The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile ad hoc networks or MANETs are infrastructureless wireless networks where each node can freely move and directly connect to the other nodes located within its transmission range to form the topology in any arbitrary pattern. Hence, to ensure network connectivity, each node tends to use the maximum transmission power to extend its transmission range. However, this maximized transmission range...
Pipeline of processors allow the execution of a sequential streaming program on multiple processors. However, partitioning sequential code for Multiprocessor Systems-on-Chips (MPSoCs), and then creating the MPSoC platform for the sequential code to execute, is a challenging problem. Parallelizing/pipelining statements within a control loop will improve the throughput of each iteration and the overall...
Radio Resource Management (RRM) plays an important role in wireless communication systems, especially in more advanced systems with more constraint conditions. In this paper, we first proposed a generalized water-filling approach to solve the power allocation problem to minimize sum power while meet the target sum rate constraint with weights. Based on this sum power objective function, we extend...
We exploit the Degrees of Freedom (DoF) resulting from the deployment of multiple antennas, both at the Access Points (APs) and the clients, to address the Hidden Terminal problem in Multi User (MU) Multiple Input Multiple Output (MIMO)Wireless Local Area Networks (WLANs). This approach permits concurrent transmissions and is able to maintain a constant gain in network throughput in a Hidden Terminal...
Underwater acoustic channel has some special properties: large propagation delay, limited bandwidth and poor quality of the physical link. The design of MAC protocol for underwater acoustic sensor networks is more difficult than terrestrial wireless networks. Because of the large propagation delay, the MAC protocol of the terrestrial wireless networks is not suitable for the underwater acoustic sensor...
As one kind of storage technology, deduplicaition is widely deployed in all kinds of storage systems. However, the key problems of duplication, such as data throughput and usage of RAM, have not been perfectly addressed. Especially, with the emergence of cloud storage, traditional deduplication methods are not able to adapt to the velocity characteristic of the large data sets. This paper proposes...
In order to estimate the DL cell average throughput of LTE network, the paper proposes an algorithm of LTE throughput based on MCS level distribution which can be used to estimate the DL cell capacity under different load conditions. The algorithm is convenient for operation and useful in guiding network planning and optimization, the simulation results show that the algorithm is effective and the...
Modern distributed key-value stores are offering superior performance, incremental scalability, and fine availability for data-intensive computing and cloud-based applications. Among those distributed data stores, the designs that ensure the confidentiality of sensitive data, however, have not been fully explored yet. In this paper, we focus on designing and implementing a scalable, private, and searchable...
Hadoop, an open-source implementation of MapReduce, is widely used because of its ease of programming, scalability, and availability. With the explosive development of cloud computing, business and scientific applications increasingly take advantage of Hadoop. The sizes of files stored and processed in Hadoop are not bound to very large files anymore. However, Hadoop cannot provide stable and efficient...
Cellular based M2M systems generate massive number of access requests which create congestion in the cellular network. The contention-based random access procedures are designed for cellular networks which cannot accommodate a large number of M2M traffic. In this paper, a contention-based slotted Aloha random access procedure for M2M network is first analyzed using different performance metrics. The...
In this paper, we consider an opportunistic beamforming scheduling scheme of secondary users (SUs) which can share the spectrum with a primary user (PU) in an underlay cognitive radio network. In the scheduling process, the cognitive base station (CBS) having multi-antennas, generates orthogonal beams which insure the minimum interference to the PU. Then, each SU feeds back its maximum signal to interference...
Frequency reuse-1 model is required to satisfy the exponential increase of data demands in mobile networks, such as the Long Term Evolution (LTE) of Universal Mobile Terrestrial radio access System (UMTS). However, the simultaneous usage of the same frequency resources in adjacent LTE cells creates inter-cell interference problems, that mainly affect cell-edge users. Inter-Cell Interference Coordination...
Recently a lot of effort has been dedicated to maximize throughput in highly mobile multi-channel networks such as vehicular networks. Nevertheless, distributing the load as equally as possible between service channels varying in space and time is still a matter of investigation. The contributions of this paper are two-fold. Firstly, we present an adaptive multi-channel allocation mechanism (AMC)...
The topic of data deduplication has received lately a lot of attention for its storage reduction functionality. Data deduplication essentially refers to the elimination of redundant data, leaving only one copy of the data to be stored, and is meant to reduce the pain regarding the exponential data growth in backup or archiving centers. Most existing state-of-the-art deduplication systems rely on approximate...
LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and...
In QoS-aware service selection, a service requester seeks to maximize its utility by selecting a service provider that charges the lowest service price while meeting the requester's QoS requirements. In existing selection approaches, a service requester focuses on finding providers based on their QoS and thereby ignores their service prices that could change with their QoS. High QoS may provide more...
This paper addresses a multi-criteria decision method properly designed to effectively evaluate the most performing strategy for multicast content delivery in Long Term Evolution (LTE) and beyond systems. We compared the legacy conservative-based approach with other promising strategies in literature, i.e., opportunistic multicasting and subgroup-based policies tailored to exploit different cost functions,...
Surgical scheduling is an important decision-making problem in the operational management of hospital. We formulate this problem as an Integer Programming model for the purpose of maximizing the surgical throughput, and discuss the decomposition property of the model based on the inner features of the surgical scheduling. At last an exact optimal method, Branch-and-Price, is proposed to solve the...
LTE uplink has two major scheduling algorithms, namely, Best CQI (BCQI) algorithm and Proportional Fairness (PF) algorithm. PF algorithm provides less system throughput than BCQI algorithm, however, unlike BCQI algorithm it considers users with poor channel condition for allocation process. In this paper, a new scheduling algorithm called as Opportunistic Dual Metric (ODM) Scheduling Algorithm is...
Filter Bank MultiCarrier modulation (FBMC) is a promising waveform technology envisaged for future mobile communication networks. For many transmission scenarios, the combination of multiple non-contiguous spectrum bands is foreseen. Because of coexistence issues, very low Adjacent Channel Leakage is required making FBMC waveforms of particular interest. However the fair frequency localization of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.