The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy-harvesting sensor nodes have been developed to solve the limited lifetime problem in wireless sensor networks. However, these energy-harvesting nodes have similar problems such as blackout time caused by excessive energy consumption and wasting of harvested energy that exceeds the charging capacity of their batteries. To solve this problem, this paper proposes a scheme that uses the surplus...
HTTP-based adaptive streaming (HAS) has recently been widely deployed on the Internet. In the HAS approach, a video content is encoded at multiple bitrates and the encoded video content is segmented into small parts of fixed durations. The HAS client requests a video segment, and stores it in the playout buffer. Many studies have shown a robust rate adaptation algorithm is critical to ensuring quality-of-experience...
Due to its highly potential applications in the healthcare and medical fields, Wireless Body Area Network(WBAN) has been attracted from many researches in recent years. In WBANs, an energy efficiency is still a challenging issue. In our previous work [5], we investigated the energy efficiency models of 1-hop and cooperative communications further in multipath fading and proposed the energy efficiency...
In this paper, we propose a novel architecture for IDMA system with low latency and high throughput for the uplink multi-user wireless system. The throughput of the proposed IDMA system can be improved to about double compared to the conventional IDMA system while the hardware complexity remains unchanged. To achieve this, the proposed system utilizes the interleaver/de-interleaver-less architecture...
It has been well-known that slotted ALOHA systems exhibit unfavorable bistable behavior, since 1970s. It was proved that we can eliminate bistable region by limiting the number of allowable transmission attempts per packet to eight or less. In this paper, we investigate bistable behavior of slotted ALOHA systems with delay constraints and geometric transmission probability in terms of the catastrophe...
In this paper, we investigate how the performance (i.e., the average message delivery delay) of IEEE 802.15.4-based WSNs is affected by the heterogeneity of wireless communication ranges of sensor nodes. An appropriate control of the wireless communication range of a sensor node should be beneficial in terms of reduced power consumption of the sensor node and performance improvement caused by reduced...
In this paper, we propose a new polling-based mechanism for the point coordination function (PCF) in IEEE 802.11 wireless local area network (WLAN). The proposed mechanism uses prioritization on two stages to enhance the ability to support quality of service (QoS) in networks with a high density of access points (APs). First step: in the competition between APs, only one AP can get the right to access...
MTC (Machine Type Communication) applications are one of the promising applications in 3GPP system because it connects a huge number of devices into one network. In MTC applications, a huge number of devices attempt to access a system using contention-based random access scheme in a short period. It makes a system overloaded. To solve the overload problem, we propose an access control scheme of devices...
In these days, as proliferating the use of mobile devices like tablet PC and smartphone, wireless AP should be distributed arrangement and cover a wide area by radio signal. There is the necessity of wireless AP controller because administrators of a wireless network can manage remotely and efficiently many APs on distributed area. The most of wireless AP has to use only one controller, so it may...
Recently, network virtualization technology (NFV) is being studied to reduce network operation cost, mainly in telco companies. Network virtualization technology is a technology that enables software control by abstracting computing, server, and network functions that were formerly hardware-oriented. Network virtualization technology provides the opportunity for small and medium enterprises with technology...
LPWAN (Low Power Wide Area Networks) technologies have been attracting attention continuously in IoT (Internet of Things). LoRaWAN is present on the market as a LPWAN technology and it has features such as low power consumption, low transceiver chip cost and wide coverage area. In the LoRaWAN, end devices must perform a join procedure for participating in the network. Attackers could exploit the join...
Content-centric networking (CCN) is considered to be the future Internet which moves from host-to-host model to transfer data model based on content name. Network data caching is a characteristic of CCN whose effectiveness depends on the content caching policies in the nodes. Leave copy everywhere (LCE) is the default policy in CCN which caches all content at all nodes leading to poor caching performance...
Undoubtedly, Cloud computing is the ongoing trend that robbed the widespread concern. In fact, it succeeded in discharging users from computational and storage burden to offer them as services following pay-as-you-go principle. The substantial feature of Cloud is the ability to scale up with the rise of users' demands. However, Cloud performance falls into the duty of scaling up to fulfill the user...
In a group touring scenario, the group leader can enable his handheld device's Wi Fi hot spot function to let other members to connect with. Then, the group leader can download Point Of Interests' (POIs') data from the content server through 3G/3.5G/4G cellular network and then forward those downloaded data to the connected clients using Wi Fi. That is, the group leader also plays the role of a mobile...
By decoupling the software and hardware, the software and cognitive radar (SRadar&CRadar) support the alteration of their functions by remapping different software in a uniform platform. This feature can make the radar more flexible, and has become a significant trend of the radars. In order to map efficiently, a framework including resource model and mapping algorithm is needed, which has been...
Recent cyber attacks are sophisticated so that it is difficult to prevent malware infection. Therefore, early malware infection detection becomes more important. Moreover, latest malware connects to C&C server by utilizing HTTP which is widely used on daily business. Furthermore, some of them utilizes HTTPS to hide its content from analyzer. Thus, it further makes malware infection detection harder...
This paper proposes a spectrum edge decision method for an energy detection with fast Fourier transfer (FFT) in cognitive radio system. Whereas the energy detection method is simple algorithm and that using FFT can detect spectrum over a wide band, there is a problem that the spectrum edges in frequency domain are unclearly detected under environment without previous knowledges of primary systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.