Learn More
—The 4G standard Long Term Evolution (LTE) has been developed for high-bandwidth mobile access for today's data-heavy applications, consequently, a better experience for the end user. To extend the user equipment battery lifetime, plus further support various services and large amount of data transmissions, the 3GPP standards for LTE/LTE-Advanced has(More)
©2014 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Abstract— The 4G(More)
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. Any communication protocol that involves(More)
One of the limitations of wireless sensor nodes is their inherent limited energy resource. Besides maximizing the lifetime of the sensor node, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to minimize maintenance and maximize overall system performance. Any communication protocol that involves(More)
(TTI) is related to the size of the data block passed from the higher networks layers to the radio link layer, the DRX scheduler should vary the resource allocation of each user basis on TTI. In this paper, we have evaluated the influences of the TTI sizes as well as the effects of LTE DRX Light and Deep Sleep mode on power consumption for Voice and Web(More)
This review provides an assessment of sediment trap accuracy issues by gathering data to address trap hydrodynamics, the problem of zooplankton " swimmers, " and the solubilization of material after collection. For each topic, the problem is identified, its magnitude and causes reviewed using selected examples, and an update on methods to correct for the(More)
Traditional security research has been on privacy or authentication. Unfortunately, attacks on wireless media cannot be simply addressed using traditional security methods [1]. An example of a security threat which is difficult to address using traditional network security techniques is Denial of Service (DoS) attacks. Under DoS attacks it is difficult to(More)
The ubiquitous access to wired and wireless networks is making information access possible from anywhere, anytime, and any device. Today, end-users are also highly mobile, often equipped with a range of portable devices, and they expect service availability when they require it. In addition, they do not want to be burdened by complex configurations before(More)
Wireless Mesh Networks (WMNs) have emerged as a key technology for the next generation of wireless networking. Instead of being another type of ad-hoc networking, WMNs diversify the capabilities of ad-hoc networks. Several protocols that work over WMNs include IEEE 802.11a/b/g, 802.15, 802.16 and LTE-Advanced. To bring about a high throughput under varying(More)