The last decades, the fast growth of the information and the communication technology has leaded to overwhelming amount of data pushing our communication network to its limit. The big data volume is produced from an assortment of users and wireless mobile technologies, and are to be processed and stored in powerful datacenters. Indeed, conventional wireless communication networks cannot deal with the massive amount of exchanged data and there is a strong demand to create a fast and scalable inter-connected heterogeneous wireless network for the big data. These advanced big data wireless networks should address all big data lifecycle (access networks, Internet backbone, intra and inter datacenter networks) and satisfy transmission QoS.
Internet-of-Thing and reasons why it is becoming a reality
It is widely accepted that the Era of IoT can potentially connect billions of sensors, devices, equipment, systems, etc. In turn, the challenge is about driving business outcomes, consumer benefits, and the creation of new value. While benefits of IoT ...
Scene mining and knowledge discovery, concepts and applications
The enormous volumes of image data being produced on a daily basis in different application domains throughout the world lead to the significant challenge of managing, exploiting and mining this vast amount of steadily increasing data in various ...
Healthcare Big Data: Challenges and Opportunities
In healthcare sector huge quantities of data about patients and their medical conditions have been gathered through clinical databases and various other healthcare processes. Currently, it records nearly all aspects of care, including patient personal ...
Mixture Model Approaches to Big Data Clustering and Classification
Technological evolution leads to increasingly large and heterogeneous data acquisitions (signals, images, measurement results, texts, etc.), and the growing share of information technology and digital simulation leads to the production of increasingly ...
Defining Big Data
As Big Data becomes better understood, there is a need for a comprehensive definition of Big Data to support work in fields such as data quality for Big Data. Existing definitions of Big Data define Big Data by comparison with existing, usually ...
MASBioseq: a Multi-Agent System for Sequence Alignment with Dynamic Programming and R
This work presents an alternative to program sequence alignment algorithms with dynamic libraries. The work is based on Dynamic Programming techniques developed in C and R languages, alternatives of implementation and a comparison of their execution ...
Towards a more reliable and robust Cloud Meta-Operating System based on heterogeneous kernels: A novel approach based on containers and microservices
The Operating Systems (OS) provide services to applications via APIs that encapsulate the system calls interface. In the context of critical applications, the SLA is closely dependent on the underlying OS. This SLA is a big challenge for the most Cloud ...
Using Ensemble Learning and Association Rules to Help Car Buyers Make Informed Choices
Cars are an essential part of our everyday life. Nowadays we have a wide plethora of cars produced by a number of companies in all segments. The buyer has to consider a lot of factors while buying a car which makes the whole process a lot more ...
Two-Stage Decision Making Policy Using Bayesian Multi-armed Bandit Algorithm for Opportunistic Spectrum Access
Recently, various paradigms, for instance, device-to-device (D2D) communications, LTE-unlicensed and cognitive radio are being envisioned to improve the average spectrum utilization as well as energy efficiency of the decentralized wireless ...
TAF: Temporal Analysis Framework for Handling Data velocity in Healthcare Analytics
We are inundated in a flood of data today. Data is being collected at a rapid scale from variety of sources like healthcare, e-commerce, social networking and so on. Decisions which were earlier made on assumptions can now be made on the data itself. It'...
Adaptive Encoding/Decoding for Turbo codes
Original turbo codes are series or parallel concatenation of component codes. In this paper, we present a new structure of turbo code suitable for parallel Turbo code and serial Turbo code, for very low BER once Eb/N0 reached a certain point in the ...
Real-time Lighting Poles Monitoring by using Wireless Sensor Networks Applied to the Smart Cities
Information and Communications Technology (ICT) will be at the heart of the smart city of the future. ICT development will allow for better urban management through obtaining, analyzing and managing a variety of information. This information helps ...
Aggregated Search and Interleaving Methods: A survey
Aggregated search attempts to satisfy user's need by searching and assembling information from variety verticals and placing them into a single result page. Aggregated search has two research directions namely, cross-vertical Aggregated Search (cvAS) ...
A New Improved GPSR (GPSR-kP) Routing Protocol for Multimedia Communication over Vehicular Ad hoc Network
One of the main constraint in front of Vehicular Ad hoc Networks (VANETs) is delivering the data in efficient time. This paper provides an improved Greedy Perimeter Stateless Routing protocol (GPSR) to enhance the video quality transmission over VANETs. ...
Opportunities, Threats and Future Directions in Big Data for Medical Wearables
Big data term has started to take part in our lives as a result of advanced technologies that produce unprecedented amount of data. Big data management has a critical role on smart decision making, new product developments and optimized offerings. ...
Retrieval and Clustering of Medicines Within Healthcare Data Records
Electronic Health Records (EHRs) are typically designed to electronically document all information that is administratively and clinically relevant in a patient's use of a healthcare facility. This paper intends to improve discoverability of medications ...
Minimum Cost Fused Feature Representation and Reconstruction with Autoencoder in Bimodal Recognition System
In the presentera, human authentication is tightly coupled with biometric advancements. Authentication deals with metrics of both physical and behavioral traits of an individual to ensure strong acknowledgment plans by either accommodating or deciding ...
Timer based LCA Clustering
A mobile ad hoc network (MANET) is a collection of wireless nodes that all of them may be mobiles. In MANETs, there are many challenges that can be reduced by a better clustering algorithm, i.e. by implementing a more robust cluster head selection -- ...
Collaborative Localization Algorithm based on Constraint Programming
The majority of applications in wireless sensor networks use a random deployment; this has made the localization in wireless sensor networks an interesting research problem. Some algorithms use basic techniques, as trilateration or triangulation. Nodes ...
Secure and Efficient ECC: Radix-16 Scalar Multiplication without Pre-Computation
The use of Elliptic curve cryptography (ECC) is widely playing a crucial role and is reporting with a great hope of advancing security and performance related benefits for the high end applications. The scalar multiplication algorithms used in ECC are ...
Predicting Access Points Workload in Wi-Fi Infrastructures According to Users' Behavior
In this work, we present a methodology based on matrix factorization and gradient descent algorithm to predict the access points workload based on the users' behavior in Wi-Fi wireless networks, under academic and university environments. This knowledge ...
An Improved Scheduling Strategy in Cloud Computing Using Fuzzy Logic
Within few years, Cloud computing has emerged as the most promising IT business model. Thanks to its various technical and financial advantages, Cloud computing continues to convince every day new users coming from scientific and industrial sectors. To ...
Trust-ticket based authentication scheme for WSN multi-domain applications
With the increasing popularity of Wireless Sensor Networks (WSNs) in versatile domains demand crucial security concerns. Secure communication mechanisms in WSNs have been widely deployed to ensure confidentiality, authenticity and integrity of ...
Coverage Quality Analysis for 3D Wireless Sensor Network
The sensor node deployment quality is defined as the most fundamental issue in Wireless Sensor Networks (WSNs), which have a great impact on the quality of coverage and the overall performance of WSNs. When the random deployment is required, where ...
Rate-Distorsion Based Cross-Layer Scheduling for Real Time Video Communication
This article proposes a novel idea of downlink scheduling for real time video communication over LTE cellular networks. The technique is based on cross-layer coding where a scheduling algorithm uses rate-distorsion characteristics produced by video ...
An Enhanced AODV Routing Protocol for Vehicular Adhoc Networks
The key difference of Vehicular Ad- hoc Network (VANET) and Mobile Ad-hoc Network (MANET) is the exceptional mobility pattern and quick variability variable of network topology. The existing MANET routing protocols are inadequate for the VANET. One good ...
EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs
In Wireless Sensor and Actuator Networks (WSANs), one of the major challenges of routing is to ensure the tradeoff between the energy consumption and the end-to-end delay, especially, where the mobility of actuators is highly frequent. The mobility ...
The Role of Sampling in Big Data Analysis
Nowadays, a huge amount of data is being continuously generated in all fields of life by all systems and applications on daily basis. This amount of data is increasing at a rapid pace. The collection of this huge amount of data leads to challenges of ...
Faulty Data Detection in Wireless Sensor Networks Based on Copula Theory
Wireless Sensor Networks (WSNs) are a powerful instrument for monitoring and recording physical phenomena. Very often the quality of the sensed data collected by sensor nodes is affected by noise and errors, events, and malicious attacks. Also, the ...
User-Driven Handover Scheme in Long-Term Evolution (LTE) Macro/Femto Cells for High Speed Scenarios
Ubiquitous communication depends upon an expanded capacity and suitable Quality of Service (QoS). To meet these requirements, LTE mobile network providers deploy small cells in shadow zones and next to base station to increase the network capacity and ...
Recommendations
Big data technologies and Management
The era of big data has resulted in the development and applications of technologies and methods aimed at effectively using massive amounts of data to support decision-making and knowledge discovery activities. In this paper, the five Vs of big data, ...