The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract-We consider a partially interdependent network and develop mathematical equations relating the fractional size of the connected component of the network, surviving the cascading failure, to the intra-layer degree distribution of the nodes. We show that these system equations can be mathematically analyzed and closed form expressions for the metrics of robustness can be obtained for the Erdos-Renyi...
Motivated by the observation that energy harvesting (EH) from radio-frequency (RF) signal is subject to fluctuations, multiple EH-enabled relays are employed to collaboratively enhance data communications in a device-to-device (D2D) network underlying a cellular system. Each relay is equipped with a single antenna and unable to harvest energy and transmit data simultaneously. Thus, the D2D user equipment...
This paper considers the physical-layer secrecy design for full-duplex (FD) bidirectional communications in the presence of an eavesdropper (Eve). The goal of this work is to maximize the sum secrecy rate (SSR) of the bidirectional transmissions via appropriately designing the transmit covariance matrices at the legitimate nodes. To this end, we propose an alternating difference-of-concave (ADC) approach...
This paper studies a robust beamforming optimization problem of minimizing total transmit power in a distributed manner in the presence of imperfect channel state information (CSI) in multicell interference networks. Due to the fact that worst- case is a rare occurrence in practical network, this problem is constrained to satisfying a set of signal-to-interference-plus-noise-ratio (SINR) requirements...
Modern cellular networks utilising the long-term evolution (LTE) and the coming 5G set of standards face an ever-increasing demand for low-latency mobile data from connected devices. Header compression is employed to minimise the overhead for IP-based cellular network traffic, thereby decreasing the overall bandwidth usage and, subsequently, transmission delays. We employ machine learning approaches...
Motivated by the massive and increasing number of online messaging service users, the idea of utilizing short-range device-to-device (D2D) communication has been adapted to the access of instant messaging services on-the-go, introducing a D2D-based messaging service (D2D-Msg) paradigm that promises higher data rate and longer battery life. The quality of message dissemination in such a new paradigm,...
Predictive Resource Allocation (PRA) has demonstrated its ability to provide smooth video delivery with minimal and fair interruptions. Recent work on PRA techniques exploited rate predictions to strategically allocate the limited radio resources for delivering video content. However, existing PRA techniques assume perfect prediction of future information in order to define the maximum attainable...
This paper addresses the problem of maximizing the weighted signal-to-interference-plus-noise-ratio (SINR) targets at user terminals in a distributed manner in multicell interference networks. The optimization is constrained to strict individual base station (BS) transmit power limitations in the presence of imperfect channel state information (CSI). This problem is numerically intractable due to...
A blink is one of physiological signals that indicates a consciousness level or a drowsiness. Using a Doppler sensor is one solution to realize non- contact blink detection without cameras. However, it is difficult to detect blinks using a Doppler sensor because of low signal to noise power ratio (SNR) of reflected signal from an eyelid. We previously proposed the blink detection method based on machine...
In this paper, we investigate the problem of robust congestion control in infrastructure-based cognitive radio networks (CRN). We develop an active queue management (AQM) algorithm, termed MAQ, based on multiple model predictive control (MMPC). The goal is to stabilize the TCP queue at the base station (BS) under disturbances from the varying service capacity for secondary users (SU). The proposed...
Single-carrier frequency-domain equalization (SC-FDE) with multi-input multi-output (MIMO) has been recognized as an alternative technology to orthogonal frequency-division multiplexing (OFDM) MIMO for broadband wireless communication systems, especially for the uplink transmission. Conventional studies focused on the FDE design with the assumption of perfect channel estimation. In this paper, we...
In this paper, we study the robust relay selection and power allocation problems for orthogonal frequency division multiplexing (OFDM) based cooperative cognitive radio networks (CRNs) with channel uncertainties. The objective is to maximize the capacity of the cooperative CRN, which is subject to the interference threshold constraints of primary users (PUs) and the total transmit power limitation...
Identifying influential spreaders in online social networks (OSNs) has long been an important but difficult problem to be addressed. Distinguished from previous works that mainly focused on the stationary features of users' influence, we systematically study the variations of users' spreading capability given the fact that influential spreaders are more likely to be the targets of various cyber attacks...
The presence of ambient light is a key challenge for reliable and robust low cost embedded visible light communication system. The photodetector used by these systems can perform poorly when subjected to bright ambient light or fluctuating ambient light. To solve this problem, we present an ambient light cancellation mechanism for low cost embedded LED to photodiode communication systems that utilizes...
Link capacity dimensioning is the periodic task where ISPs have to make provisions for sudden traffic bursts and network failures to assure uninterrupted operations. This provision comes in the form of link working capacities with noticeable amounts of headroom, i.e., spare capacities that are used in case of congestions or network failures. Distributed routing protocols like OSPF provide convergence...
In the era of Internet of Things, WiFi fingerprinting based indoor positioning system (IPS) has been recognized as the most promising IPS for indoor location-based service. Fingerprinting-based algorithms critically rely on a fingerprint database built from machine learning methods, and extreme machine learning (ELM) is preferred for its fast training speed. However, traditional WiFi based IPS usually...
This paper considers a robust precoder design for MIMO-OFDM systems with insufficient cyclic prefix (CP). Interference alignment is utilized to formulate the precoder design problem as a bit error rate (BER) minimization problem subject to a total power constraint. To this end, the precoder is designed to be robust to the errors in the available channel estimates, by considering the worst-case BER...
In this paper, we study resource allocation for secondary users (SUs) in underlay full-duplex cognitive networks, where the channel state information of the links between SUs and primary users (PUs) is uncertain. To protect the transmission of the PUs from interference generated by the SUs, we utilize robust optimization theory to characterize the channel uncertainty and formulate a resource allocation...
We study the secrecy capacity of the multiple- input single-output (MISO) Gaussian wiretap visible light communication (VLC) channel. We study a typical VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. Specifically, we compute the achievable secrecy rate for various input signaling distributions, including the truncated generalized normal (TGN) and uniform distributions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.