The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The evolution of Cloud Computing has been highlighted by the ubiquitous access to resources and intermittent communication for everyone that follows it. This work focuses on the effect of Cloud Computing in Education, especially on the way the educational process (e.g., special laboratory courses) can be leveraged by the use of this evolving technology, taking advantage of the possibility to practice...
This paper presents a software defined passive optical intra-rack network SD-POIRN based on optical couplers in data centers. It proposes a software defined medium access control mechanism SD-MAC to schedule the intra- rack data transmissions. The SD-MAC utilizes the Max- Min Fair Share bandwidth allocation algorithm. We perform network evaluations in terms of network cost, power consumption and performance...
Ultra broadband mobile communication is a key requirement of fifth generation (5G) wireless cellular networks. To fulfill this requirement much larger bandwidth is needed which can be delivered in millimeter band from 30 to 300 GHz. Beam formed transmission over a massive MIMO (m-MIMO) structure is an essential element of a millimeter wave (mmwave) system to compensate the large air propagation loss...
In this paper, we consider a new framework under which a sequential subgraph construction and thus detection is achieved via communications among a set of active nodes following a random codebook over a Boolean noiseless multiple access (MAC) channel. Based on a probabilistically generated codebook and shared between transmitters and receiver, the receiver sequentially removes edges or vertices from...
In distributed storage systems, network coding can be used for reducing the amount of storage required to achieve the same level of reliability, compared with the current three-duplication schemes. However, in the case of a node failure, extra repair cost is required to generate a repair node. Meanwhile, to retrieve a certain amount of data, additional data may be downloaded to perform the necessary...
In this paper, we propose a mathematical framework for downlink heterogeneous networks (HetNets) involving cell load factors, which measure the average resource consumption. Due to mutual interference, the cell load levels of different tiers are in general coupled with each other in a nonlinear manner. By leveraging tools from stochastic geometry, we compute the average cell load levels across tiers...
We propose a lightweight, direct, and spatial domain packet prioritization framework for joint image compression and wireless transmission, which provides high Quality of Experience (QoE) for energy-constrained wireless multimedia communications. In the proposed framework, both the spatial domain image compression and the wireless communication bit packing strategies are co-designed in a scalable...
The cyclic prefix (CP) alignment is an appealing technique for achieving multiple goals such as peak-to-average power ratio (PAPR) reduction, out- of-band (OOB) leakage suppression, and physical layer (PHY) security. It generates a perturbation signal which is aligned with the CP duration of orthogonal frequency division multiplexing (OFDM) symbols after it passes through the channel. The original...
Wireless-powered communications will entail short packets due to naturally small payloads, low-latency requirements and/or insufficient energy resources to support longer transmissions. In this paper, a wireless-powered communication system is investigated where an energy harvesting transmitter, charged by a power beacon via wireless energy transfer, attempts to communicate with a receiver over a...
This paper explores methodologies, advantages and challenges related to the use of Information Centric Networking (ICN) for realizing distributed spatial databases. Our findings show that the ICN functionality perfectly fits database requirements: routing-by-name can be used to dispatch queries and insertions, in-network caching to accelerate queries, and data-centric security to implement secure...
Full-duplex device-to-device (D2D) communications over cellular networks is a promising solution for maximizing wireless spectral efficiency. However, in practice, due to the unpredictable arrival of D2D users, the base station (BS) must smartly allocate suitable channels to arriving D2D pairs. In this paper, the problem of dynamic channel allocation is studied for full-duplex D2D networks. In particular,...
A key challenge for ensuring self-organization capabilities in the Internet of things (IoT) is that wireless devices must be able to adapt to the network's unpredictable dynamics. In the lower layers of network design, this means the deployment of highly adaptive protocols capable of supporting large numbers of wireless ``things'' via intelligent interference mitigation and online power control. In...
In this paper we present an optimal dimensioning for drone small cells. We extend the traditional models to include transmitter antenna gain patterns and wireless channel multi- path fading. We show that for the enhanced model there exists an optimal drone height which ensures the best performance in terms of various metrics. This analysis and optimization is achieved by averaging performance metrics...
We consider an energy harvesting two-way channel with processing costs, where the transmitters incur a processing cost per unit time as long as they are on for transmitting or receiving data. Such processing costs force users to perform bursty transmissions. We develop an online power scheduling algorithm where the transmitters determine their transmit powers and burst durations based only on the...
Message importance measure (MIM) is an important index to describe the message importance in the scenario of big data. Similar to the Shannon Entropy and Renyi Entropy, MIM is proposed to characterize the uncertainty of a random process and some related statistical characteristics. Moreover, MIM also needs to highlight the importance of those events with relatively small occurring probabilities, thereby...
Building penetration loss is a vital parameter for radio- system design in wireless communication. In this paper, measurement results of penetration loss are presented for two typical materials used for building construction such as glass and wood. The measurements were conducted over a wide frequency range from the centimeter-wave band to the millimeter-wave band (i.e., from 2 GHz to 74 GHz). This...
Cloud infrastructure providers need reliable performance analysis tools for their nodes. Moreover, the analysis of Virtual Machines (VMs) is a major requirement in quantifying cloud performance. However, root cause analysis, in case of unexpected crashes or anomalous behavior in VMs, remains a major challenge. Modern tracing tools such as LTTng allow fine grained analysis - albeit at a minimal execution...
Full-duplex radio, expected to double the spectral efficiency, is one of the promising technologies for fifth generation communication. To overcome self-interference, which is a main obstacle to full-duplex radio, various self-interference cancellation (SIC) techniques have been developed. For digital SIC, the nonlinearity of a transmitter occurred by a power amplifier is a main bottleneck. The nonlinear...
User-centric wireless access virtualization (WAV) allows each user to be served by a set of carefully selected transmission points (TP)s forming a user-specific virtual base-station (uVBS) adapted to its environment and quality of service (QoS) requirement. In this way, this new concept breaks away from the conventional cell-centric architecture to provide boundaryless communications in future 5G...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.