The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Complex field network coding (CFNC) enables a one-to-one mapping between the source signal vectors and the received signals. CFNC outperforms other physical layer network coding methods which decode the received signal as a combination of source signals. However, the linear constellation pre-coding (LCP) scheme adopted by CFNC to compute complex coefficients is developed for MIMO system, which is...
Using network coding, multiple-access relay channel makes a breakthrough at its performance. In order to further improve the performance of the uplink, a bit-interleaved coded modulation scheme with iterative decoding (BICM-ID) using joint coding differential modulation is designed. Specifically, it uses DE-16QAM of gray mapping mode matched with convolution code. Research has proved that in terms...
Transmission in wireless sensor network (WSN) is energy intensive and time consuming. To solve this problem, combination of Analog Network Coding (ANC) and Compressed Sensing (CS) scheme is proposed to save transmission and time slots cost (TSC) in chain-type topology. In this paper, the WSN is divided into many rectangular areas. Then each rectangular area is divided into many clusters, and head...
This paper investigates the resource allocation problem for uplink multiple-access relay channels (MARC) with network coding. Firstly, the difference between traditional relay channels and MARC is presented, and then a joint optimization problem considering power allocation and relay selection is formulated to maximize the sum-rate under total power constraint. The optimal algorithm is proposed by...
This paper investigates enhanced Inter-Cell Interference Coordination (eICIC) techniques for Heterogeneous Networks (HetNets), and models this strategic coexistence as a multi-player system in which interference management strategies inspired from a form of reinforcement learning known as distributed Q-learning are devised. Specifically, this paper focuses on time domain eICIC techniques in which...
In order to achieve good user experience, data center services usually operate under deadline constraints. Besides, data center services typically employ Partition/Aggregate algorithms which result in bursts of short query traffic with tight deadlines. This paper proposes a Deadline and Size aware TCP scheme (DSTCP) for datacenter networks, which adjusts the congestion window size of a flow according...
An upgradable broadcasting service enabled all-optical OFDM-PON architecture based on centralized comb source is proposed. Optical frequency comb generator based on a re-circulating frequency shifter for our OFDM-PON system is illustrated. The configuration employs only one light source to support 8 optical network units for downstream, upstream and broadcasting services.
An integral optimization framework of WLAN design is proposed to enhance the WLAN performance from different stages of WLAN deployment. This framework mainly includes four core stages to optimize the WLAN network: a) efficient AP deployment, b) intelligent channel assignment and power control, c) load balancing across APs, and d) good WLAN management. The researchers or network administrators are...
Router virtualization technology allows multiple router instances to run on the same physical platform. And two features of high performance and flexible resource scheduling are the main challenges for the design of virtual router. In this paper, we firstly analyze, discuss and illustrate the features and limitations of the existent virtual router models proposed by research communities to support...
Cognitive Radio Network is a key solution to improve the spectrum utilization by enabling unlicensed users (Secondary Users) to exploit the spectrum in an opportunistic manner. Since secondary users are temporary visitors to the licensed spectrum (Primary Users), they should vacate the spectrum once a primary user reclaims it. This process has a large overhead for secondary users. This overhead includes...
Vehicular Ad Hoc Networks (VANETs) offer great prospects for the future intelligent transportation system (ITS), which are receiving much attention thanks to the wide variety of services they can provide a lot of work and research around the globe is being conducted to define the standards for VANETs, which depend on the vehicles themselves to provide network functionality rather than the traditional...
The incremental efforts needed to study the relationship between Customer Satisfaction and service performances deserve more attention. This paper pays attention to Product KQIs (Key Quality Indicators), and proposes a novel approach for this study. By developing special processes to normalize data, select training samples, and determine the network model, Artificial Neural Network (ANN) is applied...
Network virtualization, as a fundamental technology of Future Internet Architecture, has been used to overcome the ossification of the current Internet. This paper focuses on virtual nodes splitting for aggregating the diverse physical resources in the issue of virtual network embedding (VNE), which is used for the resource allocation in network virtualization. A mixed integer programming (MIP) problem...
The rapid development of the Internet facilitates our lives in many aspects. More and more business will be done through Internet. Under such circumstances, enough attention must be given to the information security, of which the identity authentication is one important problem. In the traditional authentication scheme, the user provides the username and static password to service provider, but there...
TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Although the session hijacking is not in the forefront of everyone mind, it still remains a commonly used attack in MANET. Session hijack attacks are defined as taking over an active TCP/IP communication session without their permission or knowledge. When implemented successfully,...
Cloud storage system can reshape the way how kinds of contents are generated, stored and distributed on today's Internet. It is intriguing to study the service provision of cloud storage system for the sake of providing global users with satisfactory service. This paper conducts modeling analysis of a cloud storage system, and proposes a Markov decision process modeling framework to analyze the reliability...
In the paper, the hybrid model of particle swarm optimization and least square support vector machine is proposed to network signal processing and network intrusion detection, and PSO is utilized to select the parameters of support vector machine simultaneously. In the study, KDDCUP99 datasets are adopted to research the network intrusion detection performance of the hybrid model of particle swarm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.