The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this letter, we propose a low-complexity adaptive channel state information (CSI) feedback scheme to maximize the throughput in IEEE 802.11ac systems. We analyze the two factors — the interference and the feedback overhead -and develop a method to attain an optimal CSI feedback quantization level with minimal additional complexity. Our numerical results and complexity comparisons verify the efficiency...
Network coding (NC) is a promising method used to achieve the channel capacity and enhance the reliability of multicast networks. However, the general wireless multicast networks based on NC are facing big problems such as long delays and large computational complexities. We propose a multicast network based on Batched sparse (BATS) codes which can efficiently solve these problems. Since fountain...
This paper proposes a partial packet recovery scheme, called Packetized Rateless Algebraic Consistency (PRAC). PRAC exploits intra and inter-packet consistency to identify and recover erroneous packet segments, without recourse to cross-layer or detailed feedback information. In the absence of cross-layer coordination or detailed feedback, the prevailing methods proposed in the literature have discarded...
This paper presents an optimum placement of Gateways operating in Wireless Sensor Networks (WSNs). The full search method of Gird deployment requires tremendous amount of computation. A novel algorithm for resolving the complexity problem is proposed. The new algorithm utilizes the Cross Entropy Method (CEM) for the maximum network performance with a lot less operations compared to the full search...
Mobility load balancing (MLB) is an important use case in the long term evolution (LTE) self-optimized networks (SON). To combat the potential Ping-Pong load transfer and low convergence issues, we propose a concurrent MLB (CLB) scheme to solve out the asymmetry traffic distribution among multiple cells and the potential hidden-cell problem. CLB is implemented among multiple source and target cells,...
The main challenge of LTE networks is to use unitary frequency reuse factor to achieve highest possible data throughput, however it leads to a severe interference affecting active users. Several interference mitigation techniques focus on bandwidth partitioning methods to avoid cell edge interference, although they improve user's average SINR, such techniques reduce maximum achievable data rate. In...
In this paper, we investigate a joint subcarrier- relay assignment and power allocation scheme for amplify-and- forward (AF) based two-way multi-relay networks. We formulate a sumrate maximization optimization problem with individual power constraints on each node. The target is to seek a unified optimalscheme for subcarrier-relay assignment and power allocation. The problem turns out a mixed integer...
Equipping multi-channel in wireless networks brings not only an improved capacity region but also high challenge in designing joint channel-assignment and scheduling algorithms. With regard to the distributed and online strategies under multi- channel network systems, the implementation complexity is non-negligible and much higher than that of the single-channel cases. In this paper, we propose a...
With Device to Device (D2D) user equipment (DUE) sharing the same resources with traditional cellular user equipment (CUE), intra-cell interference is becoming a challenging issue nowadays in D2D underlaying network. However, due to the lack of convexity, globally optimal resource sharing scheme is generally unattainable. In this paper, we propose a genetic algorithm (GA) based user matching scheme...
Energy harvesting is necessary to make the wireless network self-sustaining and self-organizing regardless of the traditional power grid. How to allocate the limited radio resources in the energy harvesting wireless network is a challenging work. This paper focuses on optimizing the time and power related resources in the multi-cell scenario to maximize the throughput constraining of the changeable...
This paper investigates coordinated resource allocation for cell-center and cell-edge users in multicell orthogonal frequency division multiple-access (OFDMA) wireless networks. Here, we assume the data symbols of each user is only known by one base station (BS). Referring to the fractional frequency reuse (FFR) scheme, the resources for cell-center and cell-edge users are partitioned. Based on such...
Virtual Multiple-Input Multiple-Output (MIMO) is a promising uplink technology that can meet the throughput demand of Long-Term Evolution-Advanced (LTE-A) systems. However, the complexity of scheduling virtual MIMO is a challenge; existing virtual MIMO is therefore limited to best effort applications. We investigate the resource allocation and scheduling problem in a heterogeneous virtual MIMO system...
Carrier Sense Multiple Access (CSMA) protocols have been shown to reach the full capacity region for data communication in wireless networks, with polynomial complexity. However, current literature achieves the throughput optimality with an exponential delay scaling with the network size, even in a simplified scenario for transmission jobs with uniform sizes. Although CSMA protocols with order-optimal...
In dynamic cognitive radio networks (CRNs), unlicensed secondary users (SUs) opportunistically transmit in the spectrum holes left available by licensed primary users (PUs), without knowing in advance their presence on the channels. For SUs with multi-channel transmission capability, the process of selecting the channels to use by sequentially sensing the presence of PUs and evaluating the channel...
Soft decision decoding of Reed-Solomon codes can largely improve frame errors rates over currently used hard decision decoding. In this paper, we present a new hardware implementation for soft decoding of Reed-Solomon codes based on information set decoding. To our best knowledge this is the first hardware implementation of information set decoding for long Reed-Solomon codes. We propose a reduced...
In dynamic cognitive radio networks (CRNs) secondary users (SUs) sense the spectrum bands to find temporal absence of primary users (PUs) and immediately transmit on the identified spectrum holes. SUs sequentially sense the channels, stopping when the available resources are expected to provide the best throughput performance. Following, the selected channels are exploited using multi-channel transmission...
Business processes and the data they generate are often complex, causing uncertainty for managers who have to take decisions based on this information. At this moment, a theoretical understanding of the complexity associated with these business processes and their data is absent. In this paper, we therefore suggest the concept of entropy from thermodynamics as justificatory knowledge for governing...
The streaming model is a popular model for writing high-throughput parallel applications. A streaming application is represented by a graph of computation stages that communicate with each other via FIFO channels. In this paper, we consider the problem of mapping streaming pipelines — streaming applications where the graph is a linear chain — onto a set of computing resources in order to maximize...
In this paper, we consider the scheduling issue on the media access control (MAC) layer of a new practical full duplexing (FD) wireless cellular network, where the central base station (BS) works in the FD mode while the users (UEs) work in the time division duplexing (TDD) mode for considering the limited UE ability to handle the self co-channel interference in the FD mode. The main challenge of...
Burrows-Wheeler Transform (BWT) has applications in diverse areas such as compressed string matching, biological sequence analysis, error correction, and channel coding. Numerous efforts have been made to improve the performance of BWT in software and hardware. Its use in real time applications such as deep packet inspection and channel coding requires efficient hardware implementations that must...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.