Wo T(Web of Things) integrates smart devices into Web by reusing and extending Web standards. While Web technology makes the developers' job easier,it faces security,management and efficiency challenges. We propos...
详细信息
Wo T(Web of Things) integrates smart devices into Web by reusing and extending Web standards. While Web technology makes the developers' job easier,it faces security,management and efficiency challenges. We propose Wo T/SDN,the architecture of resource oriented Wo T built on SDN(Software Defined network),in which applications could be developed through resource subscription and Mashup with the programmability provided by SDN. The key components are designed,including Security and Management Controller(SMC),various atomic services and resource subscription syntax. Three applications covering device management,data access and security protection are demonstrated. Compared to traditional resource-oriented Wo T systems,our test results show that SDN,with its logically centralized control capability and awareness of flow forwarding,provides new opportunity to improve performance,simplify management and enhance security for Wo T.
Due to the network's rapid expansion, mobile networks bear extra high deployment costs. Being a key enabler of 6th generation (6G) mobile networks, it is crucial that cell-free massive MIMO (CF mMIMO) networks ach...
详细信息
Recently, echo state networks (ESN) have aroused a lot of interest in their nonlinear dynamic system modeling capabilities. In a classical ESN, its dynamic reservoir (DR) has a sparse and random topology, but the ...
详细信息
Recently, echo state networks (ESN) have aroused a lot of interest in their nonlinear dynamic system modeling capabilities. In a classical ESN, its dynamic reservoir (DR) has a sparse and random topology, but the performance of ESN with its DR taking another kind of topology is still unknown. So based on complex network theory, three new ESNs are proposed and investigated in this paper. The small-world topology, scale-free topology and the mixed topology of small-world effect and scale-free feature are considered in these new ESNs. We studied the relationship between DR architecture and prediction capability. In our simulation experiments, we used two widely used time series to test the prediction performance among the new ESNs and classical ESN, and used the independent identically distributed (i.i.d) time series to analyze the short-term memory (STM) capability. We answer the following questions: What are the differences of these ESNs in the prediction performance? Can the spectral radius of the internal weights matrix be wider? What is the short-term memory capability? The experimental results show that the proposed new ESNs have better prediction performance, wider spectral radius and almost the same STM capacity as classical ESN's.
Increased adoption of smartphones leads to the explosive growth of mobile network traffic. Understanding the traffic characteristics of mobile network is important for Intemet service providers (ISPs) to optimize ne...
详细信息
Increased adoption of smartphones leads to the explosive growth of mobile network traffic. Understanding the traffic characteristics of mobile network is important for Intemet service providers (ISPs) to optimize network resources. In this paper, we conduct a detailed measurement study on the hyper text transfer protocol (HTTP) traffic characteristics of cellular network among different operating systems (OSs) as well as different device-types. Firstly, we propose a probability-based method to identify the installed OS of eacb smartphone. Then we analyze the traffic characteristics of these smartphones in terms of OS and device-type based on a dataset across 31 days (a billing cycle). Finally, we identify the installed apps of each smartphone and compare the usage of apps on the dimensions of OS and device-type. Our measurement study provides insights for network operators to strategize priciag and resource allocation for their cellular data networks.
Air-ground integrated network is able to make up for the limitations of small coverage as well as fixed resource deployment of ground 5G network and provide flexible services via edge computing. However, duplicated da...
详细信息
Wireless Local Area networks (WLAN) is becoming increasingly important. But it is difficult for users to select the best target network for connection in WLAN. For multimedia applications, Quality of Experience (QoE) ...
详细信息
Mobile communication evolution from 2G, 3G to LTE shows a broadband and IP-oriented trend and the architecture of LTE backhaul network turns to be flat. In order to fit these new features, layer 3 routing technology h...
详细信息
This paper characterizes the spatially-normalized degrees of freedom (DoF) of a 2-cell, 3-user per cell multiple input multiple output (MIMO) cellular networks with M antennas at each user and N antennas at each base ...
详细信息
The multimedia broadcast and multicast services (MBMS) in 3GPP LTE is characterized by multicast broadcast single frequency network (MBSFN) operation. The multicast services are transmitted by single frequency network...
详细信息
The multimedia broadcast and multicast services (MBMS) in 3GPP LTE is characterized by multicast broadcast single frequency network (MBSFN) operation. The multicast services are transmitted by single frequency network (SFN) mode, and the unicast services are delivered with point-to-point (PTP) mode. To minimize the demanded radio resources for multicast services in the LTE, a novel mode switch (MS) between SFN and PTP for multicast services is proposed. MS takes into account PTP mode for multicast services and the switch is based on the handover threshold. To solve the minimization problem, MS adapts the handover threshold with the difference in the demanded radio resources between SFN mode and PTP mode for multicast services. The simulation results show that the proposed MS achieves less demanded radio resources than SFN mode for all the multicast services.
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ...
详细信息
暂无评论