The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, information security of a cooperative wireless communication system over three-phase amplify-and-forward (AF) two-way relaying channels is investigated. A relay power allocation scheme is proposed to improve secrecy capacity of the system. We first derive the secrecy rate expression for the basic scenario which consists of one source, one destination, one single relay, and an eavesdropper...
In this paper, we investigate the resource allocation for the video streaming service in the cognitive radio network (CRN) based on orthogonal frequency division multiple access (OFDMA). Considering the channel estimation error between secondary transmitters (STx) and primary receivers (PRx), we address the probabilistic interference constraint model. With imperfect CSI between STx and secondary receivers...
Mobile edge computing (MEC) has recently emerged as an important paradigm to bring computation and cache resources to the edge of core networks. However, the resources of edge network are relatively limited, so it is necessary to cooperate with data center (DC) which has sufficient computational resources. In this paper, we aim at designing a computation offloading and data caching model under the...
Virtual Network Embedding (VNE) is widely considered as a longstanding challenge in Network Virtualization: how to efficiently embed multiple virtual networks (VNs), with node-link resource requirements, onto the shared substrate network (SN), having finite underlying resources. Most heuristic VNE algorithms in the literature, only considering single network topology attribute and local network resources,...
In this paper, we propose a localization algorithm in a visible light communication (VLC) system based on the light intensity. Firstly, by developing a VLC platform, the light intensity can be measured to derive a practical equation, which reveals the relationship between the received signal strength (RSS) and the distance from the transmitter to the receiver. However, the practical additive noise...
In traditional physical interference model for Wireless Mesh Networks (WMNs) or wireless networks, a message transmitted by a node v to the intended node w within v′ transmission range can be successfully received at w if only if in this step w is listening and the interference power received at w due to simultaneous transmissions from other nodes within w′ interference range is less than the predefined...
This paper investigates the energy harvesting fading multiple-access channels, where the transmitters harvest random amounts of energy from the environment and the data transmissions are subject to statistical quality of service (QoS) constraints in the form of limitations on the buffer overflow probability. With the assumption that the channel state information (CSI) and harvested energy in all time...
Due to the power consumption and hardware implementation cost limitation, hybrid analog and digital precoding is a promising candidate for millimeter wave (mmWave) large-scale multiple-input multiple-output (MIMO) systems. Most of the prior work on hybrid beamforming considers frequency-flat channels. However, in practice, thanks to the large amount of available spectral resource, mmWave communication...
A lot of research has been proposed to improve network performance in the data center. However, with the development of distributed applications, these applications face a new performance bottleneck since existing solutions almost ignore the application level optimization. The concept of coflow has been proposed which provides a chance for us to optimize network in application level rather than individual...
This paper investigates the MAC protocol tailored for wireless sensor networks deployed in the intertidal environment (IT-WSNs) where the ebb and flow of the tide influence the packet transmission. Most packets fail to be delivered when the sensor node is submerged by seawater during high tide. To deal with it, an environment-aware electrode module is designed to detect the tide level and determine...
This paper investigates the network function virtualization (NFV)-enabled multicast problem, and proposes a steiner tree-based algorithm to reduce the cost of virtual network function (VNF) deployment and routing. In the algorithm, to minimize the bandwidth consumption, the Steiner tree is constructed by taking all the destination nodes as the terminals. Then a interconnection node of the tree is...
Under the target's sparse prior condition, the sparse signal recovery algorithm based on compressive sensing (CS) theory can improve the imaging resolution of the inverse synthetic aperture radar (ISAR) with limited observation samples. However, traditional sparse signal recovery algorithm has poor robustness under low SNR. In view of this problem, under the two-dimensional (2-D) ISAR signal model,...
This paper investigates the ergodic capacity of a multi-input multi-output (MIMO) wireless powered communication system with partial channel state information at the power beacon (PB). Employing time splitting protocol, the PB first transmit energy-bearing signals to the energy constrained source S through beamforming, and then S uses this energy to transmit information to the destination. Unlike...
In this paper, we study the tradeoff of efficiency and delay of Slepian-Wolf distributed source coding (DSC). In the considered network, Machine-Type Communications (MTC) devices transmit correlated data to one base station, the data sources follow a multi-variate Gaussian distribution. To reduce the consumption of communication resources by massive MTC devices, Slepian-Wolf coding is adopted to eliminate...
To satisfy various quality-of-service (QoS) requirements of different services in future fifth generation wireless networks, wireless virtualized network (WVN) architectures have been proposed to concurrently fulfill diversified service demands via network slicing technologies. Considering the dynamic characteristics of wireless channels and user traffic, the resource allocation problem in a WVN with...
Energy efficient cognitive radio networks can simultaneously improve spectrum efficiency (SE) and energy efficiency (EE) of wireless communication networks. This paper studies energy efficient spectrum sensing interval, spectrum sensing energy and transmit power allocation scheme of the secondary user (SU) in CR networks. The EE maximization problem subject to the transmit power constraint and average...
Interference alignment (IA) is a prospective method to manage interference between users in multi-user networks. On the other hand, jamming can be an effective way to combat adversarial eavesdropping for legitimate networks. In this paper, a beneficial jamming scheme is proposed for interference alignment networks. In the scheme, the jammer utilizes its precoding vector to constrain the jamming signal...
In public channels, common signals need to be transmitted omnidirectionally to achieve cell-wide coverage. In this paper, we consider omnidirectional beamforming for common signal transmission in the massive multi-input multi-output (MIMO) scenario. After formulating the task as a max-min optimization problem, we propose a semidefinite programming (SDP) based technique to maximize the minimum received...
In recent years, numbers of non-orthogonal multiple access (NOMA) schemes have been proposed to support the great amounts of wireless connections. However, complex multi-user detection is needed in case that the user power differentiation is not available and simple successive interference cancellation cannot directly apply, which usually incurs unaffordable computational complexity. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.