scispace - formally typeset
Search or ask a question

Showing papers by "Nokia published in 2013"


Journal ArticleDOI
12 Nov 2013-ACS Nano
TL;DR: It is shown that the two-dimensional nature of graphene oxide and its superpermeability to water combine to enable humidity sensors with unprecedented response speed (∼30 ms response and recovery times), which opens the door to various applications, such as touchless user interfaces, which is demonstrated with a 'whistling' recognition analysis.
Abstract: Sensors allow an electronic device to become a gateway between the digital and physical worlds, and sensor materials with unprecedented performance can create new applications and new avenues for user interaction. Graphene oxide can be exploited in humidity and temperature sensors with a number of convenient features such as flexibility, transparency and suitability for large-scale manufacturing. Here we show that the two-dimensional nature of graphene oxide and its superpermeability to water combine to enable humidity sensors with unprecedented response speed (∼30 ms response and recovery times). This opens the door to various applications, such as touchless user interfaces, which we demonstrate with a ‘whistling’ recognition analysis.

738 citations


Journal ArticleDOI
TL;DR: A tractable hybrid network model where the positions of mobiles are modeled by random spatial Poisson point process is proposed and derived analytical rate expressions are applied to optimize the two D2D spectrum sharing scenarios under a weighted proportional fair utility function.
Abstract: This paper addresses two fundamental and interrelated issues in device-to-device (D2D) enhanced cellular networks. The first issue is how D2D users should access spectrum, and we consider two choices: overlay (orthogonal spectrum between D2D and cellular UEs) and underlay (non-orthogonal). The second issue is how D2D users should choose between communicating directly or via the base station, a choice that depends on distance between the potential D2D transmitter and receiver. We propose a tractable hybrid network model where the positions of mobiles are modeled by random spatial Poisson point process, with which we present a general analytical approach that allows a unified performance evaluation for these questions. Then, we derive analytical rate expressions and apply them to optimize the two D2D spectrum sharing scenarios under a weighted proportional fair utility function. We find that as the proportion of potential D2D mobiles increases, the optimal spectrum partition in the overlay is almost invariant (when D2D mode selection threshold is large) while the optimal spectrum access factor in the underlay decreases. Further, from a coverage perspective, we reveal a tradeoff between the spectrum access factor and the D2D mode selection threshold in the underlay: as more D2D links are allowed (due to a more relaxed mode selection threshold), the network should actually make less spectrum available to them to limit their interference.

416 citations


Journal ArticleDOI
01 Mar 2013
TL;DR: From the analysis, it is shown that several aggregated features obtained from smartphone usage data can be indicators of the Big-Five traits and described a machine learning method to detect the personality trait of a user based on smartphone usage.
Abstract: In this paper, we investigate the relationship between automatically extracted behavioral characteristics derived from rich smartphone data and self-reported Big-Five personality traits (extraversion, agreeableness, conscientiousness, emotional stability and openness to experience). Our data stem from smartphones of 117 Nokia N95 smartphone users, collected over a continuous period of 17 months in Switzerland. From the analysis, we show that several aggregated features obtained from smartphone usage data can be indicators of the Big-Five traits. Next, we describe a machine learning method to detect the personality trait of a user based on smartphone usage. Finally, we study the benefits of using gender-specific models for this task. Apart from a psychological viewpoint, this study facilitates further research on the automated classification and usage of personality traits for personalizing services on smartphones.

364 citations


Patent
25 Sep 2013
TL;DR: In this article, a method for pixel-wise joint filtering of depth maps from a plurality of viewing angles is described, which enables to suppress the noise in the depth map data and provides improved performance for a view synthesis.
Abstract: There is disclosed a method, an apparatus, a server, a client and a non-transitory computer readable medium comprising a computer program stored therein for video coding and decoding. Depth pictures from a plurality of viewing angles are projected into a single viewing angle, making it possible to have pixel-wise joint filtering to be applied to all projected depth values. This approach enables to suppress the noise in the depth map data and provides improved performance for a view synthesis.

354 citations


Proceedings ArticleDOI
09 Jun 2013
TL;DR: This paper considers two of the most prominent wireless technologies available today, namely Long Term Evolution (LTE), and WiFi, and addresses some problems that arise from their coexistence in the same band, and proposes a simple coexistence scheme that reuses the concept of almost blank subframes in LTE.
Abstract: The recent development of regulatory policies that permit the use of TV bands spectrum on a secondary basis has motivated discussion about coexistence of primary (e.g. TV broadcasts) and secondary users (e.g. WiFi users in TV spectrum). However, much less attention has been given to coexistence of different secondary wireless technologies in the TV white spaces. Lack of coordination between secondary networks may create severe interference situations, resulting in less efficient usage of the spectrum. In this paper, we consider two of the most prominent wireless technologies available today, namely Long Term Evolution (LTE), and WiFi, and address some problems that arise from their coexistence in the same band. We perform exhaustive system simulations and observe that WiFi is hampered much more significantly than LTE in coexistence scenarios. A simple coexistence scheme that reuses the concept of almost blank subframes in LTE is proposed, and it is observed that it can improve the WiFi throughput per user up to 50 times in the studied scenarios.

324 citations


Patent
25 Apr 2013
TL;DR: In this article, the order of the texture view component and the depth view component in an access unit is determined and at least one indication of the order is encoded, and the decoding of the view component is adapted on the basis of order.
Abstract: There is disclosed a method, apparatus and computer program product in which at least one view component of a first type and at least one view component of a second type are obtained. The order of the texture view component and the depth view component in an access unit is determined and at least one indication of the order is encoded. The coding of the view components is adapted on the basis of the order. There is also disclosed a method, apparatus and computer program product in which at least one encoded view component of a first type and at least one encoded view component of a second type are received. Also at least one encoded indication of the order of the view components is received. The at least one encoded indication is decoded and the decoding of the view component sis adapted on the basis of the order.

319 citations


Patent
19 Apr 2013
TL;DR: In this article, a method for unlocking a touch screen device by providing a touch device in an idle mode is presented, where an area or region displayed on a screen of the device is contacted or activated to reveal at least one application icon associated with an active/unlocked state of the mobile device.
Abstract: A method for unlocking a touch screen device includes providing a touch screen device in an idle mode. An area or region displayed on a screen of the device in the idle mode is contacted or activated to reveal at least one application icon associated with an active/unlocked state of the device. The region is moved, expanded or dragged to an edge of the device to change a state of the device to an active/unlocked mode and activate the revealed application.

276 citations


Proceedings ArticleDOI
02 Jun 2013
TL;DR: A simulator-based system- level analysis in order to assess the network performance in an office scenario shows that LTE system performance is slightly affected by coexistence whereas Wi-Fi is significantly impacted by LTE transmissions.
Abstract: The deployment of modern mobile systems has faced severe challenges due to the current spectrum scarcity. The situation has been further worsened by the development of different wireless technologies and standards that can be used in the same frequency band. Furthermore, the usage of smaller cells (e.g. pico, femto and wireless LAN), coexistence among heterogeneous networks (including amongst different wireless technologies such as LTE and Wi-Fi deployed in the same frequency band) has been a big field of research in the academy and industry. In this paper, we provide a performance evaluation of coexistence between LTE and Wi-Fi systems and show some of the challenges faced by the different technologies. We focus on a simulator-based system- level analysis in order to assess the network performance in an office scenario. Simulation results show that LTE system performance is slightly affected by coexistence whereas Wi-Fi is significantly impacted by LTE transmissions. In coexistence, the Wi-Fi channel is most often blocked by LTE interference, making the Wi-Fi nodes to stay on the LISTEN mode more than 96% of the time. This reflects directly on the Wi-Fi user throughput, that decreases from 70% to ≈100% depending on the scenario. Finally, some of the main issues that limit the LTE/Wi-Fi coexistence and some pointers on the mutual interference management of both the systems are provided.

270 citations


Journal ArticleDOI
Pia Tanskanen1
TL;DR: In contrast to the well-established recycling of metallic scrap, it is much more complicated to recycle electronics products which have reached the end of their life as they contain many different types of material types integrated into each other.

240 citations


Journal ArticleDOI
TL;DR: The two-step approach was found to improve the results substantially compared to the context-independent baseline system, and the detection accuracy can be almost doubled by using the proposed context-dependent event detection.
Abstract: The work presented in this article studies how the context information can be used in the automatic sound event detection process, and how the detection system can benefit from such information. Humans are using context information to make more accurate predictions about the sound events and ruling out unlikely events given the context. We propose a similar utilization of context information in the automatic sound event detection process. The proposed approach is composed of two stages: automatic context recognition stage and sound event detection stage. Contexts are modeled using Gaussian mixture models and sound events are modeled using three-state left-to-right hidden Markov models. In the first stage, audio context of the tested signal is recognized. Based on the recognized context, a context-specific set of sound event classes is selected for the sound event detection stage. The event detection stage also uses context-dependent acoustic models and count-based event priors. Two alternative event detection approaches are studied. In the first one, a monophonic event sequence is outputted by detecting the most prominent sound event at each time instance using Viterbi decoding. The second approach introduces a new method for producing polyphonic event sequence by detecting multiple overlapping sound events using multiple restricted Viterbi passes. A new metric is introduced to evaluate the sound event detection performance with various level of polyphony. This combines the detection accuracy and coarse time-resolution error into one metric, making the comparison of the performance of detection algorithms simpler. The two-step approach was found to improve the results substantially compared to the context-independent baseline system. In the block-level, the detection accuracy can be almost doubled by using the proposed context-dependent event detection.

217 citations


Journal ArticleDOI
TL;DR: Graphene is used as the thinnest possible spacer between gold nanoparticles and a gold substrate, creating a robust, repeatable, and stable subnanometer gap for massive plasmonic field enhancements.
Abstract: Graphene is used as the thinnest possible spacer between gold nanoparticles and a gold substrate. This creates a robust, repeatable, and stable subnanometer gap for massive plasmonic field enhancements. White light spectroscopy of single 80 nm gold nanoparticles reveals plasmonic coupling between the particle and its image within the gold substrate. While for a single graphene layer, spectral doublets from coupled dimer modes are observed shifted into the near-infrared, these disappear for increasing numbers of layers. These doublets arise from charger-transfer-sensitive gap plasmons, allowing optical measurement to access out-of-plane conductivity in such layered systems. Gating the graphene can thus directly produce plasmon tuning.

Journal ArticleDOI
TL;DR: In this article, the authors proposed a method based on general relations between the reflection and transmission coefficients and the polarizabilities of arbitrary bi-anisotropic particles to synthesize different polarization-transforming devices realized as arrays of small particles.
Abstract: We study the possibility of analytically synthesizing different polarization-transforming devices realized as arrays of small particles. The proposed method is based on general relations between the reflection and transmission coefficients and the polarizabilities of arbitrary bi-anisotropic particles. As an example, we reveal all possible types of inclusions which can be used to realize twist polarizers, select one of them and synthesize a novel twist polarizer. The synthesized twist polarizer is then fitted on a standard printed circuit board, optimized numerically, and finally manufactured and measured. The experimental results for the twist polarizer show good correspondence with the simulations and the new method is found to be a useful tool for developing any polarization-transforming devices. As one more example, a novel circular polarization selective surface is synthesized.

Proceedings ArticleDOI
02 Jun 2013
TL;DR: The main objective of METIS is to lay the foundation for this future global mobile and wireless communications system, and to generate a global consensus here.
Abstract: In 2020, mobile and wireless traffic volume is expected to increase thousand-fold over 2010 figures. Moreover, an increase in the number of wirelessly-connected devices to counts in the tens of billions will have a profound impact on society. Massive machine communication, forming the basis for the Internet of Things, will make our everyday life more efficient, comfortable and safer, through a wide range of applications including traffic safety and medical services. The variety of applications and data traffic types will be significantly larger than today, and will result in more diverse requirements on services, devices and networks. METIS is set up by leading global players to prepare the migration towards tomorrow's multi-purpose global communication infrastructure, serving humans and things. The main objective of METIS is to lay the foundation for this future global mobile and wireless communications system, and to generate a global consensus here. In particular, METIS will provide new solutions which fit the needs beyond 2020.

Patent
16 Apr 2013
TL;DR: In this article, a method, an apparatus, a server, a client and a non-transitory computer readable medium comprising a computer program stored therein for motion compensated video coding and decoding is disclosed.
Abstract: There is disclosed a method, an apparatus, a server, a client and a non-transitory computer readable medium comprising a computer program stored therein for motion compensated video coding and decoding. Texture block motion information is used to derive disparity/depth motion information. Alternatively, disparity/depth motion information is used to derive texture block motion information.

Patent
Petri Vuori1, Juhani Kari1, Jari Muurinen1
17 Jun 2013
TL;DR: In this paper, an example embodiment of the present invention, an apparatus (200) comprises a wireless power transmitter (241) connectable to a power supply interface (201) and to a battery (204); power supply detection circuitry (213) configured to determine whether the power supply interfaces are capable of powering the wireless power transmitters (WPTs).
Abstract: In accordance with an example embodiment of the present invention, an apparatus (200) comprises a wireless power transmitter (241) connectable to a power supply interface (201) and to a battery (204); power supply detection circuitry (213) configured to determine whether the power supply interface (201) is capable of powering the wireless power transmitter (241); wireless power control circuitry (220) configured to, in response to determining that the power supply interface (201) is capable of powering the wireless power transmitter (241), enable power delivery from the power supply interface (201) to the wireless power transmitter (241).

Proceedings ArticleDOI
07 Apr 2013
TL;DR: The system performance analysis of 3GPP Long-Term Evolution (LTE) and IEEE 802.11 Wireless Local Area Networks (WLAN) in a situation where LTE downlink has been expanded over to unlicensed frequency band usually used by WLAN is presented.
Abstract: This paper presents the system performance analysis of 3GPP Long-Term Evolution (LTE) and IEEE 802.11 Wireless Local Area Networks (WLAN) in a situation where LTE downlink (DL) has been expanded over to unlicensed frequency band usually used by WLAN. Simple fractional bandwidth sharing mechanism is used to allow both technologies to transmit. The system performance is evaluated by means of fully dynamic network simulations.

Journal ArticleDOI
TL;DR: The dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors, as well as the time durations that a location is covered and uncovered, are studied.
Abstract: We study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors. As sensors move around, initially uncovered locations may be covered at a later time, and intruders that might never be detected in a stationary sensor network can now be detected by moving sensors. However, this improvement in coverage is achieved at the cost that a location is covered only part of the time, alternating between covered and not covered. We characterize area coverage at specific time instants and during time intervals, as well as the time durations that a location is covered and uncovered. We further consider the time it takes to detect a randomly located intruder and prove that the detection time is exponentially distributed with parameter 2λrvs where λ represents the sensor density, r represents the sensor's sensing range, and vs denotes the average sensor speed. For mobile intruders, we take a game theoretic approach and derive optimal mobility strategies for both sensors and intruders. We prove that the optimal sensor strategy is to choose their directions uniformly at random between (0, 2π). The optimal intruder strategy is to remain stationary. This solution represents a mixed strategy which is a Nash equilibrium of the zero-sum game between mobile sensors and intruders.

Proceedings ArticleDOI
08 Oct 2013
TL;DR: This paper introduces uTrack, a technique to convert the thumb and fingers into a 3D input system using magnetic field (MF) sensing, and calculates the magnet's 3D position and tilt angle directly from the sensor readings.
Abstract: While much progress has been made in wearable computing in recent years, input techniques remain a key challenge. In this paper, we introduce uTrack, a technique to convert the thumb and fingers into a 3D input system using magnetic field (MF) sensing. A user wears a pair of magnetometers on the back of their fingers and a permanent magnet affixed to the back of the thumb. By moving the thumb across the fingers, we obtain a continuous input stream that can be used for 3D pointing. Specifically, our novel algorithm calculates the magnet's 3D position and tilt angle directly from the sensor readings. We evaluated uTrack as an input device, showing an average tracking accuracy of 4.84 mm in 3D space - sufficient for subtle interaction. We also demonstrate a real-time prototype and example applications allowing users to interact with the computer using 3D finger input.

Patent
12 Mar 2013
TL;DR: In this article, an improved integrated circuit RF front end to simultaneously transmit and receive signals for radar imaging is presented, which includes a transceiver coupled to a circularly polarized antenna assembly and a phase shifting block circuit configured to perform phase shifting of a local oscillator signal.
Abstract: Apparatus, method, and system example embodiments provide an improved integrated circuit RF front end to simultaneously transmit and receive signals for radar imaging. In an example embodiment, an apparatus comprises a transceiver coupled to a circularly polarized antenna assembly, capable of transmitting circularly polarized signals that are a component of a multi-signal radar beam; a power amplifier configured to amplify a transmit signal, coupled through isolation couplers to the circularly polarized antenna assembly; a phase shifting block circuit configured to perform phase shifting of a local oscillator signal, in response to the receipt of phase control signals, to perform phased-array beam steering of the multi-signal radar beam when the component circular signals are associated with signals transmitted from other transceivers receiving the phase control signals. The apparatus further includes a receiver circuit utilizing a receive phase-shifting circuit coupled to a quadrature down-conversion mixer, for receive beam steering.

Journal ArticleDOI
TL;DR: An extensive set of experiments has been performed to show the benefits of using the proposed framework, using data from the real life of a significant number of users over almost a year of natural phone usage.
Abstract: In this paper, a new framework to discover places-of-interest from multimodal mobile phone data is presented. Mobile phones have been used as sensors to obtain location information from users’ real lives. A place-of-interest is defined as a location where the user usually goes and stays for a while. Two levels of clustering are used to obtain places of interest. First, user location points are grouped using a time-based clustering technique which discovers stay points while dealing with missing location data. The second level performs clustering on the stay points to obtain stay regions. A grid-based clustering algorithm has been used for this purpose. To obtain more user location points, a client-server system has been installed on the mobile phones, which is able to obtain location information by integrating GPS, Wifi, GSM and accelerometer sensors, among others. An extensive set of experiments has been performed to show the benefits of using the proposed framework, using data from the real life of a significant number of users over almost a year of natural phone usage.

Journal ArticleDOI
TL;DR: This work describes an approach to predict failures based on log files using Random Indexing and Support Vector Machines that is very reliable in predicting both failures and non-failures.

Journal ArticleDOI
TL;DR: The mechanism that this group of materials follows to improve their performance will be cleared by explaining how those properties can be exploited in several applications such as photo-catalysts (degradation of pollutants) and photovoltaics (solar cells).
Abstract: Graphene and its derivatives combine a numerous range of supreme properties that can be useful in many applications. The purpose of this review is to analyse the photoelectrochemical properties of pristine graphene, graphene oxide (GO) and reduced graphene oxide (rGO) and their impact on semiconductor catalysts/quantum dots. The mechanism that this group of materials follows to improve their performance will be cleared by explaining how those properties can be exploited in several applications such as photo-catalysts (degradation of pollutants) and photovoltaics (solar cells).

Journal ArticleDOI
TL;DR: In this paper, the authors focus on an important but hitherto neglected aspect of alliance capability by investigating how partnering firms may learn how to better manage their dyadic R&D collaborations.
Abstract: Previous research has maintained that the capacity to manage alliances is a distinct capability, defined as the ability to identify, negotiate, manage, monitor and terminate collaborations. This paper focuses on an important but hitherto neglected aspect of alliance capability by investigating how partnering firms may learn how to better manage their dyadic R&D collaborations. In particular, we seek to test the Nonaka and Takeuchi (1995) model of dynamic knowledge creation by establishing a link between the facilitation of four knowledge conversion processes – socialization, externalization, combination and internalization – and an improved capability to manage inter-organizational R&D processes. We specify and extend the model by identifying and testing several critical interactions between these knowledge conversion processes. Relying on data from 105 R&D partnerships in the global telecommunications industry, we suggest that the failure to support one of these knowledge conversion processes has the pot...

Journal ArticleDOI
TL;DR: In this article, the authors analyzed downlink scenarios using stochastic geometry and formulated a condition for the required number of ABSFs based on base station placement statistics and user throughput requirement, which is a semi-analytical formula that serves as a good initial estimate and offers an easy way to analyze impact of network parameters.
Abstract: In heterogeneous cellular scenarios with macrocells, femtocells or picocells users may suffer from significant co-channel cross-tier interference. To manage this interference 3GPP introduced almost blank subframe (ABSF), a subframe in which the interferer tier is not allowed to transmit data. Vulnerable users thus get a chance to be scheduled in ABSFs with reduced cross-tier interference. We analyze downlink scenarios using stochastic geometry and formulate a condition for the required number of ABSFs based on base station placement statistics and user throughput requirement. The result is a semi-analytical formula that serves as a good initial estimate and offers an easy way to analyze impact of network parameters. We show that while in macro/femto scenario the residue ABSF interference can be well managed, in macro/pico scenario it affects the number of required ABSFs strongly. The effect of ABSFs is subsequently demonstrated via user throughput simulations. Especially in the macro/pico scenario, we find that using ABSFs is advantageous for the system since victim users no longer suffer from poor performance for the price of relatively small drop in higher throughput percentiles.

Journal ArticleDOI
TL;DR: An overview of the Mobile Data Challenge (MDC), a large-scale research initiative aimed at generating innovations around smartphone-based research, as well as community-based evaluation of mobile data analysis methodologies, is presented.

Proceedings ArticleDOI
27 Aug 2013
TL;DR: It is found that users are generally concerned about insiders accessing their data on smartphones and a stronger adversarial model must be considered during the design and evaluation of data protection systems and authentication methods for smartphones.
Abstract: Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this paper, we report the results of a study investigating users' concerns about unauthorized data access on their smartphones (22 interviewed and 724 surveyed subjects). We found that users are generally concerned about insiders (e.g., friends) accessing their data on smartphones. Furthermore, we present the first evidence that the insider threat is a real problem impacting smartphone users. In particular, 12% of subjects reported a negative experience with unauthorized access. We also found that younger users are at higher risk of experiencing unauthorized access. Based on our results, we propose a stronger adversarial model that incorporates the insider threat. To better reflect users' concerns and risks, a stronger adversarial model must be considered during the design and evaluation of data protection systems and authentication methods for smartphones.

Patent
05 Apr 2013
TL;DR: In this article, an approach for processing and/or facilitating a processing of one or more images to determine camera location information, camera pose information, or a combination of them associated with at least one camera capturing the images is presented.
Abstract: An approach is provided for processing and/or facilitating a processing of one or more images to determine camera location information, camera pose information, or a combination thereof associated with at least one camera capturing the one or more images, wherein the camera location information, the camera pose information, or a combination thereof is represented according to a global coordinate system. The approach involves causing, at least in part, an association of the camera location information, the camera pose information, or a combination thereof with the one or more images as meta-data information.

Patent
12 Nov 2013
TL;DR: In this paper, a method for configuring a mobile wireless hotspot in a wireless network is described, which includes establishing, by a mobile hotspot device, a control channel with a wireless device, using an out-of-band communications connection in an outofband communications medium; and exchanging, by the wireless device over the control channel, with the mobile hotspots device, by at least one of transmitting or receiving inband communications connectivity configuration information to enable power saving features and optimize activity times.
Abstract: Example method, apparatus, and computer program product embodiments are disclosed for configuring a mobile wireless hotspot in a wireless network. Example embodiments of the invention include a method comprising: establishing, by a mobile hotspot device, a control channel with a wireless device, using an out-of-band communications connection in an out-of-band communications medium; and exchanging, by the wireless device over the control channel, with the mobile hotspot device, by at least one of transmitting or receiving in-band communications connectivity configuration information to enable power saving features and optimize activity times in an in-band communications tethering connection with the mobile hotspot device in an in-band communications medium, for relaying by the mobile hotspot device, communications between the wireless device and one or more entities in at least one of a wide area communications network and a wireless local area network provided by the mobile hotspot device.

Journal ArticleDOI
TL;DR: Using the considered flexible, adaptive, and intelligent schemes for small cell discovery, significant UE power savings can be achieved with small loss in offloading - giving benefits both on system level as well as in user experience.
Abstract: Heterogeneous network, or HetNet, deployments are one of the key enablers in providing ubiquitous coverage and capacity enhancements for LTE-Advanced networks. They play an important role in achieving high data rate and quality of service requirements defined for next generation wireless networks. In this article we evaluate various cell discovery techniques tailored for energy-efficient detection of small cells deployed in a carrier other than the serving macrocell. The presented schemes are evaluated using extensive system simulations conducted in a 3GPP LTE-Advanced HetNet scenario. Shortcomings of the currently standardized mechanism are analyzed, and advantages of the evaluated schemes are presented. Both the offloading opportunity utilization and savings in UE battery power consumption are analyzed. The results show that using the considered flexible, adaptive, and intelligent schemes for small cell discovery, significant UE power savings can be achieved with small loss in offloading - giving benefits both on system level as well as in user experience.

Journal ArticleDOI
Di Wei1, Jani Kivioja1
TL;DR: This review focuses on the most recent advances in the study of pure graphene properties and novel energy solutions based on these properties and includes graphene metrology and analysis of both intellectual property and the value chain for the existing and forthcoming graphene industry.
Abstract: Graphene attracts intensive interest globally across academia and industry since the award of the Nobel Prize in Physics 2010. Within the last half decade, there has been an explosion in the number of scientific publications, patents and industry projects involved in this topic. On the other hand, energy is one of the biggest challenges of this century and related to the global sustainable economy. There are many reviews on graphene and its applications in various devices, however, few of the review articles connect the intrinsic properties of graphene with its energy. The IUPAC definition of graphene refers to a single carbon layer of graphite structure and its related superlative properties. A lot of scientific results on graphene published to date are actually dealing with multi-layer graphenes or reduced graphenes from insulating graphene oxides (GO) which contain defects and contaminants from the reactions and do not possess some of the intrinsic physical properties of pristine graphene. In this review, the focus is on the most recent advances in the study of pure graphene properties and novel energy solutions based on these properties. It also includes graphene metrology and analysis of both intellectual property and the value chain for the existing and forthcoming graphene industry that may cause a new ‘industry revolution’ with the strong and determined support of governments and industries across the European Union, U. S., Asia and many other countries in the world.