The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the resource allocation for the video streaming service in the cognitive radio network (CRN) based on orthogonal frequency division multiple access (OFDMA). Considering the channel estimation error between secondary transmitters (STx) and primary receivers (PRx), we address the probabilistic interference constraint model. With imperfect CSI between STx and secondary receivers...
Mobile edge computing (MEC) has recently emerged as an important paradigm to bring computation and cache resources to the edge of core networks. However, the resources of edge network are relatively limited, so it is necessary to cooperate with data center (DC) which has sufficient computational resources. In this paper, we aim at designing a computation offloading and data caching model under the...
Virtual Network Embedding (VNE) is widely considered as a longstanding challenge in Network Virtualization: how to efficiently embed multiple virtual networks (VNs), with node-link resource requirements, onto the shared substrate network (SN), having finite underlying resources. Most heuristic VNE algorithms in the literature, only considering single network topology attribute and local network resources,...
In this paper, we propose a localization algorithm in a visible light communication (VLC) system based on the light intensity. Firstly, by developing a VLC platform, the light intensity can be measured to derive a practical equation, which reveals the relationship between the received signal strength (RSS) and the distance from the transmitter to the receiver. However, the practical additive noise...
A lot of research has been proposed to improve network performance in the data center. However, with the development of distributed applications, these applications face a new performance bottleneck since existing solutions almost ignore the application level optimization. The concept of coflow has been proposed which provides a chance for us to optimize network in application level rather than individual...
This paper investigates the MAC protocol tailored for wireless sensor networks deployed in the intertidal environment (IT-WSNs) where the ebb and flow of the tide influence the packet transmission. Most packets fail to be delivered when the sensor node is submerged by seawater during high tide. To deal with it, an environment-aware electrode module is designed to detect the tide level and determine...
This paper investigates the ergodic capacity of a multi-input multi-output (MIMO) wireless powered communication system with partial channel state information at the power beacon (PB). Employing time splitting protocol, the PB first transmit energy-bearing signals to the energy constrained source S through beamforming, and then S uses this energy to transmit information to the destination. Unlike...
In this paper, we study the tradeoff of efficiency and delay of Slepian-Wolf distributed source coding (DSC). In the considered network, Machine-Type Communications (MTC) devices transmit correlated data to one base station, the data sources follow a multi-variate Gaussian distribution. To reduce the consumption of communication resources by massive MTC devices, Slepian-Wolf coding is adopted to eliminate...
To satisfy various quality-of-service (QoS) requirements of different services in future fifth generation wireless networks, wireless virtualized network (WVN) architectures have been proposed to concurrently fulfill diversified service demands via network slicing technologies. Considering the dynamic characteristics of wireless channels and user traffic, the resource allocation problem in a WVN with...
Energy efficient cognitive radio networks can simultaneously improve spectrum efficiency (SE) and energy efficiency (EE) of wireless communication networks. This paper studies energy efficient spectrum sensing interval, spectrum sensing energy and transmit power allocation scheme of the secondary user (SU) in CR networks. The EE maximization problem subject to the transmit power constraint and average...
Interference alignment (IA) is a prospective method to manage interference between users in multi-user networks. On the other hand, jamming can be an effective way to combat adversarial eavesdropping for legitimate networks. In this paper, a beneficial jamming scheme is proposed for interference alignment networks. In the scheme, the jammer utilizes its precoding vector to constrain the jamming signal...
In public channels, common signals need to be transmitted omnidirectionally to achieve cell-wide coverage. In this paper, we consider omnidirectional beamforming for common signal transmission in the massive multi-input multi-output (MIMO) scenario. After formulating the task as a max-min optimization problem, we propose a semidefinite programming (SDP) based technique to maximize the minimum received...
In recent years, numbers of non-orthogonal multiple access (NOMA) schemes have been proposed to support the great amounts of wireless connections. However, complex multi-user detection is needed in case that the user power differentiation is not available and simple successive interference cancellation cannot directly apply, which usually incurs unaffordable computational complexity. In this paper,...
In this paper, we investigate the quality of information (QoI) maximization problem by jointly optimizing the sampling rate, packet-dropped rate, and transmit power in wireless sensor networks (WSNs). We consider a complicated but practical scenario, where various tasks with heterogeneous traffic are supported by one WSN simultaneously. Accordingly, the QoI maximization problem is formulated as a...
The recent advances of compressive sensing (CS) have witnessed a great potential of traffic condition estimation in road networks. In this paper, we propose a traffic estimation approach that applies compressive sensing technique to achieve a city-scale traffic estimation with only a small number of vehicle probes. In particular, we construct a new type of random matrix for CS which can significantly...
In this paper, we investigate the modulation order selection and power allocation for energy efficient (EE) orthogonal frequency division multiplexing (OFDM) visible light communication (VLC) systems. Unlike the widely studied Gaussian inputs, we consider that each subcarrier has discrete modulation scheme inputs. Under the constraints of the maximum total transmission power and the minimum spectral...
Expression recognition in the wild is a challenging task because of the interference of various environment. In this paper, we propose a transfer-learning method that utilize two representative transformations from grayscale images as input and fuse their results in decision level to enhance the overall performance, which also address the dimensional mismatch issue when applying pre-trained deep neural...
Employing traditional wireless two-hop relaying is very easy for eavesdropper to overhear message due to the broadcasting nature of transmission. However, relays, which are equipped with caching capabilities to store popular content, can serve the destination directly without fetching messages from source. In order to improve physical layer security, the design of hybrid cache placement becomes more...
As the rapid development of mobile communication technology, smartphones have become indispensable elements in our daily life. Particularly, the increasingly rich smartphone applications (apps) bring great convenience to people while the defects generated in app designing and coding may pose unexpected threats to users. In this paper, we focus on the issue of data leakage between the app client and...
The reversible data hiding is an emerging technology that uses the redundancy of the carrier (typically digital images) to embed secret information and ensure the reversibility of the carrier and hidden information. In recent year, a number of reversible data hiding algorithms based on prediction error expansion have been developed. In prediction error expansion, prediction on the center pixel is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.