Achievable rate estimation of IEEE 802.11ad visual big-data uplink access in cloud-enabled surveillance applications

Joongheon Kim, Jong Kook Kim

    Research output: Contribution to journalArticlepeer-review

    6 Citations (Scopus)

    Abstract

    This paper addresses the computation procedures for estimating the impact of interference in 60 GHz IEEE 802.11ad uplink access in order to construct visual big-data database from randomly deployed surveillance camera sensing devices. The acquired large-scale massive visual information from surveillance camera devices will be used for organizing big-data database, i.e., this estimation is essential for constructing centralized cloud-enabled surveillance database. This performance estimation study captures interference impacts on the target cloud access points from multiple interference components generated by the 60 GHz wireless transmissions from nearby surveillance camera devices to their associated cloud access points. With this uplink interference scenario, the interference impacts on the main wireless transmission from a target surveillance camera device to its associated target cloud access point with a number of settings are measured and estimated under the consideration of 60 GHz radiation characteristics and antenna radiation pattern models.

    Original languageEnglish
    Article numbere0167447
    JournalPloS one
    Volume11
    Issue number12
    DOIs
    Publication statusPublished - 2016 Dec

    Bibliographical note

    Publisher Copyright:
    © 2016 Kim, Kim.This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

    ASJC Scopus subject areas

    • General Biochemistry,Genetics and Molecular Biology
    • General Agricultural and Biological Sciences
    • General

    Fingerprint

    Dive into the research topics of 'Achievable rate estimation of IEEE 802.11ad visual big-data uplink access in cloud-enabled surveillance applications'. Together they form a unique fingerprint.

    Cite this