for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Institute of Electrical and Electronics Engineers (IEEE)   (Total: 176 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last

Aerospace and Electronic Systems, IEEE Transactions on     Hybrid Journal   (Followers: 95, SJR: 1.337, h-index: 85)
Affective Computing, IEEE Transactions on     Hybrid Journal   (Followers: 10, SJR: 1.824, h-index: 16)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 5)
Bell Labs Technical J.     Hybrid Journal   (Followers: 10, SJR: 0.411, h-index: 26)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 16, SJR: 1.462, h-index: 14)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 15, SJR: 1.184, h-index: 118)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 5, SJR: 1.314, h-index: 53)
Canadian J. of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 7, SJR: 0.119, h-index: 14)
China Communications     Full-text available via subscription   (Followers: 4, SJR: 0.189, h-index: 6)
Communications and Networks, J. of     Hybrid Journal   (Followers: 4, SJR: 0.364, h-index: 23)
Components, Packaging and Manufacturing Technology, IEEE Transactions on     Hybrid Journal   (Followers: 14, SJR: 0.638, h-index: 14)
Computational Intelligence and AI in Games, IEEE Transactions on     Hybrid Journal   (Followers: 9)
Computer     Full-text available via subscription   (Followers: 38, SJR: 0.717, h-index: 112)
Computing in Science & Engineering     Full-text available via subscription   (Followers: 13, SJR: 0.579, h-index: 40)
Control Systems     Hybrid Journal   (Followers: 26, SJR: 0.83, h-index: 75)
Embedded Systems Letters, IEEE     Hybrid Journal   (Followers: 23)
Emerging and Selected Topics in Circuits and Systems     Hybrid Journal   (Followers: 4, SJR: 0.63, h-index: 8)
Geoscience and Remote Sensing, IEEE Transactions on     Hybrid Journal   (Followers: 20, SJR: 2.458, h-index: 139)
Haptics, IEEE Transactions on     Hybrid Journal   (Followers: 3, SJR: 0.808, h-index: 19)
IEEE Access     Open Access   (Followers: 6)
IEEE Aerospace and Electronic Systems Magazine     Full-text available via subscription   (Followers: 46, SJR: 0.402, h-index: 35)
IEEE Annals of the History of Computing     Full-text available via subscription   (Followers: 12, SJR: 0.134, h-index: 13)
IEEE Antennas and Propagation Magazine     Hybrid Journal   (Followers: 15, SJR: 0.757, h-index: 57)
IEEE Antennas and Wireless Propagation Letters     Hybrid Journal   (Followers: 13, SJR: 1.499, h-index: 54)
IEEE Circuits and Systems Magazine     Full-text available via subscription   (Followers: 29, SJR: 0.737, h-index: 32)
IEEE Communications Letters     Hybrid Journal   (Followers: 17, SJR: 1.19, h-index: 96)
IEEE Communications Magazine     Full-text available via subscription   (Followers: 26, SJR: 3.196, h-index: 144)
IEEE Communications Surveys & Tutorials     Hybrid Journal   (Followers: 10, SJR: 3.561, h-index: 52)
IEEE Computational Intelligence Magazine     Full-text available via subscription   (Followers: 13, SJR: 2.066, h-index: 26)
IEEE Computer Architecture Letters     Hybrid Journal   (Followers: 18, SJR: 0.871, h-index: 14)
IEEE Computer Graphics and Applications     Full-text available via subscription   (Followers: 12, SJR: 0.501, h-index: 62)
IEEE Consumer Electronics Magazine     Full-text available via subscription   (Followers: 17)
IEEE Control Systems Magazine     Full-text available via subscription   (Followers: 32)
IEEE Design & Test     Full-text available via subscription   (Followers: 15)
IEEE Distributed Systems Online     Full-text available via subscription   (Followers: 5)
IEEE Electrical Insulation Magazine     Full-text available via subscription   (Followers: 9, SJR: 0.577, h-index: 41)
IEEE Electromagnetic Compatibility Magazine     Full-text available via subscription   (Followers: 5)
IEEE Electron Device Letters     Full-text available via subscription   (Followers: 5, SJR: 2.191, h-index: 105)
IEEE Engineering in Medicine and Biology Magazine     Full-text available via subscription   (Followers: 5)
IEEE Engineering Management Review     Full-text available via subscription   (Followers: 12, SJR: 0.11, h-index: 9)
IEEE Geoscience and Remote Sensing Letters     Hybrid Journal   (Followers: 18, SJR: 1.481, h-index: 46)
IEEE Industrial Electronics Magazine     Full-text available via subscription   (Followers: 18, SJR: 2.105, h-index: 27)
IEEE Industry Applications Magazine     Full-text available via subscription   (Followers: 5, SJR: 0.67, h-index: 36)
IEEE Instrumentation & Measurement Magazine     Full-text available via subscription   (Followers: 19, SJR: 0.245, h-index: 26)
IEEE Intelligent Systems     Full-text available via subscription   (Followers: 24, SJR: 0.941, h-index: 79)
IEEE Internet Computing     Full-text available via subscription   (Followers: 12, SJR: 1.044, h-index: 79)
IEEE J. of Biomedical and Health Informatics     Hybrid Journal   (Followers: 9, SJR: 1.157, h-index: 61)
IEEE J. of Emerging and Selected Topics in Power Electronics     Hybrid Journal   (Followers: 12)
IEEE J. of Oceanic Engineering     Hybrid Journal   (Followers: 6, SJR: 0.687, h-index: 63)
IEEE J. of Quantum Electronics     Hybrid Journal   (Followers: 16, SJR: 1.594, h-index: 98)
IEEE J. of Selected Topics in Quantum Electronics     Hybrid Journal   (Followers: 6, SJR: 2.588, h-index: 114)
IEEE J. of Selected Topics in Signal Processing     Hybrid Journal   (Followers: 16, SJR: 2.705, h-index: 45)
IEEE J. of Solid-State Circuits     Full-text available via subscription   (Followers: 16, SJR: 3.574, h-index: 144)
IEEE J. of the Electron Devices Society     Open Access   (Followers: 3)
IEEE J. of Translational Engineering in Health and Medicine     Open Access   (Followers: 2)
IEEE J. on Selected Areas in Communications     Hybrid Journal   (Followers: 6, SJR: 3.335, h-index: 165)
IEEE Latin America Transactions     Full-text available via subscription   (Followers: 2, SJR: 0.162, h-index: 7)
IEEE Micro     Full-text available via subscription   (Followers: 5, SJR: 1.506, h-index: 67)
IEEE Microwave and Wireless Components Letters     Hybrid Journal   (Followers: 7, SJR: 1.915, h-index: 87)
IEEE Microwave Magazine     Full-text available via subscription   (Followers: 12, SJR: 0.59, h-index: 41)
IEEE Multimedia     Full-text available via subscription   (Followers: 8, SJR: 0.639, h-index: 47)
IEEE Network     Full-text available via subscription   (Followers: 16, SJR: 1.796, h-index: 80)
IEEE Pervasive Computing     Full-text available via subscription   (Followers: 11, SJR: 0.923, h-index: 69)
IEEE Photonics Technology Letters     Hybrid Journal   (Followers: 4, SJR: 1.805, h-index: 111)
IEEE Potentials     Full-text available via subscription   (Followers: 2, SJR: 0.153, h-index: 18)
IEEE Power and Energy     Full-text available via subscription   (Followers: 12, SJR: 1.671, h-index: 45)
IEEE Power Electronics Magazine     Full-text available via subscription   (Followers: 7)
IEEE Revista Iberoamericana de Tecnologias del Aprendizaje     Hybrid Journal   (Followers: 1, SJR: 0.1, h-index: 3)
IEEE Robotics & Automation Magazine     Full-text available via subscription   (Followers: 22, SJR: 1.09, h-index: 51)
IEEE Security & Privacy Magazine     Full-text available via subscription   (Followers: 17, SJR: 0.588, h-index: 44)
IEEE Sensors J.     Hybrid Journal   (Followers: 53, SJR: 0.733, h-index: 56)
IEEE Signal Processing Letters     Hybrid Journal   (Followers: 16, SJR: 1.016, h-index: 82)
IEEE Signal Processing Magazine     Full-text available via subscription   (Followers: 36, SJR: 1.831, h-index: 106)
IEEE Software     Full-text available via subscription   (Followers: 40, SJR: 0.842, h-index: 72)
IEEE Spectrum     Full-text available via subscription   (Followers: 45, SJR: 0.191, h-index: 48)
IEEE Systems J.     Hybrid Journal   (Followers: 8, SJR: 1.034, h-index: 17)
IEEE Technology and Society Magazine     Full-text available via subscription   (Followers: 4, SJR: 0.348, h-index: 17)
IEEE Transactions on Advanced Packaging     Full-text available via subscription   (Followers: 5, SJR: 0.598, h-index: 52)
IEEE Transactions on Antennas and Propagation     Full-text available via subscription   (Followers: 10, SJR: 1.837, h-index: 118)
IEEE Transactions on Applied Superconductivity     Hybrid Journal   (Followers: 1, SJR: 0.46, h-index: 54)
IEEE Transactions on Audio, Speech, and Language Processing     Hybrid Journal   (Followers: 13)
IEEE Transactions on Automatic Control     Hybrid Journal   (Followers: 26, SJR: 2.992, h-index: 175)
IEEE Transactions on Automation Science and Engineering     Full-text available via subscription   (Followers: 10, SJR: 1.287, h-index: 35)
IEEE Transactions on Biomedical Circuits and Systems     Hybrid Journal   (Followers: 6, SJR: 1.876, h-index: 29)
IEEE Transactions on Circuits and Systems for Video Technology     Hybrid Journal   (Followers: 6, SJR: 1.47, h-index: 124)
IEEE Transactions on Circuits and Systems I: Regular Papers     Hybrid Journal   (Followers: 12, SJR: 1.406, h-index: 68)
IEEE Transactions on Circuits and Systems II: Express Briefs     Hybrid Journal   (Followers: 10, SJR: 0.932, h-index: 53)
IEEE Transactions on Cloud Computing     Hybrid Journal   (Followers: 7)
IEEE Transactions on Communications     Hybrid Journal   (Followers: 10, SJR: 2.035, h-index: 150)
IEEE Transactions on Components and Packaging Technologies     Full-text available via subscription   (Followers: 9, SJR: 0.71, h-index: 50)
IEEE Transactions on Computational Social Systems     Full-text available via subscription  
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems     Hybrid Journal   (Followers: 6, SJR: 0.77, h-index: 83)
IEEE Transactions on Computers     Hybrid Journal   (Followers: 19, SJR: 0.768, h-index: 81)
IEEE Transactions on Consumer Electronics     Hybrid Journal   (Followers: 17, SJR: 0.731, h-index: 69)
IEEE Transactions on Control of Network Systems     Hybrid Journal  
IEEE Transactions on Control Systems Technology     Hybrid Journal   (Followers: 23, SJR: 1.543, h-index: 87)
IEEE Transactions on Cybernetics     Hybrid Journal   (Followers: 8)
IEEE Transactions on Dependable and Secure Computing     Hybrid Journal   (Followers: 11, SJR: 0.866, h-index: 36)
IEEE Transactions on Device and Materials Reliability     Hybrid Journal   (Followers: 14, SJR: 0.785, h-index: 45)
IEEE Transactions on Dielectrics and Electrical Insulation     Hybrid Journal   (Followers: 5, SJR: 0.635, h-index: 71)

        1 2 | Last

Journal Cover   IEEE Communications Magazine
  [SJR: 3.196]   [H-I: 144]   [26 followers]  Follow
    
   Full-text available via subscription Subscription journal
   ISSN (Print) 0163-6804
   Published by Institute of Electrical and Electronics Engineers (IEEE) Homepage  [176 journals]
  • IEEE Communications Magazine - Cover
    • Abstract: Presents the front cover for this issue of the publication.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Global Communications Newsletter
    • Authors: Bregni; S.;
      Pages: 1 - 4
      Abstract: The following is included in this newsletter: IEEE Young Professionals, Lahore Section Win World Class Award "Hall of Fame 2015"; Distinguished Lecturer Tour of Nei Kato in China, May 2015; Distinguished Lecturer Tour of Tom Hou to Beijing and Nanjing, China; European Wireless 2015 in Budapest; Novel In-Band Full-Duplex Communication Prototype for 5G Systems, Finland, May 2015
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Table of contents
    • Pages: 2 - 4
      Abstract: Presents the table of contents for this issue of the publication.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Our journey toward ComSoc 2020 [The President's Page]
    • Authors: Benedetto; S.;Lee, B.G.;
      Pages: 6 - 12
      Abstract: Presents the President's message for this issue of the publication.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Newly approved amendments to the IEEE ComSoc Constitution. [Society News]
    • Pages: 13 - 15
      Abstract: In June 2015, the ComSoc Board of Governors approved a revision of ComSoc Constitution. The IEEE approved the revision in July 2015, and ComSoc Membership approval is currently pending.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Newly approved amendments to the IEEE ComSoc Bylaws [Society News]
    • Pages: 16 - 27
      Abstract: In June 2015, the ComSoc Board of Governors approved a major revision of ComSoc Bylaws. The IEEE approved the revision in July 2015, and the revised Bylaws are now in force.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • The first IEEE Communications Society Summer School [Society News]
    • Pages: 28 - 29
      Abstract: The city of Trento, the educational, scientific, financial and political centre of Northern Italy, served as the ideal launching point for the first IEEE Communications Society (ComSoc) Summer School. With a population of more than 100,000 residing in this noted university city, Trento is recognized throughout the country for its high quality of life, prosperous business opportunities, advanced research centers and renowned international cultural institutions. It also boasts a rich heritage of cultural and social lifestyles; enriched international conferences, meetings and exhibitions; traditional costume festivals and market fares; historical events; and global festivals highlighted with theatre, music and dance.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • IEEE ICC 2015 sets attendance record in London, United Kingdom [Conference
           Report]
    • Pages: 30 - 33
      Abstract: The 2015 IEEE International Conference on Communications (IEEE ICC 2015) recently concluded its global annual event with a record-breaking 2947 attendees participating in 1800 presentations dedicated to nearly every area of the communications spectrum.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Conference calendar
    • Pages: 34 - 34
      Abstract: Presents the ComSoc conference calendar of events.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Security and privacy in emerging networks: Part II [Guest Editorial]
    • Authors: Guizani; M.;He, D.;Ren, K.;Rodrigues, J.J.P.;Chan, S.;Zhang, Y.;
      Pages: 40 - 41
      Abstract: This is the second part of the "Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and privacy of such networks. In Part II, we present articles that overview new security schemes for emerging networks such as vehicular, biomedical, underwater, crowdsourcing, and mobile networks. We feel that even though these emerging networks have attracted many research efforts lately, the security and privacy aspects have not been investigated well. Thus, it is important to provide ways to protect such networks from various security and privacy attacks. The aim of this FT is to promote further research interests in security and privacy in emerging networks by providing a vehicle for researchers and practitioners to discuss research challenges and open issues, and disseminate their latest research results. This can pave the way to implementing emerging networks with the necessary protection from major vulnerabilities. We received a large number of submissions but were obliged to accept only the best 13 papers. Part I was composed of six contributions that dealt with the theory of security/privacy threats, while this issue (Part II) is composed of seven articles addressing security challenges in a specific set of emerging networks.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Toward trustworthy vehicular social networks
    • Authors: Qing Yang;Honggang Wang;
      Pages: 42 - 47
      Abstract: Wireless vehicular networks offer the promise of connectivity to vehicles that could provide a myriad of safety and driving-enhancing services to drivers and passengers. With wireless technology available in each car, it is expected that huge amounts of information will be exchanged between vehicles or between vehicles and roadside infrastructure. Due to defective sensors, software viruses, or even malicious intent, legitimate vehicles might inject untrustworthy information into the network. Besides relying on the public key infrastructure, this article proposes a social network approach to study trustworthy information sharing in a vehicular network. We first cover recent research progress in measuring direct trust and modeling indirect trust in online social networks, and then discuss how to apply them to vehicular social networks despite several pressing research challenges.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Verifiable, privacy-assured, and accurate signal collection for
           cloud-assisted wireless sensor networks
    • Authors: Chia-Mu Yu;Chi-Yuan Chen;Han-Chieh Chao;
      Pages: 48 - 53
      Abstract: As cloud-assisted WBSNs have become increasingly popular in healthcare applications, security and privacy threats deserve much more attention. In this article, focusing on data privacy and data completeness issues, we propose a VPAA scheme for cloud-assisted WBSNs. Through both simulation and prototype implementation, we confirm that VPAA is energy-efficient and effective in protecting data privacy and completeness.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Secure communication for underwater acoustic sensor networks
    • Authors: Guangjie Han;Jinfang Jiang;Ning Sun;Lei Shu;
      Pages: 54 - 60
      Abstract: UASNs are widely used in many applications, and many studies have been conducted. However, most current research projects have not taken network security into consideration, despite the fact that a UASN is typically vulnerable to malicious attacks due to the unique characteristics of an underwater acoustic communication channel (e.g., low communication bandwidth, long propagation delays, and high bit error rates). In addition, the significant differences between UASNs and terrestrial wireless sensor networks entail the urgent and rapid development of secure communication mechanisms for underwater sensor nodes. For the above mentioned reasons, this article aims to present a somewhat comprehensive survey of the emerging topics arising from secure communications in UASNs, which naturally lead to a great number of open research issues outlined afterward.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • From botnets to MobiBots: a novel malicious communication paradigm for
           mobile botnets
    • Authors: Mtibaa; A.;Harras, K.A.;Alnuweiri, H.;
      Pages: 61 - 67
      Abstract: Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network a reality. Today, mobile devices are capable of initiating sophisticated cyberattacks, especially when they coordinate together to form what we call a MobiBot. MobiBots differ from classical botnets in that they exploit mobile operating system vulnerabilities and the advantages of device-to-device communication to mask malicious code propagation.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Privacy-preserving participatory sensing
    • Authors: Qinghua Li;Guohong Cao;
      Pages: 68 - 74
      Abstract: The proliferation of mobile devices such as smart phones has enabled participatory sensing systems that collect data from users through their mobile devices and infer useful information from the data. However, users have concerns regarding possible privacy leakage from their data and lack incentives to contribute their data. To effectively motivate users to participate, both privacy and incentive issues need to be addressed. In this article, we address how to simultaneously protect privacy and provide incentives for participatory sensing. We review previous approaches, discuss their limitations, and propose new approaches for two types of participatory sensing systems.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Security and privacy in mobile crowdsourcing networks: challenges and
           opportunities
    • Authors: Kan Yang;Kuan Zhang;Ju Ren;Xuemin Shen;
      Pages: 75 - 81
      Abstract: The mobile crowdsourcing network (MCN) is a promising network architecture that applies the principles of crowdsourcing to perform tasks with human involvement and powerful mobile devices. However, it also raises some critical security and privacy issues that impede the application of MCNs. In this article, in order to better understand these critical security and privacy challenges, we first propose a general architecture for a mobile crowdsourcing network comprising both crowdsourcing sensing and crowdsourcing computing. After that, we set forth several critical security and privacy challenges that essentially capture the characteristics of MCNs. We also formulate some research problems leading to possible research directions. We expect this work will bring more attention to further investigation on security and privacy solutions for mobile crowdsourcing networks.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Security in space information networks
    • Authors: Chunxiao Jiang;Xuexia Wang;Jian Wang;Hsiao-Hwa Chen;Yong Ren;
      Pages: 82 - 88
      Abstract: Space information networks were proposed to broaden the observation area and realize continuous information acquisition using satellites and high altitude platform stations. Space information networks are able to enhance detection and transmission capabilities compared to the current single Earth observation satellite. Although lots of technical work has been done concerning the space network architecture and protocols, the security issues have not been investigated well. In this article, we focus on the security problems in space information networks from four perspectives, that is, secure handoff, secure transmission control, key management, and secure routing. Existing works, together with their challenges and open problems, are discussed, and our proposed scheme is introduced. Overall, this article aims to help readers understand the motivation, problem formulation, and solutions regarding security issues on space information networks.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Energy harvesting communications: Part III [Guest Editorial]
    • Authors: Chau Yuen;Elkashlan; M.;Yi Qian;Duong, T.Q.;Lei Shu;Schmidt, F.;
      Pages: 90 - 91
      Abstract: “A Hierarchical Packet Forwarding Mechanism for an Energy Harvesting Wireless Sensor Network” by Dapeng Wu et al., which investigates a dynamic gradient-aware hierarchical packet forwarding mechanism based on the relative positions of the sensor nodes. The article “Wireless Information and Power Transfer: From Scientific Hypothesis to Engineering Practice,” by Rong Zhang et al., surveys the state-of-the-art findings on simultaneous wireless information and power transfer (SWIPT), including design challenges, potential solutions, and research ideas. The article “Delay-Sensitive Dynamic Resource Control for Energy Harvesting Wireless Systems with Finite Energy Storage,” written by Fan Zhang et al., studies optimizationof the delay performance of energy harvesting wireless systems with finite energy storage, covering the resource allocation to the channel fading information, data queue length, and energy queue. The article “Toward Secure Energy Harvesting Cooperative Networks,” by Jiawen Kang et al., addresses the security issues and solutions in energy harvesting cooperative networks, where the vulnerability of energy cooperation models in energy attacks is analyzed, and several energy defense solutions are proposed.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • A hierarchical packet forwarding mechanism for energy harvesting wireless
           sensor networks
    • Authors: Dapeng Wu;Jing He;Honggang Wang;Chonggang Wang;Ruyan Wang;
      Pages: 92 - 98
      Abstract: Energy harvesting technologies have gained widespread attention for their perpetual energy supply for sensor nodes. However, the energy resources are still insufficient while the harvesting module is added on the node. To prolong the network lifetime and meet the demand of a green wireless network, a dynamic gradient-aware hierarchical packet forwarding mechanism is designed. According to the relative positions of nodes, gradient-aware clusters are established. Consequently, considering the energy conversion efficiency and relative distance, cluster heads are selected reasonably. Furthermore, by exploiting the available energy and the number of cluster members, packets can be forwarded to the sink in an energy-efficient manner. Results show that the network lifetime can be noticeably improved.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Wireless information and power transfer: from scientific hypothesis to
           engineering practice
    • Authors: Rong Zhang;Maunder; R.G.;Hanzo, L.;
      Pages: 99 - 105
      Abstract: Recently, there has been substantial research interest in the subject of simultaneous wireless information and power transfer (SWIPT) due to its cross-disciplinary appeal and its wide-ranging application potential, which motivates this overview. More explicitly, we provide a brief survey of the state of the art and introduce several practical transceiver architectures that may facilitate its implementation. Moreover, the most important link-level as well as system-level design aspects are elaborated on, along with a variety of potential solutions and research ideas. We envision that the dual interpretation of RF signals creates new opportunities as well as challenges requiring substantial research, innovation and engineering efforts.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Delay-sensitive dynamic resource control for energy harvesting wireless
           systems with finite energy storage
    • Authors: Fan Zhang;Lau; V.K.N.;
      Pages: 106 - 113
      Abstract: Energy harvesting technology has become a promising solution to enhance the energy efficiency and reduce carbon emissions in future wireless systems. In future wireless systems, most of the data throughput will come from delay-sensitive applications. To ensure a good experience for an end user, we target the optimization of the delay performance of an EH wireless system with finite energy storage. As such, it is necessary to adapt the resource allocation to the channel fading information, data queue length, and energy queue length information. The channel fading information provides the channel quality, the data queue length information provides the dynamic urgency of the transmitted data flows, and the energy queue length information provides the information on how much available energy is left in the energy buffer. Such a problem is quite challenging because it belongs to an infinite dimensional stochastic optimization. In this article, we review the existing works on the resource allocation problem in EH wireless systems. We also propose a low-complexity delay-sensitive resource control scheme and discuss valuable design insights.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Toward secure energy harvesting cooperative networks
    • Authors: Jiawen Kang;Rong Yu;Maharjan; S.;Yan Zhang;Xumin Huang;Shengli Xie;Bogucka, H.;Gjessing, S.;
      Pages: 114 - 121
      Abstract: The concept of energy harvesting cooperative networks is an emerging technology that has very high potential for a large variety of applications. However, energy transfer capability may lead to unprecedented security challenges. In this article, we study energy security issues and the solutions in energy harvesting networks. We first identify typical energy related attacks and then propose defense solutions against these attacks. We also carry out security analysis and performance analysis to evaluate our proposed solutions. Simulation results have shown that the proposed defense solutions are effective and efficient.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Energy-efficient optical networks [Series Editorial]
    • Authors: Gebizlioglu; O.;Jain, V.;
      Pages: 122 - 123
      Abstract: The emerging trends of 2014 have continued to dominate the developments in the first half of 2015: 1. The packet optical transport system (P-OTS) concept supports the service provider goal to build a common network infrastructure by integrating Ethernet, IP/MPLS, and DWDM 2. There has been intensifying focus and attention on network functions virtualization (NFV) and software-defined networking (SDN) to provide service providers with the tools for more effective operation and management of communications networks in general, and optical communications networks in particular.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • High data rate coherent optical slot switched networks: a practical and
           technological perspective
    • Authors: Pointurier; Y.;De Valicourt, G.;Simsarian, J.E.;Gripp, J.;Vacondio, F.;
      Pages: 124 - 129
      Abstract: We review several node architectures for optical slot switching ring networks, which can be used in metropolitan or datacenter applications, and compare them for their networking aspects. The dimensioning, quality of service, latency, and protection issues are discussed for the different approaches. The main devices, i.e. fast wavelength-tunable laser, burst-mode coherent receiver (which is required to enable high data rate transmission at 100 Gb/s and above), and a slot blocker for improved wavelength usage efficiency are described, and available technologies for each key building block are reviewed.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • CSO: cross stratum optimization for optical as a service
    • Authors: Hui Yang;Jie Zhang;Yongli Zhao;Yuefeng Ji;Jianrui Han;Yi Lin;Young Lee;
      Pages: 130 - 139
      Abstract: Data center interconnection with elastic optical networks is a promising scenario to meet the high burstiness and high-bandwidth requirements of services. Many data center services require lower delay and higher availability with end-to-end guaranteed QoS, which involves both application and transport network resources. However, in the current mode of operation, the control of elastic optical networks and data centers is separately deployed. Enabling even limited interworking among these separated control systems requires the adoption of complex and inelastic interfaces among the various networks, and this solution is not efficient enough to provide the required QoS. In this article, we present a novel cross stratum optimization (CSO) architecture in elastic data center optical interconnection. The proposed architecture can allow global optimization and control across elastic optical transport network and data center application stratum heterogeneous resources to meet the QoS requirement with the objective of optical as a service (OaaS). The functional modules of CSO architecture, including the core elements of application and transport controllers, are described in detail. The cooperation procedure in CSO-based service provisioning and cross stratum service resilience modes is investigated. The overall feasibility and efficiency of the proposed architecture is also experimentally demonstrated on our OaaS testbed with four OpenFlow-enabled elastic optical nodes, and compared to MFA, ALB, and CSO-DGLB service provisioning schemes in terms of path setup/release/adjustment latency, blocking probability, and resource occupation rate. Numerical results are given and analyzed based on the testbed. Some future discussion and exploration issues are presented in the conclusion.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Optical interconnects at the top of the rack for energy-efficient data
           centers
    • Authors: Jiajia Chen;Yu Gong;Fiorani; M.;Aleksic, S.;
      Pages: 140 - 148
      Abstract: The growing popularity of cloud and multimedia services is dramatically increasing the traffic volume that each data center needs to handle. This is driving the demand for highly scalable, flexible, and energy-efficient networks inside data centers, in particular for the edge tier, which requires a large number of interconnects and consumes the dominant part of the overall power. Optical fiber communication is widely recognized as the highest energy- and cost-efficient technique to offer ultra-large capacity for telecommunication networks. It has also been considered as a promising transmission technology for future data center applications. Taking into account the characteristics of the traffic generated by the servers, such as locality, multicast, dynamicity, and burstiness, the emphasis of the research on data center networks has to be put on architectures that leverage optical transport to the greatest possible extent. However, no feasible solution based on optical switching is available so far for handling the data center traffic at the edge tier. Therefore, apart from conventional optical switching, we investigate a completely different paradigm, passive optical interconnects, and aim to explore the possibility for optical interconnects at the top of the rack. In this article, we present three major types of passive optical interconnects and carry out a performance assessment with respect to the ability to host data center traffic, scalability, optical power budget, complexity of the required interface, cost, and energy consumption. Our results have verified that the investigated passive optical interconnects can achieve a significant reduction of power consumption and maintain cost at a similar level compared to its electronic counterpart. Furthermore, several research directions on passive optical interconnects have been pointed out for future green data centers.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • The watchful sleep mode: a new standard for energy efficiency in future
           access networks
    • Authors: Hirafuji; R.O.C.;da Cunha, K.B.;Campelo, D.R.;Dhaini, A.R.;Khotimsky, D.A.;
      Pages: 150 - 157
      Abstract: The continuously increasing consumption of power to access the Internet has been a major concern for network operators and equipment vendors. Passive optical network (PON) systems are widely seen as the future of broadband access. In 2010, ITU-T standardized a protocol-based PON energy efficiency mechanism that is comprised of two main modes, the doze mode and the cyclic sleep mode, which promise to save significant amounts of energy. However, the use of these two standardized alternative modes requires extra signaling and wastes energy. In this article we present the watchful sleep mode, a new mode that unifies the doze and cyclic sleep modes into a single power management mode. The new mode eliminates the extra control signaling and maximizes the amount of energy saved by keeping only the necessary hardware ON. Recently, the watchful sleep mode has been included in the ITU-T G.984 (G-PON) and ITUT G.987 (XG-PON) recommendations. It is expected to be operated as the only power management mode in future PON systems.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Crowdsending based public transport information service in smart cities
    • Authors: Farkas; K.;Feher, G.;Benczur, A.;Sidlo, C.;
      Pages: 158 - 165
      Abstract: Thanks to the development of technology and the emergence of intelligent services smart cities promise to their inhabitants enhanced perception of city life. For example, a live timetable service of public transportation can increase the efficiency of travel planning substantially. However, its implementation in a traditional way requires the deployment of some costly sensing and tracking infrastructure. Mobile crowdsensing is an alternative, when the crowd of passengers and their mobile devices are used to gather data for almost free of charge. In this paper, we put the emphasis on the introduction of our crowdsensing based public transport information service, what we have been developing as a prototype smart city application. The front-end interface of this service is called TrafficInfo. It is a simple and easy-to-use Android application which visualizes real-time public transport information of the given city on Google Maps. The lively updates of transport schedule information relies on the automatic stop event detection of public transport vehicles. TrafficInfo is built upon our Extensible Messaging and Presence Protocol (XMPP) based communication framework what we designed to facilitate the development of crowd assisted smart city applications. The paper introduces shortly this framework, than describes TrafficInfo in detail together with the developed stop event detector.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Network distance prediction for enabling service-oriented applications
           over large-scale networks
    • Authors: Haojun Huang;Hao Yin;Geyong Min;Wu; D.O.;Yulei Wu;Tao Zuo;Ke Li;
      Pages: 166 - 174
      Abstract: Knowledge of end-to-end network distances is essential to many service-oriented applications such as distributed content delivery and overlay network multicast, in which the clients have the flexibility to select their servers from among a set of available ones based on network distance. However, due to the high cost of global measurements in large-scale networks, it is infeasible to actively probe end-to-end network distances for all pairs. In order to address this issue, network distance prediction has been proposed by measuring a few pairs and then predicting the other ones without direct measurements, or splicing the path segments between each pair via observation. It is considered important to improve network performance, and enables service- oriented applications over large-scale networks. In this article, we first illustrate the basic ideas behind network distance prediction, and then categorize the current research work based on different criteria. We illustrate how different protocols work, and discuss their merits and drawbacks. Finally, we summarize our findings, and point out potential issues and future directions for further research.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • CAINE: a context-aware information-centric network ecosystem
    • Authors: Kamel; G.;Ning Wang;Vassilakis, V.;Zhili Sun;Navaratnam, P.;Chonggang Wang;Lijun Dong;Tafazolli, R.;
      Pages: 176 - 183
      Abstract: Information-centric networking (ICN) is an emerging networking paradigm that places content identifiers rather than host identifiers at the core of the mechanisms and protocols used to deliver content to end users. Such a paradigm allows routers enhanced with content-awareness to play a direct role in the routing and resolution of content requests from users, without any knowledge of the specific locations of hosted content. However, to facilitate good network traffic engineering and satisfactory user QoS, content routers need to exchange advanced network knowledge to assist them with their resolution decisions. In order to maintain the location-independency tenet of ICNs, such knowledge (known as context information) needs to be independent of the locations of servers. To this end, we propose CAINE - Context-Aware Information-centric Network Ecosystem - which enables context-based operations to be intrinsically supported by the underlying ICN routing and resolution functions. Our approach has been designed to maintain the location-independence philosophy of ICNs by associating context information directly to content rather than to the physical entities such as servers and network elements in the content ecosystem, while ensuring scalability. Through simulation, we show that based on such location-independent context information, CAINE is able to facilitate traffic engineering in the network, while not posing a significant control signalling burden on the network.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • On the use of radio environment maps for interference management in
           heterogeneous networks
    • Authors: Perez-Romero; J.;Zalonis, A.;Boukhatem, L.;Kliks, A.;Koutlia, K.;Dimitriou, N.;Kurda, R.;
      Pages: 184 - 191
      Abstract: This article addresses the use of REMs to support interference management optimization in heterogeneous networks composed of cells of different sizes and including both cellular and non-cellular (e.g. WiFi) technologies. After presenting a general architecture for including REM databases in different network entities, the article analyzes the achievable benefits in relation to specific interference management techniques, including a discussion on practical considerations such as information exchange requirements, REM ownership, and security aspects. Finally, several research directions derived from the proposed framework are identified.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Vehicle-to-vehicle communication in C-ACC/platooning scenarios
    • Authors: Vinel; A.;Lin Lan;Lyamin, N.;
      Pages: 192 - 197
      Abstract: Cooperative adaptive cruise control (C-ACC) and platooning are two emerging automotive intelligent transportation systems (ITS) applications. In this tutorial article we explain their principles, describe related ongoing standardization activities, and conduct performance evaluation of the underlying communication technology.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Greater reliability in disrupted metropolitan area networks: use cases,
           standards, and practices
    • Authors: Ming-Tuo Zhou;Oodo; M.;Vinh Dien Hoang;Liru Lu;Xin Zhang;Harada, H.;
      Pages: 198 - 207
      Abstract: Unlike most general wireless users enjoying broadband access to the Internet and so on, a number of mission-critical applications such as PPDR are using narrowband systems that are only capable of transmitting voice and low-rate data. Broadband wireless networks with greater reliability are increasingly demanded by these applications including the emerging Smart Grid. With this vision, the IEEE 802.16 Working Group completed two standard amendments recently, IEEE Std 802.16n-2013 and IEEE Std 802.16.1a-2013. 802.16 network reliability is significantly increased by technical developments dealing with failures of network infrastructure stations, radio path and backhaul connectivity, and so on. This article serves to analyze the envisaged typical use cases of greater reliable broadband wireless networks, outline the main technical developments of the two standards, and introduce a recently developed practical system for PPDR applications in Japan.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
  • Advertisers' index
    • Pages: 208 - 208
      Abstract: Presents the index of advertisers in this issue of the publication.
      PubDate: August 2015
      Issue No: Vol. 53, No. 8 (2015)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2015