Search results for " networking"
showing 10 items of 1264 documents
Energy-Efficient and Secure Resource Allocation for Multiple-Antenna NOMA with Wireless Power Transfer
2018
Non-orthogonal multiple access (NOMA) is considered as one of the promising techniques for providing high data rates in the fifth generation mobile communication. By applying successive interference cancellation schemes and superposition coding at the NOMA receiver, multiple users can be multiplexed on the same subchannel. In this paper, we investigate resource allocation algorithm design for an OFDM-based NOMA system empowered by wireless power transfer. In the considered system, users who need to transmit data can only be powered by the wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among mul…
SDN@home: A Method for Controlling Future Wireless Home Networks
2016
Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
2017
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…
Cell Association With Load Balancing in Nonuniform Heterogeneous Cellular Networks: Coverage Probability and Rate Analysis
2017
To meet the ever-growing traffic demand and address the cell capacity shortage problem, associating end users to various tiers of cells in a multitier cellular network appears to be a promising approach. In this paper, we consider a nonuniform heterogeneous cellular network (NuHCN) and propose a cell association scheme that selectively mutes certain small-cell base stations (BSs) and covers end users by cell range extension (via cell biasing) for achieving load balancing. The envisaged NuHCN is comprised of two tiers of BSs, i.e., macro- and small-cell BSs, deployed according to three independent homogeneous Poisson point processes for BSs and end users, respectively. Accordingly, the avail…
Cloud-based elastic architecture for distributed video encoding: Evaluating H.265, VP9, and AV1
2020
Abstract Areas with social and business impact such as entertainment, healthcare, surveillance, and e-learning would benefit from improvements in video coding and transcoding services. New codecs, such as AV1, are being developed to deal with new demands for high video resolutions with bandwidth constraints and quality requirements. However, these new codecs have high computational requirements and new strategies are needed to accelerate their processing. Cloud computing offers interesting features such as on-demand resource allocation, multitenancy, elasticity, and resiliency among others. Deploying video coding and transcoding services on these infrastructures is suitable because it allow…
Comparison of WSN and IoT approaches for a real-time monitoring system of meal distribution trolleys: A case study
2018
Abstract International regulations determine that food in hospitals and elderly homes must be served at given temperature ranges. However, the real-time surveillance of the meal distribution trolleys along all the institutions facilities, guaranteeing conformity to rules from the instant when all the meals are put in the distribution trolley until they are delivered to the patients, is still a challenge. In this paper, we present a comparison of two approaches based on Wireless Sensor Networks (WSN) and Internet of Things (IoT) technologies for implementing a Real-Time Monitoring System of Meal Distribution Trolleys in a hospital. The performance evaluation results show that the IoT impleme…
SAUCE: A web application for interactive teaching and learning of parallel programming
2017
Abstract Prevalent hardware trends towards parallel architectures and algorithms create a growing demand for graduate students familiar with the programming of concurrent software. However, learning parallel programming is challenging due to complex communication and memory access patterns as well as the avoidance of common pitfalls such as dead-locks and race conditions. Hence, the learning process has to be supported by adequate software solutions in order to enable future computer scientists and engineers to write robust and efficient code. This paper discusses a selection of well-known parallel algorithms based on C++11 threads, OpenMP, MPI, and CUDA that can be interactively embedded i…
A holistic modeling for QoE estimation in live video streaming applications over LTE Advanced technologies with Full and Non Reference approaches
2018
Abstract Current mobile networks are providing high speed access to Internet at a rate of Gigabits per second. In this scenario, traditional services over wired networks are an alternative, in particular those based on live video streaming. But in the transition, different issues should be considered due to the rapid changing network conditions and the limited resources of the mobile devices. These issues should be taken into account to keep a good Quality of Experience (QoE) of the video in terms of a high Mean Opinion Score (MOS), a subjective video quality. Our goal is to estimate and predict this subjective metric in a holistic manner. Thus, we have analyzed and measured different varia…
Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?
2007
Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…
Dual-model approach for safety-critical embedded systems
2020
Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.