The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923...
In this paper, we present some preliminary results on a user study which was geared to obtain a better understanding for the relevance and impact of how the media reports on data breaches. Specifically, we conducted a study to investigate whether or not there is a correlation between the media coverage of data breaches and the perceived data breach fatigue among the general public.
A problem that arises with pilot assignment in multicellular massive multiple-input-multiple-output (MIMO) systems is due to inter-cell interference, also known as pilot contamination. This paper focuses on minimizing the inter-cell interference that results from spatial correlation based on signal arrival parameters, assuming the use of a cylindrical antenna array. The signal parameters are used...
In this work, we analyse and investigate the performance of wireless communication systems with maximal ratio combining (MRC) over η − μ/Inverse Gaussian (IG) composite fading channel. All formats of coherent schemes are considered and novel closed-form expressions of average symbol error probability (ASEP) with diversity are derived. Also, the novel closed-form expressions of channel capacity under...
Adopting a Cloud solution means binding to a specific platform and vendor, with proprietary protocols, standards and tools so usually running into a vendor lock-in. The fear of vendor lock-in is often cited as a major impediment to Cloud service adoption. In this work, we focus on the Virtual Machine (VM) migration between homogeneous and heterogeneous Cloud platforms. We focused on the technical...
In this paper, a novel Memory-Assisted Adaptive-Threshold detection (MAAT) scheme for diffusion-based molecular communications (MC) systems is proposed. The proposed scheme applies to MC systems in which single-type of molecules is assumed to carry the information from the transmitting nano-machine, through a fluid medium, to the receiving nano-machine. The information is represented by the received...
This paper presents a method for protecting wireless signals through the creation and exploitation of time-varying spectral redundancy. Redundant symbols are multiplexed in both time and frequency in dynamic patterns within multicarrier symbols which creates the spectral redundancy. A novel Frequency Shift (FRESH) filter is developed to exploit this timevarying spectral redundancy. This filter structure...
Trajectory planning in airborne networks is a primary application of Unmanned Aerial Vehicle (UAV) communication. The literature contains algorithms focusing on collision avoidance, intelligent task assignment and path planning among UAVs. Cooperative schemes exist in which the UAVs communicate with each other to reach a consensus on how each vehicle will take up one trajectory at a time efficiently...
SDH and SONET networks are still widely used in metro network data infrastructure. However, over the next decade, they will be replaced by new infrastructures, e.g., IPcentric and SDN-enabled networks, throughout network migration that can take several months to a couple of years, in order to minimize the number of network disruptions. Consequently, telecommunication companies are looking for optimization...
Multicast is widely deployed in data centers for point-to-multi-point communications. It has an established set of control protocols such as IGMP and PIM that has limitations around the lack of bandwidth awareness when establishing the multicast trees. This could leads to over-subscription of network links and packet loss impacting user quality of experience. Other existing multicast issues are around...
We report a unique highly-linear, low-complexity, selectable slope, optical electric field frequency discriminator (FD) filter as novel phase-modulated/frequency-modulated-tointensity- modulated (PM/FM-to-IM) converter. We refer to this FD as Sin-Sin2 FD filter. Here, we review its different aspects, including its (i) surprisingly simple device design, (ii) excellent linearity performance, and (iii)...
Handovers in a cellular system provide mobility and freedom to connect to any desired cell at any instance. It is necessary to manage handovers better, to cater to the services that a user desires. In any given cell, the newly originating connections and the incoming handover connections both have been mostly treated as exponential arrivals from a queueing model perspective. However, such models provide...
Botnets have long been used for malicious purposes with huge economic costs to the society. With the proliferation of cheap but non-secure Internet-of-Things (IoT) devices generating large amounts of data, the potential for damage from botnets has increased manifold. There are several approaches to detect bots or botnets, though many traditional techniques are becoming less effective as botnets with...
Many wireless networks operate in the presence of distance-dependent path–loss in a fading environment with a Poisson interference field. In these networks, the aggregate interference can be modeled as an α-stable process with a known characteristic function. In this study, the authors revisit performance analysis of wireless systems operating in a Nakagamim fading channel. In particular, our emphasis...
We have previously presented ChoiceNet, a choicebased architecture for the future Internet. ChoiceNet enables users to choose and pay for advertised competing service component offerings and independently compose the end-to-end services they require. In this paper, we investigate whether we can achieve collaborative optimization (co-optimization) of the network for both the customers and service providers...
In this paper, we introduce Visible Light Detection and Ranging (ViLDAR): a novel speed estimation system that utilizes visible light variation during a known time difference. The use of light emitting diodes (LED) in vehicles lighting systems has become increasingly common in the automotive industry. Concurrently, monitoring drivers’ speeds constitutes a critical issue for safety regulation agencies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.