The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work presents the generation, dynamic phase modulation and phase detection of interfering composite optical vortices. This technique demonstrates a new method for encoding information onto an optical beam for potential use in underwater communication as well as sensing applications including object detection and channel characterization.
In order to keep up with countless emerging applications requirements, cellular systems have to embed new flexible aspects, with the aim of satisfying future wireless environments expectations. In this context, we consider a cellular system based a full-duplex amplify-and-forward cooperative communication over Nakagami-m channel. We assume the direct link between the source and the destination is...
An OVT based on Mach-Zehnder interferometer is proposed in this paper, which helps to convert the electro-optic phase delay into the displacement of the interference fringe. And then, the voltage applied to the electro-optic crystal is obtained by positioning the displacement of the fringe, and the effectiveness of this method is verified by experiments. The new OVT meets the requirements of 0.5%...
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
With the increment in users' data demand and the emergence of applications with stringent Quality of Service requirements, important improvements in cellular network architecture need to be made. In this paper we explore the symbiosis of three key communication technologies in 5G: Device-to-Device communications, 60 GHz unlicensed band transmissions and adaptive beamforming techniques. It provides...
In order to counteract hostile communication based on the advanced Orthogonal Frequency Division Multiplexing (OFDM) technology, an efficient and unrecognizable jamming technique by failing the OFDM cyclic prefix (CP) functionality is developed in the paper. CP is introduced into OFDM systems to prevent interference caused by the multipath fading, as long as it is no shorter than the channel delay...
In mobile Cognitive Radio Networks (CRNs), the frequent link breakage and wireless interference urged the need for novel stable routing solutions. In this paper, we propose STAR, a stable routing protocol that aims at selecting interference-free and durable paths. We investigate the particular Hidden interfering Primary User (HIPU) problem caused by the un-detectable presence of the primary user in...
To satisfy the requirement of increasing mobile traffic, heterogeneous networks (HetNets) will be deployed for the fifth generation (5G) mobile communications systems. Since the deployment of base stations (BSs) in HetNets is generally dense and random, stochastic geometry has increasingly been used to analyze the performance of HetNets. Most of the existing work is based on Poisson point processes...
A few-mode fiber prototype having a rectangular core geometry is experimentally characterized for its modal delays and field profiles by time-gated interferogram analysis. Excellent agreement between experimental and numerical simulations is established.
Smart grid (SG) has been recognized as a promising solution to manage and distribute electricity in the next generation power systems. The large number of devices in power systems make the wired communication a non feasible solution, thus wireless transmission becomes necessary. However this demands a huge portion of radio spectrum. In this work, we aim to provide the secure and reliable SG communication...
Emerging protocols for low-power wireless networks increasingly exploit constructive interference and the capture effect. The basic idea is that the synchronous transmission of identical packets by neighboring nodes leads to constructive interference - or at least do not cause destructive interference. This requires that the temporal displacement of packets at receiving nodes is lower than 0.5 μs...
Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we set up a secure analytical framework for IoT networks to characterize the network delay performance and secrecy performance. Firstly, stochastic geometry and queueing theory are adopted to model the location of IoT devices and the temporal arrival of packets. Based on this model, a low-complexity secure...
Burst Buffer is an effective solution for reducing the data transfer time and the I/O interference in HPC systems. Extending Burst Buffers (BBs) to handle Big Data applications is challenging because BBs must account for the large data inputs of Big Data applications and the performance guarantees of HPC applications - which are considered as first-class citizens in HPC systems. Existing BBs focus...
Most existing multiprocessor schedulability analysis assumes zero cost for preemptions and migrations. In order for those analysis to be correct, execution time estimations are often inflated by a certain (pessimistic) factor, leading to severe waste of computing resource. In this paper, a novel Global Earliest Deadline First (GEDF) schedulability test is proposed, where Cache-Related Preemption Delay...
We introduce a sensor-aided predictive algorithm for multi-hop link quality estimation. The proposed concept uses vehicle sensor data to improve a link adaptation and end-to-end path selection for a vehicular multi-hop data transmission. The obtained results show that the proposed concept allows better multi-hop link quality estimation and significantly improves end-to-end transmission characteristics...
The adoption of IEEE 802.11 wireless networks has grown importantly in previous years. Recently, some vendors are developing smart access points for these networks, which are able to change their operation channel taking interference into consideration. Handoff management in wireless networks, i.e., transferring an active data session from one cell defined by an access point to another, is a critical...
A service-aware dynamic bandwidth allocation with CoMP is proposed in the heterogeneous 5G fronthaul network. Simulation results show that the throughput and delay performance of users have been improved, and the QoS for high priority users can be guaranteed preferentially.
We identify phase noise as a bottleneck for the performance of digital self-interference cancellers that utilize a single auxiliary receiver — single-tap digital cancellers — and operate in multipath propagation environments. Our analysis demonstrates that the degradation due to phase noise is caused by a mismatch between the analog delay of the auxiliary receiver and the different delays of the multipath...
In the communication process, when channel capacity is large enough, channel quality is decided by the wrong acceptance sequence of data packet due to channel interfere, communication limited and so on. This paper surveyed the effect of channel on data sequence reception. The simulation show the relationship between acceptance sequence and channel quality.
Dual-band WiFi which supports both 2.4GHz and 5GHz has been widely deployed, aiming to expand wireless capacity and eliminate serious interference in 2.4GHz. Thus, how to select which band to access to achieve considerable user experience is becoming essential in wireless network. Clients' native decision that always prefers 5GHz will consequently cause serious interference in 5GHz and leave 2.4GHz...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.