LTE-U is one of the promising solutions to the spectrum scarcity problem. LTE-U extends the benefits of LTE-A to the unlicensed 5 GHz band, mainly used by WiFi networks. the main challenge facing deploying the LTE-U i...
详细信息
ISBN:
(纸本)9781538620700
LTE-U is one of the promising solutions to the spectrum scarcity problem. LTE-U extends the benefits of LTE-A to the unlicensed 5 GHz band, mainly used by WiFi networks. the main challenge facing deploying the LTE-U is the coexistence between the LTE and WiFi systems such that the presence of LTE does not harm the WiFi network performance. In this paper, we introduce a bargaining-based cooperative coexistence framework that controls the LTE system access to the unlicensed band of the WiFi system. In this framework, LTE User Equipment (UE) utilizes its WiFi interfaces to act as a relay to forward the WiFi network packets using Decode and Forward (DF) cooperative communication to enhance the WiFi network performance. On return, the LTE system gains a welcomed access to the unlicensed band. the percentage of time the LTE system is allowed to access the unlicensed band is determined by bargaining theory solutions. We numerically evaluate the performance of the coexistence system where the results show that the proposed framework is beneficial for boththe WiFi and LTE systems.
In this paper, we consider the distributed optimization problem of multi-agent systems. the objective is to minimize the global objective function, which is the sum of local objective functions, by using local communi...
详细信息
ISBN:
(纸本)9781538660898
In this paper, we consider the distributed optimization problem of multi-agent systems. the objective is to minimize the global objective function, which is the sum of local objective functions, by using local communication and local computation. We develop a distributed proportional-integral (PI) algorithm, based on the information received from its neighboring agents through the communication network and the gradient of its own objective function. For the case of quadratic objective functions, we establish sufficient conditions on the gain parameters under which the algorithm exponentially converges to the unique global minimizer. Moreover, we equip the proposed algorithm with a decentralized algorithm, which enables an arbitrarily chosen agent to compute the exact global minimizer within a finite number of time steps, using its own states observed over a successive time steps. Finally, the theoretical results are illustrated by numerical simulations.
Mobile traffic volume is increasing rapidly, pressuring the underlying infrastructure to quickly increase its capacity. New applications are further exacerbating this problem. Device to-Device communication has been l...
详细信息
ISBN:
(纸本)9781538668764
Mobile traffic volume is increasing rapidly, pressuring the underlying infrastructure to quickly increase its capacity. New applications are further exacerbating this problem. Device to-Device communication has been long recognized as a means to offload traffic from the infrastructure;however, the host oriented model of the TCP/IP-based Internet poses challenges to this communication pattern. this paper addresses these issues by proposing a scheme that uses a data-centric model to fetch contents from nearby peers while increasing the resiliency of the network in cases of outages and disasters. We collected real data from social media to create a content request pattern and evaluate our approach through the simulation of realistic urban scenarios. Additionally, we analyze the scenario of large crowds in sports venues. Our simulation results show that we can offload traffic from the backhaul network by up to 51.7%, suggesting an advantageous path to support the surge in traffic while keeping complexity and cost for the network operator at manageable levels.
In this paper, we analyze the physical layer secrecy performance of a 5G radio frequency energy harvesting (RF-EH) network in the presence of multiple passive eavesdroppers. In this system, the source is considered as...
详细信息
Volterra-series nonlinear system identification has recently been transformed into a tensor decomposition and optimization problem. Such tensor network reformulation with small tensor cores overcomes the curse of dime...
详细信息
ISBN:
(纸本)9781538644416
Volterra-series nonlinear system identification has recently been transformed into a tensor decomposition and optimization problem. Such tensor network reformulation with small tensor cores overcomes the curse of dimensionality in deploying high order Volterra kernels, and allows the fast simulation of arbitrarily nonlinear systems. this paper further advances the tensor core identification by adding sparsity: pruning unimportant weights and retraining the remaining weights, while retaining most accuracy. the resultant sparse macromodels are hardware friendly and can facilitate low power signal processing.
the limitations of the current real-time operating systems are given by the CPU architecture, the memory, and the I/O subsystem, but also by the high-level languages and their compilers, and the unpredictable answer o...
详细信息
ISBN:
(纸本)9781538614938
the limitations of the current real-time operating systems are given by the CPU architecture, the memory, and the I/O subsystem, but also by the high-level languages and their compilers, and the unpredictable answer of the asynchronous interrupts. the most important issue of a real time system is resource scheduling: processor, memory, I/O ports and communicationnetworks, when systems are distributed. the present article gives an overview of the state of the art of qualitative research in terms of tasks schedulability algorithms used for the nMPRA (Multi Pipeline Register Architecture) CPU architecture in real-time environments. By introducing a jitter of maximum three clock cycles for the contexts switching of tasks, the nMPRA processor proves a deterministic hardware implementation, due to the integrated nHSE (Hardware Scheduler Engine for n tasks). this paper presents and analyzes the current state of real time operation systems with hardware implementation functions.
Cyber-physical systems (CPS) usually have to cope with open contexts, i.e. the context that these systems interact withthrough sensors and actuators or communicationnetworks changes its morphology during runtime. Fo...
详细信息
ISBN:
(纸本)9781538635933
Cyber-physical systems (CPS) usually have to cope with open contexts, i.e. the context that these systems interact withthrough sensors and actuators or communicationnetworks changes its morphology during runtime. For instance, CPS can be deployed in the manufacturing domain to form a modular production system, which, at some time during its lifecycle, might have to produce new products or to interact with new modules, which have been designed by different stakeholders. In order to be able to cope with open contexts, CPSs rely on ontologies that represent the information being shared among them. However, due to the complexity of a CPS's context, building these ontologies as a basis for information exchange during runtime is a non-trivial task that requires a structured approach. the contribution of this paper is twofold. First, we present an ontology building method that is tailored towards the needs of CPS, beginning with ontological requirements and ending with a formal ontology. Second, we apply this method to build an ontology for communicating information between CPSs about processes and machine states in the manufacturing domain.
Detecting communities in networks is to find subgroups of nodes with similar characteristics, which is commonly defined as finding groups of nodes with dense connection in undirected networks. However, communities in ...
详细信息
In this research paper, we propose a novel impairment-aware resource allocation scheme that increases spectrum efficiency of an elastic optical network (EON), while satisfying the quality of transmission (QoT) require...
详细信息
ISBN:
(数字)9781728137063
ISBN:
(纸本)9781728137070
In this research paper, we propose a novel impairment-aware resource allocation scheme that increases spectrum efficiency of an elastic optical network (EON), while satisfying the quality of transmission (QoT) requirements of traffic connections with different service priorities (i.e., high and low priority traffic). To demonstrate the validity and superiority of our algorithm, we compared the results of our proposed resource allocation scheme against a benchmark algorithm. the results were simulated for a 6-node network and a 14-node network. Compared to the benchmark algorithm, on average, our proposed scheme increases spectrum efficiency by an additional 20% while ensuring a minimum latency for high priority traffic, causing minimum disruptions to existing low priority traffic, and blocking less than 1% of the total connections.
the novel reduced networks on a base of the nontraditional reentrant structures are proposed. By properly choosing their parameters, it is possible to create the versions of the devices those have suitable range of in...
详细信息
暂无评论