{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T06:11:18Z","timestamp":1693721478300},"reference-count":41,"publisher":"Wiley","issue":"16","license":[{"start":{"date-parts":[[2017,2,8]],"date-time":"2017-02-08T00:00:00Z","timestamp":1486512000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61374189"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2017,8,25]]},"abstract":"Summary<\/jats:title>Monitoring video of city surveillance camera plays an important role in public security and disaster relief, which is often used by first responder teams, such as firefighters and police officers. The first responders in emergency situations require consistent connection with one another and request the remote real\u2010time monitoring video for effective cooperation and coordination. However, the capacity and privacy of public wireless networks fail to satisfy the requirements in many emergency scenarios, which often leads to exceptionally high traffic loads and insecurity. Device\u2010to\u2010device (D2D) communications have been deemed a key solution for this problem, as responders can use D2D links for traffic offloading and secure communications. To investigate the D2D\u2010based solution for public safety video sharing, this paper focuses on the Focus Geographical Area (FGA) video consisting of multiple camera streams requiring higher bandwidth consumption than that of the traditional single\u2010camera stream, which attracts a large number of contents delivery requests in emergency situations. This paper develops a new Traffic Burden Switching Markovian (TBSM) model to evaluate the performance of transmitting real\u2010time FGA video in wireless networks with D2D communications. First, a novel D2D area model is introduced to characterize link\u2010switching in wireless D2D communication networks. Based on the proposed D2D area model, the state and transition matrix of TBSM model are then derived by jointly considering user mobility, link\u2010switching, and FGA video view\u2010switching. Thereafter, some key performance metrics including system offloading ratio, D2D link\u2010switching ratio, and view\u2010switching ratio are derived on the basis of coverage probability and ergodic rate. The performance results show the significant varying performance among D2D areas with different geographical locations in D2D enabled wireless networks, which is referred to as multi\u2010D2D\u2010area diversity. The excellent match between simulation and model results validates the accuracy of the TBSM model, which can be used to provide guidelines for the deployment and optimization of future wireless video networks with D2D communications.<\/jats:p>","DOI":"10.1002\/cpe.4078","type":"journal-article","created":{"date-parts":[[2017,2,8]],"date-time":"2017-02-08T14:36:52Z","timestamp":1486564612000},"source":"Crossref","is-referenced-by-count":5,"title":["A Markovian analytical framework for public\u2010safety video sharing by device\u2010to\u2010device communications"],"prefix":"10.1002","volume":"29","author":[{"given":"Quanxin","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Communication and Information Engineering University of Electronic Science and Technology of China 611731 Chengdu China"},{"name":"Department of Mathematics and Computer Science University of Exeter, EX4 4QF, Exeter UK"}]},{"given":"Shuai","family":"Han","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering University of Electronic Science and Technology of China 611731 Chengdu China"}]},{"given":"Yuming","family":"Mao","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering University of Electronic Science and Technology of China 611731 Chengdu China"}]},{"given":"Supeng","family":"Leng","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering University of Electronic Science and Technology of China 611731 Chengdu China"}]},{"given":"Geyong","family":"Min","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science University of Exeter, EX4 4QF, Exeter UK"}]},{"given":"Jia","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science University of Exeter, EX4 4QF, Exeter UK"}]},{"given":"Noushin","family":"Najjari","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science University of Exeter, EX4 4QF, Exeter UK"}]}],"member":"311","published-online":{"date-parts":[[2017,2,8]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7432144"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.013"},{"key":"e_1_2_9_4_1","doi-asserted-by":"crossref","unstructured":"NobachL HausheerD.Towards decentralized energy\u2010and privacy\u2010aware device\u2010to\u2010device content delivery.IFIP International Conference on Autonomous Infrastructure Management and Security.Springer Brno;2014:128\u2013132.","DOI":"10.1007\/978-3-662-43862-6_16"},{"key":"e_1_2_9_5_1","article-title":"Impact of mobile instant messaging applications on signaling load and UE energy consumption","author":"Jia Y","year":"2016","journal-title":"Wireless Netw"},{"issue":"5","key":"e_1_2_9_6_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2990473","article-title":"Real\u2010time load reduction in multimedia big data for mobile Internet","volume":"12","author":"Wang K","year":"2016","journal-title":"ACM Trans Multimedia Computing Commun Appl"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2350257"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2450020"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2332139"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2389714"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2281588"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2320522"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2430341"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2316817"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2418252"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2614517"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2880"},{"key":"e_1_2_9_18_1","first-page":"1","article-title":"A video recommendation algorithm based on the combination of video content and social network","author":"Cui L","year":"2016","journal-title":"Concurrency Computat Pract Exper"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3408"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2382639"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2479942"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2533160"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553022"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2593047"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.0337"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389824"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2014.01.001"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.05.013"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.093011.101387"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3572"},{"key":"e_1_2_9_31_1","first-page":"54","article-title":"A survey on mobility models for performance analysis in tactical mobile networks","volume":"2","author":"Aschenbruck N","year":"2008","journal-title":"J Telecommun Inf Technol"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(02)00134-7"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(98)00006-6"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120406"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.081612.111361"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2369612"},{"issue":"11","key":"e_1_2_9_37_1","first-page":"1376","article-title":"Circle packing: a mathematical tale","volume":"50","author":"Stephenson K","year":"2003","journal-title":"Notices of the AMS"},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2403367"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1267104"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.895048"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.100411.100541"},{"key":"e_1_2_9_42_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.0436"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.4078","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.4078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T23:25:22Z","timestamp":1693697122000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.4078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,8]]},"references-count":41,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2017,8,25]]}},"alternative-id":["10.1002\/cpe.4078"],"URL":"https:\/\/doi.org\/10.1002\/cpe.4078","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,8]]}}}