The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) for agriculture is a rapidly emerging technology where seamless connected sensors device make it possible to monitor and control crop parameters to get quality and quantity of food. This research proposes a new dynamic clustering and data gathering scheme for harnessing the IoT in agriculture. In this paper, an Unmanned Aerial Vehicle (UAV) is used to locate and assist...
Data is becoming more and more valuable as technology advances. Through crowdsourcing organizations are able to collect large amounts of data at an effective rate with little cost. This paper proposes a crowdsourcing-based music playing system, where the next song to play is determined by the listening preferences of realtime online users. Unlike conventional radio play system, where songs are randomly...
Wireless caching enables popular files to be stored at the base stations (BSs) in advance, which has been considered as an efficient way to reduce the service delay and alleviate heavy burdens on the backhaul links. In this paper, we study the BS clustering scheme for the cooperative wireless caching networks (CWCNs) with heterogeneous file preference among users and BSs, and propose the minimum cost...
The growing interest of our society for health issues and physical activities is reflected on social media services where people share information about their daily activities and accomplishments. Fitness activities has become a routine present in many people's daily activities. Previous studies have analyzed people commitment to enhance their lifestyle and reach health objectives using data published...
Efficiency of mobile investigation process (Smartphone Forensics) is associated with its evidence analysis phase. This phase rests on collection and location of all evidence and their temporal, functional and relational combinations. High volume of these sets evidence, its complexity and size of relations between the different data types may complicate the evidence analysis phase and crime reconstruction...
In this paper, we report an application of data analytics in a real world business case of the telecom industry. This work has been tied up with an IT company in India with a large data set of telecom customers. As part of data analytics, the first task was to perform cleansing of bad and missing data, transforming heterogeneous formats into a unified format, semantic analysis on the data (semantics...
The realization of IoT in real world without sensing devices is impossible. These sensing devices are battery operated and energy constrained in terms of computation and communication. The optimized communication leads to longer network life time. Minimum hop count, increased connectivity and scalability are challenging issues that can be effectively addressed by clustering mechanism. In the two tier...
Wireless Sensor Networks (WSNs) is a group of small sensor nodes having limited computation, memory, communication and sensing capabilities. The distributed nature and dynamic topology of WSN introduces very special requirements in conserving energy and providing security. To address these challenges, technique like secure and energy efficient clustering scheme with data aggregation has been developed...
Adaptation of the dataset shift has grown to be of great importance in machine learning problems in recent years. Reframing has emerged as a new machine learning technique that adapts the context changes between training and target domains. One of the advantages of reframing is that it can offer good performances with a limited amount of deployment data. Reframing has already been implemented in classification...
In wireless sensor networks, the limitation of energy and cache space of nodes around the base station, as well as the multi-hop transmission instability will seriously interfere the performance of traditional data collection protocols. To address this problem, a data collection mechanism by using mobile base station is proposed. Firstly, a new clustering algorithm-Time High-Overflow-Based Dominating...
Mobile sensors are expected to play a significant role in the next generation Internet of Things (IoT) networks, with sensors in vehicles, drones, robots and more. These mobile sensors participate in data gathering for various application scenarios. Some applications are information intensive in that huge chunks of data are required in order to make informative decisions. However, mobility in Wireless...
For mobile networks diverse usage scenarios have different capability requirements on connection density and user experienced data rate, and modeling such capability diversity is crucial to the strategy evaluation in addressing the problem of high traffic load and scalability of network resources. Therefore, it is necessary to build a capability model in two dimensions of connection density and user...
Mobile phone communication is an important part of human life. Nowadays a great variety of scientific works are dedicated to the investigation of the calls and cellular networks. Efficient analysis of such networks can be a great source of the information useful for reconstruction and simulation of social phenomena. The main goal of this work was to understand how much information can be obtained...
As the competition in mobile markets becomes fiercer, telecom operators have devoted themselves to serving subscribers better. Among large number of subscribers, there are some anomalous users who should be paid more attention to, such as those issuing a lot of unsolicited calls to normal subscribers or making calls to one single phone number continuously. Our study is based on the data of Call Detail...
Fingerprinting localization is to estimate a mobile terminal's location using its online received signal strength (RSS) measurement and offline RSS database originated from multiple access points (APs). Kernel-based fingerprinting localization is such a competitive algorithm. However, all training data need to be considered in its offline model learning stage. This render high risks for overfitting...
Terrorism is on the rise in the Indian Sub-Continent and application of data mining techniques to analyse terrorist attacks is the need of the hour. The Security Forces (SF) in this region still rely on traditional and manual analysis methods. Data mining in this field is in its budding stage and if utilised efficiently will greatly facilitate the SF in preventing any terrorist attacks. SF are constantly...
Wireless sensor networks [WSN] have played a prominent role in changing the technology scenario. Although most number of proposals have come through to validate its parameters still there are small issues which pose a large threat to the performance criterion of WSN, one among is the hand over which is least addressed in all types of advancements and still poses a problem for the sensor-nodes with...
To increase the throughput and performance of the next-generation wireless cellular network, this paper proposes two clustering algorithms for integrated cellular and ad hoc relaying systems. In this system, we consider that all the available users are divided into two groups: One is the super group which locates in the cell central region, and another is the regular group which locates in the cell...
Telecom Networks produce huge amount of daily alarm logs. These alarms usually arrive from different regions and network equipments of mobile operators at different times. In a typical network operator, Network Operations Centers (NOCs) constantly monitor those alarms in a central location and try to fix issues raised by intelligent warning systems by performing a trouble ticketing based management...
Rapid growth of static and dynamic applications has led to the expansion of Wireless Sensor Network (WSN). Sensor mote uses non-rechargeable batteries deployed in large numbers in the remote area; hence, dealing with the utilization of energy is an essential task in WSN. Clustering of motes gives an improved utilization of energy in the node thus balancing the load in both static and dynamic environments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.