Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
Delay Performance and Mixing Times in Random-Access Networks
The authors explore the achievable delay performance in wireless random-access networks. While relatively simple and inherently distributed in nature, suitably designed queue-based random-access schemes provide the striking capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. The specific type of activation rules...
Provided By Eindhoven University of Technology
-
Energy Optimization Hmlc Scheme for Wireless Communication in Sensor Networks
Wireless Sensor Network (WSN) consists of sensors for measuring and gathering data in a variety of environments. These sensors, with the size and battery constraints, usually have limited transmission ranges due to the low-power wireless radio transceivers. In a sensor network, sensed data should be collected at a centralized location,...
Provided By International Journal of Electronics and Computer Science Engineering
-
Compression for Fixed-Width Memories
To enable direct access to a memory word based on its index, memories make use of fixed-width arrays, in which a fixed number of bits is allocated for the representation of each data entry. In this paper, the authors consider the problem of encoding data entries of two fields, drawn...
Provided By Technimo LLC
-
The Thinnest Path Problem
The authors consider the thinnest path problem in wireless ad hoc networks. For a given source and a destination, the thinnest path problem asks for a path from the source to the destination that results in the minimum number of nodes overhearing the message. Such a path is achieved by...
Provided By Institute of Electrical & Electronic Engineers
-
Coverage and Throughput Analysis With a Non-Uniform Femtocell Deployment
In this paper, the authors propose a non-uniform femtocell network deployment scheme, in which the femtocell Base Stations (BSs) are not utilized in the region within a prescribed distance away from any macrocell BSs. Based upon a stochastic geometric framework, the downlink coverage and single user throughput are characterized with...
Provided By Institute of Electrical & Electronic Engineers
-
SoftCell: Taking Control of Cellular Core Networks
Existing cellular networks suffer from inflexible and expensive equipment, and complex control-plane protocols. To address these challenges, the authors present SoftCell, a scalable architecture for supporting fine-grained policies for mobile devices in cellular core networks. The SoftCell controller realizes high-level service polices by directing traffic over paths that traverse a...
Provided By Princeton Software
-
Zigbee GPS Based Tracking System Using ARM 9
Real Time person tracking is an important building block in advanced humanoid robots. The applications extend to small area security system like offices, hospitals, prisons, industries etc. There are various methods and some of them are now used in smart mobile applications using GSM-GPS, Sensor networks, vision based tracking system...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Approximate Congestion Games for Load Balancing in Distributed Environment
The use of game theoretic models has been quite successful in describing various cooperative and non-cooperative optimization problems in networks and other domains of computer systems. In this paper, the authors study an application of game theoretic models in the domain of distributed system, where nodes play a game to...
Provided By Indian Institute of Technology Madras
-
4G: How worldwide LTE services stack up
While a handful of countries have had commercial 4G LTE networks up and running for several years, for most of the world, fourth-generation mobile services are still a relatively new phenomena. And, thanks to the vagaries of spectrum auctions, geographically there's not much in the way of consistency.
The importance...Provided By TechRepublic
-
Delay and Doppler Spreads of Non-Stationary Vehicular Channels for Safety Relevant Scenarios
Vehicular communication channels are characterized by a non-stationary time- and frequency-selective fading process due to rapid changes in the environment. The non-stationary fading process can be characterized by assuming local stationarity for a region with finite extent in time and frequency. For this finite region the Wide-Sense Stationarity and Uncorrelated-Scattering...
Provided By Institute of Electrical & Electronic Engineers
-
An Efficient Method for Optimizing RFID Reader Deployment and Energy Saving
The rapid proliferation of Radio Frequency IDentification (RFID) systems realizes integration of physical world with the cyber ones. One of the most promising is the Internet of Things (IoT), a vision in which the Internet extends into the people daily activities through wireless networks of uniquely identifiable objects. Given that...
Provided By Tongji Apple Club
-
Deadlock-Free Fully Adaptive Routing in Irregular Networks Without Virtual Channels
This paper proposes a new flow control scheme in VCT-switched irregular networks. Based on the new scheme, a novel deadlock-free fully adaptive routing algorithm is introduced. The algorithm does not need any virtual channel. It requires that each input port of a switch holds at least two 1- packet-sized buffers....
Provided By Temple Skin Care
-
Dynamic Spectrum Refarming of GSM Spectrum for LTE Small Cells
In this paper, the authors propose a novel solution called Dynamic Spectrum Refarming (DSR) for deploying LTE small cells using the same spectrum as existing GSM networks. The basic idea of DSR is that LTE small cells are deployed in the GSM spectrum but suppress transmission of all signals including...
Provided By Cornell University
-
Optimum Transmission Through the Gaussian Multiple Access Channel
In this paper, the authors study the optimality of particular points in the capacity region of Gaussian Multiple Access Channels (GMACs) with various power constraints. The points of interest maximize general rate objectives that arise in practical communication scenarios. Achieving these points constitutes the task of jointly optimizing time-sharing parameters,...
Provided By Carleton University
-
Impact of Secondary Service Optimal Power Allocation on Cognitive Radio Systems
In cognitive radio systems, the secondary user senses a spectrum band formally allocated to the primary user and utilizes free spectrum bands or white spaces for its transmissions. In this paper, the effect of secondary service optimal power allocation on cognitive radio systems has been investigated. They have formulated and...
Provided By University of Le Havre
-
Integration of Wireless Sensor Networks with Virtual Instrumentation in a Residential Environment
In this paper, the authors present an approach to integrate Wireless Sensor Networks (WSN) with the LabVIEW graphical development environment through a dedicated software driver. As personal constribution, a system architecture and concept implementation is described, in the context of a smart house monitoring scenario. Data acquisition is performed via...
Provided By University Paris-Sud
-
Packet Monitor Scheme for Prevention of Black-Hole Attack in Mobile Ad-Hoc Network
Mobile Ad hoc NETworks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In the authors' research, they will address...
Provided By Institute of Electrical & Electronic Engineers
-
The Impact of Push Messaging
Marketers have several reasons to adopt push functionality in their app, it gives them a low cost, instant and personal communication channel to their customer base. Push messages generate traffic to the app, giving the brand the opportunity to expose the app user to an unlimited amount of the latest...
Provided By Service Tracking Systems, Inc.
-
Power of In-Person - The Business Value of In-Person Collaboration
As organizations compete and grow in a fast-paced global economy, a new set of business imperatives for success has evolved—solving complex problems quickly, effectively scaling partner interactions, growing customer relationships, and enabling agile innovation.
These elements are critical to creating market differentiation and competitive advantage in today’s business landscape. Distributed...Provided By Cisco
-
Routing with Guaranteed Delivery in Ad Hoc Wireless Networks
A network wide zone-based bidirectional tree is constructed to achieve more efficient membership management and multicast delivery. The position information is used to guide the zone structure building, multicast tree construction, and multicast packet forwarding, which efficiently reduces the overhead for route searching and tree structure maintenance. Several strategies have...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Physical-Layer Multicasting by Stochastic Transmit Beamforming and Alamouti Space-Time Coding
Consider transceiver designs in a multiuser Multi-Input Single-Output (MISO) downlink channel, where the users are to receive the same data stream simultaneously. This problem, known as physical-layer multicasting, has drawn much interest. Presently, a popularized approach is transmit beamforming, in which the beamforming optimization is handled by a rank-one approximation...
Provided By Chinese University of Hong Kong
-
Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks
The evaluation of a user's social influence is essential for various applications in Online Social Networks (OSNs). The authors propose a fine-grained Feature-Based social Influence (FBI) evaluation model. First, they construct a user's initial social influence by exploring two essential factors, that is, the possibility of impacting others, and the...
Provided By Institute of Electrical & Electronic Engineers
-
GSM-GPS Based Intelligent Security and Control System for Vehicle
The revolution of Mobile and Technology has made 'GSM based vehicle security system'. The vehicle security system is prominent worldwide. But it is not so much secure system. Every vehicle owner wants maximum protection of his vehicle; otherwise thief can easily trap the vehicle. So, by combing the idea of...
Provided By International Journal of Electronics Communication and Computer Engineering
-
A Versatile Dependent Model for Heterogeneous Cellular Networks
Due to the increasing spatial irregularity of cellular systems, point process models are ideally suited for analysis and simulation. When modeling multiple tiers, including macro-, micro-, and femto-tiers, a natural choice is the superposition of independent Poisson Point Processes (PPPs), each one modeling the locations of the base stations of...
Provided By University of Northern Iowa
-
Mobile \"Systems of Interactions\" Driving Business Innovation
Across the globe, more people are using mobile devices, which are increasingly user-friendly and intuitive, as their primary means of obtaining information and requesting services over the internet. And most enterprises realize that the users of their business applications have shifted from traditional personal computers (desktops and laptops) to mobile...
Provided By IBM
-
It's time for multi-platform Enterprise Mobility Management
Smartphones and tablets are proliferating in the workplace, with corporate and personal-owned devices often used side-by-side, driven by user demand and business strategy. Support of BYOD, end-user device choice, multiple operating systems and personal use on corporate devices is increasingly common. But with multiple platforms, mixed ownership and higher usage...
Provided By BlackBerry Enterprise Service
-
Local Monitoring and Maintenance for Operational Wireless Sensor Networks
One of the key mechanisms underlying a Wireless Sensor Network (WSN) is to monitor the network itself. Many existing approaches perform centralized analysis and maintenance based on a large amount of status reports collected from the WSN, while others use add-on protocols/modules that not only require extra management cost but...
Provided By Temple Skin Care
-
Improvisation of MAC Protocol for Wireless Sensor Network
Wireless sensor networks are collection of sensor nodes connected via wireless LAN links. The information gathered at sensor node is propagates in the form of radio signal to control room via multi hop communication. In the networks, many sensors where lying in same channel to pass message, so as well...
Provided By International Journal of Electronics Communication and Computer Engineering
-
QoS-Aware Service Selection in Geographically Distributed Clouds
As more and more services are offered in clouds, it is possible to meet the diverse demands of users via service composition. Selecting the optimal set of services, in terms of QoS, is the crucial issue when many functionally equivalent services are available. In this paper, the authors investigate the...
Provided By Nanjing University
-
Designing Home Automation System (HAS) Using Java ME for Mobile Phone
Home automation means to control home appliances and their characteristics like on and off, speed, volume and dimming. Since last few years, ICT (Information Communication Technology) have been increasingly embedded into surroundings. This inclination has been frequently referred to as pervasive or ubiquitous computing, where mobile devices are practiced widely....
Provided By International Journal of Electronics and Computer Science Engineering
-
Complexity Reduction in ML Decoding for MIMO Systems
In this paper, the authors propose a combined Breadth first tree search ML (Maximum Likelihood)-ZF (Zero Forcing) method of detection for Spatial Multiplexed MIMO (Multiple Input Multiple Output) systems with reduced complexity. The detection of real and imaginary parts of QAM (Quadrature Amplitude Modulation) modulated symbol is carried out in...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Power System Dynamics as Primal-Dual Algorithm for Optimal Load Control
The authors formulate an Optimal Load Control (OLC) problem in power networks where the objective is to minimize the aggregate cost of tracking an operating point subject to power balance over the network. They prove that the swing dynamics and the branch power flows, coupled with frequency-based load control, serve...
Provided By California Institute of Technology
-
A Novel Approach to Reduce Routing Overhead in Multi-Hop Scenario in VANET
Vehicular Ad hoc NETwork (VANET) is a sub class of mobile ad hoc networks. It provides wireless communication among vehicles and vehicle to road side equipments. The communication between vehicles is used for safety, comfort and for entertainment as well. The performance of communication depends on how better the routing...
Provided By Creative Commons
-
Wireless Sensor Networks: Routing Protocols, Challenges, Solutions
The most important evolution of the modern era is wireless sensors networks. Recent advancements in WSNs also led to the implementation of several new protocols which are to be implemented for proper functioning of the network. This paper reviews the different type of routing techniques used and the different type...
Provided By Creative Commons
-
A Study of Routing Techniques in Intermittently Connected MANETs
A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three...
Provided By Anna University
-
Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing With Low Aggregation Error
Aggregate statistics computed from time-series data contributed by individual mobile nodes can be very useful for many mobile sensing applications. Since the data from individual node may be privacy-sensitive, the aggregator should only learn the desired statistics without compromising the privacy of each node. To provide strong privacy guarantee, existing...
Provided By Pennsylvania State Employees Credit Union
-
Analysis on QPSK Modulation Technique for Wideband Code Division Multiple Access
This paper is the study of the QPSK (Quadrature Phase Shift keying) modulation technique using AWGN (Additive White Gaussian Noise) and Multipath Rayleigh fading channel. In QPSK scheme the authors can transmit one of the 4 possible signals during each interval of signaling. WCDMA systems are based on higher modulations...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Low-Power Maximum a Posteriori (MAP) Algorithm for WiMAX Convolutional Turbo Decoder
The authors propose to design a Low-Power Memory-Reduced Traceback MAP iterative decoding of Convolutional Turbo Code (CTC) which has large data access with large memories consumption and verify the functionality by using simulation tool. The traceback Maximum a Posteriori Algorithm (MAP) decoding provides the best performance in terms of Bit...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Optical Time Division Multiplexing (OTDM) and Hybrid WDM/OTDM PON Performance Investigation
Every day, the need for high speed reliable data transmission increases more and more. One important option is the passive optical networks which use the optical fiber and provides high data rates and long distance. This work investigates the performance of a four users Optical Time Division Multiplexing OTDM over...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Enhancing IEEE 802.11 Energy Efficiency for Continuous Media Applications
This paper proposes the Optimized Power save Algorithm for continuous Media Applications (OPAMA) to improve end-user device energy efficiency. OPAMA enhances the standard legacy Power Save Mode (PSM) of IEEE 802.11 by taking into consideration application specific requirements combined with data aggregation techniques. By establishing a balanced cost/benefit tradeoff between...
Provided By University of Cincinnati
-
Bacteria-based Communication in Nanonetworks
This paper describes a Bacteria-based Nanonetwork for communication between eukaryotic cell sized nano devices. The communication is achieved by the exchange of DNA molecules which are transported by bacteria guided by chemotaxis. First, the modules of the network are described and all the biological phenomena that support the basic communication...
Provided By Elsevier
-
Comparative Analysis of Link Quality Metrics and Routing Protocols for Optimal Route Construction in Wireless Mesh Networks
The authors provide a comparative analysis of various routing strategies that affect the end-to-end performance in wireless mesh networks. They first improve well-known link quality metrics and routing algorithms to enhance performance in wireless mesh environments. They then investigate the route optimality, i.e., whether the best end-to-end route with respect...
Provided By Elsevier
-
The Domestic Content Of Imports And The Foreign Content Of Exports
When a country imports goods that have been assembled abroad, some amount of the labor and capital services embodied in those goods may originally be from the country that is now importing them. Similarly, some of the value added of a country's exports may be foreign in origin. For the...
Provided By Elsevier
-
From Wireless Sensor Networks Towards Cyber Physical Systems
In the past two decades, a lot of research activities have been dedicated to the fields of Mobile Ad hoc NETwork (MANET) and Wireless Sensor Networks (WSN). More recently, the Cyber Physical System (CPS) has emerged as a promising direction to enrich the interactions between physical and virtual worlds. In...
Provided By Elsevier
-
Robust Delegation Signcrypted Authentication Protocol against FHLR Attack in 3GPP Wireless Communications
In this paper, the authors propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the...
Provided By Alexandria University
-
A Robust Technique for WLAN Device-Free Passive Motion Detection
The authors present RASID: a system capable of detecting passive human motion using the already installed indoor wireless infrastructure. RASID applies a statistical anomaly detection technique to detect motion inside indoor environments by monitoring the changes in the wireless signal strength. The system also adapts to the environment changes and...
Provided By Alexandria University
-
Performance of TC-QPSK-OFDM System With Phase Error and Perfect Compensation in Rayleigh Fading Channel
Orthogonal Frequency Division Multiplexing (OFDM) combines the advantage of high achievable rates and relatively easy implementation. In this paper, the authors present an evaluation of the combined use of the Turbo Codes (TC) and the orthogonal frequency division multiplexing with pilot-aided data in Rayleigh fading channel with compensation the phase...
Provided By Alexandria University
-
A Soft Sensing-Based Cognitive Access Scheme Exploiting Primary Feedback
In this paper, the authors examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. They consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are function of the spectrum sensing metric....
Provided By Alexandria University
-
UPTIME: Ubiquitous Pedestrian Tracking Using Mobile Phones
The mission of tracking a pedestrian is valuable for many applications including walking distance estimation for the purpose of pervasive healthcare, museum and shopping mall guides, and locating emergency responders. In this paper, the authors show how accurate and ubiquitous tracking of a pedestrian can be performed using only the...
Provided By Alexandria University
-
Optimized Dual Relay Deployment for LTE-Advanced Cellular Systems
LTE-Advanced adopts relay deployment to support higher data rates and better coverage, especially at the cell edges which suffer from inter-cell interference. The solution of relaying is attractive because of its low cost and easy deployment. In this paper, the authors show that deploying just two relays per sector can...
Provided By Alexandria University
-
Total Support: Achieving sustainable business growth with a remote support solution
Successfully expanding and supporting a geographically dispersed business requires big-picture vision, real-world analysis, pragmatic planning, and a relentless focus on execution. It also requires buckets of patience, especially when it comes to servicing and supporting your customers. If they are considering or have already purchased your product, they expect total...
Provided By NTRglobal
-
Lithofacies Classification From Well Log Data Using Neural Networks, Interval Neutrosophic Sets and Quantification of Uncertainty
This paper proposes a novel approach to the question of lithofacies classification based on an assessment of the uncertainty in the classification results. The proposed approach has multiple Neural Networks (NN), and Interval Neutrosophic Sets (INS) are used to classify the input well log data into outputs of multiple classes...
Provided By Murdoch University
-
A Crisis Communication Network Based on Embodied Conversational Agents System With Mobile Services
In this paper, the authors proposed a new framework to incorporate an intelligent agent software robot into a crisis communication portal (CCNet) in order to send alert news to subscribed users via email and other mobile services such as Short Message Service (SMS), Multimedia Messaging Service (MMS) and General Packet...
Provided By Murdoch University
-
D-Proxy: Reliability in Wireless Networks
Packet corruption negatively affects TCP throughputs because losses are interpreted as congestion. To enable TCP to operate effectively over wireless networks, a number of reliability techniques such as Forward Error Correction (FEC) and Automatic Repeat reQuest (ARQ) are used. These provide reliability at the expense of increased overheads. This paper...
Provided By Murdoch University
-
An Experimental Comparison of Routing Protocols in Multi Hop Ad Hoc Networks
This paper experimentally compares the performance of three different multi hop ad hoc network routing protocols. Traditional routing protocols have proven inadequate in wireless ad hoc networks, motivating the need for ad hoc specific routing protocols. This study tests link state, distance vector and biologically inspired approaches to routing using...
Provided By Murdoch University
-
Dynamic Weight Parameter for the Random Early Detection (RED) in TCP Networks
This paper presents the WeighTed Random Early Detection (WTRED) strategy for congestion handling in TCP networks. WTRED provides an adjustable weight parameter to increase the sensitivity of the average queue size in RED gateways to the changes in the actual queue size. This modification, over the original RED proposal, helps...
Provided By Murdoch University
-
A Game-Theoretic Approach to Security and Power Conservation in Wireless Sensor Networks
In this paper, the authors investigate the impacts of applying game theory on the network throughput, network voltage loss and accuracy of malicious node detection to wireless sensor networks. They implement a protocol which the sensors use when deciding whether or not to forward packets they receive from other sensors...
Provided By Lincoln University
-
On the Power Consumption of 802.16e Listening State
Energy consumption strategy is crucial to the future of Broadband Wireless Access (BWA). In order to manage limited battery power efficiently, the IEEE 802.16e standard defines the sleep mode operation in its MAC protocol to maximize the lifetime of Mobile Station (MS) and to enhance the network capability. In this...
Provided By Fu Jen Catholic University
-
An Almost Overhead-Free Error Control Scheme for IEEE 802.16-Based Multi-Hop Networks
Based on IEEE 802.16 specifications, the Convergence Sublayer (CS) of 802.16-based networks provides the function for heterogeneous upper layer protocols. The CS can encapsulate such as IP packets with variable lengths or ATM cells with fixed length in its MAC PDU and usually adds a CRC-32 field to the rear...
Provided By Fu Jen Catholic University
-
Utility-Based Time and Power Allocation on an Energy Harvesting Downlink: The Optimal Solution
In this paper, the authors consider the allocation of power level and time slots in a frame to multiple users, on an energy harvesting broadcast system. They focus on the offline problem where the transmitter is aware of the energy arrival statistics of a frame before the frame starts. The...
Provided By Middle East Technical University
-
Optimal Offline Packet Scheduling on an Energy Harvesting Broadcast Link
The authors consider the minimization of packet transmission duration on an energy harvesting Broadcast Channel (BC). Energy and data arrivals are assumed to occur at arbitrary but known instants. An achievable rate region with structural properties satisfied by the two-user AWGN BC capacity region is assumed. Structural properties of power...
Provided By Middle East Technical University
-
Wireless Network Simplification: The Gaussian N-Relay Diamond Network
The authors consider the Gaussian N-relay diamond network, where a source wants to communicate to a destination node through a layer of N-relay nodes. They investigate the following question: What fraction of the capacity can they maintain by using only k out of the N available relays? They show that...
Provided By Middle East Technical University
-
Cognitive Radio Sensor Networks
The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, cognitive radio has emerged as the key technology, which enables opportunistic access to the spectrum. The main potential advantages introduced by cognitive radio are improving spectrum utilization and increasing communication quality. These appealing features match...
Provided By Middle East Technical University
-
PADRE: Modulated Backscattering-Based PAssive Data REtrieval in Wireless Sensor Networks
The most difficult challenge for the design of Wireless Sensor Networks (WSN) is to maintain long network lifetimes since the sensor nodes are severely energy-constrained. Traditional WSN assumes employment of conventional RF transmitters which consume most of the stored power on the sensor node. In this regard, Modulated Backscattering (MB)...
Provided By Middle East Technical University
-
A Report on Current Advancements in Integration of IEEE 802.16 and IEEE 802.11 Networks
IEEE 802.11 and IEEE 802.16 are two technologies that can provide high data rates, but they both have restrictions on their coverage area. The fact that 802.11 is only able to cover a limited area while 802.16 provides network access to a much larger area but fails in indoor environments...
Provided By Middle East Technical University
-
Probability of Full-Diversity for Simple Coded and Rotated Multidimensional Constellation Systems
The case of rotation, in use together with coding in a channel with B fading blocks, is analyzed in terms of diversity properties of the coded systems with multi-dimensional rotated constellations (coded-rotated system) output. First closed-form expression obtained is related to the diversity performance of un-rotated generic coding structures with...
Provided By Middle East Technical University
-
Turbo-Like Codes Over Block-Fading and Time-Varying Narrowband Fading Channels
The authors' main goal in this paper is to construct codes that can perform close to information-theoretic limits in time-varying channels. For this purpose, a new turbo-like code is first proposed for the block-fading channel which achieves the same error performance of a recently introduced blockwise concatenated code but with...
Provided By Middle East Technical University
-
Iterative Decision Feedback Equalization and Decoding for Rotated Multidimensional Constellations in Block Fading Channels
It is known that rotated multidimensional constellations can be used effectively to achieve full-rate and full-diversity transmission in block fading channels. However, the optimal decoding complexity is exponential with the number of fading blocks (or degrees of freedom). In this paper, the authors propose a reduced-complexity iterative receiver structure operating...
Provided By Middle East Technical University
-
Testbed Design and Localization in MiNT-2: A Miniaturized Robotic Platform for Wireless Protocol Development and Emulation
A significant challenge in the development of robust wireless networking protocols is often the need to prototype and test these protocols in a small-scale setting before they can be widely deployed. Two contrasting prototyping and testing methods are currently used, requiring a choice between convenience and accuracy. The first involves...
Provided By Binghamton University
-
Scheduling Aware Network Flow Models for Multi-Hop Wireless Networks
Network flow models have proven to be an effective tool in the analysis and optimization of networks. In addition, with some work, they have been used to develop stable and near-optimal distributed protocols. Critical to the success of these models in Multi-Hop Wireless Networks (MHWNs) is an accurate estimation of...
Provided By Binghamton University
-
Path-Coupled Signaling for NAT/Firewall Traversal
Complex protocols tend to negotiate secondary flows on the application layer. This, in the general case, prevents Firewalls and NATs from allowing or routing them, and communication becomes impossible. This paper describes the requirements and design of an end-application triggered, path-coupled signaling protocol for NAT/Firewall traversal. Finally, the paper shows...
Provided By NEC Europe
-
Virtual Identity Framework for Telecom Infrastructures
Identity Management has so far been a field mainly applications and Web focused. This paper describes a novel approach to cross layer identity management that extends digital identities to the network, the Virtual IDentity (VID) Framework. The VID framework provides strong privacy to the user, while easily supporting personalization cross-service...
Provided By NEC Europe
-
On Supporting Mobile Peer to Mobile Peer Communications
In this paper, the authors propose a new method for assessing the sociability scalar of a mobile peer by the network, most importantly with no involvement of the mobile peer. The sociability metric can help in the Application Layer Traffic Optimization (ALTO) guidance in Mobile Peer-to-Mobile Peer (MP2MP) scenario to...
Provided By NEC Europe
-
A Destination Prediction Model Based on Historical Data, Contextual Knowledge and Spatial Conceptual Maps
Mobile wireless network technology has enabled the development of increasingly diverse applications and devices resulting in an exponential growth in usage and services. One challenge in mobility management is the movement prediction. Prediction of the user's longer-term movement (e.g., 10 min in advance) with reasonable accuracy is very important to...
Provided By NEC Europe
-
Explaining Mobile Commerce Services Adoption by Different Type of Customers
Mobile phones have been proclaimed as the new service frontier. Nowadays, in addition to traditional mobile services, new mobile commerce services are ready to be used by customers based on 3G-related technologies. However, little is known about the reasons why different groups of customers adopt mobile commerce services. By means...
Provided By University of Murcia
-
Spatially Disjoint Multipath Routing Protocol Without Location Information
Multipath routing permits the discovery and use of multiple paths between a source and a destination. The authors develop a distributed on-demand multipath routing protocol for MANETs capable of finding spatially disjoint paths without location information. The use of spatially disjoint routes in multipath routing is important due to the...
Provided By University of Murcia
-
Achieving Spatial Disjointness in Multipath Routing Without Location Information
The authors develop an on-demand multipath routing protocol for Multi-hop Wireless Networks (MWNs), capable of finding spatially disjoint paths without the need of location information. Multipath routing can enable various applications and enhancements in MWNs, such as load balancing, bandwidth aggregation, reliability and secure communications. The use of spatially disjoint...
Provided By University of Murcia
-
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorithms have recently been proposed to reduce the control overhead due to these messages. However, existing beacon-less algorithms have not considered realistic physical layers. Therefore, those algorithms cannot work...
Provided By University of Murcia
-
Multicast Ad Hoc Routing Through Mobility-Aware Steiner Tree Meshes With Consistency Across Different Mobility Models
The authors study the problem of reducing the data overhead of mesh-based multicast ad hoc routing protocols while maintaining high packet delivery ratios. Their proposed approach adaptively controls the redundancy added by the routing protocol to the minimal data overhead multicast mesh. They show that the problem of finding the...
Provided By University of Murcia
-
Mobility-Aware Adaptive Counter-Based Forwarding Elimination to Reduce Data Overhead in Multicast Ad Hoc Routing
Most of the previous efforts regarding multicast routing in MANETs, have been devoted to the provision of low-control overhead protocols, being able to maximize the packet delivery ratio. In multicast routing, the non-optimality of the forwarding structure can also lead to transmission of additional data packets (compared to the minimum...
Provided By University of Murcia