The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study how to provide optimal performance guarantee in multi-resource scenarios, such as Network Function Virtualization (NFV), where Virtual Network Function (VNF) resource demands of one Service Function Chain (SFC) are elastic and correlated with the end-to-end throughput of SFC. Previous works such as Dominant Resource Fairness (DRF) achieve this goal only if the demands are already...
This paper compares congestion controls of Multi-Path TCP (MPTCP) from a view point of Quality of Experience for Web services (Web-QoE) under heterogeneous environment; it assesses Web-QoE by experiments with subjects. The authors treat the four controls (LIA, OLIA, BALIA, WVEGAS) and evaluate Web-QoE by using Web usability. In addition to QoE, they also measure QoS and fairness. Their experiments...
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert...
In this paper, we performed human moving pattern recognition using communication quality: cellular download throughputs, Received Signal Strength Indicators (RSSIs) and cellular base station IDs. We apply three machine learning algorithms, such as Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Random Forest (RF) and evaluate recognition accuracy of human moving patterns. Results conclude...
With the advancements in mobile sensors and health-care technologies, mobile health (mHealth) services are growing in demand. However, the deployment of mHealth's applications in rural and underdeveloped areas remains a major challenge, despite the investments made, largely due to unreliable communication infrastructures. In this paper, we propose delivering mHealth data in a highly disruptive wireless...
Penetration of multimedia communications with mobile Wi-Fi and tethering requires wireless LANs (WLANs) to guarantee a specific bandwidth in densely deployed WLANs. IEEE802.11e (HCCA) with 802.11aa could use inefficiently radio frequency as well as fail to provide each WLAN with enough CFP period in which sending opportunity of a terminal is guaranteed. To guarantee a specific bandwidth even in densely...
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
Wireless Sensor Networks (WSNs) are playing remarkable contribution in real time decision making by actuating the surroundings of environment. As a consequence, the contemporary agriculture is now using WSNs technology for better crop production, such as irrigation scheduling based on moisture level data sensed by the sensors. Since WSNs are deployed in constraints environment, the life time of sensors...
In this study, an efficient device-to-device communication-assisted transmission mechanism that improves proximity-based emergency services by prioritizing elderly adults is proposed. The proposed method allows substantially enhanced service quality to be provided to users experiencing life-threatening situations, while ensuring that service quality is maintained for users facing less dire situations...
The advent of 8K and better resolutions of video pose problems for the capture and storage of data by these standards. The contemporary alternative is to compromise on quality and use various (often lossy) compression techniques to reduce the bandwidth required to move this data. This paper proposes a novel method for handling large volumes of video data without compromising its quality through space...
Nowadays in wireless network the energy consumption and sensor node energy renewable is major challenge. Which make sensor network weak and more critical. The problem of node reachability is considered and Amended Ant colony optimization technique is proposed for optimization. The proposed technique is used for the search of estimated solutions to distinct and endless optimization problems and for...
Mobile edge cloud has been increasingly concerned by researchers due to its closer distance to mobile users than the traditional cloud on Internet. Offloading computations from mobile devices to the nearby edge cloud is an effective technique to accelerate the applications and/or save energy on the mobile devices. However, the mobile edge cloud usually has limited computation resources and constrained...
Exploiting full-duplex (FD) technology on base stations (BSs) is a promising solution to enhancing the system performance. Motivated by this, we revisit a full-duplex base station (FD-BS) aided OFDMA system, which consists of one BS, several uplink/downlink users and multiple subcarriers. A joint 3-dimensional (3D) mapping scheme among subcarriers, down-link users (DUEs), uplink users (UUEs) is considered...
We study frameless ALOHA with multiple base station (BS) cooperation, where the coverage area of each BS partially overlaps, and the BSs cooperate via a backhaul network to share successfully retrieved packets. The exact packet loss rate for networks with the arbitrary number of BSs is theoretically analyzed, which reveals how the throughput improvement is achieved. Computer simulations confirm that...
Offloading users from an overloaded macro base station (BS) to a lightly loaded small cell BS is critical to alleviate the congestion of the macro BSs. However to overcome the signal-to-interference-plus-noise ratio (SINR) degradation of the offloaded users, offloading should be done in conjunction with an efficient interference management technique. Strict fractional frequency reuse (Strict-FFR)...
Content caching is an efficient technique to reduce delivery latency and system congestion during peak-traffic times by bringing data closer to end users. Existing works consider caching only at higher layers separated from physical layer. In this paper, we study wireless caching networks by taking into account cache capability when designing the signal transmission. In particular, we investigate...
Physical layer security in slow fading wiretap channels is often guaranteed by constraining the secrecy outage probability (SOP) below a maximum tolerable value. In this paper, we propose a new nonadaptive (NADP) transmission scheme for maximizing the secrecy throughput by using adjustable transmit power based on the instantaneous channel state information (CSI) of the main channel under an SOP constraint...
Nowadays, web service selection has become a very challenging issue. As the number of web services is increasing drastically, different QoS parameters are added in their description in addition to their functional parameters (Inputs and outputs) to distinguish them and ease their selection. Hence, web service selection consists to find out among services having the same functionalities the optimal...
The prominent cloud services rely on geographically distributed nodes running replication and other fault-tolerance mechanisms so as to provide flawless availability and dependability. In this paper, we address the communication cost of the well known primary-backup replication protocol, and propose compressed periodic incremental checkpoint algorithms to achieve improved throughput. We set up a replicated...
Compressive random access scheme is considered one of promising candidates for future Machine Type Communications. It enables one-shot detection, which means that the preamble, channel estimation, and data detection could be carried out at once to keep signaling overhead low. For one-shot detection, improving the performance in terms of the number of successfully received preambles is necessary. To...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.