The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract-We consider a partially interdependent network and develop mathematical equations relating the fractional size of the connected component of the network, surviving the cascading failure, to the intra-layer degree distribution of the nodes. We show that these system equations can be mathematically analyzed and closed form expressions for the metrics of robustness can be obtained for the Erdos-Renyi...
To maintain the interest of both energy supplier and demand side consumers in the electricity market, in this paper, we propose a Nash bargaining demand side management scheme that optimizes the demand loads to achieve a balanced interest distribution. We formulate the power distribution problem by the Nash bargaining framework, where the optimization objective, defined as social benefit, is product...
To achieve a significant boost on capacity performance in the next generation (5G) cellular network, novel radio access technologies (RAT) are demanded to make the system more spectrum efficient. As a promising multiple access scheme for 5G cellular network, non-orthogonal multiple access (NOMA) has attracted extensive research attention recently. Existing works show that NOMA posses the potential...
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
Radio frequency (RF) recharging can extend maintenance-free operation of wireless sensor networks. However, the period between recharging is limited by the distance between the most distant sensor node and the master which sends out recharging pulses. To increase this period, we propose a scheme in which nodes are logically grouped into circular zones centered at the master, so that nodes in a given...
We demonstrate for the first time an analytical model for computing the end to end packet delay of an Optical/Wireless 60GHz Radio-over-Fiber (RoF) network operating under the Medium-Transparent MAC (MT-MAC) protocol. The model takes into account contention both at the optical and the wireless layer, effectively incorporating the MT-MAC mechanism for seamless and dynamic capacity allocation over both...
The correlation of interference has been well quantified in Poisson networks where the interferers are independent of each other. However, there exists dependence among the base stations (BSs) in wireless networks. In view of this, we study the interference correlation in non-Poisson networks where the interferers are distributed as a Matern cluster process (MCP) and a second-order cluster process...
Big data processing is rapidly growing in recent years due to the immediate demanding of many applications. This growth compels industries to leverage scheduling in order to optimally allocate the resources to the big data streams which requires data-driven big data analysis. Moreover, optimal scheduling of big data stream process should guarantee the QoS requirements of computing tasks. Execution...
In recent years, a significant amount of research has been conducted to explore the benefits of network coding in different scenarios, from both theoretical and simulation perspectives. In this paper, we utilize queueing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks, and study throughput of inter-flow network coding. We analytically determine...
License-assisted access (LAA) is a candidate feature in 3GPP Rel-13 to meet the explosive growth of traffic demand. The main idea of LAA is to deploy LTE in the unlicensed band (mainly the 5GHz band), which is abundant with available spectrum. However, the major concern is the coexistence between WiFi and LAA in the same band. This paper presents a new framework to evaluate the downlink performance...
In this paper, an analytical framework is developed to study the performance of opportunistic channel bonding in IEEE 802.11 WLANs. Specifically, we consider a WLAN operating on multiple channels shared by both legacy users and IEEE 802.11ac users with channel bonding capability. By capturing the opportunistic channel bonding from the IEEE 802.11ac users in the primary channel and the random access...
The exponential growth in data traffic and dramatic capacity demand in fifth generation (5G) has inspired the move from traditional single-tier cellular networks towards heterogeneous cellular networks (HetNets). To face the coming trend in 5G, the high availability requirement in new applications, needs to be satisfied to achieve low latency service. In this work, we present a tractable multi-tier...
Recent trends in mobile cellular networks turn towards deployment of Small Cell Networks (SCNs), where the cell size gets smaller and thus the number of subscribers served in a cell will be relatively smaller and should be considered finite. However, almost works on cellular mobile networks consider an infinite population cell, resulting commonly in infinite queueing models, for which no analytical...
Future hybrid vehicle networks can use both Vehicle-to- Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communications to provide reliable, timely, scalable, and media-rich services. In this paper, we investigate the problem that how to disseminate the data to the Road Side Unit (RSU) considering bidirectional transmissions, using vehicles to store-carry-and-forward the messages if possible, in...
Cooperation in cellular networks has been recently suggested as a promising scheme to improve system performance. In this work, clusters are formed based on the Mutually Nearest Neighbour relation, which defines which stations cooperate in pair and which do not. When node positions follow a Poisson Point Process (PPP) the performance of the original clustering model can be approximated by another...
Network Function Virtualization (NFV) enables mobile operators to virtualize their network entities as Virtualized Network Functions (VNFs), offering fine-grained on-demand network capabilities. VNFs can be dynamically scale-in/out to meet the performance desire and other dynamic behaviors. However, designing the auto-scaling algorithm for desired characteristics with low operation cost and low latency,...
Measures of complex network analysis, such as vertex centrality, have the potential to unveil existing network patterns and behaviors. They contribute to the understanding of networks and their components by analyzing their structural properties, which makes them useful in several computer science domains and applications. Unfortunately, there is a large number of distinct centrality measures and...
This paper presents an analytical comparison of active and passive receiver models in diffusive molecular communication. In the active model, molecules are absorbed when they collide with the receiver surface. In the passive model, the receiver is a virtual boundary that does not affect molecule behavior. Two approaches are presented to derive transforms between the receiver signals. As an example,...
Power ramping is one of the mechanisms proposed to help alleviate congestion during random access in LTE cells. We evaluate its performance taking into account preamble SINR considerations as well as Physical Downlink Control Channel (PDCCH) deficiency. Our results show that power ramping can speed up access at small to moderate loads, but that it is actually detrimental at moderate to high loads,...
Directional narrow beams are used in the millimeter wave systems to provide sufficient array gains to overcome the severe pathloss as well as boost the system throughput. However, the directional link can be easily blocked by obstacles and incurs outage when the system is surrounded by many random obstacles. The blockage impediment of the millimeter wave system could be very critical and must be clearly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.