The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently an extensive deployment of small cell Networks (SCNs) called two tier-heterogeneous networks have been proposed, especially for dense urban zone. Therefore, Macro Cell Networks containing a hyper density of SCNs distributed randomly within it will emerge the field. The benefits of two tier Heterogeneous Networks (HetNets) are realized through the traffic flooding via small cells. To enhance...
To be able to efficiently utilize high data rates of 100 Gbit/s and beyond, protocols must be carefully selected for specific communication parameters. At the same time, communication parameters, such as data rate/latency requirements and the channel quality, are not static. This contradiction can be solved by switching to the best suited protocol when communicationparameters change. However, replacing...
Multiple SDN applications can make several harmful interferences unintentionally, although each individual application may be properly developed. This paper proposes a Multiple SDN Applications Interference Detector (MSAID). To bridge the gap between the source code of applications and the actual interferences, we leverage symbolic execution and constraint solving to obtain how the event handler handles...
Interference alignment (IA) is an efficient interference management technique that can result in sum-rates that scale linearly with the number of users at high signal-to-noise power ratio (SNR). But it is difficult to directly apply IA to large networks because of heavy signaling overhead and feasibility constraint. Clustered IA divides cells into disjoint clusters where IA is applied in each cluster...
Among the high-radix and low-diameter networks, fat-tree topology is commonly used in HPC and datacenter systems. Resource and job management is critically important to mitigate application interference in order to achieve high system performance and utilization. Preliminary studies have shown the effect of job placement on parallel scientific applications performance. In this work we study interference...
Reflection radio principles, used in RFID systems, have been recently exploited in wireless sensor networking, due to their inherent low-power requirements. This work offers a complete batteryless analog sensor design, implemented and tested in real-world conditions, able to backscatter its sensed information, without any type of analog-to-digital converter (ADC), digital logic or dedicated illuminator,...
If integrated circuit substrates are characterized from a propagative perspective, one can see that parameters such as the source current density distribution or the relative orientation between source and victim, also play a role in substrate coupling. In this paper, we analyze how different current distribution patterns excite interference propagation modes, in terms of matching and orientation...
Future mixed-criticality systems must handle a growing variety of traffic requirements, ranging from safety-critical real-time traffic to bursty latency-sensitive best-effort traffic. Additionally, safety standards (e.g. ISO 26262) require sufficient independence among different criticality levels for mixed-criticality systems. Networks-on-Chip (NoCs), as a scalable and modular interconnect, are used...
Based on the analysis of macro-micro composite driving positioning technology, a high precision macro-micro positioning stage integrated a voice-coil-motor (VCM) and piezoelectric actuator (PZT). The stage can combine the characteristics of large stroke and high acceleration of the VCM and the high precision and heavy load of the PZT. In this paper, a single axis positioning stage is developed to...
Although multicore chips are quickly replacing uniprocessor ones, safety-critical embedded systems are still developed using single processor architecture. The reasons mainly concern predictability and certification issues. This paper proposes a scheduling framework for handling Integrated Modular Avionics (IMA) on multicore platforms providing predictability as well as flexibility in managing dynamic...
One key requirement for the fifth-Generation (5G) mobile system is the enhancement of cell edge user performance to ensure that every user is supported with consistent experience anywhere in the network. An active interference design to improve anywhere performance, particularly in the low SINR regime, can be achieved by applying a recently proposed new type of modulation scheme, frequency quadrature-amplitude...
Unmanned Underwater Vehicle (UUV) is widely applied. In the process of accomplishing underwater task, the UUV will separate some detection equipment. When the load separate, there will be a large interference to UUV. The adaptive fuzzy sliding mode control theory is used to design the controller. In the controller, the adaptive fuzzy method is to design the switch gain in sliding mode controller....
The problem of forming an FMICW signal for vertical-incidence single-antenna ionosonde based on the USRP platform using SDR technology was solved. We carried out studies aimed at getting a constant level of a received signal, unambiguous determining virtual reflection height in the required range as well as reducing interference and correlation noise during transmission and compression. The developed...
This paper considers the problem of joint channel allocation and power control in the uplink scenario of device-to-device communications underlaying cellular networks. The problem is formulated as a coalition formation game, then a merge-split algorithm for that game is investigated. We analyze the conditions for which an merge-split algorithm will always converge to the Dc-stable coalitional structure...
This paper describes the software architecture and the implementation of a fully operational testbed that demonstrates the benefits of flexible, dynamic resource allocation with virtualized LTE-A nodes. The testbed embodies and specializes the general software architecture devised within the Flex5Gware EU project, and focuses on two intelligent programs: the first one is a Global Scheduler, that coordinates...
Conventional planning and optimization of cellular networks for supporting the peak-time user demand leads to substantial wastage of electrical energy. Therefore, we propose an energy-aware dynamic network provisioning framework for realizing green mobile cellular systems by reducing energy consumption in access networks. Proposed mechanism allows base stations (BSs) to offload their entire traffic...
In this paper, we investigate wireless information and power transfer in full-duplex (FD) two-way massive MIMO amplify-and-forward (AF) relaying network. In the considered network, the relay is an energy demander and applies time switching scheme to harvest energy from the users for amplifying and forwarding the users'' signals. Different from prior studies, MIMO users and antenna correlation are...
Mutual interference between adjacent wireless networks in indoor environment is becoming an important issue due to reducing the communication speed significantly. Isolating the wireless networks by using frequency selective surfaces (FSSs) can be an efficient solution for such interference problems. Isolating and non-isolating features are needed from FSSs due intensive usage of wireless communication...
This paper proposes a new cognitive anti-jamming stochastic game model for multi-agent environments in which each wideband autonomous cognitive radio (WACR) attempts to predict and evade the transmissions of other radios as well as a dynamic jammer signal. The cognitive framework is divided into two operations: sensing and transmission. Each is helped by its own learning algorithm based on Q-learning...
In cognitive radio networks (CRNs), the established communication sessions between secondary users (SUs) may be affected or even get interrupted because the SUs need to relinquish the spectrum when the licensed users (PUs) appear and reclaim the spectrum/channel. On detecting PU activities, the SUs on the affected links either switch to another available idle spectrum using the same link or the SUs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.