The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
The applications for MANETs have increased rapidly and today MANETs are capable of providing a variety of services. One of the major contributing factors is the availability of radios that are able to adapt to the channel conditions and can transmit at multiple data rates. A common approach for channel access is to employ a CSMA/CA based mechanism. However, these protocols tend to under perform at...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
In the process of epidemic spreading, the most important question is: how a healthy individual does catch a disease? To answer this question, researchers have developed plenty models depending on the assumption that said the contamination factor is a β coefficient, which is defined probabilistically, representing the infection rate. However, in the real life, the contagion process could depend on...
Current handhelds incorporate a variety of acceler-ators/IPs for improving their performance and energy efficiency. While these IPs are extremely useful for accelerating parts of a computation, the CPU still expends a significant amount of time and energy in the overall execution. Coarse grain customized hardware of Android APIs and methods, though widely useful, is also not an option due to the high...
Cloud radio access network (C-RAN) is a persuasive solution to the burst capacity in future 5G mobile system and it can tackle the tidal effect in mobile networks for better resource utilization. We propose a remote radio head (RRH) protection scheme to assure the availability of the RRHs. A protection layer is proposed to support re-configurable protection of the RRHs, with good scalability.
Future mobility management systems need to in-corporate innovative methods to improve mobile multimedia networking, such as quality-oriented decision-making functions for selecting the best Point of Attachment (PoA) for in-transit Moving Objects (MOs). Among the various correlating algorithms raised in the literature, solutions based on the Multiple Attribute Decision Making (MADM) are beneficial...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
We propose a signal-channel, adaptive threshold selection technique for binary mask construction, namely APHONIC, (AdaPtive tHreshOlding for NoIse Cancellation) for smart mobile environments. Using this mask, we introduce two noise cancellation techniques that perform robustly in the presence of real-world interfering signals that are typically encountered by mobile users: a violin busker, a subway...
Low Power Wide Area Networks (LPWAN) technologies have recently triggered many research efforts and standardization activities due to the inherent possibility of both providing long range wireless communications and guaranteeing a long life for very cheap sensing devices. At the same time, the increasing interest of telco operators into such kind of networks is due to the wide range of applications...
Energy harvesting has been gaining a lot of attention in the past decade due to its ability to provide a-virtually-endless energy supply. Nodes in a Wireless Powered Communication Network (WPCN) depend, totally or partially, on the energy harvested from the Central Node (CN) which has a constant power supply. This work addresses a solution to the problem of lack of fairness in the distribution of...
Inter-Cell Interference Coordination (ICIC) techniques are proposed as solutions to alleviate the negative impact of interference on system performance, while enhancing the provided Quality of Service (QoS). Typically, the available bandwidth is divided into inner and edge sub-bands. Users are also classified into interior and edge users. The available resources in each zone are exclusively allocated...
We propose a privacy preserving mobile advertising system for in-app ad placement, that enables user profiling and targeted ads without revealing user interests to the mobile advertising companies. Our proposal relies on device-based user profiles, derived from app activity, on the use of Private Information Retrieval (PIR) to query ads database(s) for matching (to profile) ads, without the database(s)...
To alleviate the pressure brought by the explosion of mobile video traffic on present cellular networks, small cell base stations (SBS) with caching ability are introduced. In this paper, we consider the caching strategy using network coding for mobile users over heterogeneous wireless network containing SBSs. We formulate an integer programming problem to minimize the average number of packets downloaded...
Understanding user behavior is essential for source optimization in mobile networks, including urban planning, road traffic engineering, and content distribution. In this paper, we take the first step to investigate the basic characterization of user behavior over 340,000 users of a 4G mobile network in a large metropolitan area. Our study is carried on from two aspects: mobility and application usage...
The edge computing techniques have been developed to support the exponentially increasing service demands in the fifth generation (5G) networks by bringing the data contents and their corresponding computations/communications near to mobile users. As a promising and efficient solution to implement edge computing techniques, mobile data offloading complements the traditional cellular transmission through...
Communications survivability of mobile wireless segments in tactical military networks is and will be an enormous challenge in the present and future defence forces, which is vital to fulfill military missions in a timely manner. We have previously presented an autonomous system named OPAL, which uses distributed cooperative management solutions for enhancing communications survivability in volatile...
The next generation cellular networks are predicted to face the challenge of massive data transmission originated from Machine Type Communication (MTC) devices with limited communication resources. The main objective of this paper is to reduce communication resources consumption in acceptable transmission latency for massive data generated from MTC devices. As an attempt to solve this challenge, a...
Available smartphone« and smart objects can use short range connections like Wi-Fi and Bluetooth as a communication technique to exchange information with nearby devices. Those techniques are used in cases of absent end-to-end connection such as in Delay Tolerant or Opportunistic Networks. The study of message transmission processes and contact information in such networks has gained more attention...
Vehicle-to-vehicle (V2V) communication technology based on Wi-Fi technology has recently been used to prevent vehicles from colliding with each other. However, in V2V communications, radio waves cannot be diffracted well enough at intersections at which vehicles cannot detect each other. Therefore, such technology might not prevent traffic accidents from occurring. In this study, we used mobile networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.