The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ultra-reliable and low latency communications is envisioned to enable new services and applications with high reliability, availability and low latency, e.g, factory automation, Tactile Internet. Device-to-device communication is one such mean that allows devices to experience benefits in terms of shorter communication latency. Currently most device-to-device communication in frequency-division duplex...
Cloud radio access network (C-RAN) has been shown to reduce both capital and operating expenditures and provide high spectral efficiency (SE) and energy efficiency (EE). High density of remote radio heads (RRHs) deployments results in inefficient energy consumption. Moreover improvements in the battery capacity of mobile devices lag far behind the surging demand for transmit power, which makes power...
Future mobile networks are known to deploy a two-tier architecture of macrocell — femtocell [1]. In the two-tier architecture, femtocell downlink channels can cause strong co-channel interference to downlink transmission of macrocell users (MUs) which use the same frequency. The co-channel downlink interference to the MU might cause the MU's QoS degradation. To maintain the QoS of the MU's connection,...
Due to the open access nature of wireless communication environment, physical layer security has brought increasingly high attention in recent years, attempting to protect the confidential communication away from eavesdroppers. In contrast to the current secrecy designs, which generally exploit the spatial Degree-of-Freedom (DoF) (e.g. MIMO and cooperative relay approaches) or the temporal DoF (e...
In cellular mobile wireless networks, nonlinear channel fading is always a critical factor which will scientifically deteriorate the Quality of Service (QoS) for the users. However, it is difficult to describe the nonlinear channel fading by precise mathematical model because of its complexity. So, the control of wireless networks becomes an especial tough work. In this paper, a power and rate control...
The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This attack by denying the normal operation of the service detracts from the purpose of these systems. In general, a jamming attack is difficult to detect given the little experimental data provided by the...
To mitigate performance anomalies due to different transmission rates and to improve throughput performance in ad-hoc networks, a previous work has proposed a new method called user cooperative mobility. It also showed that the method achieved good improvement when users appropriately move. However, it only employed theoretical evaluation which does not include detailed behavior such as capture effect...
Penetration of multimedia communications with mobile Wi-Fi and tethering requires wireless LANs (WLANs) to guarantee a specific bandwidth in densely deployed WLANs. IEEE802.11e (HCCA) with 802.11aa could use inefficiently radio frequency as well as fail to provide each WLAN with enough CFP period in which sending opportunity of a terminal is guaranteed. To guarantee a specific bandwidth even in densely...
Inter-Cell Interference Coordination (ICIC) techniques are proposed as solutions to alleviate the negative impact of interference on system performance, while enhancing the provided Quality of Service (QoS). Typically, the available bandwidth is divided into inner and edge sub-bands. Users are also classified into interior and edge users. The available resources in each zone are exclusively allocated...
Vehicle-to-vehicle (V2V) communication which supports ubiquitous information exchange and content sharing among vehicles with little or no human intervention becomes a key enabler for intelligent transportation industry. In this paper, we adopt a two-hop relay transmission mode to maximize the total spectrum efficiency of a device-to-device (D2D) based vehicular cooperative network while ensuring...
In vehicle-to-vehicle (V2V) communication underlaying cellular networks, interference between cellular users (CUEs) and V2V users (VUEs) can be severe. To address this issue, many studies focused on designing resource allocation schemes to mitigate uplink interference. Most of them investigated the instantaneous resource allocation. In this paper, however, we consider a highway scenario where CUEs'...
Recently, the development of wireless body area network (WBAN) is accelerated due to rapid development of wireless technology. In the WBAN environment, many WBANs coexist where communication ranges overlap with each other, resulting in the possibility of interference. Since many variety of applications exist in the WBAN environment, each prospective user may have different quality of service (QoS)...
This paper addresses the shared resource contention problem associated with the auto-parallelization of running queries in distributed stream processing engines. In such platforms, analyzing a large amount of data often requires to execute user-defined queries over continues raw-inputs in a parallel fashion at each single host. However, previous studies showed that the collocated applications can...
Future mixed-criticality systems must handle a growing variety of traffic requirements, ranging from safety-critical real-time traffic to bursty latency-sensitive best-effort traffic. Additionally, safety standards (e.g. ISO 26262) require sufficient independence among different criticality levels for mixed-criticality systems. Networks-on-Chip (NoCs), as a scalable and modular interconnect, are used...
This paper applies the theory of Evolutionary Game to QoS routing algorithm for wireless mesh networks which can not only improve the performance of traditional QoS routing protocols but also be able to reduce the cost of the routing algorithm.
The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However, LPWA networks rely on variations of uncoordinated spectrum access, either for data transmissions or scheduling requests, thus imposing a scalability problem...
Lambda architecture is a novel event-driven serverless paradigm that allows companies to build scalable and reliable enterprise applications. As an attractive alternative to traditional service oriented architecture (SOA), Lambda architecture can be used in many use cases including BI tools, in-memory graph databases, OLAP, and streaming data processing. In practice, an important aim of Lambda's service...
The lack of available radio spectrum and inefficiency in its usage necessitate a new communication paradigm requiring to exploit the existing spectrum opportunistically. One of the perspective spectrum sharing methods, which is currently under a heavy investigation by academia and industry as well across whole Europe, is called Licensed Shared Access (LSA). This novel technology allows for controlled...
A secrecy transmission method with robust power control is investigated in this paper for a downlink two-tier femtocell network, where an eavesdropper attempts to wiretap the legitimate macrocell users. Considering the imperfect channel gains, a probability constraint robust optimization problem is formulated to satisfy the quality-of-service (QoS) of users. We aim to maximize the secrecy rate with...
This paper targets empirical voice and video quality assessment in mobile networks and presents fundamental QoS testing methods in correlation to RF indicators. The paper focuses on the most critical performance parameters for real-time services (e.g. voice) such as call drop vs. poor coverage in UMTS. The empirical study was based on a clearly defined drive test scenario with predetermined routes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.