Globally Adaptive Data Prefetching Mechanism for Mobile Network Applications

2010 ◽  
Vol 21 (8) ◽  
pp. 1783-1794 ◽  
Author(s):  
Xiao-Wei ZHANG ◽  
Dong-Gang CAO ◽  
Gang TIAN ◽  
Xiang-Qun CHEN
Author(s):  
B. A. F. Esmail ◽  
H. A. Majid ◽  
S. H. Dahlan ◽  
Z. Z. Abidin ◽  
M. K. A. Rahim ◽  
...  

Two novel millimeter-wave (MMW) metamaterials (MTMs) unit cells operate at 28 GHz for a future fifth generation (5G) mobile network applications had been designed, presented and numerically investigated. Two MTM structures are proposed; namely the double E-shaped resonator (DER) and T-U shaped resonator (TUSR). The DER and TUSR are consists of a double E and combined T-U shaped, each printed on front side of the substrate layer respectively. DER achieves a bandwidth of 0.5 GHz and a return loss of -34 dB, whereas TUSR features a bandwidth of  0.3 GHz and a return loss of -18 dB. The conventional split range resonator (SRR) was optimized to operate at similar frequency for comparison purpose. The simulation results revealed that the proposed DER and TUSR unit cells achieves the lowest loss as opposed to literature with -0.09 dB (0.99 in linear scale) and -0.23 dB (0.97 in linear scale) respectively. Moreover, a well-known algorithm was used to extract the constitutive parameters and the double negative nature of the two novel MTM structures is proven.


2011 ◽  
Vol 22 (12) ◽  
pp. 2866-2878 ◽  
Author(s):  
Xiao-Wei ZHANG ◽  
Dong-Gang CAO ◽  
Xiang-Qun CHEN ◽  
Hong MEI

2017 ◽  
Vol 22 (S4) ◽  
pp. 9661-9676 ◽  
Author(s):  
Zhenze Jia ◽  
Xiaoguang Fan ◽  
Haoxiang Wang

2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Li Kuang ◽  
Yin Wang ◽  
Pengju Ma ◽  
Long Yu ◽  
Chuanbin Li ◽  
...  

With the rapid development of location-based services in the field of mobile network applications, users enjoy the convenience of location-based services on one side, while being exposed to the risk of disclosure of privacy on the other side. Attacker will make a fierce attack based on the probability of inquiry, map data, point of interest (POI), and other supplementary information. The existing location privacy protection techniques seldom consider the supplementary information held by attackers and usually only generate single cloaking region according to the protected location point, and the query efficiency is relatively low. In this paper, we improve the existing LBSs system framework, in which we generate double cloaking regions by constraining the supplementary information, and then k-anonymous task is achieved by the cooperation of the double cloaking regions; specifically speaking, k dummy points of fixed dummy positions in the double cloaking regions are generated and the LBSs query is then performed. Finally, the effectiveness of the proposed method is verified by the experiments on real datasets.


2014 ◽  
Vol 556-562 ◽  
pp. 5421-5426
Author(s):  
Zhen Hai Zhang ◽  
Zhao Ming Lu ◽  
Yang Chun Li ◽  
Xiang Ming Wen ◽  
Xiao Kui Chen ◽  
...  

With the recent proliferation of network applications in the smart devices, traditional cellular network has already no way to provide enough network flow to the mobile network users. WLAN becomes a very important wireless technology to offload the flow in the wireless network. In this paper, we propose one new framework which can monitor and analyze the network flow and further feedback corresponding messages to users. Firstly, the system performs the flow data statistic and further constructs one database to store the flow data through the monitoring of the network. Secondly several analysis mechanisms are designed to perform analysis of the flow data and generate corresponding advice information for users. Finally one pushing module is designed for the framework to push the feedback information to users.


Sign in / Sign up

Export Citation Format

Share Document