2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)最新文献

筛选
英文 中文
Comparison of propagation models ITU.R-P.1546 and ITU.R-P.1812 传输模式的比较。1546和itu - r - p .1812
Lidija Paunovska, L. Gavrilovska
{"title":"Comparison of propagation models ITU.R-P.1546 and ITU.R-P.1812","authors":"Lidija Paunovska, L. Gavrilovska","doi":"10.1109/VITAE.2014.6934481","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934481","url":null,"abstract":"Prediction of radio propagation is a complex process, which includes a large amount of information such as: terrain, prediction of attenuation due to obstacles that may be faced during the propagation of radio signal and type of the location. Analysis could be simplified by using the average statistic results calculated during longer period of time (over the land and/or over the sea). The radio signal may come across the obstacles that might cause reflection, diffraction and discontinuity along the propagation path. The usage of appropriate software propagation models can simulate all of the mentioned aspects. The main purpose of this paper is to compare the accuracy of the software prediction models ITU-R P.1546 and ITU-R P.1812 with terrain measurements.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"5 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the sum-rate capacity of a 2-user Multiple Access Wiretap Channel with one secret user 关于一个秘密用户的2用户多址窃听信道的总速率容量
Sanjay Karmakar
{"title":"On the sum-rate capacity of a 2-user Multiple Access Wiretap Channel with one secret user","authors":"Sanjay Karmakar","doi":"10.1109/VITAE.2014.6934477","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934477","url":null,"abstract":"We consider a 2-user Gaussian Multiple-Access Wiretap channel (MA-WC), with the unintended receiver having access to signal from only one of the two transmitters. We have characterized the sum-rate capacity of this channel within .5 bits and proved that Gaussian signalling at the transmitters is approximate sum-rate capacity optimal. For the scenario when the additive noise plus the signal from first transmitter have a combined strength poorer than the additive noise of the evesdropper, the above sum-rate capacity characterization leads to an approximate capacity region characterization for the channel. It is shown that, under this circumstances, a timesharing scheme between the two users can achieve the capacity region of the channel within .25 bits. It has been proved (Xie and Ulukus, ISIT 2013 [1]) recently that on a Multiple-Access Wiretap channel interference alignment (IA) is necessary to achieve optimal performance. Our channel model is an interesting variation of the MA-WC for which IA is not necessary and independent Gaussina signalling is sufficient to achieve the optimal sum-rate within .5 bits.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125150350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EPIKOUROS — Virtualized platforms using heterogeneous sensor services in cloud computing environment EPIKOUROS——在云计算环境中使用异构传感器服务的虚拟化平台
D. Vouyioukas, A. Moralis, M. Sardis, D. Drakoulis, George Labropoulos, S. Kyriazakos, Dimitris Dres
{"title":"EPIKOUROS — Virtualized platforms using heterogeneous sensor services in cloud computing environment","authors":"D. Vouyioukas, A. Moralis, M. Sardis, D. Drakoulis, George Labropoulos, S. Kyriazakos, Dimitris Dres","doi":"10.1109/VITAE.2014.6934461","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934461","url":null,"abstract":"EPIKOUROS is an innovative project where methodologies and tools will be developed for designing, building and deploying Internet-of-Things applications on Virtual Environments. EPIKOUROS main goal is to design and develop a virtualized middleware platform that would allow easily creating and structuring environments. In turn, it would allow the collection, management and integration of information generated by multiple sensors and sensor-networks, as well as the management of business process procedures that are supported by the sensors' infrastructure. The project will use as proof-of-concept scenarios from independent living, intelligent/multimodal transport and building management.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Subscriber group behavioral analysis for data-centric service consumption beyond LTE-Advanced 超越LTE-Advanced的以数据为中心的服务消费的用户组行为分析
L. Gonçalves, P. Sebastião, N. Souto, A. Correia
{"title":"Subscriber group behavioral analysis for data-centric service consumption beyond LTE-Advanced","authors":"L. Gonçalves, P. Sebastião, N. Souto, A. Correia","doi":"10.1109/VITAE.2014.6934500","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934500","url":null,"abstract":"In this paper we elaborate on the factors that have contributed the most to mobile data traffic growth witnessed in the past decade: mobile data subscriptions; mobile data enabled devices; mobile applications, always on and cloud services and standardization. From it a set of data-centric services and scenarios are derived: most expected by 2020. Based on them subscribers' universe was split into four user behavioral segments we introduce. All form the pillars of a traffic model, which is our main contribution, tested with real and estimated data from existing market studies. User segments' consistency and stability towards traffic generation, data consumption and service usage, as well as the probability of user segments shifting among services analysis can be performed. The effectiveness of the proposed model is demonstrated based on real world data, aiming to bring together technological, sociological and also economical perspectives into a single analytical framework.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
State-of-the-art comparative cost modeling of heavily-loaded wireless heterogeneous networks 重载无线异构网络的最先进的比较成本建模
Vladimir Nikolikj, T. Janevski
{"title":"State-of-the-art comparative cost modeling of heavily-loaded wireless heterogeneous networks","authors":"Vladimir Nikolikj, T. Janevski","doi":"10.1109/VITAE.2014.6934472","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934472","url":null,"abstract":"The motivation of this paper comes from the ongoing need of the telecommunications industry to respond to the revenue traffic decoupling trend. Besides innovation of data services in order to increase the average revenue per user, the ultimate goal of the mobile operators is to increase their cost and operational efficiency. For that purpose we developed “state-of-the-art” comparative analysis of the heterogeneous wireless networks in order to determine the most cost effective radio network deployment strategies as a function of excessive demand levels of up to 100 GB per user and month. We perform the modeling by consideration of the unit cost drivers relevant for the various base station classes which provide different coverage and high capacity performance, coming with the LTE-Advanced radio access technology or IEEE 802.11ac Wi-Fi standard. The outcome of our cost model is the proper assessment of the total investment to cover and adequately serve the particular area of interest. The key finding is that the small cell solutions like pico, femto cells and Wi-Fi access points are more cost efficient when new macro base station sites need to be deployed or when very high demand levels need to be satisfied. In all other evaluated cases the importance of the spectrum size comes to the highest level together with the introduction of the LTE-Advanced carrier aggregation functionality.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129442057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SUNSEED — An evolutionary path to smart grid comms over converged telco and energy provider networks SUNSEED -融合电信和能源供应商网络的智能电网通信的进化路径
Č. Stefanović, P. Popovski, L. Jorguseski, R. Sernec
{"title":"SUNSEED — An evolutionary path to smart grid comms over converged telco and energy provider networks","authors":"Č. Stefanović, P. Popovski, L. Jorguseski, R. Sernec","doi":"10.1109/VITAE.2014.6934427","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934427","url":null,"abstract":"SUNSEED, “Sustainable and robust networking for smart electricity distribution”, is a 3-year project started in 2014 and partially funded under call FP7-ICT-2013-11. The project objective is to research, design and implement methods for exploitation of existing communication infrastructure of energy distribution service operators (DSO) and telecom operators (telco) for the future smart grid operations and services. To achieve this objective, SUNSEED proposes an evolutionary approach to converge existing DSO and telco networks, consisting of six steps: overlap, interconnect, interoperate, manage, plan and open. Each step involves identification of the related smart grid service requirements and implementation of the appropriate solutions. The promise of SUNSEED approach lies in potentially much lower investments and total cost of ownership of future smart energy grids within dense distributed energy generation and prosumer environments.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A hybrid algorithm for efficient Wireless Sensor Network time synchronization 一种高效无线传感器网络时间同步的混合算法
P. Pawar, R. Nielsen, N. Prasad, R. Prasad
{"title":"A hybrid algorithm for efficient Wireless Sensor Network time synchronization","authors":"P. Pawar, R. Nielsen, N. Prasad, R. Prasad","doi":"10.1109/VITAE.2014.6934466","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934466","url":null,"abstract":"Applications of Wireless Sensor Networks (WSNs) have increased significantly in the last few decades and real time needs have to be satisfied using appropriate time synchronization algorithms. Novel synchronization algorithms can lead to improved network performance including energy consumption, throughput, and delay. This paper proposes, implements and evaluates a hybrid synchronization algorithm, to achieve performance efficient clock accuracy in cluster-based WSNs. The algorithm uses tight synchronization for inter-cluster communication and loose synchronization for intra-cluster communication. These distinctive features of the proposed hybrid algorithm make it performance-efficient for maintaining synchronization during time division multiple accesses (TDMA) scheduling. The results show reduced synchronization errors and delay with improved energy efficiency and throughput.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123840623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating user influence based on Web2.0 UGC 基于Web2.0 UGC的用户影响力评估
Yue Zhai, Lei Li, Xin Lin, J. Qi
{"title":"Evaluating user influence based on Web2.0 UGC","authors":"Yue Zhai, Lei Li, Xin Lin, J. Qi","doi":"10.1109/VITAE.2014.6934438","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934438","url":null,"abstract":"With the development of Social Networking Services, users can publish and receive information expediently. Social marketing emerged at this circumstance with an important need to study the influence of marketing activities in network. Based on the research of user influence, choosing the most influential users can improve marketing effectiveness greatly. With the appearance of Facebook, Twitter, and other social networks, more and more scholars began to study user influence in such complex and huge network. In this paper, we make a quantitative analysis to evaluate user influence and classify users into different categories. We synthetically consider various user attributes, including the static social relationships and dynamic social activities. We add new components to improve PageRank algorithm and propose a behavior-based ranking(BBR) algorithm. Experiments show that the improved BBR algorithm has a satisfied performance.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123871705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy efficient collection of spectrum occupancy data in wireless cognitive sensor networks 无线认知传感器网络中频谱占用数据的节能收集
G. Stamatakis, E. Tragos, A. Traganitis
{"title":"Energy efficient collection of spectrum occupancy data in wireless cognitive sensor networks","authors":"G. Stamatakis, E. Tragos, A. Traganitis","doi":"10.1109/VITAE.2014.6934414","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934414","url":null,"abstract":"We consider the problem of intelligent spectrum sensing based on historical data in the context of Cognitive Wireless Sensor Networks with the goal to minimize the long term energy consumed for spectrum sensing. The problem involves a wireless sensor with cognitive abilities that must decide how often to sense a specific region of the spectrum based on the last known state of its primary user. We model the problem at hand as a pure-exploration multi-armed bandit problem with dependent arms and use two well known arm pulling strategies to tackle it. Next, we identify the existing correlation structure among the candidate solutions and utilize it to significantly speed up the learning process. Numerical results verify the effectiveness of the proposed strategies.","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114210179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The un-polarized bit-channels in the wiretap polar coding scheme 窃听极化编码方案中的非极化位信道
Hamed Mirghasemi, J. Belfiore
{"title":"The un-polarized bit-channels in the wiretap polar coding scheme","authors":"Hamed Mirghasemi, J. Belfiore","doi":"10.1109/VITAE.2014.6934465","DOIUrl":"https://doi.org/10.1109/VITAE.2014.6934465","url":null,"abstract":"Polar coding theorems state that as the number of channel use, n, tends to infinity, the fraction of un-polarized bit-channels (the bit-channels whose Z parameters are in the interval (δ(n), 1- δ (n)), tends to zero. Consider two BEC channels W(z<sub>1</sub>) and W(z<sub>2</sub>). Motivated by polar coding scheme proposed for the wiretap channel, we investigate the number of bit-channels which are simultaneously un-polarized for both of W(z<sub>1</sub>) and W(z<sub>2</sub>). We show that for finite values of n, there is a considerable regime of (z<sub>1</sub>, Z<sub>2</sub>) where the set of (joint)un-polarized bit-channels is empty. We also show that for γ ≤ 1/2 and δ (n) = 2<sup>-nγ</sup>, the number of un-polarized bit-channels is lower bounded by 2γ log (n).","PeriodicalId":104147,"journal":{"name":"2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128080670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书