The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a hybrid approach has been proposed for maximizing ergodic capacity of the cognitive radio networks. This hybrid scheme is based upon the sensing information (sensing Metric) obtained by the secondary receiver about the absence or the presence of the primary user. By adopting hybrid scheme, one can increase the ergodic capacity of the network subject to peak transmit power constraint...
This paper proposes a novel power optimization technique in which DRX cycle is activated based on the scheduling decision. DRX MAC Control Element (CE) command is issued to the UEs for which scheduling is not possible in DRX ON duration time. Simulation results show that, significant gain can be achieved in power saving using the proposed method under specific scheduler design parameter conditions...
A new approach to implementation of the virtual network embedding strategy over OpenStack cloud platform presented. We presented the OpenStack cloud platform and the problems associated with virtual network embedding. Then, conduct OpenStack dashboard customization to generate virtual network requests to process these requests. We modified OpenStack Compute module to provide bandwidth limitation for...
We propose a Coordinated Non-Orthogonal Multiple Access (CO-NOMA) scheme for resource allocation in the context of mobile networks. NOMA refers to schemes where multiple users can access the wireless channel in the same frequency band simultaneously. In this study, we consider NOMA with power domain multiplexing, where the near- far property in space is exploited through appropriate power allocations...
Motivated by Online Ad allocation with advertisers that pursue multiple objectives, we introduce and study a problem of Ad Allocation with Secondary Metrics. For instance, advertisers pay per click which is the primary metric the platforms optimize for, but require the average cost of a conversion — the secondary metric — to be below some threshold. This is an explicit option for Facebook advertisers...
To further increase the system capacity in cellular networks, establishing stable D2D (Device-to-Device) links with efficient power allocation is necessary due to the communication interferences. Existing works are mainly focused on the interference control and mitigation at the physical layer. However, the information from social interactions among D2D users are also helpful to improve the system...
Many high-performance computing (HPC) sites extend their clusters to support Hadoop MapReduce for a variety of applications. However, HPC cluster differs from Hadoop cluster on the configurations of storage resources. In the Hadoop Distributed File System (HDFS), data resides on the compute nodes, while in the HPC cluster, data is stored on separate nodes dedicated to storage. Dedicated storage offloads...
The creation of social ties is driven by several factors which can arguably be related to individual preferences and to the common social environment of individuals. Effects of homophily and triadic closure mechanisms are claimed to be important in terms of initiating new social interactions and in turn to shape the global social structure. This way they eventually provide some potential to predict...
Horizontally scalable applications can potentially run very efficiently over IaaS environments. For that, application providers need to appropriately plan the resource capacity that is to be acquired from the cloud providers, such that, at any point in time, they allocate the smallest infrastructure that is needed to provide the required quality of service for their applications. Since the workload...
Virtualisation encourages users to procure, relin-quish and scale resources frequently. Such fluid deployments require continuous performance assessment to inform resource allocation. In current systems Tick Accounting, Load Average, and Memory Usage are used to judge system performance and to trigger resource scaling. We argue that the readily available Context Switch (CS) counter is also an effective...
Intelligent Transportation Systems (ITS) demand sophisticated vehicular networks integrating entities from the transportation sector. The ability to plan and manage such networks represents a key challenge for moving ITS solutions from laboratories into the streets. In this work, we propose Gamma Deployment as a metric for evaluating the distribution of roadside units in vehicular networks by considering...
In this paper, we develop an efficient design for a decision engine (DE) with anti-jamming (AJ) capability for advanced wideband satellite communication (SATCOM) systems. Our goal is to design a decision engine that evaluates the statistical observations of spectrum and link metrics provided by the co-located dynamic spectrum access (DSA) components. Upon the evaluation of the observations provided...
SDN orchestration, the problem of integrating and deploying multiple network control functions (NCFs) while minimizing suboptimal network states that can result from competing NCF objectives, is a challenging open problem. In this work, we formulate SDN orchestration as a multiobjective optimization problem, and present an evolutionary approach designed to explore the NCF tradeoff space comprehensively...
The growing variety and consumption of the mobile services throughout the Long Term Evolution (LTE) mobile networks lead to various challenging issues in radio resource scheduling. One of the main challenges in LTE resource management is how to allocate the scare available bandwidth, especially in overload states of the network, to the services which have different characteristics and quality requirements...
In this paper, we propose a policy-based model to achieve end-to-end (E2E) service negotiation among multiple domains that constitute E2E path. The model relies on a centralized approach, realized via the third party (3P) agent, which acts as a proxy server for local (per-domain) management entities. We demonstrate the proposed model on the implementation of policies for allocation of performance...
The growing variety and consumption of the mobile services throughout the cellular networks lead to various challenging issues in radio resource scheduling. To have an apparent perspective over the resource scheduling in real implementation of the next generation cellular networks, it is essential to consider sequences of alternating overload and normal states of the traffic, occurring much in the...
Apache Storm has recently emerged as an attractive fault-tolerant open-source distributed data processing platform that has been chosen by many industry leaders to develop real-time applications for processing a huge amount of data in a scalable manner. A key aspect to achieve the best performance in this system lies on the design of an efficient scheduler for component execution, called topology,...
In this paper, we consider the problem of ensuring fairness in systems serving a mixture of fully backlogged applications, which continuously demand resources, and non-fully backlogged applications. We introduce a fairness metric, called interference fairness, the basic idea underlying which is that the interference caused by application A for another application B should be equal to that caused by...
Allocating resources to virtualized network functions and services to meet service level agreements is a challenging task for NFV management and orchestration systems. This becomes even more challenging when agile development methodologies, like DevOps, are applied. In such scenarios, management and orchestration systems are continuously facing new versions of functions and services which makes it...
Analyzing the behavioral patterns to maintain the workload in cloud computing is very important. There are number of cloud data centers that have the facility to maintain this. But this paper has provided the approach for resource utilization based on two metrics, energy and cost function. This approach works within the workload which helps to understand the relationship between users and servers,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.