The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents diffraction measurements, analysis, and signal strength prediction models around objects such as corners, pillars, and irregular objects, at 10, 20, and 26 GHz. The diffraction measurements were conducted indoors and outdoors by using a continuous wave (CW) channel sounder with three pairs of identical directional horn antennas at the transmitter and receiver. The measurement results...
Under the real-time electricity pricing environment in smart grid, building owners are faced with the indoor temperature control problem to minimize the daily electricity cost. Taking the heating scenario as an example, an intuitive strategy is to maintain the building's indoor temperature always at the lower bound of the predetermined comfort range. However, this strategy may not always achieve the...
As the most widely used standards for wireless local area network (WLAN), IEEE 802.11 standards are continuously amended by introducing new techniques so as to meet the increasing demands. In order to verify the performance of amended protocols, network simulation is considered as a significant method. However, as far as we know, current simulation tools are only for either media access control layer...
Cognitive radio (CR) is considered as a key enabling technology for dynamic spectrum access to improve spectrum efficiency. Although the CR concept was invented with the core idea of realizing "cognition", the research on measuring CR cognition capabilities and intelligence is largely open. Deriving the intelligence capabilities of CR not only can lead to the development of new CR technologies,...
The rapid advances in wireless communication and sensor technologies facilitate the development of viable mobile-Health applications that boost opportunity for ubiquitous real- time healthcare monitoring without constraining patients' activities. However, remote healthcare monitoring requires continuous sensing for different analog signals which results in generating large volumes of data that needs...
This paper analyzes the performance of information and energy beamforming in multiple-input multiple- output (MIMO) wireless communications systems, where a self-powered multi-antenna hybrid access point (AP) coordinates wireless information and power transfer (WIPT) with an energy-constrained multi-antenna user terminal (UT). The wirelessly powered UT scavenge energy from the hybrid AP radio-frequency...
Many online social networks have provided a messenger app (e.g., facebook messenger, direct message on Twitter) to facilitate communication between strong- tied friends. Meanwhile, some messenger apps (WeChat) also start to offer social-networking services ("WeChat Moments" (WM), a.k.a. friend circle) that allow users to post pictures, texts, links of webpages, on their walls, which is called...
Data shuffling is one of the fundamental building blocks for distributed learning algorithms, that increases the statistical gain for each step of the learning process. In each iteration, different shuffled data points are assigned by a central node to a distributed set of workers to perform local computation, which leads to communication bottlenecks. The focus of this paper is on formalizing and...
Multipath routing, which is increasingly common in today's Internet, can lead two end-hosts to own multiple routing paths. This will impose adverse effects on most of the current network measurement methods, as they generally need to assume a single active path between any pair of end-hosts at any given time. In this paper, we attempt to identify whether multipath routing exists between two end-hosts...
This paper considers the design of hybrid precoders and combiners for mmWave MIMO systems with per-antenna power constraints and the additional limitations introduced by the phase-shifting network in the analog processing stage. Previous hybrid designs were obtained using a total power constraint, but in practical implementations per-antenna constraints are more realistic, specially at mmWave, given...
Security issues in unmanned aerial vehicle (UAV) networks attract the attention of both industry and research community. This is due to the large number of attacks that can target such networks with a goal for instance to jam the communication, disturb the network operation, inject wrong data, etc. In this paper, we propose and implement a cyber security system to protect the UAVs against the most...
We study energy-efficient secure link adaptation for large-scale device-to-device (D2D) underlaid cellular networks, where base stations (BSs), D2D transmitters, and eavesdroppers (Eve nodes) are distributed as independent homogeneous Poisson point processes. First, we analyze the impact of the underlaid D2D network on the secrecy performance, i.e., secrecy spectral efficiency (SE) and secrecy energy...
Emerging Information-Centric Networking (ICN) architectures seek to optimally utilize both bandwidth and storage for efficient content distribution over the network. The Virtual Interest Packet (VIP) framework has been proposed to enable joint design of forwarding, caching, and congestion control strategies within the Named Data Networking (NDN) architecture. While the existing VIP algorithms exhibit...
Evolving nature of network traffic challenges existing models to fit and predict its behavior. In particular, real traffic modeling requires more flexible design that can adapt to long-range and short-range dependent traffic with dynamic patterns. Unfortunately, existing models cannot handle such requirements because various traffic behaviors such as periodic and self-similar are not taken into account...
This paper generalizes the piggybacking constructions for distributed storage systems by considering various protected instances and piggybacked instances. Analysis demonstrates that the proportion of protected instances determines the average repair bandwidth for a systematic node. The generalized codes cost much less repair bandwidth than the previous piggybacking codes by optimizing the proportion...
Signal compression is essential for energy and bandwidth efficient communication and storage systems. In this paper, we provide two practical approaches for source compression of noisy sparse and non-strictly sparse (compressible) sources. The proposed schemes are based on channel coding theory to construct a source encoder that decreases the number of transmitted bits while preserving the fidelity...
We investigate the energy efficiency (EE) maximization problem under the scenario of Device-to-Device (D2D) communications underlaying cellular networks. By jointly considering time-varying channels and stochastic arrivals, we propose a distributed power allocation algorithm for both D2D user groups (DUGs) and cellular user terminals (CUTs) with long- term quality of service (QoS) provision. To effectively...
Abstract-We consider a partially interdependent network and develop mathematical equations relating the fractional size of the connected component of the network, surviving the cascading failure, to the intra-layer degree distribution of the nodes. We show that these system equations can be mathematically analyzed and closed form expressions for the metrics of robustness can be obtained for the Erdos-Renyi...
As next-generation mobile networks are rapidly taking shape driven by the target standardization requirements and initial trial implementations, a range of accompanying technologies prepare to support them with more reliable wireless access and improved service provisioning. Among these are more advanced spectrum sharing options enabled by the emerging Licensed Shared Access (LSA) regulatory framework,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.