The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization technology has been widely adoptedin Cloud data centers for adaptive resource provisioning. Withvirtualization, multiple virtual machines (VMs) can be colocatedon a single physical host to yield maximum efficiency. However, VMs which show high CPU utilization correlationsto other co-located peers are more likely to trigger overloadingincidents. This work provides an analysis on effects...
Millimeter wave (mmWave) is one of the key technologies in the fifth-generation (5G) wireless system, providing abundant spectrum resources to meet the ever-increasing wireless connections and a huge volume of data traffic. Nowadays, many experts and scholars in this field are focusing on the relationship between channel modeling and system performances of mmWave cellular networks. In this paper,...
Wireless Mesh Networks provide a reliable, robust and resilient platform for broadband access. Main benefits of using Wireless Mesh Networks are their low cost, robustness, self healing, and self configuring properties. In Wireless Mesh Networks, routing metric determines the path from source to destination. Wireless link conditions can be affected by a number of factors including interference, congestion,...
The traffic profile of future mobile networks is foreseen as becoming more variable both in time and among base stations (BSs) due to the widespread heterogeneity in applications and services. Dynamic time division duplex (TDD) has been recognized as an important enabler to cope with this traffic variability, especially in dense networks with many BSs and a small number of user equipments (UEs) served...
We study the coverage performance of multi-antenna (MIMO) communications with maximum ratio combining (MRC) at the receiver in heterogeneous networks (HetNets). Our main interest in on multi-stream communications when BSs do not have access to channel state information. Adopting stochastic geometry we evaluate the network-wise coverage performance of MIMO-MRC assuming maximum signal- to-interference...
In this paper we study a dense small cell network employing multi-antenna Base Station (BS)s and analyse the two performance metrics, the Energy Efficiency (EE) and the Area Spectral Efficiency (ASE). In this network each BS utilizes the Frequency Reuse (FR) to mitigate the interference of the other BSs. Although the two network parameters, the BS density and the number of its antennas change the...
In this paper we look into the test methods to evaluate the quality of audio separation algorithms. Specifically we try to correlate the results of listening tests with state-of-the-art objective measures. To this end, the quality of the harmonic signals obtained with two harmonic-percussive separation algorithms was evaluated with BSS_Eval, PEASS and via listening tests. A correlation analysis was...
Cognitive radar refers to an adaptive sensing system exhibiting high degree of waveform adaptivity and diversity enabled by intelligent processing and exploitation of information from the environment. The next generation of radar systems are characterized by their application to scenarios exhibiting non-stationary scenes as well as interference caused by use of shared spectrum. Cognitive radar systems,...
We consider Device-to-Device (D2D) communications underlaying cellular networks with multiple cellular users (CUs) and multi-pair direct D2D users (DUs). In this considered scenario, we propose a novel opportunistic interference alignment (OIA) scheme to improve the sum rate of the whole networks. DUs are opportunistically selected based on the reference signal space (RSS) of the CUs. According to...
In a multi-hop wireless network, a node can act as a candidate file provider to other nodes, if it has downloaded the file from the Internet. When another node requires the same file, all nodes which have already obtained the file can act as candidate file providers (sources) and transmit file together to the request node (destination). We form this as the multi-source transmission. As the multi-source...
Network virtualization has been proposed to be a promising way to solve the Internet ossification problem. One of the main challenges for network virtualization is the virtual network embedding (VNE) problem, which focuses on the efficiency of the substrate resources allocation and involves the virtual node and link mapping problems. Node mapping process has serious influence on the whole mapping...
In this paper, we propose a reliable and interference-aware routing protocol for underwater wireless sensor networks (UWSNs). Proposed protocol follows end-to-end path from source node to sink and selects next forwarder node of a data packet on the basis, having already established a path to sink. In this way, the problem of encounters void hole in depth based routing protocol is eliminated. Furthermore,...
Spectrum sharing technologies are a kind of important technologies to overcome the shortage of the wireless spectrum, among which the centralized spectrum sharing exhibits superior performance in dense region. However, this method does suffer from large computational complexity and impractical implementation when optimization target is and overall system is complex. In this paper, reinforcement learning...
In this paper a novel technique is proposed for online detection of timing interference in multicore architectures. The technique is aimed at mixed-criticality workloads. This paper describes a method to use hardware performance counters to detect such misbehaviors. Experimental data is gathered, showing the viability of this method. The method can be used as safety-net in several scheduling approaches.
Due to the upsurge of context-aware and proximity aware applications, device-to-device (D2D) enabled mobile cloud (MC) emerges as next step towards future 5G system. There are many applications for such MC based architecture but mobile data offloading is one of the most prominent one especially for ultra dense wireless networks. The proposed system exploits the short range links to establish a cluster...
The LTE-Advanced HetNets deployment is meant to address the increasing demand for quality of service (QoS), high data rates, and coverage extension to mobile users especially in hotspot areas. One of the main challenges of the deployment, where different network tiers share spectrum, is how users associate with the cells to achieve load balancing for improving system performance. The importance of...
In this paper we consider a random wideband wireless-adhoc-networks (WANETs). We assume that the nodes are distributed according to a Poisson-Point-Process and consider routing schemes that select the next relay based on the geographical locations of its neighbor nodes. We consider the case that each node is equipped with a single antenna and the signal is transmitted using orthogonal-frequency-division-multiplexing...
Some characteristics of optical networks can be assessed by analyzing the topology of the network. Many metrics can be used for this purpose. Modularity indicators were already proposed to study complex networks, and they have been useful to clarify many real world problems. In this paper, we propose an indicator inspired in the traditional modularity concept aiming at finding suitable routes in optical...
In today's data centers, storage hardware is getting virtualized and shared across multiple tenants. The storage virtualization is expected to significantly increase resource utilization, and consequently provide infrastructure providers with tremendous cost savings. In a shared environment, however, demanding tenants can severely impact the IO performance of co-located tenants. Therefore, in order...
In the emerging Fifth Generation (5G) systems mobile social networks will play an important role for disseminating information and multimedia contents. In such a scenario, short range transmissions and multicast services are considered as promising technologies in order to disseminate contents as fast as possible. This paper proposes a viral information diffusion approach for improving the information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.