The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Covert communication is to achieve a reliable transmission from a transmitter to a receiver while guaranteeing an arbitrarily small probability of this transmission being detected by a warden. In this work, we study the covert communication in AWGN channels with finite blocklength, in which the number of channel uses is finite. Specifically, we analytically prove that the entire block (all available...
In Long Term Evolution-Advanced (LTE-A) networks, different aspects of radio resource scheduling such as fairness and Quality of Service (QoS) assurance must be provided for heterogeneous traffic, having different characteristics. However, the ever-growing number of mobile devices sharing the limited radio resources leads to the high cost and difficulty for information acquisition and computations...
Intravehicular wireless systems are attracting a lot of research interest during the last years. A future scenario where intravehicular wired systems will be replaced by wireless systems will allow to reduce cabling weight and increase the flexibility. But one of the main requirements of wireless systems is to maintain the same reliability level as the wired ones. A system based on LDM (Layered Division...
We analyze the performance of the type-I automatic repeat request (ARQ) protocol with ultra-reliability constraints. First, we show that achieving a very low packet outage probability by using an open loop setup is a difficult task. Thus, we introduce the ARQ protocol as a solution for achieving the required low outage probabilities for ultra reliable communication. For this protocol, we present an...
The equipment efficiency plays a great role in the profitability of a manufacturing company. It impacts the throughput, cycle times, costs, and return on investment in manufacturing capacity.
With the fast growth of mobile data services, rich services deliver a brand new experience to end users, and also bring about new opportunities for operators. Some applications, such as vehicular and industrial applications, demand a level of reliability that wireless communication systems typically are not able to guarantee. This paper provides a framework that enables these applications to make...
State-of-the-art GPU chips are designed to deliver extreme throughput for graphics as well as for data-parallel general purpose computing workloads (GPGPU computing). Unlike graphics computing, GPGPU computing requires highly reliable operation. The performance-oriented design of GPUs requires to jointly evaluate the vulnerability of GPU workloads to soft-errors with the performance of GPU chips....
Semantic web services represent the potential of the web and they have significant impact on the discovery process. Due to the high proliferation of web services, selecting the best web services from functional equivalent service providers have become a real challenge when a large number of services have been published in a registry. If these services have been functionally-equivalent, it is difficult...
Several approaches are introduced to increase the throughput and reliability of Multistage Interconnection Networks (MINs), mostly by changing the network architecture. When multiple sources in such a network try to send data, collision of packets and blocking problems are inevitable. Time division multiple access (TDMA) protocol are used to address these issues. However, TDMA protocol based on fixed...
A Wireless Sensor Network is an assortment of nodes organized into a cooperative network. Wireless Sensor Networks (WSNs) are subjected to node failures because of energy constraints; also nodes can be added to or removed from the network upon application demands, leading to unpredictable topology changes. Bursty traffic resulted from the detected events will simply cause congestion within the networks,...
Exploiting multi-user diversity (MUD) means to assign the resources to the user experiencing the best channel conditions. When multicast communication is considered, MUD means that a sender can serve the intended receiver users using one or many data transmission rates. In fact, MUD-based multicast schemes aiming to maximize the multicast throughput (e.g. DOMS and MOST) or to minimize the multicast...
In order to accommodate the growing traffic demands from moving users, the next generation heterogeneous networks (HetNets) are considering the deployment of moving small cells (mSCs). mSC is a user-centric network and unlike other fixed small cells such as femto and pico cells, these mSCs use wireless backhaul links. mSC provides network services while on the move. In this paper we propose a novel...
The rapid development in communication approach has brought out new mode of communication. Among the recent developments, adhoc network has emerged as new mode of data communication. The objective of link reliability is a major concern in such network. In this paper, a new approach to route discovery based on network power and operational characteristic is proposed. The approach suggested, results...
The performance of wireless mesh networks (WMNs) deployed for Internet access in rural settings is affected by several factors. Typically, deployments in African domains use cheap and computationally constrained devices with challenges such as power fluctuations, gateway congestion, VSAT communications asymmetry and low bandwidth, which affects throughput under dynamic scenarios. Caching methods can...
This work presents relay selection and beamwidth adaptation algorithms for millimeter-wave communication network by selecting best relay. Due to the high path loss, the mm-Wave links suffer from shadowling. Thus improving link availability is a challenge for the system designer. In this work, the link availability is further improved by optimal power allocation and beamwidth adaptation. The channel...
Resource management approaches are necessary for managing the run-time dynamics originating from application dynamism, platform reliability degradation and changing operating conditions. Existing on-chip resource managers assume that resources are always available and are biased toward application requirements. This paper presents Agora, a distributed resource management framework based on market...
In the simultaneous wireless information and power transfer (SWIPT) system, due to the broadcast nature of wireless radio, the energy receiver may act as a potential eavesdropper to eavesdrop the information sent to the information receiver. To address this issue, in this paper, we propose an optimization framework of target secrecy rate and power allocation ratio based on secrecy outage probability...
In a data communication network, several flows contend to utilize limited and shared network resources, however, this gives rise to congestion along with other network issues. So, this leads to the development of congestion control based methods/ protocols to support the deployment of real-time multimedia applications while ensuring reliability and fairness. This paper presents a simulation based...
In this paper, we present a novel idea of multipath multicast, which is imperative to bandwidth intensive applications, in the context of multimedia streaming. In addition to congestion control, multipath TCP (MPTCP) has been proposed to establish multiple paths in a network to improve network reliability. Application-layer multicast (ALM) has been proposed to leverage end systems instead of dedicated...
IEEE 802.15.6 standard defines several service differentiation mechanisms with the aim of providing good QoS to different Wireless Body Area Network (WBAN) based applications including medical, entertainment, military, and security. The purpose of this paper is to improve IEEE 802.15.6 slotted CSMA/CA efficiency, making it more suitable for healthcare applications. To do so, we propose an enhancement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.