The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Connection Admission Control (CAC) is one of the resource allocation functions which plays a significant role to ensure Quality of Service (QoS) provisioning in wireless networks. To meet connection requirements, and achieve bandwidth efficiency with less computation complexity, we present a CAC mechanism for OFDMA-based WiMAX networks which uses fuzzy sets and fuzzy logic theory to admit new incoming...
Introducing new methods to enhance health services for elderly persons has become the main objective of Smart Home researchers. One of the most important issues that they have dealt with is the application of forecasting models used to predict states of elderly persons. In fact, our approach focuses on some critical health parameters (blood pressure, pulse, etc) over 40 days. In this paper, we have...
In this paper, we propose an anti-interference cooperative spectrum sharing strategy based on fairness secondary users selection where the secondary system can gain spectrum access to the primary system. Specifically, secondary user STb and STq are selected to transmit the primary and secondary signal by using different bandwidth in the second transmission slot which occupies a part of the whole transmission...
In this paper, we investigate intelligent handoff decisions in femtocell networks, with the goal of achieving a seamless femtocell-to-femtocell handoff procedure that minimizes unnecessary handoffs and provides a good quality of connection to mobile users. To this aim, we propose a promising handoff scheme called Optimized Handoff based on Mobility Prediction and Call Admission Control (OHMP-CAC)...
Sparse code multiple access (SCMA) is a new modulation and non-orthogonal multiple access scheme for 5G systems, in which the coded bits are mapped to multidimensional sparse codewords, and the message passing algorithm (MPA) is employed to detect multi-user signals. Device-to-Device communications underlaying cellular network is also a key technique in 5G networks; hence the sparse codes allocation...
The paper investigates the optimum pairing of attribute weighting techniques used with Distance to Ideal Alternative (DIA) selection in Multi-Attribute Decision Making (MADM) applied to wireless network vertical handover. The performance of the DIA algorithm is investigated with Analytical Hierarchy Process (AHP), Fuzzy AHP, Analytic Network Process (ANP), Random Weighting (RW) and Least Squared weighting...
By current medium access control mechanisms designed for Half-duplex (HD), a node in distributed In-band Full-duplex (IBFD) wireless networks cannot identify the HD or IBFD transmission modes of the other nodes. This will decrease IBFD transmission opportunities by preventing simultaneous transmission in asymmetric dual link. In this paper, we propose a novel in-band Full-duplex Distributed Medium...
Energy harvesting (EH) is a prominent method to prolong the operation time of energy-constrained wireless networks. Integrating EH into wireless communications to support simultaneous wireless information and power transfer (SWIPT) allows the spectrum to be used for both purposes without compromising the quality of service (QoS). In this paper, we propose a subcarrier allocation based SWIPT scheme...
The emerging wireless energy transfer technology based on Radio Frequency (RF) is a promising technology for wireless rechargeable sensor networks (WRSN) as it can charge sensor nodes simultaneously. In this paper, we use a mobile charger to stay at some locations and stay for certain time at each location to charge all the nodes in the network. We first define a power-charging function for the whole...
In this paper, a new watermarking method based on spread spectrum technique, which we call capacious spread spectrum (CSS) is proposed. In this method, unlike the traditional spread spectrum watermarking (TSS), more than one pseudo noise (PN) sequence will be deployed. Also, a novel method to produce orthogonal PN-sequences is achieved. Moreover, it is shown that with utilizing the new approach, for...
SIP is amongst the most popular Voice over IP signaling protocols. Its deployment in live scenarios showed its vulnerability to flooding attacks. In this paper, we present a SIP flooding attack detection mechanism that dynamically detects SIP flooding attacks and correlates in real time the temporal characteristics of SIP reliable mechanism and the number of received INVITE requests. Experimental...
Internet of Things (IoT) applications carry on at an environment that is mainly highly dynamic and real time nature. Due that environment, such applications should be able to reason autonomously and give self-adaptive decisions. To date, there has not been an adequate architecture to incorporate self-adaptive property in that type of environment. Thus, we design a management architectural pattern...
As online eco-feedback social applications are being increasingly used around the world for motivating citizens to become more energy-aware, privacy concerns in terms of sharing personal electricity consumption data among online contacts are rising. Through Social Electricity, an online application offering personal energy management through a social and collaborative environment, we study the privacy...
One of the challenges that smart Microgrid should face is to rely mostly on renewable energy sources and ensure the balance of the usage of heterogeneous energy sources. But, due to its uncertain and intermittent character, the renewable sources cannot be predictable, and the balancing task becomes less evident to apply. In this paper, we propose a new home energy management strategy to ensure a balanced...
Emergency situations, such as fire incidents or terrorist attacks, have imposed strongest safety requirements for crowds gathering. The enhancement of situation awareness, decision support and emergency notification systems that facilitate the safety and effectiveness of evacuation processes in a major incident is therefore of utmost importance. ICT, IoT and smart systems have gained much attention...
Machine-to-machine (M2M) communications protocols, e.g., Machine Type Communications (MTC) in 3GPP LTE, support a variety of Machine to Machine (M2M) applications, which requires real-time data reporting. Many uplink scheduling algorithms are primarily designed for human-to-human applications rather than for M2M applications. These scheduling algorithms typically are based on the fact that the machines...
mmWave (millimeter-Wave) is a very promising technology for the future wireless communication. To mitigate its high attenuation characteristics, mmWave communication frequently employs directional beamforming for both transmission and reception. Localization commonly takes advantage of directionality in RF frequencies in urban and indoor environments. In this paper, we use lessons learned from classical...
With development of wireless communication technologies, mobile devices are commonly equipped with multiple network interfaces and ready to adopt emerging transport layer protocols such as multipath TCP (MPTCP). The protocol is specifically useful for Internet of Things streaming applications with critical latency and bandwidth demands. To achieve full potential of MPTCP, major challenges on congestion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.