61,472 research outputs found

    Fog-enabled Edge Learning for Cognitive Content-Centric Networking in 5G

    Full text link
    By caching content at network edges close to the users, the content-centric networking (CCN) has been considered to enforce efficient content retrieval and distribution in the fifth generation (5G) networks. Due to the volume, velocity, and variety of data generated by various 5G users, an urgent and strategic issue is how to elevate the cognitive ability of the CCN to realize context-awareness, timely response, and traffic offloading for 5G applications. In this article, we envision that the fundamental work of designing a cognitive CCN (C-CCN) for the upcoming 5G is exploiting the fog computing to associatively learn and control the states of edge devices (such as phones, vehicles, and base stations) and in-network resources (computing, networking, and caching). Moreover, we propose a fog-enabled edge learning (FEL) framework for C-CCN in 5G, which can aggregate the idle computing resources of the neighbouring edge devices into virtual fogs to afford the heavy delay-sensitive learning tasks. By leveraging artificial intelligence (AI) to jointly processing sensed environmental data, dealing with the massive content statistics, and enforcing the mobility control at network edges, the FEL makes it possible for mobile users to cognitively share their data over the C-CCN in 5G. To validate the feasibility of proposed framework, we design two FEL-advanced cognitive services for C-CCN in 5G: 1) personalized network acceleration, 2) enhanced mobility management. Simultaneously, we present the simulations to show the FEL's efficiency on serving for the mobile users' delay-sensitive content retrieval and distribution in 5G.Comment: Submitted to IEEE Communications Magzine, under review, Feb. 09, 201

    Application of multiple-wireless to a visual localisation system for emergency services

    Get PDF
    Abstract—In this paper we discuss the application of multiplewireless technology to a practical context-enhanced service system called ViewNet. ViewNet develops technologies to support enhanced coordination and cooperation between operation teams in the emergency services and the police. Distributed localisation of users and mapping of environments implemented over a secure wireless network enables teams of operatives to search and map an incident area rapidly and in full coordination with each other and with a control centre. Sensing is based on fusing absolute positioning systems (UWB and GPS) with relative localisation and mapping from on-body or handheld vision and inertial sensors. This paper focuses on the case for multiple-wireless capabilities in such a system and the benefits it can provide. We describe our work of developing a software API to support both WLAN and TETRA in ViewNet. It also provides a basis for incorporating future wireless technologies into ViewNet. I

    Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration

    Get PDF
    There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems ‘expose’ relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT)

    New Trends and Solutions in Mobile Business

    Get PDF
    Nowadays the business medium requires anytime and anywhere connectivity. In an increasingly competitive business environment, more and more organizations need fast responses and instant results. Therefore, mobility changes the way companies do business; instant messaging, voice services, real-time LAN access, network access while traveling are transforming the business environment. In this context, WLANs are critical from the business point of view. The effectiveness with which employees make decisions drives to the success or failure of the business; thus, the business must enable employees to access the information needed to exceed corporate expectations. This article presents the key characteristics of the mobile business and analyzes a possible solution offered by a giant of the networking industryWLANs, Mobility, Communications, Mobile Business, Security, 802.11n

    Intention to use mobile customer relationship management systems

    Get PDF
    © Emerald Group Publishing Limited. Purpose - The purpose of this paper is to investigate the behavioral intentions of business-to-business (B2B) sales managers to use mobile customer relationship management (CRM) systems in the course of their day-to-day activities. Design/methodology/approach - An extended Technology Acceptance Model (TAM) of mobile CRM system adoption is developed and tested with data from 105 international sales managers representing five B2B companies. Findings - The study extends the TAM framework with three additional constructs derived from mobile technology and sales force automation literature, namely personal innovativeness in the domain of IT, perceived risk, and perceived reachability. The model demonstrates that personal innovativeness and perceived reachability have significant effects on the TAM framework. Research limitations/implications - The relatively small sample size limits the generalization of the results. Practical implications - Sales managers' intention to adopt mobile CRM can be explained by the extended TAM framework. Understanding the key factors that influence intention to adopt a mobile CRM system will aid companies in implementing it among their sales force. Companies willing to foster adoption of a mobile CRM system among the sales force could focus on communicating the usefulness of using the system and benefits gained from enhanced reachability. Recruiting sales people with strong personal innovativeness is beneficial. Originality/value - This study responds the calls for studies on mobile platforms and on the use of mobile B2B applications in sales force management. It is among the first attempts to incorporate variables derived from mobile technology acceptance literature among the sales force into the TAM framework, to better explain acceptance of mobile CRM systems
    • 

    corecore