The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ultra-reliable and low latency communications is envisioned to enable new services and applications with high reliability, availability and low latency, e.g, factory automation, Tactile Internet. Device-to-device communication is one such mean that allows devices to experience benefits in terms of shorter communication latency. Currently most device-to-device communication in frequency-division duplex...
Recent standardization efforts in IEEE 802.15.4-2015 Time Scheduled Channel Hopping (TSCH) and the IETF 6TiSCH Working Group (WG), aim to provide deterministic communications and efficient allocation of resources across constrained Internet of Things (IoT) networks, particularly in Industrial IoT (IIoT) scenarios. Within 6TiSCH, Software Defined Networking (SDN) has been identified as means of providing...
The diversity of IoT applications implies the requirement of reliable yet efficient MAC solutions for supporting transmissions for various traffic patterns. In this paper, we propose GoMacH, an efficient MAC protocol that provides high reliability and throughput for handling various traffic loads in IoT. GoMacH seamlessly integrates several outstanding techniques. It adopts the phase-lock scheme to...
Industrial applications demand for ease of deployment, reliability and low-power in wireless networks, leading to standards like IEEE802.15.4, which include time synchronized channel hopping mechanisms. Yet, scheduling of transmissions on timeslots and channels falls outside the scope of current standards. Given the application requirements above, distributed (rather than centralized) scheduling has...
This paper presents the description of several key RAN enablers for the radio resource management (RRM) framework of the fifth generation (5G) radio access network (RAN), referred to as building blocks of the 5G RRM. In particular, the following key RAN enablers are discussed: i) interference management techniques for dense and dynamic deployments, focusing on cell-edge performance enhancement; ii)...
This paper presents a methodology based on a multi-objective mathematical model to optimally allocate and coordinate protective devices and switches in electric power distribution systems with distributed generation (DG). The objective functions contemplate the economic and reliability requirements of a distribution network, seeking an optimized plan of operation at the minimum investment cost and...
Large-scale disasters (such as earthquake, flood, tornado) may cause severe network failures, leading to massive disruptions and data loss. Particularly, the aftermaths of disasters may further threaten the residual network and impact the existing/survived service connections. In this paper, we study a reliability based restoration scheme for recovering the impacted (disrupted and/or reliability-decreased)...
Disasters, such as earthquake, tsunami, tornado, and malicious attack, may cause large-area, geographically correlated and/or cascading failures in telecom networks, leading to massive connection disruptions and instability of network state. In this paper, we study survivability strategies to alleviate the effect of disasters to telecom networks, e.g., Wavelength-Division-Multiplexing (WDM) optical...
Security and privacy challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. To ensure data confidentiality and fine-grained access control in cloud-based environments, stored data and resources needs to be re-encrypted periodically or based on special mechanisms such as revoked user-based or manual re-encryption...
Machine-type communication services in mobile cellular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection:...
Reliability of distribution power systems mainly depends on preventive maintenance planning. This paper proposes a method of preventive maintenance budget allocation for electric power distribution utilities. First, the customer outage costs are calculated by using customer damage function and actual statistical recorded interruption data. Then, the optimization problem is formulated. The total monetary...
Compared with today’s 4G wireless communication network, the next generation of wireless system should be able to provide a wider range of services with different QoS requirements. One emerging new service is to exploit cooperative driving to actively avoid accidents and improve traffic efficiency. A key challenge for cooperative driving is on vehicle-to-vehicle (V2V) communication which requires...
In this paper, we study the purchasing strategy problem when the suppliers' reliability is uncertain. This problem is derived from the real world situation in the power metering device industry. Besides the price and product category each supplier can provide, the purchasing strategy is also influenced by other intangible impacts, i.e. wild fluctuations of suppliers' reliability and lead time can...
Reliability redundancy allocation problem (RRAP) is an optimization problem with objective to maximize the system reliability considering component reliability and redundancies as decision variables. RRAP was mostly solved as a single level optimization problem. However, the nature of the problem fits quite well in the framework of bilevel optimization. In this paper, we have proposed two novel bilevel...
Mobile crowdsourcing has received considerable attention as it enables people to collect and share large volume of data through their mobile devices. Since the accuracy of the collected data is usually hard to ensure, researchers have proposed techniques to identify truth from noisy data by inferring and utilizing the reliability of users, and allocate tasks to users with higher reliability. However,...
Recently vehicle-to-vehicle (V2V) communication emerged as a key enabling technology to ensure traffic safety and other mission-critical applications. In this paper, a novel proximity and quality-of-service (QoS)-aware resource allocation for V2V communication is proposed. The proposed approach exploits the spatial-temporal aspects of vehicles in terms of their physical proximity and traffic demands,...
The coming 5G cellular communication system is envisioned to support a wide range of new use cases on top of regular cellular mobile broadband services. One of the 5G usage scenarios is ultra-reliable low-latency communications (URLLC). It has been predicted that URLLC will play an essential role in enabling wireless communications for emerging new services and applications such as factory automation,...
In this paper, we suggest a power allocation strategy for the Chase Combining Hybrid Automatic Repeat Request (CC-HARQ) protocol with ultra-reliability constraints. The proposed optimal power allocation scheme would allow us to reach any outage probability target in the finite block-length regime. We cast an optimization problem as minimization of the average transmitted power under a given outage...
5G New Radio (NR) is envisioned to support three broad categories of services: evolved mobile broadband (eMBB), ultra-reliable and low-latency communications (URLLC), and massive machine-type communications (mMTC). The URLLC services refer to future applications that require secure data communications from one end to another with ultra-high reliability and deadline-based low latency requirements....
In a high-speed backbone network, the failure of a network link may cause large data losses, so it is necessary to reserve spare network resources for faster recovery. The conventional protection methods to reserve backup routes do not consider the failure probability of each network link, so the same amount of network resources for the backup route are needed regardless of the failure probability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.