40 research outputs found
C-V2X Communications for the Support of a Green Light Optimized Speed Advisory (GLOSA) Use Case, Journal of Telecommunications and Information Technology, 2021, nr 2
Rapid expansion of 5G affects a number of sectors, including vehicular communications relying on cooperative intelligent transportation systems (C-ITS). More specifically, in the context of the Internet of Vehicles (IoV), a particular emphasis is placed on modern cellular V2X (C-V2X) technologies aiming to further improve road safety. This work originates from the detailed scope of the ongoing 5G-DRIVE research project promoting cooperation between the EU and China, with the aim of demonstrating IoV services that rely on vehicle-to-infrastructure (V2I) communications. With the C-V2X approach serving as a point of departure, we analyze and describe a specific green light-optimized speed advisory (GLOSA) use case, for which we provide a detailed descriptive framework, a proposed architectural framework for trials, as well as specific KPIs for the joint assessment of trials between the EU and China. We also discuss the context for performance test procedures to be conducted as part of the intended trials. GLOSA provides end-users with short-term information on upcoming traffic light status to optimize traffic flows, help prevent speed limit violations, improve fuel efficiency, and reduce pollutio
Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features
Cloud computing delivers services over virtualized networks to many end-users. Cloud services are characterized by such attributes as on-demand self-service, broad network access, resource pooling, rapid and elastic resource provisioning and metered services of various qualities. Cloud networks provide data as well as multimedia and video services. Cloud computing for critical structure IT is a relative new area of potential applications. Cloud networks are classified into private cloud networks, public cloud networks and hybrid cloud networks. Anomaly detection systems are defined as a branch of intrusion detection systems that deal with identifying anomalous events with respect to normal system behavior. A novel application of a Self-Organizing-Feature Map (SOFM) of reduced/aggregate sets of ordered vector structured features that are used for detecting anomalies in the context of secure cloud environments is herein proposed. Multivalue inputs consist of reduced/aggregate ordered sets of vector and binary features. The nodes of the SOFM - after training - are indicative of local distributions of feature measurements during normal cloud operation. Anomalies are detected as outliers of the trained SOFM. Each structured vector consists of binary as well as histogram data. The aggregated Canberra distance is used to order histogram data whereas the Jaccard distance is used for multivalue binary data. The so-called Cross-Order Distance Matrix is defined for both cases. The distance depends upon the selection of a similarity/distance measure and a method for operating upon the elements of the Cross-Order Distance Matrix. Several methods of estimating the distance between two ordered sets of features are investigated in the course of this paper
The emergence of operator-neutral small cells as a strong case for cloud computing at the mobile edge
Small cells have emerged as a useful tool for supporting increased network capacity through network densification, but they can also be used to support edge cloud computing services. In this paper, we provide a preview of an innovative concept that tackles the consolidation of multi‐tenancy in such type communications infrastructures, as well as the placement of network intelligence and applications in the network edge. After surveing the challenges and the enabling technologies, we present the envisaged architecture to manage and control the Cloud‐Enabled Small Cell infrastructure. Also, at the operation level, we explain the potential advantages of adopting the proposed solutions on the long‐term evolution access networks. Copyright © 2016 John Wiley & Sons, Ltd
Optimization of Log-Periodic TV Reception Antenna with UHF Mobile Communications Band Rejection
The coexistence of TV broadcasting and mobile services causes interference that leads to poor quality-of-service for TV consumers. Solutions usually found in the market involve external band-stop filters along with TV reception log-periodic and Yagi-Uda antennas. This paper presents a log-periodic antenna design without additional filtering that serves as a lower cost alternative to avoid interference from mobile services into the UHF TV. The proposed antenna operates in the UHF TV band (470–790 MHz-passband) and rejects the 800 MHz and 900 MHz bands (stopband) of 4G/LTE-800 and GSM900 services, respectively. Matching to 50 Ohms is very satisfactory in the passband with values of S11 below −12 dB. Furthermore, the antenna is highly directive with a realized gain of approximately 8 dBi and a front-to-back ratio greater than 20 dB
Design of a Button Sensor Antenna for Wireless Wearable Applications
A narrow-band wearable button sensor antenna (BSA) operating between 2.4 and 2.5 GHz has been designed and it is described in this paper. The top button shape is made of a Rogers substrate, that is properly arranged on a felt substrate and a conductive e-textile ground surface and is fed via a coaxial probe on the bottom side of the ground surface. The BSA is assessed in free space and on the body's chest location. The design is simulated in various configurations and the results are promising for a wireless body area network (WBAN). In free space, the simulated bandwidth, peak gain, and radiation efficiency are 59.3 MHz, 0.755 dBi, and 90%, respectively. While on certain on-body chest locations, these values reach up to 75.6 MHz, 2.69 dBi, and 75%. Furthermore, a wide omnidirectional radiation pattern is obtained in free space and on the body's chest location, which provides robustness across diverse environments. The specific absorption rate (SAR) is relatively low. Therefore, the design is the right solution for the WBAN system.</p
Enhancing Network Management via NFV, MEC, Cloud Computing and Cognitive Features: The “5G ESSENCE” Modern Architectural Approach
Part 2: 5G-PINEInternational audienceThe paper work presents the essential architectural approach that has been proposed in the framework of the modern “5G-ESSENCE” EU-funded project, intending to develop a suitable ecosystem for serving real-life use cases associated to vertical industries and built on the pillars of network functions virtualisation (NFV), mobile-edge computing (MEC) capabilities, cognitive network management and appropriate use of small cells. Apart from identifying innovative features and options for enabling service deployment, the work focuses on the fundamental 5G ESSENCE-based architecture with description of the corresponding modules and their capabilities. The current approach comes as a mature continuity of previous efforts and/or related findings in the 5G-PPP context (mainly from the SESAME research project), but it purely concentrates upon providing tools for a robust and agile network management