The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the problem of secure communication in multiuser downlink wiretap networks where there exist a base-station (BS) equipped with multiple antennas, multiple legitimate receivers and a passive eavesdropper. The transmitter simultaneously transmits an information signal and artificial noise (AN) separately to the intended receivers and the eavesdropper, in which way, the secrecy...
As a promising technology, Device-to-Device (D2D) communication can bring some advantages such as high bit rates, low delays, low power consumption by reusing frequency band with the cellular user equipments (UEs). While at the same time, inter-cell and intra-cell interference is inevitable. In this paper, we propose an algorithm Stackelberg game based to jointly allocate power and resources when...
In this paper, the dynamic power allocation problem over the multiple-access channel (MAC) against overhearing of eavesdroppers is investigated with the objective to maximize the users' secrecy rate under transmitted power constraints. Lyapunov drift approach is applied to derive the sub-optimal solution for this inherent non-convex optimization problem. Convergence condition and performance of the...
One of the main challenges in Machine Type Communication (MTC) services in the 3GPP LTE networks is to improve device power efficiency for Machine to Machine (M2M) communication. We consider MTC application scenarios which consist of a number of devices connecting to the network concurrently. The methods considered in TR 37.868 involve Disjoint Allocation (DA) and Joint Allocation (JA). The DA scheme...
Simulation of channel adaptive random access is performed in multiple input multiple output (MIMO) environments. The results show that channel adaptive random access can obtain significant performance gains in MIMO environments.
This paper reports on PReMAS, a simulator used for research on parallel scheduling, processor allocation, and task mapping for systems with rigid batch jobs scheduled with pure space sharing. PReMAS features an object-oriented design that has proven adaptible for a variety of research foci and is easily extendible to incorporate new resource management algorithms. We are making its code public to...
A novel quantize-and-forward scheme with two relays is proposed in this paper. In our scheme, each relay only processes one bit of the quantized codeword. The principle of selecting the aforementioned bit is based on the channel condition of the relay links. Compared with the single-relay scheme, the system consumes the same resources, while each relay has a prolonged life since it only transmits...
Reusable launch vehicle (RLV) has multiple different kinds of control effectors. These redundant effectors provide RLV the potential to maintain acceptable stability and performance even when some of them get failures. Proper control allocation and re-allocation after control effectors failure are necessary for RLV. A new fault-tolerant reconfigurable controller integrating control allocation is proposed...
Solid State Disks (SSDs) are promising data storage devices in term of performance and energy consumption comparing to Hard Drive Disks (HDDs). They are more and more used, even in On-Line Transaction Processing (OLTP) systems and for scientific data with hard constraints on response time. Consequently, parallel execution and parallel access to data are capital to fulfil this performance requirement...
In this paper, a playout buffer and DRX aware scheduling scheme(PBDAS) is proposed to improve the user experience of the video streaming over the DRX enabled LTE systems. By considering the UE playout buffer level and the DRX cycle length, we define the remaining playout time, which can effectively indicate the UEs' urgency. Based on their urgency, the UEs are assigned with different forms of scheduling...
While the services-based model of cloud computing makes more and more IT resources available to a wider range of customers, the massive amount of data in cloud platforms is becoming a target for malicious users. Previous studies show that attackers can co-locate their virtual machines (VMs) with target VMs on the same server, and obtain sensitive information from the victims using side channels. This...
In this paper, we study the problem of optimizing the error generated in the allocation of processing elements to tasks, based on real-time scheduling. The makespan of the tasks to be scheduled is the same, in the computational grid. Tasks to be assigned to processing elements are randomly generated and are mapped to processors. Scheduling is done, considering real-time environment and mapping is...
We present a model and system for cost-efficient and reliable management of sessions in a Cloud, based on the von Neumann-Morgenstern utility theorem. Our model enables a web application provider to maximize profit while maintaining a desired quality of service. The objective is to determine whether, when, where, and how long to store a session, given multiple storage options with various properties,...
Device-to-device (D2D) communication has been widely studied in academic and industry due to its contribution in improved resource utilization. As the radio resource can be reused by multiple D2D links, complicated intracell interference environment is caused. In this paper, we analyze the performance of resource allocation schemes in D2D communications, considering the dynamic data arrival with finite...
In this paper, we propose a hybrid decision algorithm for the selection of the access in multi-operator networks environment, where competing operators share their radio access networks to meet traffic and data rate demands. The proposed algorithm guarantees the user satisfaction and a global gain for all cooperating operators. Simulation results prove the efficiency of the proposed scheme and show...
The productive allocation is one of the most important factors for the development of Chip Multi-Processor (CMP) systems. The efficiency of CMP depends on the design of Processor Allocator which is driven by allocation schemes. A good allocation algorithm should identify available processors with minimum fragmentation and in as short period of time as possible. The goal of this paper is to present...
Network on Chip (NOC) is a important communication infrastructure for system on chips (SOC). Router is most important parameter of the NOC. Area and performance both play a vital role in network on chip (NOC) architecture. In this paper we implement the loop back virtual channel router by comparing the look - ahead speculative virtual channel and baseline router architecture. In this implemented loopback...
To avoid radio access network (RAN) takes place severe congestion when a large number of machine-type communication (MTC) devices send their random access requests to the evolved Node B (eNB) simultaneously, some schemes were proposed by 3rd Generation Partnership Project (3GPP). Group paging is one of the candidate solutions for solving the RAN overload control problem. However, the access success...
Cloud computing is a developing computing paradigm that has inclined every other entity in the digital industry, it may be government sector or the personal sector. Taking into account the mounting significance of cloud, finding new ways to advance cloud services is an area of concern and research center. Usually clouds have powerful data centers to handle large number of users. Cloud is a platform...
The channel sensing order in cognitive radio networks is very important and has a significant impact on the cognitive users operation. In this paper, we propose four adaptive spectrum searching schemes to determine the channel sensing order taking into consideration the primary users activities. These schemes use previous sensing results to generate a criterion to find the channel sensing sequence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.