The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Selection of appropriate detection threshold (λ) is a very critical task in energy detection scheme based cognitive radio (CR) system. λ is mainly selected by using two principles called as constant detection rate (CDR) in which λ is calculated by taking fixed value of probability of detection (Pd) and constant false alarm rate (CFAR) in which λ is calculated by taking fixed value of probability of...
Recent research has established that hardware overprovisioning can improve system power utilization as well as job throughput in power-constrained, high-performance computing environments significantly. These benefits, however, may be associated with an additional infrastructure cost, making hardware overprovisioned systems less viable economically. It is thus important to conduct a detailed cost-benefit...
Software Defined Networks (SDNs) allow a centralized controller to globally plan packets forwarding according to the operator's objectives. The realization of global objectives requires more local forwarding rules. However, the forwarding tables in TCAM-based SDN switches are limited resources. In this paper, we concentrate on satisfying global network objectives, such as maximum flow, with the limitation...
Orthogonal Frequency Division Multiple Access (OFDMA) has been adopted in the newest fifth generation radio networks (5G) such as Cloud Radio Access Networks (C-RANs) and Heterogeneous Cloud Radio Access Networks (H-CRANs). Therefore, new scheduling strategies should be projected. In 5G radio networks, restricted requirements must be considered to implement an effective service to users such as throughput,...
The United States Department of Defense (DoD) is contemplating the use of commercial technologies such as 4G/LTE (Long Term Evolution) for tactical edge communications because of several benefits offered by them. However, the greatest hindrance to the adoption of LTE for military communications is its lack of support to combat the presence of malicious jamming. In this paper, we propose an anti-jamming...
The current static model used for allocating the spectrum of frequencies and the increasing demand for network resources imposed by modern applications and services may lead to a resources scarcity problem. Dealing with this problem demands optimized resources allocation. An alternative to provide this optimization is by allowing resources sharing among network operators. In this paper, an architecture...
In next generation wireless LAN standard which is called IEEE802.11ax, Orthogonal Frequency Division Multiple Access (OFDMA) random access has been adopted as an uplink multi-user transmission technology. In this paper, we propose an adaptive backoff algorithm for OFDMA random access. Due to the finite service period defined by the standard, random access OFDMA sessions are discontinuous in time which...
In recent years, the using of energy having in the natural environment has drawn attention of many researchers in the world. And the energy harvesting (EH) protocol is a ideal point focusing the study of many scientists especially in wireless communication systems. This paper deals with the EH architecture of the full duplex relay networks. Through utilizing the time switching based relaying (TSR)...
This work presents a new backoff algorithm, namely Maximum Throughput and Fairness aware Backoff (MTFB), for IEEE 802.11 wireless LANs. The algorithm adaptively adjusts the contention window (CW) size so that the maximum throughput and fairness can be maintained even with large number of active stations (STAs). In mixed environments with the legacy 802.11 devices the algorithm is able to keep the...
For cognitive radio, dynamic spectrum access is a promising development direction. Dynamic spectrum access mechanism which is considered in this paper is a kind of channel reservation mechanism. Unlike most of the existing channel reservation mechanism, it is considered that the channel is reserved exclusively for unauthorized users in this paper. This reserved channel can only allow unauthorized...
The densification of small cells (SCs) and caching at the edge are two promising approaches to improve the network throughput, reduce end-to-end delay and backhaul cost in future 5G wireless networks. However, current analysis and design only focus on the system state at a certain time, neglecting the temporal-spatial fluctuation of traffic and the content popularity variations, which are often affected...
The image processing applications require low power and high speed, the convolution based 1D-DWT is not desirable. In this proposed architecture the modified 5/3 lifting algorithm is realized on FPGA platform with optimizations. The latency and throughput is optimized with the modified algorithm. The architecture is modelled using HDL and implemented on FPGA. The proposal operates at 178MHz and realised...
A problem of optimal urban traffic flows control is considered. A mathematical model of control by the traffic lights at intersections using the controlled networks theory is given. It is a system of nonlinear finite-differential equations. To present a large scale road networks the model contains the connection matrices that describe interactions between input and output roads in subnetworks. The...
Today, Apache Cassandra, an highly scalable and available NoSql datastore, is largely used by enterprises of each size and for application areas that range from entertainment to big data analytics. Managed Cassandra service providers are emerging to hide the complexity of the installation, fine tuning and operation of Cassandra datacenters. As for all complex services, human assisted management of...
The EDCA protocol was designed to enhance the functionality of the IEEE 802.11 WLAN through the introduction of different channel access parameter values for different traffic types. This enables some degree of service guarantee for traffic depending on their QoS requirements. While the improved standard has recommended values for the channel accessing parameters, it does not take into account the...
With the development of MEMS (Micro-electromechanical Systems), the wireless sensor networks (WSNs) have become an important communicating method for intelligent transportation application. Mathematics modeling, as an effective quantitative analysis method, is very important for conducting intelligent transportation performance research when WSNs are applied. Based on the channel contention mechanism...
Design of underwater wireless sensor networks (UWSNs) is difficult because of limited battery energy of sensor nodes. Low bandwidth and energy consumption are major problems that we face in UWSNs, due to dynamic behavior of water in underwater environment. In our scheme, circular field is divided into ten sub-regions and each region is divided into eight sectors. Two mobile sinks move to cover the...
HTTP-based adaptive streaming is today's predominating video delivery model over Internet. However, state-of-the-art bitrate adaptation algorithms are not suitable for low-latency adaptive video streaming due to a distinct lack of buffer dynamic stabilization at the client. A small buffer size lacks resilience to the buffer fluctuation imposed by the mismatch between the network throughput and the...
Internet of Things (IoT) can improve the lives of millions of people. In IoT the smart objects are converted from physical to virtual world to connect with Internet. The IoT enables smart objects to observe, identify, and understand the world without intervention of human-being (Machine-to-Machine communication: M2M). Due to the increasing interest of IoT, M2M, and wireless sensor applications the...
The existing radio access network system is static and rigid which could not satisfy the communication requirements of the modern society — flexibility, mobility and intelligence. This paper studies the problems of virtualized resource allocation with multi-objective mapping in heterogeneous radio access network. First, a mathematical model of the multi-objective mapping for virtualized resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.