The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay tolerant network, because of the unreliability of the link, and the limit of the network resources, needs to select the appropriate data forwarding algorithm to ensure efficient message forwarding and delivery. According to DTN properties, this article first establishes the DTN two-layered mobility model. Then it introduces node's location, direction of movement and other important parameters...
The Multicast/Broadcast Service (MBS) feature of mobile WiMAX network is a promising technology for providing wireless multimedia, because it allows the delivery of multimedia content to large-scale user communities in a cost-efficient manner. In this paper, we consider WiMAX networks that transmit multiple video streams encoded in scalable manner to mobile receivers using the MBS feature. We focus...
This paper addresses color correction of the panoramic image for mobile multimedia devices. To compensate the visible color difference caused by defects of optical systems near a seam which is a connected path of low energy pixels between images, we propose an adaptive blending algorithm based on the human visual system. In the proposed algorithm, a blending range is adjusted according to the color...
Recent technological advancements have led to the popularity of mobile devices, which can dynamically form wireless networks. Unfortunately, mobile devices are vulnerable to failure because of various factors, including physical damage due to deployment in harsh environmental conditions, limited energy, and malicious attacks. Detecting node failure is an important problem that has been widely studied;...
Opportunistic spectrum access (OSA) currently receives a constantly growing interest due to the under-utilization of the licensed spectrum. OSA refers to identifying and exploiting spatiotemporal underutilized spectrum portions in order to be occupied by unlicensed-secondary users. The efficiency of an OSA scheme is strongly correlated with the adopted sensing strategy and primary user activity model...
This paper describes new algorithms for mobile backbone network optimization. In this hierarchical communication framework, mobile backbone nodes (MBNs) are deployed to provide communication support for regular nodes (RNs). While previous work has assumed that MBNs are unconstrained in position, this work models constraints in MBN location. This paper develops an exact technique for maximizing the...
The exponential growth of users in Mobile Telecom Network has forced operators to analyze their network more frequently to predict changes in user behavior and offer right incentives to retain them in their network. In this paper, we propose a self-contained approach to the problem of analyzing the community structure to identify bridge members in the community and also to understand their diffusion...
For some sensor network applications, the problem of sweep coverage, which periodically covers POIs (Points of Interest) to sense events, is of importance. How to schedule minimum number of mobile sensors to achieve the sweep coverage within specified sweep period is a challenging problem, especially when the POIs to be scanned exceeds certain scale and the speed of mobile sensor is limited. Therefore,...
The rapid growth of emerging techniques for mobile resource sharing, content sharing, mobile social networks, and complex cyber-physical systems poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on Peer-to-Peer (P2P) systems. However, due to the difficulties caused by system mobility, wireless...
This paper first presents a RFID-based mobile logistics monitoring system framework composed of mobile front-end application sub-system and back-end monitoring and service sub-system. The system architecture is designed, and the operating principle is described. The architectures and functions of the front-end application software and back-end monitoring software are discussed in detail. In practical...
Deployment problem is how to deploy a number of nodes in the area of the network so that the covered area is maximized. In this paper we consider the problem of self-deployment of a mobile sensor network. Such networks with locomotion capability are able of self-deployment; i.e., starting from some random initial configuration, the nodes in the network can distribute such that the area `covered' by...
It is heterogeneous wireless Networks (HWN) aggregation foundation for vertical handoff (VHO), and that is key characters of core technology for multi-network aggregation. The currently mechanism handoff trigger is analyzed, a best network selected (BNS) framework is designed, the parameters of network terminal and user terminal of effecting VHO algorithm, and which also include norm of capable parameters,...
The delay tolerant mobile sensor network distinguishes itself from conventional sensor networks by several unique characteristics such as node mobility, loose connectivity, and delay tolerability. Therefore, traditional data gathering methods cannot be applied. In this paper, a novel data gathering method named average contact probability-based data delivery scheme (ACPBD) is proposed. ACPBD introduces...
Several studies in recent years have considered the use of mobile elements for data gathering in wireless sensor networks, so as to reduce the need for multi-hop forwarding among the sensor nodes and thereby prolong the network lifetime. Since, typically, practical constraints preclude a mobile element from visiting all nodes in the sensor network, the solution must involve a combination of a mobile...
Mobile Sensor Networks (MSN) are used for network load balancing, prolonging network lifetime, and improving network coverage by monitoring critical areas where manual sensor deployment cannot be performed. Addressing the problem of how to achieve maximum network coverage and network uniformity, after deploying sensors in critical areas randomly, is of significant importance recently. In this paper,...
In realistic mobile heterogeneous environment, the quality perceived by user is variable and dependant on following major factors: available bit rate variation, packet loss and latency. Even though QoS management is enabled in most modern telecommunication systems, it does not ensure the actual end-user perceived quality of service level. Therefore, to make sure that operator follows SLA provisions,...
In urbanized and indoor environments, outdoor positioning systems, such as Global Navigation Satellite Systems (GNSSs), are often inaccurate and adaptations of such systems to those contexts are expensive and hard to deploy. Nowadays, a lot of indoor positioning techniques have been studied, but it it quite difficult to objectively evaluate and compare their accuracies in the same environment. Our...
This paper discusses the physical layer abstraction algorithms for the integration of next-generation high-speed wireless local area network (WLAN) based on 802.11n and Long term evolution (LTE) cellular mobile communication network. Both the received bit information rate (RBIR) algorithm and the exponential effective signal-to-noise-ratio (SNR) mapping (EESM) algorithm are compared and analyzed in...
Multicast application is one of key value-add field to cellular mobile network. Most of researches focus on the whole system and ignore the structure inner cell. Current structure must let the signal strength satisfy the request of terminals located on the edge of cell, and this influence the capacity and data rate of multicast in same cell. we propose a cooperative relay multicast structure for cellular...
In order to resolve the problems of network segmentation, coverage holes and unable to conduct key monitoring upon specific target area by the conventional virtual force algorithm (abbr. VFA) in sparse network environment, a Multi-center Self-deployment Algorithm (abbr. MCSA) is presented hereby. Through construction of virtual repulsive force between nodes as well as a virtual attraction force field...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.