The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One way to make more spectrum available is through white space sharing, where secondary spectrum users are allowed to transmit from any location except inside exclusion zones (EZs) that are drawn around primary spectrum users (PUs). However, EZ boundaries reveal the locations of PUs, and for some devices, location privacy is extremely important. Location privacy can be improved by increasing the area...
This paper presents the methodology and results of several trials carried out in order to test the effects of impulsive noise source in IoT wireless systems. The impulsive noise generated by fluorescent lamps at 433 MHz and 868 MHz has been measured and recorded. Using these measurements an impulsive noise generator has been developed. Then, with the generated noise two IoT systems have been interfered...
Wi-Fi Mesh Community has turn out to be an important area community to offer internet to challenge the thrown domains and wireless link in metropolitan environments. In this paper, hassle of figuring out the most to be had bandwidth direction is targeted, which is an essential problem in helping pleasant-of-carrier in WMCs. Due to the concept of interference, bandwidth, which is a familiar challenging...
Routing is the soul of wireless communication. It is the process through which best available path between the source and the destination nodes is identified. This selection procedure is carried out with the help of measurements that address various issues of the network. Such measurements are called as routing metrics. Routing metrics are in the course of evolution addressing the issues such as path...
In this paper, a hybrid approach has been proposed for maximizing ergodic capacity of the cognitive radio networks. This hybrid scheme is based upon the sensing information (sensing Metric) obtained by the secondary receiver about the absence or the presence of the primary user. By adopting hybrid scheme, one can increase the ergodic capacity of the network subject to peak transmit power constraint...
Network efficiency and proper utilization of its resources are essential requirements to operate wireless networks in an optimal fashion. Cognitive radio aims to fulfill these requirements by exploiting artificial intelligence techniques to create an entity called cognitive engine. Cognitive engine exploits awareness about the surrounding radio environment to optimize the use of radio resources and...
Wireless Body Area networks (WBANs) are a subset of wireless sensor networks that interconnect miniaturized nodes with sensor or actuator capabilities in, on, or around a human body. WBANs can operate over a number of different frequency bands such as MICS (Medical Implant Communications system), 2.4 GHz ISM (Industrial Scientific and Medical), UWB (Ultra-Wideband), and HBC (Human Body Communications)...
The number of e-commerce customers and database services in cloud computing platforms has grown increasingly, leading providers to adopt resource-sharing solutions to meet growing demand for infrastructure resources, such as processing and storage. Consolidating database applications has become arguably a de-facto solution to support a large number of customers/tenants at low infrastructure costs...
We propose a Coordinated Non-Orthogonal Multiple Access (CO-NOMA) scheme for resource allocation in the context of mobile networks. NOMA refers to schemes where multiple users can access the wireless channel in the same frequency band simultaneously. In this study, we consider NOMA with power domain multiplexing, where the near- far property in space is exploited through appropriate power allocations...
Cooperation in cellular networks has been recently suggested as a promising scheme to improve system performance. In this work, clusters are formed based on the Mutually Nearest Neighbour relation, which defines which stations cooperate in pair and which do not. When node positions follow a Poisson Point Process (PPP) the performance of the original clustering model can be approximated by another...
Cell association is a critical aspect of cellular network operation wherein mobile terminals (MTs) connect to optimal base stations before commencing data transmission and reception. This paper investigates a novel physical layer security problem wherein malicious base stations (MBSs) seek to subvert the cell association process by spoofing the common reference signals of legitimate base stations...
To further increase the system capacity in cellular networks, establishing stable D2D (Device-to-Device) links with efficient power allocation is necessary due to the communication interferences. Existing works are mainly focused on the interference control and mitigation at the physical layer. However, the information from social interactions among D2D users are also helpful to improve the system...
Wireless covert systems use low probability of detection (LPD) techniques to hide transmission and protect the transmitter. Traditionally, spread spectrum has been used to hide the covert signal in noise. Recently, research has focused on covert systems that sense the RF channel and hide their transmission in the RF band of a primary network (PN). A widely used metric to quantify covertness is the...
The performance of wireless multi-hop mesh networks is negatively affected by interference between neighboring links which use the same channel. Even if no interflow interference exists, intra-flow interference still degrades network performance to a high degree. To overcome this problem this paper presents a routing protocol for wireless multi-hop networks with multiple radio interfaces, which minimizes...
Cognitive radio technology is used to alleviate the contradiction between the scarcity problem and low utilization rate of spectrum resources. However, the existence of unbelievable data leads to an inaccurate judge for some available resources, which causes the failed network behaviors and interferes the authorized networks. The traditional security techniques can't defense this threat efficiently...
Covert systems are designed to operate at a low probability of detection (LPD) in order to provide system protection at the physical layer level. The classical approach to covert communications hides the signal in noise; however, the increasing demand for modern covert systems that provides better protection against intercept receivers (IRs) has shifted the focus to the design of Ad-Hoc covert networks...
Despite attractiveness of multicore processors for embedded systems, the potential performance gains need to be studied in the context of real-time task scheduling and memory interference. This paper explores performance-aware schedula-bility of multicore systems by evaluating the performance when changing scheduling policies (as design parameters). The modelbased framework we build enables analyzing...
The notion of Total Interference Degree (TID) is traditionally used to estimate the intensity of prevalent interference in a Multi-Radio Multi-Channel Wireless Mesh Network (MRMC WMN). Numerous Channel Assignment (CA) approaches, link-scheduling algorithms and routing schemes have been proposed for WMNs which rely entirely on the concept of TID estimates. They focus on minimizing TID to create a minimal...
In this paper, we investigate the K-cell multiple input multiple output (MIMO) interference multiple-access channel (IMAC) where opportunistic user scheduling and interference alignment (IA) are combined. For traditional opportunistic IA (OIA) scheme, without consideration on enhancing the effectiveness of the desired signal, each user calculates its beamforming vector only based on the singular value...
In this paper, we consider the problem of ensuring fairness in systems serving a mixture of fully backlogged applications, which continuously demand resources, and non-fully backlogged applications. We introduce a fairness metric, called interference fairness, the basic idea underlying which is that the interference caused by application A for another application B should be equal to that caused by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.