Smart mobility is an emerging concept characterized by the use of disruptive technologies, such as cloud computing, Big Data and artificial intelligence. In this paper we propose a FIWARE-based component focus on impr...
详细信息
Smart mobility is an emerging concept characterized by the use of disruptive technologies, such as cloud computing, Big Data and artificial intelligence. In this paper we propose a FIWARE-based component focus on improving the data analysis process, from data generated in services and applications existing in the smart mobility context. Our proposal aims to provide features that allows the development of solutions from the industry 4.0 concept and smart cities. Firstly, we briefly contextualize these terms, then we describe the characteristics and architectural design of our FIWARE component, highlighting how it can improve the support to smart services and applications. We also present real application scenarios where this component can be applied, specially considering the Brazilian cities.
In this paper, the off-body performance of a single-input single-output (SISO) system was evaluated in Non-Line-of-Sight (NLOS) situations and compared with measurements done with a clear Line of Sight (LOS) link. The...
详细信息
ISBN:
(纸本)9781479974801
In this paper, the off-body performance of a single-input single-output (SISO) system was evaluated in Non-Line-of-Sight (NLOS) situations and compared with measurements done with a clear Line of Sight (LOS) link. The obstructed link study takes into account the human shadowing effect, usually caused by close by miners interrupting the transmitter-receiver link. Measurement campaigns were performed using Monopole antennas in an underground gold mine. The off-body channels were characterized in terms of the channel impulse response, RMS delay spread, and coherence bandwidth. The channel capacity was determined using the well-known Shannon formula for LOS and NLOS situations. The variation of the channel parameters in the different measurement scenarios was analyzed.
The management and operation of a Self-Organizing Network (SON)-enabled mobile network still requires considerable human effort. On the one hand, SON Functions need to be configured through low-level parameters in ord...
详细信息
The management and operation of a Self-Organizing Network (SON)-enabled mobile network still requires considerable human effort. On the one hand, SON Functions need to be configured through low-level parameters in order to control the optimization of the network. On the other hand, an operator wants to steer the system with solely technical objectives, and the underlying network should be adapted accordingly. This opens up a gap in network management that is currently closed manually. This paper presents an approach that overcomes the manual gap between technical objectives and SON Functions by choosing the best values for the SON Functions' configurations automatically. Main advantage of this approach is that it allows to manage a system at a high level of abstraction and, at the same time, reduces manual effort. The approach is explained by applying it in a case study in the field of mobile networks with four SON Functions, namely Mobility Load Balancing (MLB), Coverage and Capacity Optimization (CCO), Energy Savings Management (ESM) and Mobility Robustness Optimization (MRO).
Current Internet traffic comprises diverse service requirements. Service providers differentiate connections characteristics according to demand's requirements and pricing policy. In this paper we propose a differ...
详细信息
Current Internet traffic comprises diverse service requirements. Service providers differentiate connections characteristics according to demand's requirements and pricing policy. In this paper we propose a differentiated service methodology that implements constrained resources allocation according to demand's priority level for WDM networks. With our proposed mechanism higher priority connections are guaranteed a larger amount of resources, still, lower priority demands are guaranteed a minimum level of service.
A business model for video transmission services is proposed that uses the Dynamic Adaptation Streaming over HTTP (DASH) mechanism using different versions of the same video. These video versions are encoded using dif...
详细信息
Crowdsourcing has gained increasing interest during the last years as means for solving complex tasks with the help of a flexible group of contributors. The crowd can contribute with collecting data in the field, comp...
详细信息
The paradigm of virtual world environment arises as an useful tool in diverse fields such as e-Health or education, where they provide a new way of communication and interaction with end users. Networking capabilities...
详细信息
ISBN:
(纸本)9781467324793
The paradigm of virtual world environment arises as an useful tool in diverse fields such as e-Health or education, where they provide a new way of communication and interaction with end users. Networking capabilities play an important role in these systems, which motivates the study and understanding of the gaming network traffic. The present work focuses on Open Wonderland, a system that provides the basis for the development of Networked Virtual Environments with educational or health purposes. The goal of this paper is defining a testing environment and modelling the behaviour of the outgoing network traffic at the server side.
Virtualization and broadband Internet connections enabled what is known today under the term cloud. Benefits like scalability and cost reduction by pay per use agreements are accompanied by potential harm to the users...
详细信息
Virtualization and broadband Internet connections enabled what is known today under the term cloud. Benefits like scalability and cost reduction by pay per use agreements are accompanied by potential harm to the users data. Since existing cloud solutions can be considered synonymous with unknown locations and potentially hostile environments security protection objectives can not be guaranteed. Motivated by cloud's potential we propose a way to get rid of this drawback. We present work in progress of an approach that enables users to benefit from cloud computing and retain data sovereignty by federating the users own resources. More precisely we present initial protocol design thoughts for this federation and an extension of the OCCI specification for the flexible description of own and foreign services.
This paper presents a multi-tenancy model based on infrastructure resource capability virtualisation. The model, namely Resources, Ownership, Roles and Actors or RORA, approaches network and IT infrastructure virtuali...
This paper presents a multi-tenancy model based on infrastructure resource capability virtualisation. The model, namely Resources, Ownership, Roles and Actors or RORA, approaches network and IT infrastructure virtualisation seamlessly, thus enabling complex provisioning workflows for Cloud services and network services attached.
暂无评论