The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since our research to study mobility, we noted that the best way to represent the mobility of sensor nodes is to follow a mobility model. Numerous models have been proposed in the literature, they are commonly used as a data source in all kinds of studies, including motion in several networks. To this end, we propose to exploit this mobility, which results in the proposal of a new approach based on...
Mobile communication service is widely penetrating to all the society as the key infrastructure. It is spreading beyond the conventional telephone service. Wide variety of social services including e-commerce, e-bank, navigation, location, healthcare, and education are offered on the network. It's not too much to say that people can never part with a smartphone as the most frequently use interface...
Telecommunication networks are designed for high reliability but, given their complexity, when problems do occur they are difficult to detect and diagnose. Anomaly detection approaches typically provide cryptic results, resulting in extensive human effort for diagnosis. Using data from a 4G network, we focus on non-parametric change detection algorithms for anomaly detection and evaluate the performance...
Current Distributed Radio Access Networks (DRANs), which are characterized by a static configuration and deployment of Base Stations (BSs), have exposed their limitations in handling the temporal and geographical fluctuations of capacity demands. At the same time, each BS's spectrum and computing resources are only used by the active users in the cell range, causing idle BSs in some areas/times and...
Classification of daily human movements using wearable sensor technology is among the current research topics, especially healthcare. In this study, eight different daily human movements (writing, walking, running, tooth brushing, writing on paper, using keyboard, stationary and cleaning) are classified by using data obtained from only smartwatch motion sensors (accelerometer and gyroscope). To compare...
The high reliance on the Internet observed recently makes the quests of mobile networks capacity demand and reliability crucial in mobile networks design and management. The next generation mobile networks is anticipated to address the problem of increasing capacity demand by employing various techniques such as Massive MIMO, Heterogeneous Networks (HetNets), and millimeter wave (mm-Wave). Nevertheless,...
Human activity patterns such as communication and cooperation rely in large parts on smartphone-based interaction. Day-to-day available communication means are taken for granted. But in scenarios where communication infrastructure is broken, such as in the aftermath of a disaster, communication establishment becomes crucial. In those post-disaster conditions ubiquitous mobile devices carried by humans...
The IEEE802.15.4e standard for Iow power wireless sensor networks defines a new mode called Time Slotted Channel Hopping (TSCH) as Medium Access Control (MAC). TSCH allows highly efficient deterministic time-frequency schedules that are built and maintained by the 6TiSCH operation sublayer (6top). In this paper, we propose a solution to limit the allocation of identical cells to co-located pair of...
Due to the ubiquitous presence of cellular networks and their exemplary success, they have been pushed forward to provide connectivity for Internet-of-things (IoT) applications with mass deployments of sensors and machines. Nevertheless, existing transmission protocols, e.g., orthogonal allocation or spectrum sharing, can be detrimental for both existing cellular users and IoT devices due to increased...
In order to provide ubiquitous communication, seamless connectivity is now required in all environments including highly mobile networks. By using vertical handover techniques, it is possible to provide uninterrupted communication as connections are dynamically switched between wireless networks as users move around. However, in a highly mobile environment, traditional reactive approaches to handover...
In wireless coded cache network, data contents are cached in a number of mobile devices using an erasure correcting code, and a user retrieves content from other mobile devices using device-to-device communication. In this paper, we consider the repair problem when multiple devices that cache data contents fail or leave the network. By exploiting the wireless broadcast nature, we formulate the repair...
In cellular networks, tail states are designed for a tradeoff between energy efficiency and latency. However, the energy consumed during tail states becomes a huge energy drainer itself. Traditional energy saving techniques by content prefetching cannot be directly applied to mobile ads, due to the deadline requirements of ads, randomness in user behaviors, different usage patterns of mobile apps...
Delay Tolerant Networks (DTNs) differ from the traditional Mobile Ad Hoc networks (MANETs) in that DTNs are not always interconnected. The issue of routing data in a DTN is considered here. Many routing protocols exist for DTNs. Some are based on comparing nodes to each other, whereas others focus on the internal properties of the messages they hold. There are wide ranges of protocols, and they perform...
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's...
Traditionally, enterprise application integration (EAI) processes structured data. Recent trends such as social and multimedia computing led to an increase in unstructured multimedia data like images and video streams that have to be processed by EAI. This poses challenges to EAI with respect to variety, velocity, and volume of the processed data. Furthermore, multimedia data has more semantic qualities...
This study aims to design a web technology based Emergency System (SmartER) system, which will enable the doctors and nurses to perform the patient related procedures more quickly and smoothly in the emergency departments. SmartER is not just software, it is planned as a system that includes a monitor screen to be mounted on the wall, a barcode bracelet for the patients, mobile devices to be used...
With the progress of the network and technology, the perfect combination of mobile intelligent terminal and internet, people are increasingly dependent on intelligent terminals. So, it was very necessary of a model for assessing the security performance of mobile intelligent terminals, especially to establish the objective model of the security performance of mobile intelligent terminal. In this paper,...
In the 5G era, radio IP capacity is expected to reach 20 Gbit/s per sector, and ultra-large content traffic will travel across the faster wireless/wireline access network and packet core network. Also massive and mission-critical IoT is the main differentiator of 5G services. These types of real-time and large-bandwidth consuming services require radio latency of less than 1ms, and end-to-end latency...
In the recent years, mobile wireless technology has invaded the computer domain with the increased evolution of mobile devices in computing power, storage capacity, and other richer functionalities. Those devices are no longer restricted to phone calls and messages, but also for the access to internet (via WiFi, 3G, 4G …) and exchanging data via Bluetooth. On the other side, we have the great success...
This paper proposes a radio resource management scheme for the multi-RAT (Multiple Radio Access Technology) unit based MHN-E (Mobile Hotspot Network Enhancement) network that provides a millimeter-wave (mmWave) backhaul link of high-speed railway communications. We designed when multi-RAT unit configuration procedure is triggered and how it works, also explained detailed multi-RAT unit bearer configuration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.