We apply network virtualization to remove the differences between heterogeneous networks in Fiber-Wireless (FiWi) network to establish intelligent multipath access through the flexible use of virtual networks (VNs) de...
详细信息
Proposed a relay routing method for Radio and TV services, the method through obtaining the node's time-delay and power information, obtained the value of the system interrupt decisions, and as a decision threshol...
详细信息
The interference problem is a bottleneck of femtocell development as more and more femtocells are deployed. This paper considers interference from macro-cell as well as femtocells and puts forward a novel interference...
详细信息
ISBN:
(纸本)9781849198196
The interference problem is a bottleneck of femtocell development as more and more femtocells are deployed. This paper considers interference from macro-cell as well as femtocells and puts forward a novel interference avoidance scheme. The proposed scheme employs cognitive radio technology which can sniff the resources usage to obtain the real-time environment information, and then allocates the frequency resources to femtocell network. In this way, interference mitigation is fulfilled. Simulations verify that the proposed scheme is able to achieve higher capacity and lower interference than the classical dedicated channel and co-channel deployment schemes.
This paper proposes a novel parametric channel estimation approach for orthogonal frequency-division multiplexing (OFDM) systems. The method is composed of two parts: estimation of channel parameters and estimation of...
详细信息
ISBN:
(纸本)9781849197298
This paper proposes a novel parametric channel estimation approach for orthogonal frequency-division multiplexing (OFDM) systems. The method is composed of two parts: estimation of channel parameters and estimation of channel coefficients. The exponentially embedded family (EEF) criterion is exploited to determine the number of channel paths as well as the multipath time delays. Based on these parameters, channel frequency responses are estimated. Additionally, our scheme is computational efficient due to the needless of eigenvalue decomposition (EVD) or the estimation of signal parameters by rotational invariance technique (ESPRIT). Simulations are provided to validate the performance of our algorithm from the perspectives of channel parameter error probability (CPEP) and mean square error (MSE).
Caching scheme will change the original feature of the network in Content Centric networking (CCN). So it becomes a challenge to describe the caching node importance according to network traffic and user behavior. In ...
详细信息
ISBN:
(纸本)9781849198196
Caching scheme will change the original feature of the network in Content Centric networking (CCN). So it becomes a challenge to describe the caching node importance according to network traffic and user behavior. In this work, a new metric named Request Influence Degree (RID) is defined to reflect the degree of node importance. Then the caching performance of CCN has been addressed with specially focusing on the size of individual CCN router caches. Finally, a newly content store space heterogeneous allocation scheme based on the metric RID across the CCN network has been proposed. Numerical experiments reveal that the new scheme can decrease the routing stretch and the source server load contrasting that of the homogeneous assignment and several graph-related centrality metrics allocations.
We present a fundamentally different approach to improve the security of cloud storage. In contrast to previous methods, our approach introduces third party trusted timestamp and certificate into Cloud storage framewo...
详细信息
ISBN:
(纸本)9781849198196
We present a fundamentally different approach to improve the security of cloud storage. In contrast to previous methods, our approach introduces third party trusted timestamp and certificate into Cloud storage framework. And user's request is multiply validated. There are three main aspects. (i) Certificate identifies the user's identity;(ii) Trusted timestamp is added to the user's operation request;(iii) Cloud storage system communicates with TSA and Directory server for user information verification. Furthermore, our approach has two important features. First, we use PKI technology to improve cloud storage system security, and through Directory server to authenticate the user certificate status. Second, Cloud storage vets user's operation requests based on trusted timestamps and stores user's operation records, which can provide security services including safety audit, electronic evidence and other services. Our results show that our mechanism can vet and monitor various types of data operations in cloud storage system under the premise of increasing a very small overhead, and the security of cloud storage has greatly enhanced.
Content Centric networking (CCN) is one of the most promising future networkarchitectures. Current researches on CCN routing scheme mainly focus on finding the best single routing path and then transferring all the c...
详细信息
ISBN:
(纸本)9781849198196
Content Centric networking (CCN) is one of the most promising future networkarchitectures. Current researches on CCN routing scheme mainly focus on finding the best single routing path and then transferring all the content chunks along this path. For an Interest packet who should have had opportunities to be routed along multiple paths to reach more repositories but only been routed along one single path due to the single path routing scheme, the problems of low utilization of the network resources and unbalance of the load of the faces and repositories are caused. This paper focuses on how to make best use of multiple paths to route the Interests, and further transfer different chunks of the content back along the paths. According to the different network-status parameters, a Multi-path Interests Routing (MIR) scheme is proposed for CCN routing, which is based on Analytical Hierarchy Process (AHP). AHP is a method for obtaining the optimized result of the Interest packets allocation. The simulation experiments have been performed to evaluate the proposed scheme in terms of a wide range of performance metrics. The results show that the proposed scheme significantly outperforms existing scheme.
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user *** this paper,we propo...
详细信息
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user *** this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic ***,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access *** handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency *** using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network *** show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.
By using 60GHz spectrum in high frequency carrier,IEEE 802.11ad is widely used in the transmission of high-definition *** this paper,an adaptive cross-layer optimization scheme is proposed based on IEEE 802.11ad which...
详细信息
ISBN:
(纸本)9781479900763
By using 60GHz spectrum in high frequency carrier,IEEE 802.11ad is widely used in the transmission of high-definition *** this paper,an adaptive cross-layer optimization scheme is proposed based on IEEE 802.11ad which involves modulation and coding at the physical layer,retransmission policy at the medium access control layer and source coding at the video coding *** scheme aims at minimize the video distortion between original video at sending end and reconstructed video at receiver under certain time *** results show that the proposed scheme can select a proper combination of parameters at each layer mentioned above for a given SNR and greatly improve the overall performance in minimizing the video distortion.
Handover(HO) is a key procedure in long term evolution(LTE) *** paper makes a detailed introduction on two aspects in HO measurement procedure—Layer3 filtering theory and the radio link failure(RLF) *** the channel e...
详细信息
ISBN:
(纸本)9781479900763
Handover(HO) is a key procedure in long term evolution(LTE) *** paper makes a detailed introduction on two aspects in HO measurement procedure—Layer3 filtering theory and the radio link failure(RLF) *** the channel environment in mountainous scenario has a great effect on received signal,we have made researches and optimizations on user equipment(UE) measurement signal *** procedure based on Layer3(L3) filtering and optimized RLF procedure are designed and implemented in a dynamic system level simulation platform which models the mountainous *** UE measured Reference Signal Received Power(RSRP) of source and target eNodeB with different L3 filtering factor have been measured to make a comparison and select the best ***-pong HO rate and RLF rate are used to evaluate the influence of L3 filtering to HO *** results show that the best L3 filtering factor is 1/6 and the optimized RLF procedure is effective in mountainous *** paper presents a new fast interpolation method based on edge *** method extracts image edge by improved canny operator which has two specified thresholds *** for different areas,it chooses different *** can keep edge details while doing quick *** experimental results show that the effect of this method can hold the edge details very well,and it is obviously superior to the traditional *** method provides a better initial image for the super resolution reconstruction.
暂无评论