Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Device-to-Device (D2D) communications are promising technologies to improve the spectrum efficiency, network throughput, and transmission latency for short-range communications in underlaid cellular networks. In this paper, we investigate the resource allocation for multiple D2D pairs in underlaid cellular networks. By utilizing the Power Emission Density-based interference modeling method, the impact...
This paper investigates secrecy efficiency (SE) optimization in a friendly full-duplex (FD) decode- and-forward (DF) relay network with a passive eavesdropper. Targeting on SE maximization, the power allocation is optimized subject to the total power and minimum secrecy rate constraints adapting to the assumption of unknown eavesdropper's channel state information (CSI). By exploiting the properties...
Vehicle-to-everything (V2X) communications, enabled by cellular device-to-device (D2D) links, have recently drawn much attention due to its potential to improve traffic safety, efficiency, and comfort. In this context, however, intracell interference combined with demanding latency and reliability requirements of safety vehicular users (V-UEs) are challenging issues. In this paper, we study a resource...
This paper studies the application of non-orthogonal multiple access (NOMA) to a cooperative multicast system (termed CM-NOMA). In particular, the multicast subscribers are served as secondary users underlaying a primary user. To enhance the secondary user fairness and compensate for the primary user, a two-stage cooperative strategy is proposed by selecting a certain secondary user to perform NOMA...
The development of the self-interference cancellation techniques enables wireless nodes to work with the full duplex (FD) mode. In cooperative relay networks, however, FD relay (FDR) may not always outperform the half-duplex relay (HDR) due to the residual self-interference (RSI). On the other hand, the hybrid HD/FD relay strategy can adaptively facilitate the network performance. This paper investigates...
This work investigates the performance for D2D enabled wireless caching in distributed storage system by taking the typical erasure correcting code namely maximum distance separable (MDS) into consideration. Targeting on the minimization of the transmission cost for content sharing, the spectrum resource allocation is optimized based on their statistical channel state information (CSI). To evaluate...
Wireless caching using device-to-device (D2D) communications is a promising approach for reducing delivery delay and improving spectrum efficiency and energy efficiency. In addition to the physical link condition, social behaviors are also of great importance for effectiveness enhancement of the D2D-based wireless caching schemes. In this work, we focus on resource allocation including power and spectrum...
This work studies secrecy enhancement for socially enabled communications in cellular device-to-device (D2D) underlay through resource allocation. By analyzing the impact of social characteristics of those involved D2D users (DUs), proper selection of transmitters and friendly jammer nodes with appropriate power and spectrum allocation can facilitate secrecy transmission. First, we select D2D transmitter...
With the rising growth trend of data size in the Internet era, storage, analysis, and processing of big data arebecomingamong the strongtopics in academia and industry. Typical big data processing platforms adopt the MapReduce programming model to perform application processing. For example, the deployment and calculation method of Hadoop are as follows: Hadoop first collects data and stores them...
Multi-NoC (multiple network-on-chip) has demonstrated its advantages in power gating for reducing leakage power. This work presents Chameleon, a novel heterogeneous Multi-NoC design. Chameleon employs a fine-grained power gating algorithm which exploits power saving opportunities at different levels of granularity simultaneously. Integrated with a performance-aware traffic allocation policy, Chameleon...
Multi-radio multi-channel (MR-MC) networks contribute significant enhancement in the network throughput by exploiting multiple radio interfaces and non-overlapping channels. While throughput optimization is one of the main targets in allocating resource in MR-MC networks, recently, the network energy efficiency is becoming a more and more important concern. Although turning on more radios and exploiting...
In this paper, a resource allocation model is constructed, based on the Double Multi-Attribute Auction (DMAA) mechanism. Firstly, multiple attributes are taken into account to form the Quality Index (QI), which is used to comprehensively evaluate consumers' and providers' performance in the transactions. Secondly, a Support Vector Machine (SVM) algorithm is adopted to predict the price. Finally, the...
This paper investigates the problem of resource and power allocation in device-to-device (D2D) underlays given a specific secrecy rate constraint. The objective is to optimize the pairing of D2D links with cellular user equipment (CUE) uplink channel resources, and to allocate their respective powers to combat against eavesdroppers for secrecy rate improvement. The proposed method first determines...
This paper proposes a novel clustering scheme by incorporating both social and physical relationships among wireless terminals for Device-to-Device (D2D) communications. Given the explosive growth of online social networking activities, social interactions among mobile users and people's social behaviors can have strong impact on the efficiency of D2D cluster communications. We exploit the well known...
In this paper, we study the power allocation for both regenerative and non-regenerative relay transmission over Rayleigh fading channels in cognitive networks. Based on the analyses of features of cognitive networks, a relevant interference model is first built over Rayleigh fading channels. Then, we propose a combined power allocation strategy in order to minimize the outage probabilities in the...
In this paper, we investigate a freight empty cars allocation problem in railway network. Considering the dynamic time periods, a time-space network is firstly developed. Then a stochastic optimization model is constructed for the allocation of empty freight cars in stochastic environment, whose objective is to minimize the total cost consisting of the cost in a planning horizon incurred by transferring...
This work studies security-oriented cooperation schemes, addressing three possible cooperation scenarios, namely the jammer only, relay only and the relay-jammer pair. The cooperation scheme is adaptively selected according to the security requirement and network's operational conditions. The selection of a relay or/and a jammer as well as their transmit power are jointly optimized with the objective...
In cloud systems, it is non-trivial to optimize task's execution performance under user's affordable budget, especially with possible workload prediction errors. Based on an optimal algorithm that can minimize cloud task's execution length with predicted workload and budget, we theoretically derive the upper bound of the task execution length by taking into account the possible workload prediction...
This paper proposes a cluster-based optimal relay and jammer selection (CB-ORJ) scheme to deal with interception and improve the secrecy rate in wireless multi-hop networks in the presence of both intra-cluster and inter-cluster eavesdroppers. We first present a novel mathematical model of cluster-based secure transmission. Furthermore, we propose an on-demand relay and jammer selection approach based...
In this paper we present a hybrid multicast and unicast transmission scheme with superposition coding (SC), i.e., the multicast and unicast signals are overlaid across the entire time and frequency domain. In the SC scheme, the multicast and unicast signals are superimposed and transmitted by BS, in each transmission the superimposed multicast signals are transmitted to a multicast group, while the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.