The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet has become a fundamental platform for virtually all social, economical and security activities in modern societies. Monitoring widespread events on the Internet has many important applications in social trend studies and distributed intrusion/attack detection. This paper studies the problem of distributed joint detection of widespread events observed by the collaborating network devices...
To maintain the interest of both energy supplier and demand side consumers in the electricity market, in this paper, we propose a Nash bargaining demand side management scheme that optimizes the demand loads to achieve a balanced interest distribution. We formulate the power distribution problem by the Nash bargaining framework, where the optimization objective, defined as social benefit, is product...
This paper addresses the problem of In-phase/Quadrature (I/Q) imbalance sensitivity of communication systems when it occurs at both Transmitter (TX) and Receiver (RX) sides of an optical coherent system. A novel blind technique is proposed based on the pseudo-rotation of the M-QAM constellation. The pseudo-rotation based compensator is a generic approach, because it does not depend on the modulation...
This work introduces MultiSphere, a method to massively parallelize the tree search of large sphere decoders in a nearly-independent manner, without compromising their maximum-likelihood performance, and by keeping the overall processing complexity at the levels of highly-optimized sequential sphere decoders. MultiSphere employs a novel sphere decoder tree partitioning which can adjust to the transmission...
The newly proposed sparse-code multiple-access (SCMA) has been shown to approach the single-user performance even the overload reaches 150% when message passing algorithm (MPA) detection is applied. Obviously, combined with multiple-input multiple-output (MIMO) techniques, the spectrum efficiency of SCMA system can be further improved. While maximum likelihood (ML) detection is optimal for MIMOSCMA,...
With the explosive growth of smart devices and mobile data traffic, limited fronthaul capacity has become a notable bottleneck of green communication access networks, such as cloud radio access networks(C-RANs). In this paper, we proposed a joint user association and downlink beamforming scheme for green C-RANs to minimize the network power consumption with the limited fronthaul links. We first formulate...
In this paper, we show that by investigating inherent time delays between different users in a multiuser scenario, we are able to cancel interference more efficiently. Time asynchrony provides another tool to cancel interference which results in preserving other resources like frequency, time and code. Therefore, we can save the invaluable resource of frequency band and also increase spectral...
In Underwater Sensor Networks (UWSNs) with high volume of data recording activity, a mobile sink such as a Autonomous Underwater Vehicle (AUV) can be used to offload data from the sensor nodes. When the AUV approaches the underwater node, it can use high data rate optical communication. However, the data is not considered delivered when it was transferred from the sensor node to the AUV, but when...
Random linear network coding (RLNC) has been shown to efficiently improve the network performance in terms of reducing transmission delays and increasing the throughput in broadcast and multicast communications. However, it can result in increased storage and computational complexity at the receivers end. In our previous work we considered the broadcast transmission of large file to N receivers. We...
Abstract-We consider the problem of designing constellation sets for multistage systems for high spectral efficiencies. In particular we will focus on two-stage systems where the cascaded decoding stages are associated to three types of receivers with different complexities and performances. The optimal receiver (S) processes the symbol LLR and delivers the maximum possible throughput, the simpler...
The next generation mobile communication system (5G) needs to address the challenges stemming from the performance requirements in diverse technical scenarios, such as low power massive connections for machine type communications (MTC). Heterogeneous Network (HetNet) has been identified as a promising network architecture for 5G. In HetNets, traffic offloading can be exploited to effectively improve...
We consider extensions of orthogonal matching pursuit (OMP) and oblique matching pursuit (ObMP) detectors for generalized space shift keying (GSSK). In particular, the maximum a posteriori (MAP) principle is incorporated with the OMP/ObMP so that the posteriori ratio can be maximized iteratively. Due to the fact that the posteriori ratio cannot be evaluated at the receiver unless the activated transmit...
In this paper, we develop a joint channel estimation and decoding method for faster-than-Nyquist signaling (FTNS) transmitting over (quasi-static) time-varying frequency-selective fading channels based on the variational Bayesian (VB) framework. In contrast to existing methods, ours is capable of performing explicit frequency-domain channel estimation and decoding in a turbo mode without requiring...
Current DSL systems cancel FEXT in both downstream and upstream directions using a technique called vectoring. FEXT is cancelled even when two or more bonded pairs serve the same subscriber. In this paper, we propose a method to exploit FEXT between these lines rather than mitigating it. FEXT across the lines serving different subscribers will still be cancelled. This system may be considered a multi-user...
An uplink cognitive radio system with a single primary user (PU) and multiple secondary users (SUs) is considered. The SUs have an individual average delay constraint and an aggregate average interference constraint to the PU. If the interference channels between the SUs and the PU are statistically different due to the different physical locations of the SUs, the SUs will experience different delay...
We propose a Coordinated Non-Orthogonal Multiple Access (CO-NOMA) scheme for resource allocation in the context of mobile networks. NOMA refers to schemes where multiple users can access the wireless channel in the same frequency band simultaneously. In this study, we consider NOMA with power domain multiplexing, where the near- far property in space is exploited through appropriate power allocations...
Recently, smartphones are increasingly used in situation-aware applications, e.g. determining the way of transportation when an individual is going outside. However the existing methods of transportation mode classification often suffer from high computing complexity and unsatisfactory accuracy. In this paper we present EasiTMC, a two-stage hierarchical classification framework which consists of coarse-...
For polar codes, cyclic redundancy check (CRC)-aided successive cancellation list (CA-SCL) decoder has attracted increasing attention from both academia and industry. In this paper, a hardware efficient and low-latency CA-SCL polar decoder based on distributed sorting is first proposed. For path metric (PM) sorting of each level, a distributed sorting (DS) algorithm is proposed to reduce the comparison...
In this paper we consider a constant envelope pilot signal based carrier frequency offset (CFO) estimation in massive multiple-input multiple-output (MIMO) systems. The proposed algorithm performs spatial averaging on the periodogram of the received pilots across the base station (BS) antennas. Our study reveals that the proposed algorithm has complexity only linear in (the number of BS antennas)...
As one of the promising candidates for the next generation network, Named Data Networking (NDN) has more advantages than the TCP/IP network in areas such as mobility, content distribution and security. Although NDN is designed to defense the majority Distributed Denial of Service (DDoS) attack in the current Internet, it anticipates some new varietal DDoS attacks. A representative DDoS form is called...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.