Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we study a wireless cooperative secure transmission system with the help of a friendly cooperative jammer Chad to interfere a potential malicious eavesdropper Eve. For imperfect channel estimation, we continue to follow the optimal power allocation and the maximum secrecy rate design of the perfect channel. Considering channel estimation scenario in the actual communication environment,...
Based on the problem of the multi-objective spectrum allocation on the joint optimization of maximal network utility and the fairness of users in the cognitive network, a novel adaptive fruit fly algorithm (FOA) for channel (i.e. spectrum) scheduling is proposed, which can make both of primary users (PUs) and cognitive nodes (CNs) access to the available wireless channels. In the present algorithm,...
In this paper, an optimal control allocation strategy is presented for an eight in-wheel-motor independent drive electric vehicle/four double front wheel steering(8WD/4WS). The upper level controller consists of a speed following controller and two sliding mode controllers. The speed tracking controller obtains the desired longitudinal force by tracking the longitudinal speed. Two sliding mode controllers...
In the study of complex networks, identifying important nodes in propagation contributes a lot to the control of diffusion. Since real-world networks are often closely interacted, it seems promising to generalize the ranking algorithms of nodes to multi-layer networks. In this paper, the iterative resource allocation method is extended to interconnected networks for the identification of influential...
Border Gateway Protocol (BGP) has been the de facto inter-domain routing protocol since it was introduced. Its destination-based routing nature, which is not able to choose a specific end-to-end AS-level route, might overload some popular peering (or inter-AS) links, while making some others underused. This could result in congestion and cause service disruption. To cope with the issue of destination-based...
The paper deals with the comparative analysis of methods of losses distribution between electricity market participants on the example of their implementation on the test scheme IEEE RTS-96. Several methods have been analyzed: a proportional method (Pro Rate), a method of losses distribution between market participants in proportion to their contribution to power cardinality with adjacent nodes (Proportional...
The never-ending increase in energy demand across the globe requires a new approach towards efficiency in the production, distribution and consumption chain. A system that achieves minimum operational losses becomes more and more attractive. This paper tackles the energy efficiency in distribution networks by proposing an optimum allocation and sizing of capacitor banks. Using a genetic algorithm,...
Edge computing, which is a fundamental component of emerging 5G architectures, involves onloading or offloading multiple virtual network functions from mobile devices to an edge network substrate. In this paper, we present a model for the complete edge function onloading problem, which consists of three main phases: (1) Cyber foraging, which involves discovery of resources monitoring the state of...
Toward 5G, LTE-Advanced specifies the key objective that the gigabit data rate for real-time video streaming can be transmitted under a high mobility scenario; thus, packet scheduling and radio resource management become the critical techniques that should be addressed effectively. Additionally, the mechanisms of relaying and the OFDMA coding have been certainly adopted in LTE-Advanced for the purposes...
Inter-Cell Interference Coordination (ICIC) techniques are proposed as solutions to alleviate the negative impact of interference on system performance, while enhancing the provided Quality of Service (QoS). Typically, the available bandwidth is divided into inner and edge sub-bands. Users are also classified into interior and edge users. The available resources in each zone are exclusively allocated...
The paper studies a practical problem of resource assignment and optimal human resource allocation scheduling with the objective of minimizing employees' useless working time and retire some workers. We analyze simultaneous employment staff with different competencies (skills) that needed to complete jobs. Each job and worker have a set of individual parameters. The mathematical model of assignment...
Large-scale data processing framework like Apache Spark is becoming more popular to process large amounts of data either in a local or a cloud deployed cluster. When an application is deployed in a Spark cluster, all the resources are allocated to it unless users manually set a limit on the available resources. In addition, it is not possible to impose any user-specific constraints and minimize the...
Cloud computing (CC) is a computing model that enables its customers to access a shared pool of resources (e.g., storage, network, servers, etc.) through the Internet with a pay-per-use pricing model. Different service models are employed in CC including the Platform-as-a-Service (PaaS) model, in which the costumers request a certain set of resources and the cloud service providers provide these resources...
Vehicle-to-vehicle (V2V) communication which supports ubiquitous information exchange and content sharing among vehicles with little or no human intervention becomes a key enabler for intelligent transportation industry. In this paper, we adopt a two-hop relay transmission mode to maximize the total spectrum efficiency of a device-to-device (D2D) based vehicular cooperative network while ensuring...
This paper considers a fast fading wireless powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, sends a secret message to a legitimate user using the artificial noise (AN) scheme in the presence of a passive eavesdropper. Based on a two-phase time division protocol, the ergodic secrecy throughput is derived. Furthermore, the optimal time-switching...
Fault tolerance is a major issue for all storage service providers. Currently, the storage service providers make use of data replication as a method to ensure fault tolerance. In the big data era, relying on data replication for fault tolerance reduces the storage efficiency. Most of the modern applications make use of erasure code based storage systems as an alternative to the data replication....
Due to the expansion of the unmanned aerial vehicle (UAV) market, there is the issue of spectrum scarcity for unmanned aerial system (UAS). Thus, it needs to allocate the resource effectively in the limited bandwidth considering the network environment. In this paper, we propose the frame structure and the resource allocation algorithm which can maximize the network throughput as well as satisfy the...
In this paper, we study the physical layer security in the downlink Non-Orthogonal Multiple Access (NOMA) systems with the capability of simultaneous wireless information and power transfer (SWIPT). In our system, each user applies the optimum power splitting (PS), in order to coordinate the energy harvesting and information decoding at the receiver. The optimization problem is formulated as the optimal...
Non-Orthogonal Multiple Access (NOMA) is a promising multiple access technique for 5G wireless communication networks due to its higher spectral efficiency and user fairness. Power allocation is the key to improve the performance of NOMA systems. In this paper, we focus on a certain NOMA group of a hybrid NOMA system. We formulate a sum-throughput maximization problem for uplink under the constraints...
In this paper, the throughput maximization problem is investigated for a block fading buffer-aided relay channel. The decode-and-forward (DF) relaying scheme is adopted, and the buffers at the relay can temporarily store the data received from the source. Considering the non-ideal circuit power, one of three transmission modes (source transmission, relay transmission, and keeping silence) is selected...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.