The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Provides an abstract for each of the plenary presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
In traditional cellular networks, cell edge users suffer from severe interference. This paper considers a cell free network scenario that multiple base stations (BSs) serve a group of users without cell boundary. Each user can only be served by its own BS according to the traditional cellular network paradigm, while in the user centric cell free network, users can be associated with multiple nearby...
The newly proposed sparse-code multiple-access (SCMA) has been shown to approach the single-user performance even the overload reaches 150% when message passing algorithm (MPA) detection is applied. Obviously, combined with multiple-input multiple-output (MIMO) techniques, the spectrum efficiency of SCMA system can be further improved. While maximum likelihood (ML) detection is optimal for MIMOSCMA,...
Small cell networks are considered one of the key technologies in the next generation wireless networks. One of the main challenges in this area of research is how to tackle the problems of interference and resource allocation, especially for the hyper dense deployment of small cells. In this paper, we study the problem of cooperative interference mitigation in a small cell network. In particular,...
Energy-efficient design has emerged as a promising technique in heterogeneous networks. We study the energy efficiency problem of joint user association and power allocation in a two-tier heterogeneous network with small cells. The energy efficiency is maximized under certain prescribed quality-of-service requirement and maximum power limit constraint. The original optimization problem is a nonconvex...
This paper proposes a destination and moving direction information based probabilistic routing protocol, called Advanced DIP (ADIP), for vehicular ad hoc networks (VANETs). The ADIP protocol uses different strategies for routing and data forwarding in different network scenarios. For a high-density scenario, it only considers the position of a neighbor in selecting the next hop for forwarding a data...
This paper considers the optimal energy-efficient transmission policy in time-sharing multiuser systems with a hybrid energy harvesting transmitter. The system operation energy is supplied by a constant energy source which is driven by a non-renewable resource and an energy harvester which harvests energy from its surrounding environment. Our goal is to maximize the energy-efficient transmission of...
We improve upon our previous upper bound on the secrecy capacity of the wiretap channel with multiple transmit antennas and single-antenna receivers, with noisy main channel state information (CSI) at the transmitter (CSI-T). Specifically, we show that if the main CSI error does not scale with the power budget at the transmitter $\bar{P}$, then the secrecy capacity is bounded above essentially by...
Network Function Virtualization (NFV) explores the virtualization technologies to offer Network-as-a- Service (NaaS) through connected virtual network functions. The network operations that were previously performed by specialized hardware are consolidated as software-based virtual network functions (VNFs). These VNFs can be implemented in the telecom clouds with high volume servers, switches and...
Heterogeneous cloud small cell network (HCSNet) with energy harvesting is a promising technique in the next generation mobile communications. However, the cross- tier and co-tier co-channel interference can be severe due to the spectrum sharing in inter-tier and intra- tier of HCSNet. This paper investigates the problem of power allocation and subchannel assignment with the consideration of cross-tier/co-tier...
Degraded provisioning provides an effective solution to flexibly allocate resources in various dimensions to reduce blocking for differentiated demands when network congestion occurs. In this work, we investigate the novel problem of online degraded provisioning in service-differentiated multi-layer networks with optical elasticity. Quality of Service (QoS) is assured by service-holding-time prolongation...
In Underwater Sensor Networks (UWSNs) with high volume of data recording activity, a mobile sink such as a Autonomous Underwater Vehicle (AUV) can be used to offload data from the sensor nodes. When the AUV approaches the underwater node, it can use high data rate optical communication. However, the data is not considered delivered when it was transferred from the sensor node to the AUV, but when...
Massive MIMO systems, where base stations are equipped with hundreds of antennas, are an attractive way to handle the rapid growth of data traffic. As the number of users increases, the initial access and handover in contemporary networks will be flooded by user collisions. In this work, we propose a random access procedure that resolves collisions and also performs timing, channel, and power estimation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.