenFlow-based load balancer demonstrate the potential...
Electric Vehicles (EVs) can be considered as a step forward towards the green environment and economical transportation. Moreover, EVs offer fuel economy, clean environment, and less cost of vehicle charging as compared to gasoline refilling. These are the main motivations towards the adaptation of EVs by the users. In order to increase the penetration of EVs into the transportation system, the EV...
Multilevel polarization shift keying (MPolSK) is an optical modulation scheme, in which the state of polarization changes according to transmission data. When either the transmitter or the receiver is not fixed, the mismatched polarization axes is caused. It significantly degrades the communication performance. To overcome this problem multilevel differential PolSK (MDPolSK) was proposed, in which...
Recent advances in chaotic communications have paved the way for the implementation of matched filter based receivers to detect chaotic signals generated by hybrid-chaotic oscillators. These oscillators offer an exact analytic solution given their fixed basis function. This paper extends the hybrid-chaotic oscillator concept and presents a novel hybrid-chaotic oscillator for multilevel chaotic modulation...
One of the promising enhanced features introduced in LTE-Advanced is relaying. Coverage extensions as well as enhanced throughput gain are attractive from the perspective of network operators. While functioning in the macro-overlaid network, relay offers the flexibility of random deployment (nomadic relay) at places where the communication link is congested due to an occasional event (e.g. festival)...
The Internet of Things (IoT) for agriculture is a rapidly emerging technology where seamless connected sensors device make it possible to monitor and control crop parameters to get quality and quantity of food. This research proposes a new dynamic clustering and data gathering scheme for harnessing the IoT in agriculture. In this paper, an Unmanned Aerial Vehicle (UAV) is used to locate and assist...
This paper presents a novel radio-resource scheduler with a hardware accelerator for coordinated scheduling in 5G ultra-high-density distributed antenna systems. In 5G mobile communications systems, the transmission weight and the overall system throughputs for a huge number of possible combinations of antennas and user equipment have to be computed. To accelerate the scheduling, the new scheduler...
In cognitive radio networks, secondary users (SUs) must accurately sense the spectrum of primary user (PU) to acquire their own communication opportunities without interfering PU's communication. Collaborative spectrum sensing (CSS) among SUs can improve the probability to detect PU's communication, compared to non-collaborative spectrum sensing, where each SU senses signal independently. In this...
The paper discusses new scheduling algorithms that are modifications of classical cycle based scheme, named the cycle based algorithm with time alternating priorities and time guard. The classical cycle based algorithm assumes that a given packet stream can be served only in predefined periods while it is not entitled to receive service in the periods dedicated to serve other packet streams. This...
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
This paper proposes a method of TCP multi-pathization for IoT network by SDN. The method distributes packets according to the congestion between paths and IP packet length. Since it is performed over SDN, no changes of existing protocols and devices are required. The authors implement the method by actual IoT devices and evaluate QoS by experiment. The results of the experiment show that the TCP throughput...
The high density code-shift-keying (CSK) using Pseudo Noise (PN) codes generated by combining modified pseudo orthogonal M-sequence sets (MPOMs) with biorthogonal code has been proposed. In this paper, synchronous code division multiple access (SCDMA) capability of the proposed system is clarified under the optical-wireless channel. Consequently, simulation results are in good agreement with theoretical...
Recently, a semi-blind pilot decontamination based method is proposed in [1] for multicell multiuser massive multiinput multioutput (MIMO) systems. In [1], to reduce the effect of the pilot contamination, a semiblind channel estimation method that does not require cell cooperation or statistical information of the channels is proposed. The blind pilot decontamination method in [1] is reformulated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.