The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose and evaluate an auction-based resource allocation mechanism in a cloud-based radio access network (C-RAN), where the spectrum is managed by several mobile virtual network operators (MVNOs) and the physical resource is owned by the C-RAN operator. Technically, our approach consists of two coupled auctions in a hierarchical way: the lower-level auction between end users and...
The rapid growth in the number and variety of connected devices requires 5G wireless systems to cope with a very heterogeneous traffic mix. As a consequence, the use of a fixed transmission time interval (TTI) during transmission is not necessarily the most efficacious method when heterogeneous traffic types need to be simultaneously serviced. This work analyzes the benefits of scheduling based on...
Cloud-based Radio Access Network (C-RAN) is a promising architecture for future cellular networks, in which Baseband Units (BBUs) are placed at a centralized location, with capacity-constrained fronthaul connected to multiple distributed Remote Radio Heads (RRHs) that are far away from the BBUs. The centralization of signal processing enables the flexibility for coordinated multi-point transmission...
We investigate the performance of dynamic proactive caching in relay networks where an intermediate relay station caches content for potential future use by end users. A central base station proactively controls the cache allocation such that cached content remains fresh for consumption for a limited number of time slots called proactive service window. With uncertain user demand over multiple data...
Motivated by applications in competitive WiFi sensing, and competition to grab user attention in social networks, the problem of when to arrive at/sample a shared resource/server platform with multiple players is considered. Server activity is intermittent, with the server switching between ON and OFF periods alternatively. Each player spends a certain cost to sample the server state, and the per-player...
High precision location information formulates the basis of many modern wireless location based services (LBS). However, location privacy becomes an important issue along with the advantages that LBS offers. In this paper, we first show that, a novel eavesdropper is able to perform position estimation of the agent by purely overhearing the measurement signals between agents and anchors, using a time...
Larger share of total energy consumed by mobile network operators (MNOs) is wasted to ensure seamless coverage. Three to six MNOs covering the same geographical area results in even more energy waste. Division of scarce resource, i.e., spectrum into small chunks also deteriorates the overall performance. With exponential growth of the traffic and insignificant marginal revenue, it is time for the...
Non-orthogonal multiple access (NOMA) has been investigated recently as a candidate radio access technology for the fifth generation (5G) mobile communication due to its high spectral efficiency (SE). Green radio (GR) which focuses on energy efficiency (EE) is becoming an inevitable trend. In this paper, we study the tradeoff between EE and SE in downlink NOMA systems. The tradeoff problem is formulated...
Recommendation System for Technical paper reviewer assignment is very important for many applications especially in the academic environment and industry. Previous work to build the expert finding system based on a paper title. Here we take a scenario of a conference where they need some experts who can review the paper for that we identify whether the reviewer is expert in that topic or domain to...
There are many storage structure available to store data in memory of many forms. These structures can be array, class, linked list with its various forms, Tree, Binary Tree, Binary Search Tree (BST), etc. These can be differentiated in two major forms. First one uses continuous memory allocation and the second one can occupy any free memory block by pointed by the other memory locations. An array...
Future power networks are supposed to contain various power sources in mesh-like structures, including distributed generations such as solar panels, wind power generations, and electric vehicles (EVs) that work not only as transportation but as huge batteries. These power sources have their own characteristics such as cost, stability, amounts of CO2 emission, etc. Hence it is desired to use them efficiently...
This paper proposes a novel power optimization technique in which DRX cycle is activated based on the scheduling decision. DRX MAC Control Element (CE) command is issued to the UEs for which scheduling is not possible in DRX ON duration time. Simulation results show that, significant gain can be achieved in power saving using the proposed method under specific scheduler design parameter conditions...
Empowered by the orthogonal frequency division multiplexing (OFDM) technology, elastic optical networks (EONs) have emerged as a promising solution for future high-speed networks. Routing and spectrum allocation (RSA) is one of the key challenges to the design of EONs. An adaptive RSA is required to meet the robustness objective of EONs. The relative cost concept can be used to implement an adaptive...
We present an approach to increase likelihood that an automated reasoning system will make the best decisions for a system and sensor resource manager (SSRM) with limited resources. The introduction of automated game theory to mission planning allows for a modular architecture and scalable approach across a range of platforms and facilitates rapid integration of new modes and technology. Game theory...
Energy and resource utilization efficiency are two of the most significant differentiators in the contemporary Cloud computing marketplace. This paper addresses both of these from system of systems architectural and optimization viewpoints. Our approach will allow multiple cloud providers to optimally utilize compute resources. It will do this by (1) lowering the datacenters deployments per provider...
The Physical Layer Security (PLS) technology has been proved to be an effective way to reduce information leakage in wireless communication networks. This paper discusses the problem of secure transmission for Amplify-and-Forward (AF) cooperative network which contains both an external eavesdropper and some untrusted relays at the same time, where each relay acts as a helper of transmitting information...
Using phase change memory (PCM) as main memory for embedded systems, such as Beidou navigation terminals, has many advantages, such as non-volatile, energy saving, anti-crack and so on. However, the problem of write operations needs to be solved to prevent premature failure of the PCM chips. In this paper, the data allocation problem of a hybrid PCM and DRAM main memory in Beidou navigation terminals...
The existing emergency rescue systems face the following problems: rescue systems belong to different rescue brigades and are independent of each other, there is no guarantee that the data interface is consistent with the National Safety Supervision Bureau, the bureau and provincial rescue centers can't get the important rescue information timely and accurately; In addition, the rescue brigades cannot...
Current network architecture suffers overloading due to extensive resource utility. This paper proposes a resource mapping algorithm upon service layer of service-based network: the unit of service component requests resource as well as limits; an agent is embedded in the component to surveil the utility of network resource. If network resource violates the limits, agent will punish the component...
Cloud computing goals to maximize the advantage of distributed resources and aggregate them to attain greater throughput to remedy huge scale computation issues diminish the completion time. The tasks submitted to it using the resources to be had it may be achieved as per scheduled by using the algorithm on time to acquire a better utilization and fairness. It is a difficult job to relatively allocate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.