The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The high risk of random access collisions leads to huge challenge for the deployment massive Machine-Type Communications (mMTC), which cannot be sufficiently overcome by current solutions in LTE/LTE-A networks such as the extended access barring (EAB) scheme. The recently studied approaches of grouped random access have shown a great potential in simultaneously reducing the collision rate and the...
The predictive proportional integral (PPI) controller being simple and non conservative like its Smith predictor and internal model control (IMC) counterparts, has the ability to be employed in environments characterised by uncertainties such as stochastic network delays. However, its performance degrades in the presence of measurement noise. This is due to the prediction involve in the controller...
Smartphones and other connected devices rely on data services, such as web services (WS) and Google Cloud Messaging (GCM), to share the information they collect or use. Traditionally, these services were classified according to their efficiency or their delivery time, but, when dealing with battery operated devices, another important parameter is the power consumption. In this paper, we present the...
This paper focuses on the performance and stability of discrete-time domain complex vector PI (CVPI) current regulator operating at low carrier-wave frequency ratio. A novel and accurate discrete-time induction motor model using Pole-zero Matching method is proposed with consideration of control delay and PWM delay. On the foundation of this, an explicit comparison of discrete-time CVPI using Front-Euler...
In 2013, Mao initiated the study on the stabilization of continuous-time hybrid stochastic differential equations by feedback controls based on discrete-time state observations. In this paper, we will extend the theory to deal with the robust discrete-state-feedback stabilization problem for hybrid stochastic systems with time-varying delay. By employing the Razumikhin technique, delay-dependent criterion...
This paper proposes an adaptive method to modify network delay caused by clock skew. First, we introduce the concept of end-to-end network delay, and then we propose a method which aims at eliminate the effect cause by the difference clock frequency. The method first denoises the data set to remove error points, and then uses Least Square Method to estimate the clock skew in distributed network. Finally,...
To satisfy diverse use cases and business models in fifth generation (5G) wireless communication, network slicing in fog radio access networks (F-RANs) is proposed, which provides a cost efficient networking in a convenient way. However, the resource management for network slices is challenging, especially when the edge caching is utilized to alleviate the fronthaul burden and reduce the delay. In...
Addressed in this paper is the leader-following lag consensus of multiagent systems. By leader-following lag consensus, we mean that the followers achieve the state consensus with a lagged state of the leader. By means of Lyapunov-Krasovskii method, a sufficient condition is established which guarantees the required lag consensus. A numerical example is provided to illustrate the proposed theoretical...
Feedback delay can severely impact network performance in mobile network and the theoretical quantification of performance degradation has attracted much research interest recently. In this paper, we conduct coverage analysis of mobile ultra-dense networks (UDNs) where coordinated multipoint (CoMP) technology is adopted to enhance network performance and the available channel state information (CSI)...
Compressive random access scheme is considered one of promising candidates for future Machine Type Communications. It enables one-shot detection, which means that the preamble, channel estimation, and data detection could be carried out at once to keep signaling overhead low. For one-shot detection, improving the performance in terms of the number of successfully received preambles is necessary. To...
In this paper, a general structure of type-III FIR filters with derivative constraints is proposed. It consists of a linear combinations of basic sub-filters, called cardinal filters, with weighting coefficients equal to derivatives of the target frequency response at ω = 0. Closed-form expressions for these cardinal filters are derived and their filter coefficients are shown to have a simple recursive...
Groups of strongly consistent devices can efficiently order events under ideal (data center) conditions, but become less effective in dynamic and heterogeneous environments. Weakly consistent devices efficiently tolerate both faults and dynamic conditions but are slow to converge on a single ordering of system events. We propose "federated consistency", which combines the strengths of both...
Utility computing models such as cloud computing provide a variety of computing services using several pricing options. Flexibility of requirements and availability of pricing options, enable a consumer to make trade-offs between cost and time. These trade-offs are governed by consumers' behavior with respect to how they discount price vis-à-vis time of delivery. In this paper, we study this trade-off...
The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage and control network traffic. However, SDN will experience long packet delay and high packet loss rate when the communication link between two planes is jammed by SDN-aimed DoS attacks with massive table-miss packets. In this paper, we propose FloodDefender, an...
We consider the problem of proactive (i.e. predictive) content caching that is aware of the costs of retention of the content in the cache. Prior work on caching (whether proactive or reactive) does not explicitly take into account the storage cost due to the duration of time for which a content is cached. This new problem, which we call retention aware caching, is motivated by two recent technological...
To reduce the energy consumption of a smartphone, multiple data transfer requests from applications can be bundled together and granted at once in order to reduce the time the radio interface is on. The side effect of bundling is the increased delay experienced by mobile applications. While several bundling algorithms have been proposed in the literature, a general and systematic solution to balance...
The backpressure algorithm has been widely used as a distributed solution to the problem of joint rate control and routing in multi-hop data networks. By controlling a parameter V in the algorithm, the backpressure algorithm can achieve an arbitrarily small utility optimality gap. However, this in turn brings in a large queue length at each node and hence causes large network delay. This phenomenon...
Network Function Virtualization (NFV) is a promising technique to greatly improve the effectiveness and flexibility of network services through a process named Service Function Chain (SFC) mapping, with which different network services are deployed over virtualized and shared platforms in data centers. However, such an evolution towards software-defined network functions introduces new challenges...
We introduce a new class of forward error correction (FEC) codes for VoIP communications which support different recovery delay depending on the channel conditions. Specifically, our proposed class of Dual-Delay (DD) codes can recover from challenging long bursts of losses with close to theoretical minimum delay so as to meet playback deadlines for recovered packets. They further improve conversational...
In a software defined network (SDN), the control plane needs to frequently collect flow statistics measured at the data plane switches for different applications, such as traffic engineering, flow re-routing, and attack detection. However, existing solutions for flow statistics collection may result in large bandwidth cost in the control channel and long processing delay on switches, which significantly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.