The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the evolution towards the Fifth Generation of Mobile Communications (5G), Software-based Networks are paving the way to a radical transformation of Network Operators infrastructures. Novel technologies like Network Function Virtualisation (NFV) and Software Defined Network (SDN) are enabling new way of managing on-demand network resources. Focusing on the Mobile Core Network architecture, Service...
Classification of daily human movements using wearable sensor technology is among the current research topics, especially healthcare. In this study, eight different daily human movements (writing, walking, running, tooth brushing, writing on paper, using keyboard, stationary and cleaning) are classified by using data obtained from only smartwatch motion sensors (accelerometer and gyroscope). To compare...
The IEEE802.15.4e standard for Iow power wireless sensor networks defines a new mode called Time Slotted Channel Hopping (TSCH) as Medium Access Control (MAC). TSCH allows highly efficient deterministic time-frequency schedules that are built and maintained by the 6TiSCH operation sublayer (6top). In this paper, we propose a solution to limit the allocation of identical cells to co-located pair of...
With the progress of the network and technology, the perfect combination of mobile intelligent terminal and internet, people are increasingly dependent on intelligent terminals. So, it was very necessary of a model for assessing the security performance of mobile intelligent terminals, especially to establish the objective model of the security performance of mobile intelligent terminal. In this paper,...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
Lattice codes used under the Compute-and-Forward paradigm suggest an alternative strategy for the standard Gaussian multiple-access channel (MAC). It has been proven that decoding an integer linear combination of the transmitted codewords enables higher data rates compared to decoding the messages individually. Recent work of Gasptar et al. proposed a new multiple access channel technique that they...
Mobility traces have been widely used in the design and evaluation of mobile networks. To mitigate the privacy threat of publishing mobility traces, the traces are often anonymized and obfuscated. However, even with anonymization and obfuscation techniques, traces can still be deanonymized by exploiting some side information such as users' co-location. With online social networks, mobile users increasingly...
This paper identifies that the anycast communication pattern is needed in the Machine Type Communications (MTC), where there could be multiple MTC devices being deployed in the same area for the same type of data, the client only cares about the data being retrieved but not where the data comes from. Currently the MTC server can provide such anycast service, but with large signaling overhead and bandwidth...
To fully exploit the increasingly dense deployments of mobile base station (BS) infrastructure, this paper proposes a novel caching paradigm called explicit caching, which stores selective contents at BSs and exposes such contents to users for volunteer browsing and download. We formulate the explicit caching problem as a joint content recommendation and delivery problem, which aims to maximize the...
Feedback delay can severely impact network performance in mobile network and the theoretical quantification of performance degradation has attracted much research interest recently. In this paper, we conduct coverage analysis of mobile ultra-dense networks (UDNs) where coordinated multipoint (CoMP) technology is adopted to enhance network performance and the available channel state information (CSI)...
Mobile Crowdsourced Access (MCA) enables mobile users (MUs) to share their Internet connections by serving as tethers to other MUs, hence can improve the quality of service of MUs as well as the overall utilization of network resources. However, MCA can also reduce the revenue-generating mobile traffic and increase the network congestion for mobile network operators (MNOs), and thus has been blocked...
Packet forwarding plays an important role in inter-vehicle communications. A predicted forwarding is a promising solution to address high mobility issues in a Vehicular Ad-hoc Network (VANET) as it increases the ratio of packet transmissions. The predicted forwarding scheme proposed, termed Vehicular-to-vehicular Urban Network (V2VUNet), is based on an angle measurement between a sender and a receiver...
Network slicing to enable resource sharing among multiple tenants-network operators and/or services-is considered a key functionality for next generation mobile networks. This paper provides an analysis of a well-known model for resource sharing, the ‘share-constrained proportional allocation’ mechanism, to realize network slicing. This mechanism enables tenants to reap the performance benefits of...
Mobile traffic data collected by network operators is a rich source of information about human habits, and its analysis provides insights relevant to many fields, including urbanism, transportation, sociology and networking. In this paper, we present an original approach to infer both spatial and temporal structures hidden in the mobile demand, via a first-time tailoring of Exploratory Factor Analysis...
Caching decisions by default seek to maximize some notion of social welfare: the content to be cached is determined so that the maximum possible aggregate demand over all users served by the cache is satisfied. Recommendation systems, on the contrary, are oriented towards user individual preferences: the recommended content should be most appealing to the user so as to elicit further content consumption...
A Cooperative Intelligent Transportation System is a transportation system where involved stations can sense their environments and communicate with each other in order to take certain decisions. Many applications are being proposed such as cooperative crash avoidance. However, the information exchanged between the stations may lead an adversary to determine the identity and also the behavior of the...
In delay tolerant mobile sensor networks, the application may sometimes require informing all the sensor nodes in the network about the presence of a message while delivering it to a specific destination node. But, due to constraints on buffer space, it is not efficient to keep these message copies in the buffer of all nodes. In this paper, we propose a probabilistic approach for information dissemination...
Challenged Networks (CNs) are characterized by frequent varying network conditions and intermittent connectivity. In general, CNs emerge in different scenarios including the disaster and emergency situations when the traditional cellular infrastructure is dysfunctional or unavailable as well as in the undeserved areas such as rural and developing regions. This paper aims to evaluate the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.