The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is my greatest pleasure and honor to welcome you to the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2015) in Taipei, Taiwan on 19 - 20 August 2015 with the theme “Innovative and Intelligent Infrastructure for the Future Networks”. After 10 years since the first Qshine conference at Dallas, TX, USA, we are happily to have...
Following the constant improvements in technology and rapid developments in the computers, communications, and consumer electronics (3C) industry, mobile devices have become assistive tools for everyday life. They are lightweight, thin, and convenient for carry and their functionality is akin to a portable computer. However, these devices are normally equipped with small displays. At times when a...
To support various Internet-of-Thing (IoT) applications involving an enormous number of machine-type devices, deploying LTE/LTE-A networks on ISM bands with an extensive bandwidth has been regarded as a promising solution to enable machine-to-machine (M2M) communications. Designating as licensed-assisted access (LAA) in 3GPP Rel-13, unprecedented challenge of uncontrollable interference from collocated...
Many resource allocation schemes have been proposed based on different criteria such as system throughput, fairness, transmission power, user priority and others. According to the 3GPP specifications, however, as long as a GBR (guaranteed bit rate) bearer is admitted, eNB has to allocate resource blocks (RBs) for this bearer to ensure its transmission right. At the same time, eNB also must distribute...
There are many challenges to provide telecommunication services. The reliability is one of the most important challenges. Telecommunications systems require 99.999% reliability, which means that system only tolerant of downtime about 5 minutes per year. To achieve such high reliability, multiple servers and a shared database are deployed for a Session Initiation Protocol (SIP)/ IP Multimedia Subsystem...
In the deployment of heterogeneous Long Term Evolution (LTE), due to the unmanaged power range of femtocells, inter-cell interference problems cause severe degradation in network performance, particularly in Closed Subscriber Group (CSG) mode. In the paper, we proposed an effective approach termed Adaptive Smart Power Control Algorithm (ASPCA), which can be applied to cluster users in coverage hole...
With the increasing demand of broadband wireless communication networks, users have an increasing need of the wireless broadband service coverage and the wireless access quality. To alleviate this problem, several novel techniques are proposed. One of these techniques is femtocells. A femtocell can be used to increase the coverage of wireless broadband service indoors or at hotspots and raise both...
With the rapid progress of wireless technology, mobile users can retrieve multiple real-time data with portable devices from mobile service centers. Providing deadline guarantees for queries over mobile environments is a challenging problem due to real-time data arrival rates and time-varying data contents. In this paper, we propose a prediction-based scheme for periodic continuous queries over wireless...
Underwater sensor networks (USNs) has many characteristics different from terrestrial wireless sensor networks (WSNs), such as dynamic network topology, unreliable acoustic communication, which increases the difficulty in energy efficiency and reliability of data transmission, for traditional WSN protocols are not suitable for underwater acoustic sensor networks (UASNs). Vector based forwarding (VBF)...
The growth of Internet increases the range of future services that demand more network capacity and higher data rates. Network and system concepts are evolving accordingly using fiber-optic networks with transmission speeds more than 40 Gb/s as the base environment. Therefore, the creation of completely optical networks corresponding equipment is required. One of the basic elements of such network...
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data via insecure communication channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based remote user authentication schemes for multi-server environment...
An Opportunistic Network is an extreme network where the communication mainly depends on the mobility of the participating nodes to address the intermittent connectivity. This opportunistic routing utilizes a store-carry-forward paradigm exploiting node mobility and local forwarding to transfer the messages. The mobile nodes are normally low-power portable wireless communication devices employing...
Most of researches about the design of the topology and the operation of a wireless sensor network are focusing on how to take advantage of all sensor nodes to collect information that covering the whole sense area. A criticism been ignored that the goal of lengthening lifespan is conflict with the complete coverage strategy due to the overlapping of sensor area among nodes result in unnecessary waste...
The past studies on router node placement for wireless mesh networks (WMNs) did not consider placement of Internet gateways. Therefore, mesh routers and mesh clients can only communicate locally. The problem in this paper is to maximize both network connectivity and client coverage for the router node placement in WMNs consisting of mesh routers, mesh clients, and Internet gateways, subject to three...
One lesson learned from recent large-scale disasters is that the destroyed communication infrastructure severely burdens the relief operation and the recovery mission. How to establish a temporary emergency communication system (ECS) providing reliable communication channels upon deployment becomes a must. An Universal Software Radio Peripheral platform with GNU Radio is employed for experimential...
As the smart devices revolutionize, people may generate a lot of data and store the data in the local or remote file system in their daily lives. Even though the novel computer hardware and network technologies can handle the demand of generating a big volume of data, effective file deduplication can save storage space in either the private computing environment or the public cloud system. In the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.