The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile sensing, which uses mobile sensors to monitor spatially correlated physical fields, is a promising technique to enhance the flexibility and coverage of wireless sensing systems. However, the position errors of mobile sensors can deteriorate the estimation accuracy of the physical fields. Thus, to optimize the estimation performance, it calls for a trade-off between the resource allocated to...
In this paper, we consider a T \times R massive MIMO system with up to R simultaneous links (T>> R>>1) and nonlinear amplifiers in each transmitter branch. The impact of a nonlinear amplification is analytically studied and accurate expressions for the spectral characterization of the transmitted signals, as well as the bit-error-rate (BER) are derived. The accuracy...
Wearable devices with various sensors are useful instruments to monitor human health. Due to the limited size, these wearable devices, however, always encounter critical energy problem, which further hinders their widely application. Considering that wireless communication dominates the total energy consumption, we make an in-depth study on the problem of communication energy consumption in body sensor...
LTE-WLAN Aggregation (LWA) at Radio Access Network (RAN) level offers better performance compared to other WLAN inter-working and offloading mechanisms due to its tighter integration. In rel.~13, 3GPP standardized an LWA architecture which works at the Packet Data Convergence Protocol (PDCP) layer of LTE eNodeB and provides packet-level steering. But this architecture provides sub-optimal...
Performance anomaly is a well-known problem in 802.11 networks. It refers to the case where the aggregated throughput of the multirate network is degraded by slow rate links due to the fair sharing of transmission opportunities. As a result of growing heterogeneity in 802.11 hardware, the coexistence of slow rate and fast rate links are more common and performance anomaly is considered severer. In...
In this paper, relay selection is considered to enhance security of a cooperative system with multiple threshold-selection decode-and-forward (DF) relays. Threshold-selection DF relays are the relays in which a predefined signal-to-noise ratio is set for the condition of successful decoding of the source message. We focus on the practical and general scenario where the channels suffer from independent...
Cognitive radio emerges as a promising technology to improve the utilization of the allocated spectrum. In a cognitive radio network, secondary users (SUs) need to sense the spectrum to obtain currently available channels and have to vacate the occupied channels when primary users (PUs) return. In cognitive radio networks, establishing a link through a common available channel is defined as the rendezvous...
In this paper, we investigate the sustainable resource allocation for green Cloud Radio Access Networks (C-RAN) powered by renewable energy. Specifically, the Base Station pool (BS pool) in the C-RAN distributes data to a set of remote radio heads (RRHs) with energy harvesting (EH) capability, and allocates sub-carriers to the selected RRHs for downlink transmissions, by jointly considering the user...
Download delay is a crucial performance metric in distributed storage systems as it greatly impacts user experience. Recently, plenty of research has pointed out that coding can reduce delay compared with replication. However, almost all previous studies only focus on the case in which all of the users require the same size of files and hence must download all files of a codeword and ignore the case...
In this paper, we consider the channel estimation problem in millimeter wave (mmWave) wireless systems with large antenna arrays. By exploiting the inherent sparse nature of the mmWave channel, we develop a novel rate-adaptive channel estimation (RACE) algorithm, which can adaptively adjust the number of required channel measurements based on an expected probability of estimation error (PEE). To this...
Nowadays, the sufficient quality-of-service (QoS) provision for mobile applications remains a major challenge in any wireless network. Conventional sufficient QoS provision techniques using resource allocation, data scheduling, and cross-layer optimization have been proposed to tackle this problem. Nevertheless, due to the unpredictable nature of wireless channel conditions, the QoS improvements resulting...
Abstract-Research efforts to incorporate multicast and broadcast transmission into the cellular network architecture are gaining momentum, particularly for multimedia streaming applications. Layered division multiplexing (LDM), a form of nonorthogonal multiple access (NOMA), can potentially improve unicast throughput and broadcast coverage with respect to traditional orthogonal frequency division...
Determining an optimal placement for active measurement points in an arbitrary network topology is challenging. Software-defined infrastructure and the virtualization of network functions imply that re-optimized placement is needed frequently to keep up with dynamic changes in the infrastructure. We present a novel genetic algorithm that was defined for optimizing the placement of active measurement...
Recently, Unmanned Aerial Vehicle (UAV) networks attracts a lot of interest as one of promising research areas since it can be used for a large portfolio of relevant applications. Among several issues in UAV networks, a collision avoidance among multiple UAVs should be addressed due to its significance. Furthermore, a barrier-coverage is considered as an important coverage concept because it is also...
Device-to-Device (D2D) communication is one of the key technologies to get to very high data rates in future 5G networks through offloading part of the cellular traffic onto D2D networks. While extensive research is targeted on addressing the many challenges D2D brings along in cellular networks, security issues have not gained much attention, especially that the direct connections between proximity...
This paper studies how to determine an optimal order of recovering interdependent Cyber Physical Systems (CPS) after a large scale failure. In such a CPS, some failed devices must be repaired first before others can. In addition, such failed devices require a certain amount of repair resources and may take multiple stages to repair. We consider two scenarios: 1) reserved model where all the required...
The idea of combining spatial modulation (SM) with massive multiple-input multiple-output (MIMO) system, i.e. massive SM-MIMO, has recently attracted plenty of academic interest, as it could simultaneously harness the advantages of SM and massive MIMO. However, the spectral efficiency (SE) analysis for massive SM-MIMO is still lack of exploring. To this end, a novel SE expression is derived in this...
The popularity of personal devices has been creating a new location-based content era, where users produce, share and access content anytime and anywhere. Mobile devices in the same area can cooperate to each other by using a Device-to-Device (D2D) communication and maximize the usage of network resources and allow the creation of new applications and experiences. In this paper, we investigate the...
The very high mobility of the nodes in Vehicular Adhoc Networks (VANET) increases the rate at which the handoff occurs. This motivates researchers to investigate the novel strategies for channel allocation such that the handoff becomes transparent. At the same time the utilization of the channels need to be effective in order to enhance the QoS. Hence this paper proposes a channel reservation procedure...
The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes. In such a scheme, the secrecy rate is considered as a function of the maximum achievable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.