The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we focus on the issue of maximizing the data collected by a mobile sink with unlimited energy which traverses a given straight path in an energy harvesting wireless sensor network (EH-WSN). Sensors are assumed to harvest energy periodically from the solar resources in their surrounding. Due to limitations on energy replenished within different time intervals, the sensors can reduce...
In this paper, by utilizing the MCA (Multi-Cache Approximation) algorithm, which is an approximate algorithm for numerically solving cache hit rates in a multi-cache network, we analytically obtain performance metrics of CCN (Content-Centric Networking). Specifically, our analytic model consists of multiple routers, multiple repositories (e.g., storage servers), and multiple entities (e.g., clients)...
The mechanisms of allocating the resources in Long Term Evolution (LTE) cellular networks are very critical issues, because scheduling algorithms have the main responsibility for determining how to allocate radio resources for different users. In this work a dynamically adopted Proportional Fair (PF) scheduling strategy for capacity enhancement of LTE system is proposed. Performance comparison with...
Wireless networks are required to guarantee the Quality of Service (QoS), including throughput, fairness, delay, etc. IEEE802.11 MAC protocol employs a typical backoff mechanism, Binary Exponential Backoff (BEB) algorithm, to avoid collisions when multiple users try to access the shared wireless channel. Many works on QoS guaranteeing point out that the BEB algorithm introduces the unfairness and...
We propose a novel, near-optimal data detection algorithm and a corresponding FPGA design for large multiple-input multiple-output (MIMO) wireless systems. Our algorithm, referred to as TASER (short for triangular approximate semidefinite relaxation), relaxes the maximum-likelihood (ML) detection problem to a semidefinite program and solves a non-convex approximation using a preconditioned forward-backward...
This paper presents an area-efficient memory-based FFT processor for long FFT lengths. To achieve high throughput, radix-42 FFT algorithm is adopted to reduce number of FFT stages. For low-complexity realization of the main butterfly processing element, a folded-by-2 scheme along with an optimized scheduling is designed. Variable FFT lengths (i.e., 1024 ∼ 32768 points) can be supported through flexible...
Lenstra-Lenstra-Lovász (LLL) algorithm is a common technique for lattice reduction (LR) aided multiple-input multiple-output (MIMO) detectors. This paper presents the first VLSI implementation of a recently published Incremental fixed-complexity LLL algorithm (Incremental fcLLL) with fewer iterations than other existing fcLLL algorithms. We propose a modified Incremental fcLLL algorithm with simplified...
The decisions of routing and scheduling in typical backpressure framework are actually made jointly, which hurts modularity and imposes difficulties in practice. In addition, the backpressure style routing and scheduling usually lead poor delay performance. This paper proposes a throughput utility maximization algorithm for multisession multihop wireless networks by applying the Lyapunov optimization...
In this paper, resource allocation (RA) problem in heterogeneous Software Defined Network (SDN) with infrastructure sharing platform among multiple network service providers (NSPs) is studied. The considered problem is modeled as a reverse combinatorial auction (R-CA) game, which takes competitiveness and fairness of different NSPs into account. The heterogeneous RA associated with personal QoS requirement...
The ubiquity of WLAN networks bears inherently a risk of generating considerable interference level. Measurements have been obtained to demonstrate that densely, though randomly deployed Access Points cannot operate at maximum bit rates due to mutual interference. A simple non-collaborating algorithm has been proposed and verified under carefully controlled measurement conditions providing a proof...
This paper focuses on addressing the Access Point (AP) selection problem by relying on a centralized controller that provides a global view of the network. This approach follows the Software-Defined Networking (SDN) concept, which has long been considered in the literature as an innovative method to control management functionalities for wired networks and that is also now becoming a hot topic in...
In the context of Software-Defined Networking (SDN), various sophisticated policy-aware network functions such as intrusion detection, access control and load balancer, can be realized via specified middlebox devices. However, high congestions may occur in specific bottleneck links if middlebox selection and traffic routing are not well jointly planed. To this end, we study a joint optimization of...
Network-Assisted Interference Cancellation and Suppression (NAICS) receivers have appeared as a promising way to curb inter-cell interference in future dense network deployments. This investigation compares the performance of a NAICS receiver with successive interference cancellation capabilities, known as Symbol-Level Interference Cancellation (SLIC), with respect to a baseline Minimum Mean Square...
Dynamic spectrum access via active spectrum sharing has been considered as a promising approach to improve the spectrum utilization for future wireless systems. In this paper, based on our recent study on the optimal transmit-power allocation for an active spectrum sharing system comprised of single primary-user (PU) and multiple secondary-users (SUs) [7], we move a further step to investigate a more...
Network coding improves transmission efficiency by combining packets at relay nodes and thus reduces the number of packets sent to the network. It is a network layer solution to improve network throughput and transmission efficiency. However, a coded packet must be decodable by the destination, otherwise it is a waste of resource to combine them together and to deliver the coded packet. This paper...
Millimeter wave (mmWave) spectrum is one of the frontiers in the evolution towards the next generation of the wireless communication systems, which can provide great performance benefits at the variform access and backbone networks. However, at the access level the typical rapidly fading behavior of the mmWave channel imposes the careful design of client association to access points (APs), as well...
In order to address the throughput constraints of the system at minimal power consumption, the workload of computing nodes should be balanced. This requires accounting for the underlying hardware characteristics and throughput sustainable by these nodes. This work provides a workload distribution and balancing methodology of a divisible load under a throughput constraint, on heterogeneous nodes. The...
Existing networks deemed as complex system merged with many wireless communication networks. Traditional routing algorithm may not be sufficient to meet such complex data transmission from the source nodes to the sink nodes. Therefore, serious studying and investigation for traffic performance and congestion over complex networks seem to be an urgent challenge. Data propagation over complex networks...
In this paper, an optimal link selection and data rate assignment algorithm for spatial time division multiple access (STDMA) medium access control (MAC) protocols is exploited. The motivation for this study is jointly searching for optimal links and corresponding rates in simultaneous transmission environments in order to maximize the throughput capacity in each time slot. A mathematical formulation...
VANET (Vehicular Ad-Hoc Network) is an optimistic approach to present safety and other applications to the clients and it is the key module of the intelligent transport system. In this paper, Grayhole attack is mitigated with respect to VANET. The prevention is done through Genetic Algorithm. Genetic Algorithm produce solutions to optimization problems by means of techniques stimulated by natural...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.