Volume 10 Issue 12 • Dec. 2013
Filter Results
-
[Front and back cover]
Publication Year: 2013, Page(s):c1 - c4|
PDF (345 KB)
-
China Unicom [advertisement]
Publication Year: 2013, Page(s): 1|
PDF (1362 KB)
-
[Advertisement]
Publication Year: 2013, Page(s): 1|
PDF (979 KB)
-
Table of contents
Publication Year: 2013, Page(s):ii - v|
PDF (1151 KB)
-
Call for papers
Publication Year: 2013, Page(s): 1|
PDF (609 KB)
-
ICT industry convergence [Guest Editorial]
Publication Year: 2013, Page(s):vii - viii|
PDF (640 KB)
-
How to make virtual community more active and cohesive: From brand and perceived protection perspectives
Publication Year: 2013, Page(s):1 - 14With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is necessary to cultivate within it good group cohesion and vitality. Using empirical and experimental research methods, this study explores the effect of users' trust in the VC Platform (VCP) on gr... View full abstract»
-
Multiple reader algorithm for sports timing systems and its application at low frequency bandwidth
Publication Year: 2013, Page(s):16 - 24In sports timing systems, P2P communication is used at low frequency bandwidths (under 135 KHz) between tags and readers in the RFID field. However, in such cases, collisions tend to occur when a reader deals with multiple RFID tags simultaneously. To overcome this issue, a sports timing system including a Multi Reader Controller (MRC) loaded with an advanced multiple reader algorithm and applicat... View full abstract»
-
Mining and modelling the dynamic patterns of service providers in cellular data network based on big data analysis
Publication Year: 2013, Page(s):25 - 36
Cited by: Papers (4)Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience. Recent studies have illustrated traffic characteristics from specific perspectives, such as user behaviour, device type, and applications. In this paper, we present the results of our study from a different perspective, namel... View full abstract»
-
User identification based on multiple attribute decision making in social networks
Publication Year: 2013, Page(s):37 - 49Social networks are becoming increasingly popular and influential, and users are frequently registered on multiple networks simultaneously, in many cases leaving large quantities of personal information on each network. There is also a trend towards the personalization of web applications; to do this, the applications need to acquire information about the particular user. To maximise the use of th... View full abstract»
-
Network selection based on context-awareness services
Publication Year: 2013, Page(s):50 - 56
Cited by: Papers (2)In this paper, we propose a systemic architecture of network selection based on context-awareness services, which gathers contextual information that includes such network information, user information and local information. This network selection strategy considers the Quality of Service (QoS) and user preferences. Also, it perceives contexts such as speed, coverage percentage and location, etc.,... View full abstract»
-
User-oriented graph based frequency allocation algorithm for densely deployed femtocell network
Publication Year: 2013, Page(s):57 - 65
Cited by: Papers (2)Femtocell is a promising technology for improving indoor coverage and offloading the macrocell. Femtocells tend to be densely deployed in populated areas such as the dormitories. However, the inter-tier interference seriously exists in the co-channel Densely Deployed Femtocell Network (DDFN). Since the Femtocell Access Points (FAPs) are randomly deployed by their customers, the interference cannot... View full abstract»
-
Status-aware resource adaptation in information-centric and software-defined network
Publication Year: 2013, Page(s):66 - 76
Cited by: Papers (2)In recent years, realising a “clean-state” design for the future Internet has become an important research focus. An architecture combining an Information-Centric Network (ICN) and Software-Defined Network (SDN) (IC-SDN) has gradually attracted more attention. However, the existing studies regarding IC-SDN still lack support in terms of the “network status awareness” fu... View full abstract»
-
CHC-TSCM: A trustworthy service composition method based on an improved CHC genetic algorithm
Publication Year: 2013, Page(s):77 - 91Trustworthy service composition is an extremely important task when service composition becomes infeasible or even fails in an environment which is open, autonomic, uncertain and deceptive. This paper presents a trustworthy service composition method based on an improved Cross generation elitist selection, Heterogeneous recombination, Catacly-smic mutation (CHC) Trustworthy Service Composition Met... View full abstract»
-
QoS provisioning energy saving dynamic access policy for overlay cognitive radio networks with hidden Markov channels
Publication Year: 2013, Page(s):92 - 101Dynamic spectrum access policy is crucial in improving the performance of overlay cognitive radio networks. Most of the previous works on spectrum sensing and dynamic spectrum access consider the sensing effectiveness and spectrum utilization as the design criteria, while ignoring the energy related issues and QoS constraints. In this article, we propose a QoS provisioning energy saving dynamic ac... View full abstract»
-
Construction of quasi-cyclic low-density parity-check codes for simplifying shuffle networks in layered decoder
Publication Year: 2013, Page(s):102 - 113Offset Shuffle Networks (OSNs) interleave a-posterior probability messages in the Block Row-Layered Decoder (BRLD) of Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes. However, OSNs usually consume a significant amount of computational resources and limit the clock frequency, particularly when the size of the Circulant Permutation Matrix (CPM) is large. To simplify the architecture of the OSN... View full abstract»
-
Energy-aware scheduling scheme using workload-aware consolidation technique in cloud data centres
Publication Year: 2013, Page(s):114 - 124
Cited by: Papers (3)To reduce energy consumption in cloud data centres, in this paper, we propose two algorithms called the Energy-aware Scheduling algorithm using Workload-aware Consolidation Technique (ESWCT) and the Energy-aware Live Migration algorithm using Workload-aware Consolidation Technique (ELMWCT). As opposed to traditional energy-aware scheduling algorithms, which often focus on only one-dimensional reso... View full abstract»
-
Cognitive MAC protocol with minimum sampling time and cross-layer cooperation for low signal-to-noise ratio environments
Publication Year: 2013, Page(s):125 - 138The previous Decentralised Cognitive Medium Access Control (DC-MAC) protocol allows Secondary Users (SUs) to independently search for spectrum access opportunities without the need for a central coordinator. DC-MAC assumes that the detection scheme is ideal at the Physical (PHY) layer. In fact, a more complex detection algorithm is impractical in distributed spectrum sharing scenarios. Energy Dete... View full abstract»
-
Action recognition from a different view
Publication Year: 2013, Page(s):139 - 148In this paper, we propose a novel approach to recognise human activities from a different view. Although appearance-based recognition methods have been shown to be unsuitable for action recognition for varying views, there must be some regularity among the same action sequences of different views. Self-similarity matrices appear to be relative stable across views. However, the ability to effective... View full abstract»
-
Optimal time and bandwidth allocation based on Nash bargaining solution for cooperative cognitive systems
Publication Year: 2013, Page(s):149 - 157In this paper, we propose a cooperative spectrum sharing strategy based on the Nash bargaining solution. Specifically, the primary system leases a fraction of its transmission time to the secondary system in exchange for cooperation to improve its transmission performance. To gain access to the spectrum of the primary system, the secondary system needs to split a fraction of its transmission bandw... View full abstract»
-
Comparative analysis of mobile application stores in different charging modes
Publication Year: 2013, Page(s):158 - 168This paper describes the platformisation of the mobile services domain, which in recent years has become a successful strategy for some hardware manufacturers and software companies. While having different platform strategies and business models, they have succeeded in creating a demand for mobile software and content with end-users. This paper proposes a way to determine the optimum platform-char... View full abstract»
-
China Unicom: Further development of "smart car"
Publication Year: 2013, Page(s):1 - 2|
PDF (249 KB)
-
[Advertisement]
Publication Year: 2013, Page(s): 1|
PDF (1255 KB)
Aims & Scope
China Communications, published in English and in conformance with IEEE editorial standards, covers innovative technologies and systems in the broad field of Information- Communication Technology (ICT).
Meet Our Editors
Editor-in-Chief
Chen Junliang