The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Routing is a critical issue in vehicular ad hoc networks (VANETs). This paper considers the routing issue in both vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communications in VANETs, and proposes a Moving dirEction and DestinAtion Location based routing (MEDAL) algorithm for supporting V2V and V2I communications. MEDAL takes advantage of both the moving directions of vehicles and...
Wireless sensor networks (WSNs) are used to continuously monitor certain area of interest and send data back to the base station for processing. In many applications, WSNs serve in inhospitable environments where multiple node failure may take place causing the network to be divided into disjoint segments. Also, multiple standalone WSNs in some applications may need to be federated to collectively...
Crossover nodes have been utilized to achieve smooth handoffs for micro mobility management schemes. IEEE 802.11s supports proxy-based frame delivery services for mobile hosts roaming within a wireless mesh network (WMN). Discovering crossover node for mobile hosts in 802.11s WMNs, however, faces several challenges due to intrinsic properties of mesh networks. This paper identifies these challenges...
Wide deployment of GSM based location determination systems is a critical step towards moving existing systems to the real world. The main barrier towards this critical step is the heterogeneity of existing types of cell phones which results in different readings of received signal strength. Specially, in the context of fingerprinting localization where offline phases are needed for system training...
In this paper, we address the popular content distribution (PCD) problem in a highway scenario, in which popular files are distributed to a group of on-board units (OBUs) driving through a single roadside unit (RSU). Due to the high speeds, the OBUs may not finish downloading a large file within the limited time for vehicle-to-roadside (V2R) communication and a peer-to-peer (P2P) network consisting...
This paper proposes a reporting decision protocol called IVE (for Information Value — Energy tradeoff), where individual nodes of an intruder tracking sensor network make decisions about the transmission of information chunks. Instead of trying to achieve raw data metrics (such as total transmitted data) the protocol aims to optimize the value of information (VoI) maintained by the customer. To achieve...
In this work we consider nano-scale communication using bacterial populations as transceivers. We demonstrate using a microfluidic test-bed and a population of genetically engineered Escherichia coli bacteria serving as the communication receiver that a simple modulation like on-off keying (OOK) is indeed achievable, but suffers from very poor data-rates. We explore an alternative communication strategy...
The identification of vessel collision risk for a Maritime Intelligent Transport System (MITS) is crucial for maritime safety and management. This paper considers the identification of the Systematic Collision Risk (SCR) for an MITS based on AIS data, which is obtained by wireless communication among vessels and between vessels and shore-based stations. SCR is modeled as a function of the collision...
Cooperative transmission in vehicular networks is studied by using coalitional game and pricing in this paper. There are several vehicles and roadside units (RSUs) in the networks. Each vehicle has a desire to transmit with a certain probability, which represents its data burtiness. The RSUs can enhance the vehicles' transmissions by cooperatively relaying the vehicles' data. We consider two kinds...
An important topic in performance evaluation of wireless networks is the modeling of inter-cell interference, to predict the distribution of the Signal to Interference plus Noise Ratio (SINR) in the network. The classical hexagonal model is generally intractable and requires extensive numerical calculations. Two approaches have been shown to produce tractable, closed-form formulas: Poisson networks...
In addition to spectrum scarcity, unfair and insufficient channel contention resolution has become one of the major bottlenecks for a good throughput in multi-hop wireless ad-hoc networks (MHAHNs). In this paper, we propose an optimal cognitive MAC protocol for MHAHNs under opportunistic spectrum access (OSA) approach in which channel contention resolution is done on the basis of interference-dependent...
Android developers cache data to improve the performance of their applications. Caching is the technique of transparently storing data such that future requests can be accessed more quickly. At times when a mobile device is not under heavy use the cached data, including sensitive data, can remain on the device for an extensive period of time. This poses a security risk, especially when developers...
In this paper, we consider the scenario where a secondary operator leases licensed spectrum from a spectrum owner and then serves its end users with both licensed and unlicensed bands. An end user can decide its traffic segmentation in terms of the percentage of its total amount of traffic demand transmitted via licensed and unlicensed band respectively. The optimal spectrum investment and pricing...
Available works either explore the order sense capacity scaling laws or derive closed-form throughput results for mobile ad hoc networks (MANETs) where a transmitter randomly probes only once a neighboring node for possible transmission. Obviously, such single probing strategy may result in a significant waste of the precious transmission opportunities in highly dynamic MANETs since the randomly selected...
Due to the scarcity of the wireless spectrum along with the ever increasing number of cellular wireless users and the associated drastic increase in the data traffic demand, femtocells are envisioned to provide fast, flexible, cost-efficient, and customer driven solutions to offload users from the congested macro access network and enhance the overall system performance. To control offloading and...
Device-to-device (D2D) communication as an underlay to cellular networks brings significant benefits to users' throughput and battery lifetime. The allocation of power and channel resources to D2D communication needs elaborate coordination, as D2D user equipments (UEs) cause interference to other UEs. In this paper, we propose a novel resource allocation scheme to improve the performance of D2D communication...
Recently, the multimedia content delivery has replaced the traditional voice communication as the major source of traffic in wireless networks. The deployment of femtocells is promising in satisfying the requirements of these multimedia applications if the interference among the femtocell access points (FAPs) is well-managed. In this paper, we study the interference management problem of the FAPs...
Wireless systems are getting deployed in many new environments with different antenna heights, frequency bands and multipath conditions. This has led to an increasing demand for more channel measurements to understand wireless propagation in specific environments and assist deployment engineering. We design and implement a rapid wireless channel sounding system, using the Universal Software Radio...
This paper proposes an approximate method, equivalent access intensity (EAI), for the throughput analysis of CSMA wireless networks in which links have finite offered-load and their MAC-layer transmit buffers may be empty from time to time. Different from prior works that mainly considered the saturated network, we take into account in our analysis the impacts of empty transmit buffers on the interactions...
It is a common problem for Wireless LAN (WLAN) users when they face more than one available Access Point (AP): which one may serve them better? In the real world, most WLAN devices and users select the AP by Received Signal Strength (RSS), which doesn't consider the load of APs. Therefore, the RSS-based scheme may result in load imbalance and utilization degradation. This paper proposes a simple scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.