The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we performed human moving pattern recognition using communication quality: cellular download throughputs, Received Signal Strength Indicators (RSSIs) and cellular base station IDs. We apply three machine learning algorithms, such as Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Random Forest (RF) and evaluate recognition accuracy of human moving patterns. Results conclude...
With the advancements in mobile sensors and health-care technologies, mobile health (mHealth) services are growing in demand. However, the deployment of mHealth's applications in rural and underdeveloped areas remains a major challenge, despite the investments made, largely due to unreliable communication infrastructures. In this paper, we propose delivering mHealth data in a highly disruptive wireless...
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
ITU-R M.1842-1, which is one of the renowned specification for VHF data exchange system (VDES) devoted to maritime mobile applications, has been standardized wireless transmission protocols according to the peculiar characteristics of a maritime communications scenario. Generally, in the Annex-4 of ITU-R M.1842-1, the VHF data link protocols for maritime mobile services are described along with a...
This paper provides a thorough analysis of the key aspects affecting the capacity of LTE networks. We group the analysis to the three major categories namely technology, spectrum and topology aspects. Through the extensive system-level simulations we investigate which of the specified aspects mostly affect the capacity and spectrum efficiency of 4G LTE networks. In addition, based on the performed...
This paper studies appropriate values of EDCA parameters of the author's wireless LAN base station based on Quality of Experience (QoE) for Web Services by experiments with subjects. The base station reduces the traffic of a Web service without degradation of QoE; it utilizes EDCA as QoS control. However, appropriate EDCA parameter value have never been studied. This paper evaluates QoE and measures...
When a standard TCP implementation using the minimum retransmission timeout (RTOmin) of 200 ms is used in distributed file systems in data centers, a well-known throughput degradation called TCP Incast occurs, because 200 ms is too large as an RTOmin in data centers. In order to avoid TCP Incast, a TCP implementation using a much smaller RTOmin attained by a fine-grained kernel timer is proposed....
With the upsurge in the volume of data and profuse cloud applications, big data analytics becomes very popular in the research communities in industry as well as in academia. This led to the emergence of real-time distributed stream processing systems such as Flink, Storm, Spark, and Samza. These systems sanction complex queries on streaming data to be distributed across multiple worker nodes in a...
Vehicular ad hoc network (VANET) is a particular class of mobile ad hoc network (MANET) that utilizes moving cars as nodes to establish wireless communications and exchange information between them without the need of infrastructure. VANET is a promising technology used to provide safety, efficiency, and comfort to the road users. Routing protocol has become one of the most challenging tasks for VANET...
With the rapid growth of smart devices such as smartphones, tablets, and laptops, traffic demands in IEEE 802.11 wireless local area networks (WLANs) has been increased exponentially. To meet the demand, in recent years, numerous access points (APs) have been deployed in many places such as residential areas, shopping malls, airports, office and campus buildings. As the density of 802.11 WLAN increases,...
Energy efficient cognitive radio networks can simultaneously improve spectrum efficiency (SE) and energy efficiency (EE) of wireless communication networks. This paper studies energy efficient spectrum sensing interval, spectrum sensing energy and transmit power allocation scheme of the secondary user (SU) in CR networks. The EE maximization problem subject to the transmit power constraint and average...
Opportunistic communications through wireless ad-hoc mesh networks have been thoroughly studied in the context of military infrastructureless deployments, sensor networks and even human-centered pervasive networking. However, due to the lack of a model that accurately computes the probability distribution of the delay, we usually content ourselves with the mean values. Such an approach can limit both...
We consider a two-way cognitive radio relay network where two secondary users (SUs) can simultaneously transfer energy and information to a relay. Then, a joint optimization algorithm for power allocation and energy cooperation is proposed. The algorithm proves that the formulated throughput maximization problem is a convex optimization problem. Next, we decompose the formulated problem into a power...
State-machine replication (SMR) is a fundamental technique to implement fault-tolerant services. Recently, various works have aimed at enhancing the scalability of SMR by exploiting partial replication techniques. By sharding the state machine across disjoint partitions, and replicating each partition over independent groups of processes, a Partially Replicated State Machine (PRSM) can process operations...
In this paper, compact memory strategies for partially parallel Quasi-cyclic LDPC (QC-LDPC) decoder architecture are proposed. By compacting several adjacent rows hard decisions and extrinsic messages into one memory entry, which not only reduces the number of memory banks for hard decisions, but also facilitates multiple data accesses per clock cycle, the throughput of the decoder is increased. We...
Due to the limitation of frequency resources, Long Term Evolution(LTE) is usually applied for the train-ground communication applications of Communication(CBTC) service, Wireless Local Network (WLAN) is used for the train ground applications of Passenger Information System (PIS) service and Closed Circuit Television(CCTV) service. Train ground communication systems for PIS and CCTV applications are...
More than half of the mobile backhaul connections are wireless and huge capacity promise of mmW bands is compelling to cope with the increasing data capacity for future 5G system. We reported a backhaul E-band measurement campaign focusing on radio system measurements with the demonstrator developed in the project. The evaluations include the throughput measurement with different modulation coding...
The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This attack by denying the normal operation of the service detracts from the purpose of these systems. In general, a jamming attack is difficult to detect given the little experimental data provided by the...
To mitigate performance anomalies due to different transmission rates and to improve throughput performance in ad-hoc networks, a previous work has proposed a new method called user cooperative mobility. It also showed that the method achieved good improvement when users appropriately move. However, it only employed theoretical evaluation which does not include detailed behavior such as capture effect...
QoS of applications in an edge node of mobile edge computing (MEC) could degrade due to congestion of wireless access or short of mobile edge computing resource. In order to improve QoS such as TCP throughput, we propose a VM migration method, which takes a VM from congested node to another node in a mobile edge. Users can choose a far but less-congested node, instead of a near but congested node...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.