The Random Access Procedure in Long Term Evolution Networks for the Internet of Things

2017 ◽  
Vol 55 (3) ◽  
pp. 124-131 ◽  
Author(s):  
Tiago P.C. De Andrade ◽  
Carlos A. Astudillo ◽  
Luiz R. Sekijima ◽  
Nelson L.S. Da Fonseca
2021 ◽  
Vol 39 (4) ◽  
pp. 1-33
Author(s):  
Fulvio Corno ◽  
Luigi De Russis ◽  
Alberto Monge Roffarello

In the Internet of Things era, users are willing to personalize the joint behavior of their connected entities, i.e., smart devices and online service, by means of trigger-action rules such as “IF the entrance Nest security camera detects a movement, THEN blink the Philips Hue lamp in the kitchen.” Unfortunately, the spread of new supported technologies makes the number of possible combinations between triggers and actions continuously growing, thus motivating the need of assisting users in discovering new rules and functionality, e.g., through recommendation techniques. To this end, we present , a semantic Conversational Search and Recommendation (CSR) system able to suggest pertinent IF-THEN rules that can be easily deployed in different contexts starting from an abstract user’s need. By exploiting a conversational agent, the user can communicate her current personalization intention by specifying a set of functionality at a high level, e.g., to decrease the temperature of a room when she left it. Stemming from this input, implements a semantic recommendation process that takes into account ( a ) the current user’s intention , ( b ) the connected entities owned by the user, and ( c ) the user’s long-term preferences revealed by her profile. If not satisfied with the suggestions, then the user can converse with the system to provide further feedback, i.e., a short-term preference , thus allowing to provide refined recommendations that better align with the original intention. We evaluate by running different offline experiments with simulated users and real-world data. First, we test the recommendation process in different configurations, and we show that recommendation accuracy and similarity with target items increase as the interaction between the algorithm and the user proceeds. Then, we compare with other similar baseline recommender systems. Results are promising and demonstrate the effectiveness of in recommending IF-THEN rules that satisfy the current personalization intention of the user.


2019 ◽  
Vol 6 (2) ◽  
pp. 1-12
Author(s):  
Gesoon j.k Al-Abass ◽  
Huda R. ALkifaey

"Internet of things (IoT) domain targets human with smart resolutions through the connection of “M2M” in all over the world, effectively. It was difficult to ignore domain importance field of IoT with the new deployment of applications such as smartphone in recent days. The most important layer in architecture of IoT is network layer, because of various systems (perform of cloud computing, switching, hub, gateway, so on), different technologies of connection (Long-Term Evolution (LTE), WIFI, Bluetooth, etc.) gathered in layer. Network layers should transfer the information from or to various applications/objects, via gateways/interfaces between networks that are heterogeneous, therefore utilizing different connection technologies, protocols. Recent work highlighted IoT technologies state-of-the-art utilized in architectures of IoT, some variations among them in addition to the applications of them in life."


2005 ◽  
Vol 01 (03) ◽  
pp. 359-369
Author(s):  
IAN FENTY ◽  
ERIC BONABEAU ◽  
JUERGEN BRANKE

In this paper, co-evolution is used to examine the long-term evolution of business models in an industry. Two types of co-evolution are used: synchronous, whereby the entire population of business models is replaced with a new population at each generation, and asynchronous, whereby only one individual is replaced.


Author(s):  
Mohammad Haasin Farooq ◽  
Muhammad Zain ◽  
Muhammad Bilal Khalid ◽  
Saima Zafar

The Internet of Things (IoT) has dominated the digital world by enabling thousands of physical devices to communicate with each other and share useful data over the Internet. With use cases spanning every sphere of modern life, the IoT is all set to revolutionize the traveling sector by extending services associated with safety, security, surveillance, tracking, comfort, and a lot more. This paper presents the design and implementation of a prototype Easy-Weigh-Out, based on the principles of the IoT which enables a user to run Android-based mobile application and view the weight of luggage and track its location without any contact with it. The hardware of the system is built around Arduino UNO microcontroller which interfaces with a load cell (20 kg) via A/D converter and a NEO-6M Global Positioning System (GPS) module for tracking of the bag. The system uploads data to a Cloud server using ESP8266 Wi-Fi module. Our results show the real-time weight and tracking of the bag at a click of a button as well as long-term data logging.


Computers ◽  
2018 ◽  
Vol 7 (4) ◽  
pp. 48 ◽  
Author(s):  
Lorenzo Vangelista ◽  
Marco Centenaro

Hybrid Automatic Repeat reQuest (HARQ) techniques are widely employed in the most important wireless systems, e.g., the Long Term Evolution (LTE) cellular standard, to increase the reliability of the communication. Despite these schemes have been widely studied in literature in the past several years, the recent results obtained by Polyanskiy, Poor, and Verdú on the finite-blocklength regime disclosed new possibilities for the research on HARQ schemes. Indeed, new communications trends, which are usually part of the Internet of Things (IoT) paradigm, are characterized by very short packet sizes and a high reliability requirement and, therefore, they call for efficient HARQ techniques. In many scenarios, the energy efficiency of the communication plays a key role as well. In this paper, we aim at providing a comprehensive performance comparison of various kinds of HARQ schemes in the context of short-packet transmissions with energy constraints. We derive optimal power allocation strategies and we show that a minimum 50% energy saving can be achieved after very few transmission attempts if we enable packet combining at the receiver side.


Sign in / Sign up

Export Citation Format

Share Document