The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new framework for compressive video sensing (CVS) that exploits the inherent spatial and temporal redundancies of a video sequence, effectively. The proposed method splits the video sequence into the key and non-key frames followed by dividing each frame into the small non-overlapping blocks of equal sizes. At the decoder side, the key frames are reconstructed using adaptively...
In recent decades, due to limitation of radio spectrum and increasing users in wireless networks, spectral efficiency has been a considerable issue in literatures. In addition, energy consumption is rapidly increasing in wireless communications due to growing demand for wireless technologies especially cellular networks. Therefore, energy efficiency has become an important issue in such networks....
Communities are basic units of complex networks and understanding of their structure help us to understand the structure of a network. Communities are groups of nodes that have many links inside and few links outside them. Community detection in a network can be modeled as an optimization problem. We can use some measures such as Modularity and Community Score for evaluating the quality of a partition...
In this paper, we formulate an optimization problem for resource allocation and scheduling in orthogonal frequency division multiple access (OFDMA) half-duplex decode-and-forward (DF) relay assisted networks. Our problem formulation takes into account artificial noise generation to combat a multiple antenna eavesdropper. The secrecy data rate, power, and sub-carrier allocation policies are optimized...
We considered the grid generation problem of computation of a grid over a given domain from the knowledge of the domain boundary. A simple grid generation method based on the direct computing of grid curves was proposed. The grid curves wer constructed in u-direction and v-direction by two formulas with the shape parameters, seperately. By choosing different shape parameters, different grid curves...
Aiming at the optimization problem of recycling channel of waste electronic products, the channel efficiency and its lost of the waste electronic products with recycling based on four different models are discussed in the paper. The research shows that the expected revenue values of used electronic products are the motive factors of recycling activities, the channel efficiency lose is happened in...
A computationally efficient methodology is proposed to solve infinite horizon intertemporal optimization problem which appears in the areas of management and economics. Such a problem involves local instability emerging from the interaction of the discount rate in future. An algorithm based on modal space reduction and state parameterization is designed which approximates the performance functional...
Interference alignment is a new technique recently proposed in physical layer wireless communications research, which purposely align the interference among multiple users thus increase the efficiency of channel use. This paper proposes a new method to enhance throughput of multi-hop wireless networks by utilizing interference alignment at physical layer. At first, it takes a simple network with only...
This paper presents a hardware architecture for an embedded real-time generalized predictive control (GPC) algorithm based on the state-of-the-art Customizable Advanced Processor (CAP9) technology from Atmel; targeting automotive active suspension systems. The GPC algorithm relies on the solution of an optimization problem at every sampling period. Profiling shows that matrix operations consume the...
Biological weapons are difficult and expensive to detect. Within a limited budget, we can afford a limited number of bio-weapon detector stations. It is therefore important to find the optimal locations for such stations. A natural idea is to place more detectors in the areas with more population - and fewer in desert areas, with fewer people. However, such a commonsense analysis does not tell us...
The rate region of the two-terminal vector Gaussian CEO problem is studied. A lower bound on the rate region is derived. It is obtained by lower-bounding a weighted sum rate for each supporting hyper plane of the rate region. The bound is in the form of a closed-form expression rather than the form of an optimization problem.
Probability intervals and random sets are special cases of interval-valued probability measures. In this paper, we analyze the relationship between a probability interval and a random set. We provide a construction of a random set for a given probability interval. This construction is easier to apply than an existence construction.
Admission control plays an important role in providing Quality of Service (QoS) guarantees for wireless mesh networks (WMNs). Multipath routing can improve network performance in reliability and load balancing. However, when the multipath routing are adopted in 802.11-based WMNs, the transmission with bandwidth assurance is facing rigorous challenges. In this paper, a novel joint design of multipath...
Several studies have shown that the BGP protocol adopts a special routing policy such that the default BGP route is usually not the best choice in terms of path length or quality of service. In order to send the traffic through the shortest AS paths by overlay routing, we have to place overlay nodes at several critical points along such paths. Otherwise, these AS paths will never be available to end...
We consider the Noisy MIMO Interference Channel (IFC) with linear transmitters and receivers and full CSI. The maximization of the Weighted Sum Rate (WSR) or transceiver design for Interference Alignment (IA) lead to cost functions with many local optima. Deterministic annealing is an approach that allows to track the variation of the known solution of one version of the problem into the unknown solution...
In this paper, resource allocation and scheduling in an orthogonal frequency division multiple access (OFDMA) downlink network is studied. The considered problem is modeled as an optimization problem which takes into account a multiple antenna eavesdropper and artificial noise generation for secure communications. Power, secrecy data rate, and subcarrier allocation are optimized for maximization of...
In this paper, we study the selfish behavior in wireless sensor networks and apply a game theory method to address this problem in a CSMA/CA protocol. More specifically, we formulate the Media Access Control (MAC) layer activity in sensor networks as an optimization problem in terms of the random accessing problem. Then we propose a distributed algorithm for the system to reach the Nash Equilibrium...
We consider the network with two kinds of traffic: inelastic and elastic traffic. The inelastic traffic requires fixed throughput, high priority while the elastic traffic has controllable rate and low priority. Giving the fixed rate of inelastic traffic, how to inject the elastic traffic into the network to achieve the maximum utility of elastic traffic is solved in this paper. The Lagrangian Duality...
White space means spatially (or temporally) unused spectrum and this can be used on a unlicense basis. Since protecting primary users from harmful interference is the most important issue in unlicensed spectrum access on a secondary basis, regulatory authorities mandate the use of geolocation and DB (database) access capability as interference avoid scheme. The main role of this white space DB is...
Delivering desired QoS to the applications is one of the most important challenges in next generation networks. Designing efficient queue management in midway nodes leads to improvement in NGN efficiency. This paper presents fair Efficient active Queue Management (EQM) mechanism for congestion avoidance and control in next generation networks. Proposed AQM mechanism uses instantaneous queue length...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.