The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present a novel dynamic spectrum sensing and access model in cognitive radio networks. This model allows secondary user (SU) to sequentially sense two times if necessary due to the false alarm, and choose different accessing manner according to the sensing result. In practice, sensing results often affect the data transmission in cognitive radio systems. Therefore, a hybrid interweave/underlay...
To meet the imperative need for ubiquitous mobile communication, the infrastructure of the next-generation mobile system, i.e. 5G, is developing toward a densely distributed cellular network with multiple tiers of base stations and access technologies serving users with different mobility styles and variant bandwidth demands. Therefore, strategy of power control and interference mitigation is becoming...
Due to the lack of spectrum resource of power wireless private network, it is difficult to guarantee the transmission for the services in the distribution network. In order to enhance the network resource utilization, this paper puts forward a method for the uplink resource scheduling of power wireless private network based on NB-IoT and LTE hybrid transmission. Firstly, through the cognizing for...
This paper considers queue-driven, real-time interference mitigation aiming to maximize wireless network throughput. A best-response power control algorithm is derived from successive convex approximations, and a single power update is performed at each scheduling interval. In the high-SINR regime, the power control algorithm achieves maximum network throughput. Extending the approach to general SINR...
Probabilistic reasoning applied to dynamic spectrum sharing systems enables them to characterize situational uncertainties and determine acceptable spectrum access behaviors. Spectrum sharing systems may use sensing data to reduce situational uncertainty and improve spectrum sharing potential. Probabilistic reasoning approaches enable risk-constrained spectrum access, a concept in which spectrum sharing...
The individual applications of network coded opportunistic routing and successive interference cancellation have been proven with significant improvement on throughput performance of wireless multi-hop networks, but there lacks practical optimization on their combination application. Based on a TDMA system, this paper models the throughput maximization as network utility function maximization problem...
The individual applications of network coded opportunistic routing and successive interference cancellation have been proven with significant improvement on throughput performance of wireless multi-hop networks, but there lacks practical optimization on their combination application. Based on a TDMA system, this paper models the throughput maximization as network utility function maximization problem...
In this paper, energy efficient transmit antenna selection in underlay cognitive radio (CR) multiple-input multiple-output (MIMO) systems from a cross layer perspective, is investigated. Conventional energy efficient antenna selection optimizes an energy efficiency (EE) metric defined in terms of the system capacity and energy consumption, making it a physical layer criterion. In this work, we propose...
Throughput in IEEE 802.11 networks depends on a large number of factors related to the standard version, transmission conditions in the radio channel and a number of users of the network. In addition, the bit rate obtained for the actual conditions is significantly different from the theoretical maximum bit rate defined in the standard as it can be only the part of the maximum bit rate. The authors...
Memory interference is a critical impediment to system performance in CMP systems. To address this problem, we first propose a Dynamically Proportional Bandwidth Throttling policy (DPBT), which dynamically throttles back memory-intensive applications based on their memory access behavior. DPBT achieves a more balance memory bandwidth partitioning. Moreover, we improve the previous memory channel partitioning...
Cloud storage services are associated with high latency variance, and degraded throughput which is problematic when users are fetching and storing content for interactive applications. This can be attributed to performance hotspots created by slow nodes in a storage cluster, and performance interference caused by multi-tenancy, and background tasks such as data scrubbing, backfilling, recovery, etc...
Cloud computing has been adapted for various application areas because it can reduce the time required for system development and the cost of hardware. One of the factors that degrades performance stability of applications running in the cloud is “unexpected loads”, caused by interference between Virtual Machines (VMs) coexisting on the same physical machine. In this paper, we propose a VM scaling...
Smartphones and other devices connected to a mobile network typically create billions of measurement samples every day. Those measurements are currently used for instantaneous resource allocation and link adaptation. There is much room for using the measurements also for network optimization with big data analytics. The measurements give valuable insight into the service quality experienced by devices...
In this work, we study a practical resource allocation (RA) scheme that considers heterogeneous services in OFDMA femtocell networks. Heterogeneous services include guarantees of the minimum data-rate for delay-sensitive (DS) users and the fairness for delay-tolerant (DT) users. The RA problem is formulated to maximize the total throughput of all femtocells while satisfying the constraints of cross-tier...
Non-orthogonal multiple access (NOMA) is a promising multiple access technique for 5G wireless technology. In this paper, we first discuss the fundamentals of uplink and downlink NOMA transmissions in a cellular system and outline their key distinctions in terms of implementation complexity, detection and decoding at the SIC receiver(s), and the intra-cell and inter-cell interferences. Later, for...
This paper presents a mobility-aware channel allocation strategy for clustered ad hoc network. Our main novelty is to consider the mobility associated with the number of times that the channel with larger spectral distance is allocated to guide the channel allocation process, while quickly responding to changes in the network topology. In our performance evaluation, we use a realistic mobility model...
Recently, the concept of heterogeneous networks (HetNets) has been proposed as an alternative solution to provide higher coverage and capacity for cellular networks. In HetNets concept, many of small base stations (SBSs) are employed in the existing cell of macro base stations (MBSs) to increase the coverage and system capacity. However, the employment of many SBSs in the existing macro cells would...
Future 5G mobile networks are expected to support high numbers of simultaneously connected devices and to achieve high system spectrum efficiency at low power consumption. To attain these goals, device-to-device (D2D) communication is a key component. We allow any cellular user equipment to share its radio resource with multiple D2D devices and then develop the MiSo algorithm, which considers spectrum...
Wireless Mesh Networks (WMNs) are gaining popularity due to the features provided, especially the low cost and self-configuration ability. In WMNs, the data traffic is transmitted through intermediate nodes and a number of packets are dropped during the transmission due to various reasons. One significant reason is the limitation of network resources such as bandwidth and buffer size. Because of these...
In fifth-generation mobile communication systems (5G), it is necessary to significantly increase system capacity compared with 4G in order to accommodate rapidly increasing mobile data traffic. Cell densification has been considered an effective way to increase system capacity. However, severe intercell interference degrades the system capacity due to the increase of the line-of-sight environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.