The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is well-know that carrier frequency offset in the subcarriers of orthogonal frequency division multiplexing (OFDM) leads to intercarrier interference (ICI); therefore, system degradation occurs. Nevertheless, this issue may effectively be mitigated via the pulse shaping filter method. In this manuscript, we present the improved double jump linear combination (IDJLC) function. With the goal of minimizing...
While metric learning is important for Person reidentification (RE-ID), a significant problem in visual surveillance for cross-view pedestrian matching, existing metric models for RE-ID are mostly based on supervised learning that requires quantities of labeled samples in all pairs of camera views for training. However, this limits their scalabilities to realistic applications, in which a large amount...
In this paper, we propose PreDA-a preferencebased truthful double auction for dynamic spectrum access (DSA) networks where multiple heterogeneous spectrum bands are sold by the primary users and bought by the secondary users. We consider channels' heterogeneity and multi-bids from buyers, and also consider buyers' preferences for the channels. We use the signal to interference and noise ratio (SINR)...
This paper considers a frequency-division-duplexing (FDD) massive multiple-input multiple-output (MIMO) system that operates with two-stage beamforming based on user grouping. In this system, we propose a first stage beamformer and a user grouping method for the two-stage beamforming. The proposed first stage beamformer maximizes an approximate sum rate calculated from the second-order statistic of...
The explosive growth of wireless devices requires more aggressive and balanced spectrum sharing and the listen-before-talk (LBT) is still a superior candidate protocol for a high device density. The Modified hardcore point process (HCPP) type II model provides mathematically tractable performances for such LBT networks, but it underestimates the LBT performances. In this regard, this paper evaluates...
In next generation cellular networks, small cell base stations (BSs) with ultra-dense deployments are likely to cooperate together to manage interference and provide users with high data rates. But users may still experience large drops in throughput due to lack of available resources even with high received signal strength. In this paper, we propose a congestion-aware user-centric cooperative BS...
Coordinated multipoint transmission (CoMP) and soft frequency reuse (SFR) are two popular techniques used to control the deleterious effects caused by inter-cell interference in current 4G and envisaged 5G cellular networks. The performance of the combination of CoMP and SFR has been shown to be strongly influenced by the specific choice of the parameters governing the action of both mechanisms. Unfortunately,...
We investigate the problem of person search in the wild in this work. Instead of comparing the query against all candidate regions generated in a query-blind manner, we propose to recursively shrink the search area from the whole image till achieving precise localization of the target person, by fully exploiting information from the query and contextual cues in every recursive search step. We develop...
MU-MIMO proposed in 802.11ac is to achieve higher data rate, with transmitting to multiple users concurrently. However, the overhead cost by collecting channel state information (CSI) sometimes even overwhelm real data transmission when quantity of user is large, which leads the network and unscalable. In this work, we address the problem with adaptive location-based CSI feedback compression (LFC),...
Although the base station processing and the majority of the protocols of the wireless systems are standardized by 3GPP, the receiver architecture and implementation remain vendor-dependent. The receiver design should fulfill computational efficiency requirements, and be evaluated in practical simulators or emulators that are compliant with real-world wireless standards. In this paper, we provide...
The use of direct device-to-device (D2D) communications is expected to drastically increase the spatial frequency reuse significantly improving the capacity of forthcoming fifth generation (5G) cellular systems. The number of D2D pairs operating within the same channel that can be supported in a certain area of interest is limited by the interference imposed by them on each other. In an inherently...
In cellular networks, end-users receive wireless network services only by a base station (BS). Device-to-device (D2D) communication is a new paradigm in cellular network that enables end-users to communicate with each other in an ad hoc manner using single or multi-hops. The communication can be realized both with and without the support of the cellular network infrastructure. A major challenge associated...
Recently multi-agent patrolling became more and more crucial in security, monitoring, etc. applications. It can be used, for example, to monitor points of interest in space, such as measurement points or entrances to a guarded area. A good patrolling strategy would ensure frequent visits to all points of interest defined by a user. A variety of centralized and distributed approaches exist already...
Many online application services are now provided by cloud-deployed VM clusters. Although economical, VMs in the cloud are prone to interference due to contention for physical resources among colocated users. Worse, this interference is dynamic and unpredictable. Current provider-centric solutions are application-oblivious and are thus not always aware of the user's SLO requirements or application...
Caching at the edge is a promising technique to cope with the increasing data demand in wireless networks. This paper analyzes the performance of cellular networks consisting of a tier macro-cell wireless backhaul nodes overlaid with a tier of cache-aided small cells. We consider both static and dynamic association policies for content delivery to the user terminals and analyze their performance....
Modifying the logic at register transfer level can help to protect a circuit against counterfeiting or illegal copying. By adding extra gates, the outputs can be controllably corrupted. Then the circuit operates correctly only if the right value is applied to the extra gates. The main challenge is to select the best position for these gates, to alter the circuit's behaviour as much as possible. However,...
Machine-type communications (MTC), considered as one of potential technologies in 5G, has attracted more and more attention in recent years. Massive MTC connection density but with small data rate leads to preamble deficiency and network congestion in the network. In order to solve this problem, we jointly utilize the back off strategy and the hierarchical access control method. We formulate a Quality...
Energy efficiency (EE) is becoming one of the important criteria in wireless transmission design. This paper discusses the recently proposed energy-efficient transmit beamforming designs for multicell multiuser multiple-input single-output (MISO) systems, including maximizing overall network EE, sum weighted EE and fairness EE. Generally, the EE optimization problems are NP-hard nonconvex programs...
Anomalies of multitier services running in cloud platform can be caused by components of the same tenant or performance interference from other tenants. If the performance of a multitier service degrades, we need to find out the root causes precisely to recover the service as soon as possible. In this paper, we argue that cloud providers are in a better position than tenants to solve this problem,...
In a virtualized heterogeneous cluster, for a distributed parallel application which runs in multiple virtual machines (VMs) concurrently, there are a huge number of possible ways to place its VMs. This paper investigates a performance estimation technique for distributed parallel applications in virtualized heterogeneous clusters. We first analyze the effects of different VM configurations on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.