Veselin Rakocevic

Veselin Rakocevic
  • City, University of London

About

110
Publications
34,481
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,276
Citations
Current institution
City, University of London

Publications

Publications (110)
Preprint
Accurate classification of low-latency Internet traffic is essential for real-time applications 1 such as video conferencing, online gaming, financial trading, and autonomous systems, where even millisecond-level delays can significantly degrade performance. Modern networks must dynamically allocate resources based on real-time traffic demands to e...
Conference Paper
Full-text available
The development and operation of solar and wind renewable energy systems depend on the use of critical metals, including copper. While the unique properties of copper make it irreplaceable in the renewable energy technologies, the scarcity of copper raises environmental concerns. Copper extraction, processing and transportation have a significant i...
Article
Full-text available
Multipath wireless access aims to seamlessly aggregate multiple access networks to increase data rates and decrease latency. It is currently being standardized through the ATSSS architectural framework as part of the fifth-generation (5G) cellular networks. However, facilitating efficient multi-access communication in next-generation wireless netwo...
Preprint
Providing multi-connectivity services is an important goal for next generation wireless networks, where multiple access networks are available and need to be integrated into a coherent solution that efficiently supports both reliable and non reliable traffic. Based on virtual network interfaces and per path congestion controlled tunnels, the MP-DCC...
Article
Full-text available
This paper presents a relay selection algorithm based on fair battery power utilization for extending mobile network coverage and capacity by using a cooperative communication strategy where mobile devices can be utilized as relays. Cooperation improves the network performance for mobile terminals, either by providing access to out-of-range devices...
Article
Full-text available
In orthogonal frequency division multiple access networks buffer aided non-transparent in-band half duplex decode and forward relay nodes aim to improve coverage and capacity under fairness considerations. Existing centralized radio resource management and inter cell interference coordination schemes achieve these goals at the cost of heavy signall...
Preprint
Mobile nodes are typically equipped with multiple radios and can connect to multiple radio access networks (e.g. WiFi, LTE and 5G). Consequently, it is important to design mechanisms that efficiently manage multiple network interfaces for aggregating the capacity, steering of traffic flows or switching flows among multiple interfaces. While such mu...
Article
Full-text available
Coordination is foreseen to be an important component of future mobile radio networks. It is especially relevant in heterogeneous networks, where high power base stations produce strong interference to an underlying layer of low power base stations. This work investigates in detail the achievable performance gains for one coordination technique—coo...
Conference Paper
Over the past decade, the way that devices connect to the Internet has changed drastically. The introduction of high-speed mobile networks and the omnipresence of wireless access points led to a situation where most devices offer multiple network interfaces, such as cellular and WiFi radios. However the most prevalent Layer 4 protocol, TCP, is not...
Conference Paper
This paper proposes a solution for mitigating mobility induced challenges in wireless ad hoc networks of moving robots operating in challenging environments. We consider a case of a network of moving robots instructed to share large data volumes in an environment characterized with lack of network infrastructure and uncertainty of signal measuremen...
Article
An intelligent location-aware data aggregation mechanism for real-time observation, estimation, and efficient dissemination of any kind of traffic information in vehicular ad hoc networks (VANETs) is presented in this paper. The mechanism introduces a location awareness algorithm, enabling spatiotemporal database indexing and providing the location...
Article
Full-text available
The high increase of bandwidth-intensive applications like high definition video streaming in home and small office environments leads to QoS challenges in hybrid wired/wireless local area networks. These networks are often not QoS aware and may contain bottlenecks in their topology. In addition, they often have a hybrid nature due to the used acce...
Article
Coordination is foreseen to be an important component of future mobile radio networks. It is especially relevant in heterogeneous networks, where high power base stations produce strong interference to an underlying layer of low power base stations. This work investigates the impact of the interference from base stations which are not part of the c...
Article
The problem of efficient use of resources in wireless access networks becomes critical today with users expecting continuous high-speed network access. While access network capacity continues to increase, simultaneous operation of multiple wireless access networks presents an opportunity to increase the data rates available to end-users even furthe...
Chapter
Autonomous and self organizing wireless adhoc communication networks for moving objects are based on nodes without using any centralized infrastructure. Moving object networks have to face many critical challenges due dynamic changes in topologies and symmetric links of networks. A suitable and effective routing mechanism helps to extend the deploy...
Article
Full-text available
Each year, some 30 percent of global deaths are caused by cardiovascular diseases. This figure is worsening due to both the increasing elderly population and severe shortages of medical personnel. The development of a cardiovascular diseases classifier (CDC) for auto-diagnosis will help address solve the problem. Former CDCs did not achieve quick e...
Article
Full-text available
In this work, an Intrusion Detection System (IDS) for vehicular ad hoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in presence of rogue nodes that can launch attacks. The proposed IDS is capable of detecting a false information attack using statistical techniques effectively and can also detect other types of att...
Article
Detailed residential energy consumption data can be used to offer advanced services and provide new business opportunities to all participants in the energy supply chain, including utilities, distributors and customers. The increasing interest in the residential consumption data is behind the roll-out of smart meters in large areas and led to inten...
Article
We consider the problem of supporting traffic with elastic bandwidth requirements and average end-to-end delay constraints in multihop wireless networks, with focus on source rates and link data rates as the key resource allocation decisions. The network utility maximization-based approaches to support delay-sensitive traffic have been predominantl...
Chapter
This chapter presents the problem of clustering of moving objects in ad hoc wireless networks. The networks of moving objects include networks of flying objects, networks of cars and other vehicles, networks of people moving in the cities, and networks of robots sensing the environment or performing coordinated actions. Clustering of such objects i...
Conference Paper
The well-known traffic congestion problem in urban environments has negative impact on many areas including economy, environment, health and lifestyle. Recently, a number of solutions based on vehicle-to-vehicle communications were proposed for traffic congestion detection and management. In this paper we present an algorithm designed to enable eac...
Article
Full-text available
This paper presents a ZigBee In-Patient Monitoring system embedded with a new ZigBee mobility management solution. The system enables ZigBee device mobility in a fixed ZigBee network. The usage, the architecture and the mobility framework are discussed in details in the paper. The evaluation shows that the new algorithm offers a good efficiency, re...
Article
This paper uses problem decomposition to show that optimal dynamic home energy prices can be used to reduce the cost of supplying energy, while at the same time reducing the cost of energy for the home users. The paper makes no specific recommendations on the nature of energy pricing, but shows that energy prices can normally be found that not only...
Conference Paper
Vehicular traffic congestion is a well-known economic and social problem generating significant costs and safety challenges, and increasing pollution in the cities. Current intelligent transport systems and vehicular networking technologies rely heavily on the supporting network infrastructure which is still not widely available. This paper contrib...
Conference Paper
A Multipurpose Patient Monitoring system embedded with a new ZigBee mobile application profile is proposed and developed. This system enables the mobility of ZigBee devices. The usage, the architecture and the mobility framework are discussed in details. It saves people life by providing panic button and location tracking service. A case study base...
Conference Paper
LTE-Advanced networking standard introduces fixed relays as one of the ways to support the ambitious performance requirements for next-generation network services. The relays are introduced to increase the available capacity or to extend the coverage of the network. Balancing the dynamic interference scenarios and the complex resource management in...
Conference Paper
Pico base stations are an important instrument to increase the capacity of mobile radio networks. Due to the limited spectrum availability it will be necessary to operate macro and pico base stations on the same frequency bands. In this case the transmit power imbalance between different base station types creates new interference situations. Coord...
Article
The connected dominating set (CDS) principle has emerged as the predominant method for energy-efficient discovery and clustering of power-/location-unaware WSN nodes. While many CDS discovery protocols have been proposed recently, a one-to-one comparative evaluation of these protocols has not been performed on judicious metrics. In this paper, we p...
Article
Energy consumption in Wireless Sensor Networks (WSNs) is of paramount importance, which is demonstrated by the large number of algorithms, techniques, and protocols that have been developed to save energy, and thereby extend the lifetime of the network. However, in the context of WSNs routing and dissemination, Connected Dominating Set (CDS) princi...
Article
Full-text available
A WiFi-ZigBee hybrid BAN solution, namely WiZBAN, is proposed and implemented to cater for the development of high traffic AMI for smart grid application. It is important to highlight that the major challenge of WiZBAN is to handle the high density environment which results in heavy traffic loading and weak signal propagation. To overcome the capti...
Article
Full-text available
Consumer networks face the problem of lacking quality awareness. The quality of network connections is a problem, as well as consumers are overstained finding quality content of interest. The system proposed in this paper assures the quality of both aspects. We introduce a novel self-organised QoS system and integrate a hybrid personalised recommen...
Article
Energy efficiency and reliability are the two important requirements for mission-critical wireless sensor networks. In the context of sensor topology control for routing and dissemination, Connected Dominating Set (CDS) based techniques proposed in prior literature provide the most promising efficiency and reliability. In a CDS-based topology contr...
Article
Full-text available
Accurate simulation and analysis of wireless networks are inherently dependent on accurate models which are able to provide real-time channel characterization. High-order Markov chains are typically used to model errors and losses over wireless channels. However, complexity (i.e., the number of states) of a high-order Markov model increases exponen...
Conference Paper
The prevalent assumption in the current utility maximisation-based rate control and scheduling solutions for multihop wireless networks has been that bounded packet end- to-end delay can be attained by guaranteeing a pre-specified bandwidth. However, in addition to the inherent complexities in determining the exact bandwidth, this approach requires...
Article
This paper presents novel algorithms which are able to generate recommendations within a heterogeneous service environment. In this work explicitly set preferences as well as implicitly logged viewing behavior are employed to generate recommendations for Digital Video Broadcast (DVB) content. This paper also discusses the similarity between the DVB...
Conference Paper
The banking sector is always looking for new services delivery platforms to improve customer confidence and satisfaction. To achieve this, the banking service delivery platform must provide end-to-end security to safeguard the information exchange between the bank and the customer. With the increased penetration of mobile phones in the market place...
Conference Paper
Full-text available
Since most real-time audio and video applications lack of QoS support, QoS demand of such IP data streams shall be detected and applied automatically. To support QoS in LANs, especially in home environments, a system was developed, which enables self-organised QoS for unmanaged networks through host implementations in contrast to traditional soluti...
Conference Paper
Full-text available
Since most real-time audio and video applications lack Quality of Service (QoS) support and QoS-aware network hardware is not common in consumer grade networks, the Quality of Experience (QoE) of, for example, high definition Internet Protocol Television (IPTV) is very limited. Therefore, this paper proposes a novel approach for enabling QoS in unm...
Conference Paper
Power- and location-unaware topology control protocols for wireless sensor networks (WSNs) generally conserve energy by forming node clusters using the connected dominating set (CDS) principle. CDS-based clustering allows nodes lying outside the CDS to enter the sleep mode thereby extending node and network lifetimes. In this paper, we introduce a...
Article
Wireless Mesh Networks (WMNs) are seen as a means to provide last mile connections in Next Generation Networks (NGNs). Because of their auto-configuration capabilities and the low deployment cost WMNs are considered to be an efficient solution for the support of multiple voice, video and data services in NGNs. This paper looks at the optimal provis...
Conference Paper
Full-text available
The concept of mobile services is to provide the access to online content and services from anywhere, anytime and on any device. The mobile user is the consumer for the mobile services and the access to the services are enabled according to the user identification. Meanwhile, mobile device identity, SIM identity and location identity are some of th...
Book
This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009. The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process. The papers dealt with subjects like virtual business alliances, organizational and c...
Article
Full-text available
We propose two multipath rate control algorithms that guarantee bounded end-to-end delay in multihop wireless networks. Our work extends the previous research on optimal rate control and scheduling in multihop wireless networks, to support inelastic delay requirements. Using the relationship between dual variables and packet delay, we develop two a...
Conference Paper
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious p...
Conference Paper
It is well-known that the values of IEEE 802.11 MAC parameters directly affect the utilization of the channel capacity and link layer throughput as well as higher layers performance. This paper first studies the throughput of ad hoc network under various 802.11 MAC parameters by developing a 3-dimensional Markov chain. Based on this model, it is ma...
Article
In energy constrained wireless sensor networks, it is important that a routing protocol provides network redundancy and reliability at a minimum energy consumption cost. To satisfy these conflicting constraints, wireless sensor networks (WSN) routing protocols generally employ a clustering algorithm in which the entire network does not have to be a...
Conference Paper
This paper presents algorithms and techniques to generate recommendations for DVB content. The developed recommendation engine uses metadata which are delivered by the DVB transport stream, the Service Information. The creation of user profiles, which contains the preferences of an individual user, is described. Personalization strategies, to filte...
Article
Full-text available
In this paper we present a platform for the direct consumption of web services by a Mobile Station. We give an architectural solution where Mobile Operators play the role of Trusted Third Parties supplying service credentials that allow a co-located 3GPP Network Application Function and Liberty-enabled Identity Provider entity to implement a contro...
Conference Paper
This paper provides detailed solutions for trust delegation and secure temporary storage of medical records for authorized users in public mobile communication networks. The solutions presented in this paper enable the development of software that can be used by emergency medical units in urgent need of sensitive personal information about unconsci...
Conference Paper
Full-text available
Accurate simulation and analysis of wireless networks are inherently dependent on accurate models which are able to provide real-time channel characterization. High-order Markov chains are typically used to model errors and losses over wireless channels. However, complexity (i.e., the number of states) of a high-order Markov model increases exponen...
Conference Paper
Full-text available
The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unautho- rized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentica- tio...
Conference Paper
In this paper, we propose a transport layer tunneling for improving the seamless handover for group mobility. Efficiency of this protocol in reducing the handover latency and increasing the end-to-end throughput in wireless access networks with frequent handovers has been considered. We show that the new scheme could significantly increase the thro...
Article
This article proposes a system in which a Global System for Mobile (GSM) communication user can access and be authenticated to third party services with total anonymity as far as the Services Providers are concerned and where the GSM Network Operator provides a Single Sign-On service. Within the system, it is possible for a trusted authority to rev...
Conference Paper
Full-text available
A network based method for an intelligent distribution of transport resources of heterogeneous points of attachment to the network among mobile nodes with multiple network interfaces is presented in this paper. Selection of the used network for a particular multimedia session is based on the QoS situation in access networks available for mobile nod...
Conference Paper
Full-text available
WLAN, based on the IEEE 802.11 standard has been extensively studied since its release. In addition to infrastructure access to WLAN, mesh networks currently attract a lot of attention. This comes from the envisioned advantages of wireless mesh networks, such as cheap installation costs, extended coverage, robustness, easy maintenance, and self-con...
Conference Paper
Full-text available
This paper presents a WLAN based next generation wireless mesh testbed, called "MeshBed". The aim of this testbed is to investigate carrier-grade mesh network aspects from network operators point of view. The paper describes in detail the purpose, architecture as well as the features of the MeshBed. In particular, the Operations Support System cons...
Article
The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distr...
Article
Seamless communication between computing devices is an essential part of the new world of ubiquitous computing. To achieve the concept of a "disappearing computer," it is necessary to establish reliable and simple communication principles to enhance the usability and the efficiency of the ubiquitous computing devices. It is also important to use wi...
Conference Paper
Full-text available
Remote monitoring is fundamental in eHealth and introducing mobile devices in the remote monitoring process can provide additional benefits to both patients and medical personnel. For mobile remote monitoring systems to be successful, however, the authentication process must be in place to prevent the misuse of the system. In this paper we analyse...
Conference Paper
Full-text available
The Internet and mobile networks have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such healthcare environment the privacy and security of the transmitted information must be preserved. When dealing with health sensitive information at times it is vital to prot...
Conference Paper
Full-text available
In this paper, we propose a transport layer tunnelling for improving the seamless handover for group mobility. Efficiency of this protocol in reducing the handover latency, increasing the end-to-end throughput in wireless access networks with frequent handovers has been considered. We show that the new scheme could significantly increase the throug...
Conference Paper
Full-text available
The European Global Product Realisation (EGPR) course is designed to bring knowledge and skills in engineering education and to develop student's competences for industrial collaboration and realisation. To connect undergraduate learning with real life experience, an academic virtual enterprise has been created between Kesslers International, a UK...
Conference Paper
Full-text available
The problem of terminal-pair reliability has been extensively studied for wired computer networks, however comparatively less research has been done on the reliability of wireless networks. With mesh networks becoming a more attractive option than the traditional point- to-multipoint network design due to extended coverage and increased overall lin...
Conference Paper
Full-text available
Wireless mesh networks are a viable solution to provide broadband wireless access (BWA) in a cost efficient and flexible manner. The IEEE 802.16 standard is currently one of the most interesting BWA standards. Besides the popular point-to-multipoint mode it defines an optional mesh mode. This paper evaluates the performance of the coordinated distr...
Article
Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, su...
Conference Paper
Full-text available
It is well known that one of the critical sources of TCP poor performance in multihop ad hoc networks lies in the TCP window mechanism that controls the amount of traffic sent into the network. In this paper, we propose a novel cross layer solution called "TCP Contention Control" that dynamically adjusts the amount of outstanding data in the networ...
Conference Paper
Full-text available
This paper presents a novel architecture for providing converged IP-based TV (IPTV) services specified by ETSI TISPAN standardisation for IPTV in ongoing NGN release 2 specifications. The described IPTV architecture is based on utilisation of the IP Multimedia Subsystem concept used by NGN architectural framework and its adaptation to provide the I...
Conference Paper
Full-text available
There are many advantages to deploying mobile devices in eHealth systems. However; security is still an issue: in particular authentication and user privacy. In this paper we propose a novel architecture that integrates 3GPP UMTS mobile technology with Web services. This will help address authentication and privacy concern within eHealth environmen...
Conference Paper
Full-text available
Mobile and wireless devices have penetrated the health care sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such health care applications the privacy and security of the transmitted information must be preserved. Also different personal involved in the Healthcare industry must have differe...
Article
Full-text available
Finite element analysis, based on the vector H-field formulation and incorporating the perturbation technique, is used to calculate the complex propagation characteristics of metal-coated dielectric waveguides at terahertz frequencies. The propagation and attenuation characteristics of surface-plasmon modes (SPMs) at the metal/dielectric interfaces...
Conference Paper
Full-text available
In this paper we present a platform for the direct consumption of Web services by a Mobile Station. We give an architectural solution where Mobile Operators play the role of Trusted Third Parties supplying service credentials that allow a co-located 3GPP network application function and liberty-enabled identity provider entity to implement a contro...
Article
Modal solutions of photonic crystal fibers with equal and unequal circular air holes in a hexagonal matrix are presented, by using a rigorous full-vectorial finite element-based approach. The effective indices, mode field profiles, spot-sizes, modal hybridness, modal birefringence and group velocity dispersion values have been determined and presen...
Article
Full-text available
The existing wireless technologies are strug-gling to satisfy the enormous growth of demand on broadband wireless access anywhere and anytime. The IEEE 802.16 standard family has been developed recently, introducing a new air interface for fixed and mobile Broad-band Wireless Access. This paper evaluates the perfor-mance of the most commonly used I...
Article
Full-text available
Broadband wireless access becomes more and more important for current and future communication sys-tems. The IEEE 802.16 (WiMAX) standard combines this technology with mesh multihop network topologies. These multihop networks can be deployed for high speed wide-area wireless networks. One key issue of mesh network-ing is the MAC (Medium Access Cont...
Article
Full-text available
The connection of ad-hoc networks to the Internet is typically established via gateways. To start an Internet connection, gateways have to be discovered by the mobile nodes within the ad-hoc cluster. This paper presents a new gateway discovery algorithm based on HELLO messages of the AODV protocol and compares the performance of the new algorithm w...
Conference Paper
Full-text available
This paper defines a multi-hierarchical architecture of mobile anchor points (MAP) in a micro mobility network to enhance the performance of hierarchical mobile IPv protocol. By deploying this multi-hierarchical architecture of MAPs the latency of IP handoffs is reduced significantly so that the traffic performance during handoffs can be improved....
Article
This paper provides a parallel study of two important issues for the next-generation multimedia networking. Firstly, the emerging multimedia applications require a fresh approach to congestion control in the Internet. Currently, congestion control is performed by TCP; it is optimised for data traffic flows, which are inherently elastic. Audio and v...
Conference Paper
This paper investigates the case of a wireless sensor network deploying Bluetooth technology. The paper analyses main technological features of Bluetooth, such as error recovery, power consumption and connection establishment, and using some experimental results analyses their effect on the Quality of Service in the sensor network. The paper presen...
Conference Paper
Full-text available
This paper analyses resource provisioning for enterprise Voice-over-IP (VoIP) networks. Simulation and analytical methods are used to enhance the provisioning process, which ultimately aims to provide the delivery of consistent Quality of Service (QoS). Consistent QoS is increasingly important in order to deliver an adequate service, as defined in...
Article
Full-text available
This paper presents results from ns-2 simulation of an integrated wireless – wired – wireless network architecture, in which wireless stations attached to a wireless LAN transmit UDP video traffic and TCP data traffic to wireless stations attached to some other, remote wireless LAN. The communication between the two LANs is achieved through a seque...
Article
The Internet needs to evolve from a single-service data network into the multiservice intelligent network capable of satisfying diverse performance requirements. The way network resources, primarily bandwidth, is shared, is one of the key issues in this evolution. This paper analyses the concept of bandwidth partitioning, in which each link in the...

Network

Cited By