1,004 results
Search Results
2. Power Resource Allocation Algorithm for Dual-Function Radar–Communication System.
- Author
-
Yue Xiao, Zhenkai Zhang, and Xiaoke Shang
- Subjects
OPTIMIZATION algorithms ,POWER resources ,RESOURCE allocation ,ALGORITHMS ,TELECOMMUNICATION systems ,RADAR interference ,RADAR ,MOBILE communication systems - Abstract
In this paper, a power allocation algorithm of dual-function radar–communication system with limited power is proposed to obtain better overall system performance measured by the weighted summation of radar signal to interference plus noise ratio (SINR) and communication channel capacity. First, a power allocation model is established to maximize the radar SINR and communication channel capacity with limited transmitted power. Then, the Karush–Kuhn–Tucker (KKT) conditions are used to solve the optimal objective function under the condition that only radar SINR or communication channel capacity is considered, respectively. Finally, the optimal value is combined with the original model and transformed into a single objective optimization model, and the optimal power is obtained by solving the model through the iterative optimization algorithm. Simulation results show that, compared with other power allocation algorithms, the proposed algorithm can achieve better radar-communication integration performance under the same transmit power. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. High-Performance Turbo Coder Design using MAP Algorithm and Gating Technology for Error Correction in Communication Systems.
- Author
-
Benny, Elon Anne, P., Arun, P. R., Sreesh, and S., Madhukumar
- Subjects
MAP design ,TURBO codes ,ALGORITHMS ,VERY large scale circuit integration ,TELECOMMUNICATION systems ,MOBILE communication systems - Abstract
This paper proposes a novel Very Large-Scale Integration (VLSI) design for the Turbo decoder, a popular communication tool to achieve optimal data reception with minimal errors. The Turbo decoder includes SISO decoders, interleavers, and deinterleavers, which use the Maximum-a-Posteriori (MAP) algorithm to reduce the number of iterations required for decoding. Additionally, the encoder part uses two Recursive convolutional encoders and a pseudorandom interleaver to enhance the error correction capability of the Turbo code. The paper also suggests using clock gating technology to improve the decoder's performance by selectively activating specific blocks based on the decoding performance. The proposed Turbo decoder is designed in Xilinx Vivado 2018.3 achieves high performance and provides a scalable and efficient solution for implementing Turbo decoders in communication systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
4. Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT.
- Author
-
Liu, Lidong, Li, Shidang, Wei, Mingsheng, Xu, Jinsong, and Yu, Bencheng
- Subjects
MOBILE communication systems ,WIRELESS power transmission ,ENERGY shortages ,ENERGY harvesting ,PHASE modulation ,TELECOMMUNICATION systems ,ALGORITHMS - Abstract
Network energy resources are limited in communication systems, which may cause energy shortages in mobile devices at the user end. Active Reconfigurable Intelligent Surfaces (A-RIS) not only have phase modulation properties but also enhance the signal strength; thus, they are expected to solve the energy shortage problem experience at the user end in 6G communications. In this paper, a resource allocation algorithm for maximizing the sum of harvested energy is proposed for an active RIS-assisted Simultaneous Wireless Information and Power Transfer (SWIPT) system to solve the problem of low performance of harvested energy for users due to multiplicative fading. First, in the active RIS-assisted SWIPT system using a power splitting architecture to achieve information and energy co-transmission, the joint resource allocation problem is constructed with the objective function of maximizing the sum of the collected energy of all users, under the constraints of signal-to-noise ratio, active RIS and base station transmit power, and power splitting factors. Second, the considered non-convex problem can be turned into a standard convex problem by using alternating optimization, semi-definite relaxation, successive convex approximation, penalty function, etc., and then an alternating iterative algorithm for harvesting energy is proposed. The proposed algorithm splits the problem into two sub-problems and then performs iterative optimization separately, and then the whole is alternately optimized to obtain the optimal solution. Simulation results show that the proposed algorithm improves the performance by 45.2% and 103.7% compared to the passive RIS algorithm and the traditional without-RIS algorithm, respectively, at the maximum permissible transmitting power of 45 dBm at the base station. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. An Improved Bit-Flipping Algorithm of Successive Cancellation List Decoding for Polar Codes.
- Author
-
Wang, Desheng, Yin, Jihang, Xu, Yonggang, Yang, Xuan, Xu, Qiuwei, and Hua, Gang
- Subjects
DECODING algorithms ,MONTE Carlo method ,ALGORITHMS ,ERROR probability ,TELECOMMUNICATION ,VIDEO coding ,MOBILE communication systems - Abstract
Polar codes, as the coding scheme for the control channel in fifth-generation mobile communication technology (5G), have attracted widespread attention since their proposal. As a mainstream decoding algorithm for polar codes, the successive cancellation list (SCL) decoder usually improves the error correction performance by increasing the list size, but this method suffers from the problems of high decoding complexity. To address this problem, this paper proposes a layered-search bit-flipping (LS-SCLF) decoding algorithm based on SCL decoding. Firstly, a new flip-bit metric is proposed, which derives a formula to approximate the probability of an error occurring in an information bit. This formula introduces a perturbation parameter to improve the calculation accuracy. Secondly, a compromise scheme for determining the perturbation parameter is proposed. The scheme uses Monte Carlo simulation to determine an optimized parameter for the precise positioning of the first erroneous decoded bit under different decoding conditions. Finally, a layered search strategy is adopted to sequentially search the erroneous decoded bits from the low order to high order, which can correct up to multiple bits at the same time. Simulation results show that the proposed algorithm achieves improved error correction performance with a slight increase in decoding complexity compared to the generalized SCL-Flip (GSCLF) decoding algorithm. This algorithm also achieves a good balance between the error correction performance and decoding complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Fast computation of radio wave diffraction effects.
- Author
-
Mejstrik, Thomas, Berisha, Taulant, and Woblistin, Sebastian
- Subjects
- *
WAVE diffraction , *MOBILE communication systems , *MARKET penetration , *RADAR in aeronautics , *TELECOMMUNICATION systems , *RADIO waves , *AERONAUTICAL communications systems - Abstract
Summary Unmanned aerial vehicle operations are quickly gaining ground due to rapid global market penetration. While on one hand, novel technologies that bridge communication networks to aviation industry are yet to be explored, on the other hand, their development requires highly scalable systems to enable beyond visual line‐of‐sight missions. This requirement imposes a big bottleneck in terms of computation complexity. This paper presents a method for fast computation of multiple diffraction of radio waves over knife‐edge obstacles based on the Deygout technique and some offline computation steps, including a ground profile analysis. We prove that this algorithm is equivalent to the original Deygout algorithm for all non‐line‐of‐sight points, show heuristics confirming that it is mostly applicable in the line‐of‐sight case. The computational and memory complexity of our algorithm is approximately O(N)$$ \mathcal{O}\left(\sqrt{N}\right) $$, compared to O(N)$$ \mathcal{O}(N) $$ for the original Deygout algorithm. Finally we discuss how to apply the approach to the Epstein‐Peterson technique and the Giovanelli technique, and how to use it to compute clutter‐loss. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Radio Frequency Link and User Selection Algorithm for 5G Mobile Communication System.
- Author
-
Lv, Zhengnan and Xi, Zhenghao
- Subjects
MOBILE communication systems ,5G networks ,TELECOMMUNICATION systems ,ANTENNA arrays ,ALGORITHMS ,COMPUTATIONAL complexity ,RADIO frequency - Abstract
Based on the millimetre-wave time-domain channel detector, this paper conducts channel measurement and modelling for different scenarios and antenna types in typical frequency bands and thus carries out a study on the propagation characteristics of millimetre-wave channels in typical frequency bands and scenarios for 5G. The time-varying characteristics and modelling methods of millimetre-wave clusters are studied, and the time-varying channel simulation strategy and linear regression fitting method are used to establish the time-varying generation and extinction model of clusters by combining the measured data of 26 GHz large-scale antenna channels. The algorithm is based on the correlation dictionary and achieves the efficient and optimal selection of large-scale antenna arrays in the millimetre-wave band. A low-complexity multiuser hybrid precoding design scheme is proposed based on the wideband millimetre-wave large-scale Multiple-Input Multiple-Output (MIMO) system. The scheme aims to maximize the system spectral efficiency and introduces the net spectral efficiency as a bridge to decouple the analogy precoding design from the digital precoding design, thus significantly reducing the computational complexity. In the analogy precoding stage, a Hungarian algorithm-based beam assignment method is proposed to avoid beam conflicts and maximize the net spectral efficiency of the system; in the digital precoding stage, the equivalent channel matrix of each subcarrier is diagonalized to eliminate multiuser interference. Finally, the effectiveness of the scheme is verified by simulation. In this paper, we focus on the radio frequency (RF) link and user selection algorithm of 5G mobile communication system. Through the study of these two aspects, the RF link of our communication system has high stability and reliability, and through the study of the algorithm used for selection, our results also have a strong practical value. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. Study on Cooperative Multipoint Communication Precoding Algorithm under SLNR-MMSE Framework.
- Author
-
Fan, Yu
- Subjects
MOBILE communication systems ,BIT error rate ,MEAN square algorithms ,MULTIUSER computer systems ,ALGORITHMS ,TELECOMMUNICATION systems - Abstract
With the rapid growth of demand for wireless data services and the continuous introduction of new air interface technologies, mobile communication systems continue to face new challenges in supporting high-speed multimedia service transmission and achieving seamless coverage. In order to meet the requirements of the IMS system in terms of bandwidth, peak rate, communication throughput, etc., multiantenna enhancement technology and cooperative multipoint transmission technology have become research hotspots as key technologies. In the study of multiuser system, this paper focuses on the precoding technology based on noncode book, based on the minimum mean square error criterion and the maximum letter leakage noise ratio criterion, studies the precoding technology of different multiuser systems, expounds the collaborative multipoint transmission system, and makes a basic classification. The signal leakage-to-noise ratio precoding algorithm and the minimum mean square error precoding algorithm are analyzed in detail. In view of the shortcomings of these two algorithms, this paper takes the minimum sum of the total mean square error of the system as the optimization goal of the combinations of precoding and power allocation. The precoding algorithm of SLNR-MMSE is proposed. The simulation analysis shows that the proposed algorithm has certain advantages over other algorithms in terms of bit error rate and system capacity. It shows that this study is important for optimizing collaborative multipoint communication system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. K-XMSS and K-SPHINCS + : Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.
- Author
-
Sim, Minjoo, Eum, Siwoo, Song, Gyeongju, Yang, Yujin, Kim, Wonwoong, and Seo, Hwajeong
- Subjects
MOBILE communication systems ,DIGITAL signatures ,CRYPTOGRAPHY ,BLOCK ciphers ,QUANTUM cryptography ,ALGORITHMS ,TELECOMMUNICATION - Abstract
As Mobile Communication and Internet Systems (MCIS) have rapidly developed, security issues related to MCIS have become increasingly important. Therefore, the development and research of security technologies for mobile communication and internet systems are actively being conducted. Hash-Based Signature (HBS) uses a hash function to construct a digital signature scheme, where its security is guaranteed by the collision resistance of the hash function used. To provide sufficient security in the post-quantum environment, the length of hash should be satisfied for the security requirement. Modern HBS can be classified into stateful and stateless schemes. Two representative stateful and stateless HBS are eXtended Merkle Signature Scheme(XMSS) and SPHINCS + , respectively. In this paper, we propose two HBS schemes: K-XMSS and K-SPHINCS + , which replace internal hash functions of XMSS and SPHINCS + with Korean cryptography algorithms. K-XMSS is a stateful signature, while K-SPHINCS + is its stateless counterpart. We showcase the reference implementation of K-XMSS and K-SPHINCS + employing Lightweight Secure Hash (LSH) and two hash functions based on block ciphers (i.e., CHAM and LEA) as the internal hash function. In addition, K-XMSS and K-SPHINCS + using Advanced Vector Extensions 2 (AVX2) have been provided, demonstrating that they can be optimized for better performance using advanced implementation techniques than previous approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. A Low-Power VLSI Implementation of RFIR Filter Design using Radix-2 Algorithm with LCSLA.
- Author
-
Satish Reddy, Kasarla and Suresh, Hosahally Narayangowda
- Subjects
ALGORITHMS ,TELECOMMUNICATION systems ,MOBILE communication systems ,VERY large scale circuit integration ,FILTERS & filtration ,IMPULSE response ,COMPILERS (Computer programs) - Abstract
The multimedia applications and mobile communication systems require an efficient reconfigurable finite impulse response (RFIR) filter designs for achieving low area, power, cost, and high speed of system operation. In this paper, an efficient RFIR filter is designed based on the Radix-2 algorithm and Look-up-table Carry Select Adder (Radix 2 – LCSLA). Generally, the RFIR filter is controlled by multiplier and adder, which improves the performances of the filter. Hence, this research work is mostly concentrated on the multiplier and adder design. Here, the radix-2 algorithm is used instead of normal multiplier for multiplication operation in the RFIR filter design. Additionally, CSLA and LCSLA approaches used in the Radix-2 structure for adding partial products. The LCSLA has achieved better performance compared to the normal CSLA approaches. In this paper, both the Radix-2 algorithm and LCSLA approach improved the performances of the proposed RFIR filter design. The proposed RFIR filter design was implemented in the Xilinx and Cadence RTL compiler by using the Verilog code. The RFIR-Radix 2-LCSLA filter design was verified in the Modelsim by utilizing the Verilog code. The experimental result showed that the RFIR-Radix 2-LCSLA methodology has improved the performance of ASIC and FPGA in the RFIR filter design up to 5–15% compared to the existing filter architecture: DA-RFIR and LC-CBA-RFIR methods. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
11. A Method for Optimizing the Base Position of Mobile Painting Manipulators.
- Author
-
Ren, Shunan, Xie, Ying, Yang, Xiangdong, Xu, Jing, Wang, Guolei, and Chen, Ken
- Subjects
MOBILE robots ,ROBOT kinematics ,COEFFICIENTS (Statistics) ,ALGORITHMS ,MOBILE communication systems - Abstract
This paper presents an algorithm to optimize the base position of a mobile manipulator to meet the requirements of local painting tasks. Considering the physical limits and singularity of the manipulator, the feasible base positions are first discretely calculated with the given poses of the end effector by inverse kinematics. Then, the joint-level performance criteria are proposed with respect to the requirements of the painting process. The weight coefficients are also determined by the critic method to balance the contribution of every criterion. Thus, the globally near-optimal base position is selected by sorting all feasible positions according to the evaluation criteria. The experimental results show that the planning result is well executed and has an acceptable computation time, thus demonstrating that the algorithm is both practical and effective compared with previous methods. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
12. Stackelberg Game-Based Radio Resource Management Algorithm in an Urban Rail Transit Communication System.
- Author
-
Shao, Yingxia, Jiang, Hailin, and Zhao, Hongli
- Subjects
PUBLIC transit ,RADIO resource management ,TELECOMMUNICATION systems ,RELIABILITY in engineering ,ALGORITHMS ,MOBILE communication systems - Abstract
Train-to-wayside (T2W) and train-to-train (T2T) communication modes may coexist in future train-centric communication-based train control (CBTC) systems. The feasibility of T2T communication in urban rail transit is analyzed first. Referring to the device-to-device (D2D) communication scenario in the general cellular network, this paper establishes a radio resource optimization model for the coexistence of train-to-train communication and train-to-wayside communication. With the aim of more efficient scheduling of radio time-frequency resources in the dedicated frequency band, we propose a Stackelberg game-based radio resource management algorithm based on the consideration of different service priorities of trains. The analysis and simulation results show that the proposed algorithm can effectively guarantee the performance of the system and improve the reliability of the CBTC system. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. A CO-ORDINATED INTERFERENCE CANCELLATION METHOD FOR MIMO FOR SELF-INTERFERENCE MITIGATION.
- Author
-
Ahmed, Waseem and Abdulhayan, Sayed
- Subjects
MOBILE communication systems ,TELECOMMUNICATION systems ,ALGORITHMS - Abstract
In 5G/6G mobile communication systems, MIMO or MASSIVE MIMO is the most promising evolving technology for implementation in recent times. Due to this scenario, it is bound to lead drastic interference circumstance, the most common Interference being Self Interference. In 3G/4G base stations, this situation may also arise in the existing mobile communication networks. Our Algorithm will address this severe Interference issue, thereby improving the QOS of the overall system. Each and Every step in our algorithm is being tested and integrated in a single flow, which is supported by Matlab simulation results and hardware implementation using GNU radio with SRSLTE emulation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. Acquisition Algorithms and Structures for STiMi Receiver.
- Author
-
Yushan Li and Zisheng Cao
- Subjects
ALGORITHMS ,BROADCASTING industry ,TIME measurements ,LINE receivers (Integrated circuits) ,MOBILE communication systems ,TELECOMMUNICATION systems ,RADIO broadcasting ,MULTIMEDIA systems ,INFORMATION storage & retrieval systems ,MULTIMEDIA computer applications - Abstract
STiMi is a mobile multimedia broadcasting trade standard that was released by the Chinese State Administration of Radio Film and Television in 2006. This paper details the algorithm research and development work on the acquisition for STiMi. First, the STiMi physical layer is briefly reviewed. secondly, individual algorithms, including time slot detection, fractional frequency offset estimation, integer frequency offset estimation and fine timing synchronization are discussed with simulation results presented. An implemented STiMi receiver prototype is also introduced with a focus on the acquisition algorithms implementation. Finally, the whole acquisition procedure is summarized. Acquisition algorithms and structures presented in this paper are adopted for prototyping and perform well. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
15. MMSE/EGC adaptive selection for nonuniformly aligned adaptive array antenna.
- Author
-
Takahashi, Masayuki, Fujii, Takeo, Kamiya, Yukihiro, and Suzuki, Yasuo
- Subjects
ALGORITHMS ,MOBILE communication systems ,ANTENNA arrays ,DOPPLER effect ,SIGNAL-to-noise ratio ,INTERFERENCE (Sound) ,COMPUTER simulation - Abstract
When an adaptive array antenna is used in cellular and other mobile communication base stations for the purpose of improving SINR, the array antenna itself sometimes falls into a fading valley, resulting in failure to obtain an adequate improvement effect. While this problem can be solved by increasing the aperture length of the array antenna, simply increasing the aperture length alone increases the number of antenna elements, so that a large-scale adaptive array antenna becomes required, leading to the problem of failure of the weighting to track changes in the environment during fast fading. In this paper, we try to solve the first issue by making the element spacing nonuniformly aligned, reducing the number of elements. For the second issue, the weighting is divided into two layers, resolving the problem through both use of MMSE to eliminate interference and use of EGC for diversity combining. In a slow fading environment, however, favorable characteristics can be obtained when the entire weighting is controlled by MMSE. In this paper, we estimate the fading speed by the amount of envelope fluctuation in the desired signal after elimination of interference by the initial layer MMSE, and propose during slow fading the use of MMSE batch control, and during fast fading a control that incorporates both MMSE and EGC diversity combining. Finally, we use a computer simulation to evaluate the validity. © 2007 Wiley Periodicals, Inc. Electron Comm Jpn Pt 1, 90(12): 13–21, 2007; Published online in Wiley InterScience (
www.interscience.wiley.com ). DOI 10.1002/ecja.20397 [ABSTRACT FROM AUTHOR]- Published
- 2007
- Full Text
- View/download PDF
16. Research on PDMA communication system based on complete complementary sequence.
- Author
-
Li, Shufeng, Su, Baoxin, and Jin, Libiao
- Subjects
WIRELESS communications ,ALGORITHMS ,TELECOMMUNICATION systems ,RESOURCE allocation ,MOBILE communication systems - Abstract
Pattern division multiple access (PDMA) is a new non-orthogonal multiple access (NOMA) technology. It is proposed to meet the challenge of 5G large-scale connectivity and high-frequency spectral efficiency. Compared with traditional orthogonal multiple access (OMA), PDMA can support more users through the allocation of non-orthogonal resources. Due to perfect aperiodic correlation, complete complementary sequence (CCS) greatly improves the spectrum efficiency of the system. It has been widely used in wireless communication and radar sensing, and it still has research value in 5G. In order to apply the advantages of CCS to NOMA communication system, this paper proposes a system model of CCS spread spectrum coding based on PDMA. CCS is used as spread spectrum code to improve the performance of PDMA communication system. At the same time, on the basis of spread spectrum technology, this paper analyzes the average power allocation algorithm and water-filling power allocation algorithm, and a dynamic power allocation algorithm based on the transmission rate and practical application is proposed. The simulation results show that the system model can effectively improve the performance of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
17. Resource Mining Algorithm and IoT Applications for Career Literacy Oriented Civics Courses.
- Author
-
Liu, Han
- Subjects
LITERACY ,TELECOMMUNICATION systems ,ALGORITHMS ,MINES & mineral resources ,CIVICS ,MOBILE communication systems - Abstract
The importance of vocational efficiency has gradually grown in stature as a result of rapid population expansion, rapid urbanization, rising competitiveness in the labor market, and the growing requirement for specialist workforce. Around the world, there are several overarching trends in vocational education and training, including increased use of technology, increased relevance of information and communications systems and changes in country demographics. The main aim of this paper is to discuss a resource mining algorithm for vocational literacy-oriented civics courses. The exploratory data comes from a nearby vocational database partitioned into three segments: a record database, a data database, and a video database. The data sublibrary stores data like word-related types, collections, characters, archives, and photographs, though the video sublibrary stores general media data from the play. Indexes for both the data and video sublibraries can be found in the index sublibrary. In our proposed strategy for gathering vocational literacy resources on an organization stage, we have consolidated RFID remote sensor innovation with a remote organization convention stack. We utilized QGA to order the vocational literacy resources on the organization stage in light of the discoveries of the resource assortment. Besides, in the stage's vocational literacy materials, we joined the fluffy property highlight ID strategy with the semantic affiliation elements of successive examples. The trial results show that this approach outflanks customary techniques as far as resource mining time, mining result breadth, and mining result exactness, demonstrating that this strategy has useful application esteem. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Low-Complexity Channel Estimation for Circular and Noncircular Signals in Virtual MIMO Vehicle Communication Systems.
- Author
-
Wang, Xianpeng, Wan, Liangtian, Huang, Mengxing, Shen, Chong, Han, Zhiguang, and Zhu, Tong
- Subjects
MOBILE communication systems ,MIMO systems ,CHANNEL estimation ,INTELLIGENT transportation systems ,ALGORITHMS - Abstract
In intelligent transportation systems (ITSs), the communication between the base station (BS) and the vehicles can form a virtual multiple-input multiple-out put (VMIMO) vehicle communication system. This paper addresses the issue of channel estimation in a virtual MIMO system that simultaneously adopt a smart antenna (SA). First, based on quaternion theory, a novel algorithm named quaternion noncircular MUSIC (QNC-MUSIC) is proposed, and direction of arrival (DOA) estimation is achieved for circular and noncircular signals. Then, a dimension reduction procedure is performed for the parameter search by employing the partial derivative of the spectrum function with respect to the noncircular phase; thus, a novel dimensional reduction noncircular MUSIC (DRNC-MUSIC) algorithm with a low computational complexity is proposed for DOA and polarization estimation of circular signals and noncircular signals. Finally, numerical examples are provided to demonstrate the parameter estimation performance of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
19. Performance Analysis of Dynamic PUCCH Allocation Algorithm in LTE Network.
- Author
-
Czerniecki, Maciej, Wszołek, Jacek, Sikora, Marek, and Ludwin, Wiesław
- Subjects
LONG-Term Evolution (Telecommunications) ,ALGORITHMS ,CELL phone systems ,MOBILE communication systems ,TELECOMMUNICATION - Abstract
The aim of the presented paper was to verify the impact of Dynamic PUCCH Resource Allocation Algorithm of the LTE cellular system on the maximum uplink cell throughput and call setup success rate - CSSR. Paper includes the laboratory testbed description and presents the results of an experiment confirming the improvement of both key performance indicators KPIs. Apart from the presentation of the Dynamic PUCCH Resource allocation algorithm, the paper also includes a description of legacy LTE uplink (PUCCH and PUSCH) channels dimensioning process thus filling the gap of such a tutorial in the available literature. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
20. Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks.
- Author
-
Abdelhakim, Mai, Lightfoot, Leonard E., Ren, Jian, and Li, Tongtong
- Subjects
WIRELESS sensor networks ,MOBILE communication systems ,MOBILE computing ,DATA integration ,ENTROPY ,ALGORITHMS - Abstract
This paper explores reliable data fusion in mobile access wireless sensor networks under Byzantine attacks. We consider the q-out-of-m rule, which is popular in distributed detection and can achieve a good tradeoff between the miss detection probability and the false alarm rate. However, a major limitation with it is that the optimal scheme parameters can only be obtained through exhaustive search, making it infeasible for large networks. In this paper, first, by exploiting the linear relationship between the scheme parameters and the network size, we propose simple but effective sub-optimal linear approaches. Second, for better flexibility and scalability, we derive a near-optimal closed-form solution based on the central limit theorem. Third, subjecting to a miss detection constraint, we prove that the false alarm rate of q-out-of-m diminishes exponentially as the network size increases, even if the percentage of malicious nodes remains fixed. Finally, we propose an effective malicious node detection scheme for adaptive data fusion under time-varying attacks; the proposed scheme is analyzed using the entropy-based trust model, and shown to be optimal from the information theory point of view. Simulation examples are provided to illustrate the performance of proposed approaches under both static and dynamic attacks. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
21. LIMERIC: A Linear Adaptive Message Rate Algorithm for DSRC Congestion Control.
- Author
-
Bansal, Gaurav, Kenney, John B., and Rohrs, Charles E.
- Subjects
INTELLIGENT transportation systems ,ELECTRONICS in transportation ,MOBILE communication systems ,TRAFFIC accidents ,ALGORITHMS ,WIRELESS communications - Abstract
Wireless vehicle-to-vehicle (V2V) and vehicle-toinfrastructure (V2I) communication holds great promise for significantly reducing the human and financial costs of vehicle collisions. A common characteristic of this communication is the broadcast of a device's core state information at regular intervals (e.g., vehicle speed and location or traffic signal state and timing). Unless controlled, the aggregate of these broadcasts will congest the channel under dense traffic scenarios, reducing the effectiveness of collision avoidance applications that use transmitted information. Active congestion control using distributed techniques is a topic of great interest for establishing the scalability of this technology. This paper defines a new adaptive congestion control algorithm that can be applied to the message rate of devices in this vehicular environment. While other published approaches rely on binary control, the LInear MEssage Rate Integrated Control (LIMERIC) algorithm takes advantage of full-precision control inputs that are available on the wireless channel. The result is provable convergence to fair and efficient channel utilization in the deterministic environment, under simple criteria for setting adaptive parameters. This “perfect” convergence avoids the limit cycle behavior that is inherent to binary control. We also discuss several practical aspects associated with implementing LIMERIC, including guidelines for the choice of system parameters to obtain desired utilization outcomes, a gain saturation technique that maintains robust convergence under all conditions, convergence with asynchronous updates, and using channel load to determine the aggregate message rate that is observable at a receiver. This paper also extends the convergence analysis for two important cases, i.e., measurement noise in the input signal and delay in the update process. This paper illustrates key analytical results using MATLAB numerical results and employs standard NS-2 simulations to demonstrate the performance of LIMERIC in several high-density scenarios. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
22. Approximation Algorithms for Cell Planning in Heterogeneous Networks.
- Author
-
Zhao, Wentao, Wang, Shaowei, Wang, Chonggang, and Wu, Xiaobing
- Subjects
APPROXIMATION theory ,CELLULAR neural networks (Computer science) ,HETEROGENEOUS computing ,MOBILE communication systems ,ALGORITHMS - Abstract
Small cells are introduced to cellular systems to enhance coverage and improve capacity. Densely deploying small cells can not only offload the traffic of macrocells but also provide an energy- and cost-efficient way to meet the sharp increase in traffic demands in mobile networks. However, such a cell deployment paradigm also leads to heterogeneous network (HetNet) infrastructure and raises new challenges for cell planning. In this paper, we study the cell planning issue in the HetNet. Our optimization task is to select a subset of candidate sites to deploy macro or small cells to minimize the total cost of ownership (TCO) or the energy consumption of the cellular system while satisfying practical constraints. We introduce approximation algorithms to cope with two different cell-planning cases, which are both NP-hard. First, we discuss the macrocell-only case. Our proposed algorithm achieves an approximation ratio of O(\log R) in this scenario, where R is the maximum achievable capacity of macrocells. Then, we introduce an O(\log \widetildeR)-approximation algorithm to the small-cell scenario, where \widetildeR is the maximum achievable capacity of a macrocell with small cells overlaid on it. Numerical results indicate that the HetNet can significantly reduce the TCO and the energy consumption of the cellular system. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
23. HANDOFF DETERMINATION FOR A HYBRID CHANNEL ALLOCATION ALGORITHM IN WIRELESS AND MOBILE NETWORKS.
- Author
-
YUHONG ZHANG, WEI WAYNE LI, and SALARI, EZZATOLLAH
- Subjects
MOBILE communication systems ,ALGORITHMS ,MATHEMATICAL analysis ,NUMERICAL analysis ,PROBABILITY theory - Abstract
The handoff rate is identified in a hybrid channel allocation algorithm of a wireless and mobile network. In this network model, both new calls and handoff calls to a cell have possibilities to borrow channels from the control center if all allocated channels to the cell are used up. In addition, there is a buffer with finite size reserved exclusively for handoff calls in a cell when they arrived but are not be able to borrow channels from the control center. In this paper, we derived a novel and theoretical expression of the handoff rate in the network first. This analytical expression for handoff rate is a general form which covers several special cases discussed in the literature. Then, an efficient iterative algorithm to calculate this handoff rate is proposed also. By using this algorithm, the handoff rate and the blocking probability of both new calls and handoff calls will be successfully derived at the same time. Furthermore, our numerical analysis validates the algorithm and the corresponding theoretic expression. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
24. Chance-Constrained Optimization in D2D-Based Vehicular Communication Network.
- Author
-
Liu, Zhixin, Xie, Yuan'ai, Ma, Kai, Chan, Kit Yan, and Guan, Xinping
- Subjects
CELL phone systems ,MOBILE communication systems ,CELL phone users ,RELIABILITY in engineering ,COMPUTER simulation ,ALGORITHMS - Abstract
In this paper, a novel scheme is proposed to optimize the effectiveness of the device-to-device (D2D) enabled vehicular communications (D2D-V), which are underlaid in cellular networks, where the uplink channel allocated to one cellular user (CU) is reused by the multiple D2D-V links. To develop a well-functioning D2D-V system, the sum rate of all D2D-V links is necessary to be maximized, and also the reliability of the co-channel CU to infrastructure has to be guaranteed with the CU interference constraint. Unlike the traditional statical D2D systems, the D2D-V system suffers with high mobility and channel uncertainty. Therefore, the CU interference constraint is formulated as a probabilistic function by the Bernstein approximation, the constraint attempts to address the mobile channel fluctuations. Besides, the tractable approximate constraint is reformulated as two separable structure, this reformulated constraint attempts to determine the near-optimal solutions more efficiently. Since the objective function with a logarithmic form is nonconvex, successive convex approximation is applied to transform the nonconvex problem into the convex problem. The dual decomposition is used to determine the near-optimal solutions. After the problem is reformulated, a distributed robust power control algorithm is proposed to perform the chance-constrained optimization. Numerical simulations are used to evaluate the performance of the proposed scheme. The simulation results show the impacts of system performance when applying the proposed scheme in vehicular environments with high mobility. The proposed optimization schemes are further verified by comparing with the existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. Multi-Principal Multi-Agent Contract Design: Theory and Application to Device-to-Device Communications.
- Author
-
Yang Hu, Xuerui Li, Yan Chen, and Bing Zeng
- Subjects
MOBILE communication systems ,MULTIAGENT systems ,WIRELESS sensor networks ,INTERFERENCE (Telecommunication) ,ALGORITHMS - Abstract
How to stimulate the devices to participate is a key problem in the device-to-device (D2D) communications, especially when there are multiple base stations in practice. On one hand, the base station needs to lower the price to compete with other base stations for attracting more devices. On the other hand, the base station needs to increase the price to obtain more benefit. In this paper, we propose an optimal multiprincipal multiagent contract design to tackle such a challenge. Specifically, we formulate the multiprincipal contract design problem as a game theoretic optimization problem, where the objective of each principle (base station) through contract design is to maximize its overall utility obtaining from the trade with agents (devices) subject to the individual rationality and incentive compatibility constraints. By solving the game theoretic optimization problems, we can obtain the equilibrium contract where the contracts of different principals reach an equilibrium and any deviation from a single principal will lead to the degradation of its own utility. Moreover, under the equilibrium, both the individual rationality and incentive compatibility constraints are satisfied, i.e., all agents will choose the corresponding contract according to their types to reach the optimal nonnegative utilities. Simulation results show that compared with the monoprincipal contract design, both the utilities of devices and the social welfare can be improved with the multiprincipal contract design. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
26. Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System.
- Author
-
Cabaj, Krzysztof, Gregorczyk, Marcin, Mazurczyk, Wojciech, Nowakowski, Piotr, and Żórawski, Piotr
- Subjects
SOFTWARE-defined networking ,5G networks ,COMPUTER networks ,MOBILE communication systems ,ALGORITHMS - Abstract
Currently 5G communication networks are envisioned to offer in a near future a wide range of high-quality services and unfaltering user experiences. In order to achieve this, several issues including security, privacy, and trust aspects need to be solved so that the 5G networks can be widely welcomed and accepted. Considering above, in this paper, we take a step towards these requirements by proposing a dedicated SDN-based integrated security framework for the Internet of Radio Light (IoRL) system that is following 5G architecture design. In particular, we present how TCP SYN-based scanning activities and DHCP-related network threats like Denial of Service (DoS), traffic eavesdropping, etc. can be detected and mitigated using such an approach. Enclosed experimental results prove that the proposed security framework is effective and efficient and thus can be considered as a promising defensive solution. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
27. Download Elastic Traffic Rate Optimization via NOMA Protocols.
- Author
-
Mokhtari, Fatemeh, Mili, Mohammad Robat, Eslami, Farzad, Ashtiani, Farid, Makki, Behrooz, Mirmohseni, Mahtab, Nasiri-Kenari, Masoumeh, and Svensson, Tommy
- Subjects
DOWNLOADING ,5G networks ,MOBILE communication systems ,MULTIPLE access protocols (Computer network protocols) ,ALGORITHMS ,COMPUTER simulation - Abstract
Non-orthogonal multiple access (NOMA) is a promising scheme for the fifth generation (5G) of mobile communication systems. In this scheme, transmission to multiple users is performed on the same subchannel using superposition coding and successive interference cancellation. In this paper, we focus on a multi-cell network with two users’ data traffic models, namely elastic and streaming. We exploit the NOMA scheme in order to maximize the download elastic traffic rate at cells, without degrading the download streaming traffic rates. Since elastic traffic rates at different cells are interactive, we maximize the total elastic traffic rates assuming either perfect or partial channel state information available at each base station subject to a target rate for streaming users. Because of the interference due to NOMA as well as the interference among different cells, subchannel assignment and power allocation affect the system performance significantly. For this reason, we propose an iterative algorithm to jointly solve the subchannel assignment and the power allocation problem via the Hungarian algorithm and successive convex approximation, respectively. Finally, our simulation results show the efficiency of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
28. Mine Identification and Classification by Mobile Sensor Network Using Magnetic Anomaly.
- Author
-
Nazlibilek, Sedat, Kalender, Osman, and Ege, Yavuz
- Subjects
MOBILE communication systems ,CLASSIFICATION ,SENSOR networks ,ANOMALY detection (Computer security) ,MAGNETIC resonance imaging ,MINES (Military explosives) ,MATHEMATICAL models ,ALGORITHMS ,MAGNETIC anomalies - Abstract
In this paper, a new method is proposed to identify and classify the data obtained by the sensor network (SN) for the detection of mines. This method is used for the identification of antitank and antipersonnel mines and classification of buried objects within a target region. In this paper, a mobile SN is used to detect mines and some other objects buried and creating magnetic anomaly in and around the region where they are found, with the behavior of the individual sensors swarming onto the area under which a mine or any other object is buried. The process of collecting data by the SN and modeling it mathematically are explained in detail. The SN is modeled as a fictitious two-dimensional spatial impulse sampler. This paper is motivated by clearing the territories of mine fields to open them to agriculture. It is very important because, currently, in some countries, very fertile territories around the borders are covered by buried mines. The approach is basically based on magnetic anomaly measurements, which directly tackles the subregions corresponding to buried objects whether they represent objects that are separately located or occluded by other objects. It is based on a new developed method that is called “the back-most object detection and identification algorithm.” This method is fully automatic, and there is no human intervention throughout the process. In this paper, classification of objects is based on their well-known shapes and dimensions. Therefore, there is no need for sophisticated learning algorithms to achieve classification. The experimental results are given both for detection and identification of a single mine and classification of a number of mines and any other objects that have a potential of giving false alarms in a target region. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
29. ANALYSIS OF THE ALGORITHM FOR EVALUATING THE QUALITY PARAMETERS OF MOBILE DATA TRANSMISSION.
- Author
-
Balčiūnas, Dmitrijus
- Subjects
ALGORITHMS ,MOBILE communication systems ,COMPUTER software ,BIT rate ,MOBILE computing - Abstract
Copyright of Science: Future of Lithuania / Mokslas: Lietuvos Ateitis is the property of Vilnius Gediminas Technical University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2011
- Full Text
- View/download PDF
30. Packet Scheduling and Fairness for Multiuser MIMO Systems.
- Author
-
Torabzadeh, Masoomeh and Ajib, Wessam
- Subjects
MOBILE communication systems ,MIMO systems ,WIRELESS communications equipment ,DATA packeting ,MULTIUSER computer systems ,DATA transmission systems simulations ,MATHEMATICAL models ,ALGORITHMS ,MATRICES (Mathematics) - Abstract
This paper investigates the network resource allocation in multiuser downlink wireless systems where the base station and the mobile stations are equipped with multiple antennas to provide fair and efficient transmission services to the mobile users. We focus on packet scheduling, given that it has a significant impact on the overall performance of a multiple-input-multiple-output (MIMO) system. Most previous schedulers designed at the packet level do not take into account the traffic characteristics (different packet lengths and the arrival process parameters); consequently, they fall short of simultaneously providing fairness and a low average packet transmission delay. We are making use of a flexible packet transmission algorithm at the medium access control (MAC) layer to develop and propose a novel scheduler, which is referred to as MIMO packet-based proportional fairness (MP-PF). The new scheduler is designed with the goal of providing high performance in terms of a low average packet transmission delay and time and service fairness among the users based on the concept of proportional fairness. The scheduler also conserves work and takes into consideration the packet length, the user queue length, the user transmission rate (related to its channel quality), and the service guarantees for heterogeneous users. The well-known ideal service fair scheduler called max-min can also significantly be improved using our framework by taking into consideration the traffic characteristics. We also provide an analysis for the fairness of the new scheduler in terms of time and service allocation, which is the key contribution of this paper. Simulations that consider the traffic characteristics and the mobility of users show the relatively low average packet transmission delay and demonstrate the time and service fairness capabilities of MP-PF, compared with other well-known MIMO schedulers. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
31. Architectural Optimizations for Low-Power K-Best MIMO Decoders.
- Author
-
Mondal, Sudip, Eltawil, Ahmed M., and Salama, Khaled N.
- Subjects
DECODERS (Electronics) ,MIMO systems ,COMPUTATIONAL complexity ,VERY large scale circuit integration ,WIRELESS communications ,ALGORITHMS ,ELECTRONIC data processing ,MOBILE communication systems ,ELECTRONICS - Abstract
Maximum-likelihood (ML) detection for higher order multiple-input-multiple-output (MIMO) systems faces a major challenge in computational complexity. This limits the practicality of these systems from an implementation point of view, particularly for mobile battery-operated devices. In this paper, we propose a modified approach for MIMO detection, which takes advantage of the quadratic-amplitude modulation (QAM) constellation structure to accelerate the detection procedure. This approach achieves low-power operation by extending the minimum number of paths and reducing the number of required computations for each path extension, which results in an order-of-magnitude reduction in computations in comparison with existing algorithms. This paper also describes the very-large-scale integration (VLSI) design of the low-power path metric computation unit. The approach is applied to a 4 x 4, 64-QAM MIMO detector system. Results show negligible performance degradation compared with conventional algorithms while reducing the complexity by more than 50%. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
32. Contextual patterns in mobile service usage.
- Author
-
Verkasalo, Hannu
- Subjects
MOBILE communication systems ,CELL phones ,ALGORITHMS ,GLOBAL Positioning System ,EMAIL ,SOCIAL conditions in Great Britain ,SOCIAL history - Abstract
Mobile services differ from other services because of their temporal and spatial attributes. Mobile services additionally differ from each other in their value-added to the end-user. Some services—such as emailing and voice—are more business oriented. On the other hand, various free-time oriented services are provided in new smartphones, such as imaging and music playback. The present paper studies how mobile services are used in different contexts. For this, the paper develops a specialized algorithm that can be used with handset-based usage data acquired straight from end-users in an established panel study process. Educated guesses can be drawn on the user context based on the developed algorithm. In the present exercise usage contexts were divided into home, office and “on the move”. The algorithm is used with exemplary data from Finland and the UK covering 324 consumers in 2006. More than 70% of contextual use cases are correctly classified based on raw data. According to exemplary results particularly multimedia services are used “on the move”, whereas legacy mobile services experience more evenly distributed usage across all contexts. The algorithm that identifies context based on raw data provides a new angle to mobile end-user research. In the future, the accuracy of the algorithm will be improved with the integration of seamless cell-id logging and GPS data. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
33. Efficient Broadcasting in Mobile Ad Hoc Networks.
- Author
-
Khabbazian, Majid and Bhargava, Vijay K.
- Subjects
MOBILE communication systems ,BROADCASTING industry ,DIGITAL communications ,TELECOMMUNICATION ,ALGORITHMS ,COMMUNICATIONS industries ,RADIO broadcasting ,MOBILE computing - Abstract
This paper presents two efficient broadcasting algorithms based on 1-hop neighbor information. In the first part of the paper, we consider sender-based broadcasting algorithms, specifically the algorithm proposed by Liu et al. In their paper, Liu et al. proposed a sender-based broadcasting algorithm that can achieve local optimality by selecting the minimum number of forwarding nodes in the lowest computational time complexity O(n log n), where n is the number of neighbors. We show that this optimality only holds for a subclass of sender-based algorithms. We propose an efficient sender-based broadcasting algorithm based on 1-hop neighbor information that reduces the time complexity of computing forwarding nodes to O(n). In Liu et al's algorithm, n nodes are selected to forward the message in the worst case, whereas in our proposed algorithm, the number of forwarding nodes in the worst case is 11. In the second part of the paper, we propose a simple and highly efficient receiver-based broadcasting algorithm. When nodes are uniformly distributed, we prove that the probability of two neighbor nodes broadcasting the same message exponentially decreases when the distance between them decreases or when the node density increases. Using simulation, we confirm these results and show that the number of broadcasts in our proposed receiver-based broadcasting algorithm can be even less than one of the best known approximations for the minimum number of required broadcasts. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
34. Outdoor WLAN planning via non-monotone derivative-free optimization: algorithm adaptation and case study.
- Author
-
González-Castaño, Francisco J., Costa-Montenegro, Enrique, Burguillo-Rial, Juan C., and García-Palomares, Ubaldo
- Subjects
WIRELESS LANs ,MATHEMATICAL optimization ,ALGORITHMS ,SIMULATED annealing ,STOCHASTIC convergence ,MOBILE communication systems - Abstract
In this paper, we study the application of non-monotone derivative-free optimization algorithms to wireless local area networks (WLAN) planning, which can be modeled as an unconstrained minimization problem. We wish to determine the access point (AP) positions that maximize coverage in order to provide connectivity to static and mobile users. As the objective function of the optimization model is not everywhere differentiable, previous research has discarded gradient methods and employed heuristics such as neighborhood search (NS) and simulated annealing (SA). In this paper, we show that the model fulfills the conditions required by recently proposed non-monotone derivative-free (DF) algorithms. Unlike SA, DF has guaranteed convergence. The numerical tests reveal that a tailored DF implementation (termed "zone search") outperforms NS and SA. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
35. Architecture of Wireless Sensor Networks With Mobile Sinks: Sparsely Deployed Sensors.
- Author
-
Liang Song and Hatzinakos, Dimitrios
- Subjects
SENSOR networks ,MOBILE communication systems ,DETECTORS ,ENERGY consumption ,ALGORITHMS ,TELECOMMUNICATION transmitters & transmission - Abstract
In this paper, we propose to develop wireless Sensor Networks with Mobile Sinks (MSSNs). The proposed MSSN is highly energy efficient, because the multihop transmissions of high-volume data over the network are converted into single-hop transmissions. We focus our investigation on sparsely deployed networks, where single node-to-sink transmission is considered. The transmission-scheduling algorithm (TSA-MSSN) is proposed, where a parameter λ is employed to control the tradeoff between the maximization of the probability of successful information retrieval and the minimization of the energy-consumption cost. It is shown that the proposed implementation of the TSA-MSSN has a complexity of O(1). This paper serves as the foundation for understanding fundamental laws behind the aforementioned tradeoff with useful implications for the design of more complex MSSNs. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
36. A Highly Efficient Algorithm for Phased-Array mmWave Massive MIMO Beamforming.
- Author
-
Althuwayb, Ayman Abdulhadi, Hashim, Fazirulhisyam, Jiun Terng Liew, Khan, Imran, Jeong Woo Lee, Affum, Emmanuel Ampoma, Ouahabi, Abdeldjalil, and Jacques, Sébastien
- Subjects
MOBILE communication systems ,TELECOMMUNICATION systems ,TELECOMMUNICATION ,WIRELESS Internet ,BEAMFORMING ,ALGORITHMS - Abstract
With the rapid development of the mobile internet and the internet of things (IoT), the fifth generation (5G) mobile communication system is seeing explosive growth in data traffic. In addition, low-frequency spectrum resources are becoming increasingly scarce and there is now an urgent need to switch to higher frequency bands. Millimeter wave (mmWave) technology has several outstanding features--it is one of the most well-known 5G technologies and has the capacity to fulfil many of the requirements of future wireless networks. Importantly, it has an abundant resource spectrum, which can significantly increase the communication rate of amobile communication system. As such, it is now considered a key technology for future mobile communications. MmWave communication technology also has a more open network architecture; it can deliver varied services and be applied inmany scenarios. By contrast, traditional, all-digital precoding systems have the drawbacks of high computational complexity and higher power consumption. This paper examines the implementation of a new hybrid precoding system that significantly reduces both calculational complexity and energy consumption. The primary idea is to generate several sub-channels with equal gain by dividing the channel by the geometric mean decomposition (GMD). In this process, the objective function of the spectral efficiency is derived, then the basic tracking principle and least square (LS) techniques are deployed to design the proposed hybrid precoding. Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
37. Aerial intelligent reflecting surface-enhanced cell-free massive MIMO for high-mobility communication: joint Doppler compensation and power optimization.
- Author
-
Zhou, Tao, Xu, Kui, Xie, Wei, Shen, Zhexian, Wei, Chen, Liu, Jie, and Sun, Linpu
- Subjects
DOPPLER effect ,POWER transmission ,ALGORITHMS ,ENERGY consumption ,BEAMFORMING ,COGNITIVE radio ,MOBILE communication systems - Abstract
Intelligent reflecting surfaces (IRSs) are considered one of the core technologies in sixth-generation (6G) mobile communication. In this paper, we investigate an aerial IRS (AIRS)-enhanced cell-free (CF) massive multiple-input-multiple-output (MIMO)system where multiple APs serve a high-speed mobile user simultaneously. The mobility of the user leads to fast time-varying and nonnegligible Doppler frequency offsets (DFOs), which cause a serious threat to link performance. To overcome the influence of the Doppler effect and reduce the energy consumption of the system, we propose a Doppler compensation and transmission method by using the AIRS. Specifically, we divide the AIRS reflection phase shift vector into two parts: one part is used for Doppler compensation, and the other is used for transmission. First, we propose an angle-sensing algorithm to obtain the user angle in each coherent time (CT) and use it to design a Doppler compensation vector. Then, we propose an angle information-aided transmission strategy to design the transmission reflecting vector, the beamforming vector, and the power allocation coefficient of each AP to minimize the transmission power of all APs at a required achievable rate. The simulation results show that we can significantly reduce the total transmission power by using the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
38. Joint optimization of BS-VS association and power control in secure HSR communication systems.
- Author
-
Xu, Hao, Yan, Lu, Liu, Haixiang, Li, Ke, and Wang, Jian
- Subjects
MOBILE communication systems ,WIRELESS communications ,TELECOMMUNICATION systems ,DRONE aircraft ,QUALITY of service ,ALGORITHMS ,EAVESDROPPING - Abstract
In this paper, the secure transmission for high-speed railway (HSR) communication system is studied. The considered HSR wireless communication system consists of a macro base station, B roadside base stations, and K vehicle stations (VSs) on the top of the train, and the eavesdropping user is a mobile unmanned aerial vehicle (UAV). We consider maximizing the sum of the minimum security rate of each time slot as the objective function, and the constraint conditions contain the quality of service (QoS), switch requirements and the total power constraint. The original optimization problem is mixed-integer and non-convex, it is intractable to solve directly. The block coordinate descent (BCD) method is applied, and the original problem can be decoupled into two sub-problems. The one is the joint BS-VS association problem, and the other is the power control problem. The first sub-problem of optimizing BS-VS association can be solved by the successive convex approximation (SCA) algorithm, and the second one of optimizing transmit power can be solved by the lagrangian dual method. Simulation results show that the proposed algorithms have good convergence. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. CBLM: Cluster-Based Location Management for 5G Small Cell Network Under Stochastic Environment.
- Author
-
Chakraborty, Sheuli, Mazumdar, Kaushik, and De, Debashis
- Subjects
TELECOMMUNICATION systems ,MOBILE communication systems ,5G networks ,STOCHASTIC processes ,ALGORITHMS - Abstract
Internet of Things (IoT) applications are connecting several Mobile Stations (MSs) to form the Mobile Communication Network (MCN). MSs are moving through macrocell and picocell recurrently due to the discontinuous deployment of the picocell over the macrocell. Each time they cross the cell boundary, they need to register with the Mobility Management Entity (MME). It incurs a high registration cost and elevates the signaling overhead ratio. To reduce the signaling overhead ratio, earlier techniques were attempted either by forming closed subscriber groups or by delaying the registration process, but that may create inconsistency in user location information. With this motivation, in this paper, MSs with similar mobility pattern which are moving from the picocell to macrocell, are grouped in clusters. A representative MS, called Cluster Representative (CR), performs the location management task on behalf of the whole cluster. The stochastic process has been employed to analyze the model. This study proposes Cluster-Based Location Management (CBLM) scheme and compares it with two state-of-the-art algorithms, named Group Mobility Management (GMM) and Closed Subscriber Group (CSG). On average, the CBLM scheme exhibits approximately 70% better performance than the CSG scheme whereas, 30% better than the GMM algorithm to mitigate the signaling overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
40. Adaptive Working Schedule for Duty-Cycle Opportunistic Mobile Networks.
- Author
-
Zhou, Huan, Zhao, Hongyang, Chen, Jiming, Liu, Chi Harold, and Fan, Jialu
- Subjects
MOBILE communication systems ,WIRELESS sensor networks ,WIRELESS sensor nodes ,ENERGY consumption ,ALGORITHMS - Abstract
In opportunistic mobile networks (OppNets), a large amount of energy is consumed by idle listening, instead of infrequent data exchange. This makes energy saving a challenging and fundamental problem in OppNets since nodes are typically battery powered. Asynchronous duty-cycle operation is a promising approach for energy saving in OppNets; however, if its working schedule is not effectively designed, it may also cause significant network performance degradation. Therefore, it is pressing to design an energy-efficient working schedule for duty-cycle OppNets. In this paper, we first analyze the contact process in duty-cycle OppNets and then propose an adaptive working schedule for duty-cycle OppNets. The proposed adaptive working schedule uses the past recorded contact histories to predict future contact information to adaptively configure the working schedule of each node in the network. Finally, extensive real trace-driven simulations are conducted to evaluate the performance of our proposed adaptive working schedule. Extensive real trace-driven simulation results demonstrate that our proposed adaptive working schedule is superior to the random working schedule and the periodical working schedule algorithms in terms of the number of effect contacts, delivery ratio, and delivery delay. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
41. TDMA with multiple parallel transmission using a directional antenna.
- Author
-
Akizuki, Osamu, Suzuki, Shingo, Mutsuura, Kouichi, and Ooshita, Shinjirou
- Subjects
TIME division multiple access ,SPREAD spectrum communications ,CELL phone systems ,ANTENNAS (Electronics) ,ALGORITHMS ,MOBILE communication systems - Abstract
The authors previously proposed a TDMA with parallel transmission (TDMA/PT) system in which several terminals can send packets in parallel in the TDMA system by controlling the transmission power of each terminal. In TDMA/PT, packets can be transmitted in parallel unless the packet sent by a terminal collides with that transmitted by the preceding terminal. Each terminal understands the positions of other terminals and can obtain transmission information about the preceding terminal. Hence, if a directional antenna is used in the TDMA/PT, it is possible to improve the performance by increasing the probability of parallel transmission. In this paper, a transmission algorithm is proposed in which directional antennas are used in conjunction with TDMA/PT. In TDMA/PT, only the parallel transmission of two terminals with contiguous IDs is considered, so that the probability of parallel transmission cannot be made very high. In this paper, a transmission algorithm allowing the parallel transmission of more than three terminals is proposed, and its performance improvement effect is discussed. © 1998 Scripta Technica, Electron Comm Jpn Pt 1, 82(1): 11–21, 1999 [ABSTRACT FROM AUTHOR]
- Published
- 1999
- Full Text
- View/download PDF
42. Wideband Channel Modeling for mm-Wave inside Trains for 5G-Related Applications.
- Author
-
Moreno García-Loygorri, Juan, Briso-Rodríguez, César, Arnedo, Israel, Calvo, César, Laso, Miguel A. G., He, Danping, Jiménez, Florentino, and González Posadas, Vicente
- Subjects
5G networks ,ALGORITHMS ,MOBILE communication systems ,ALGEBRA ,FREQUENCIES of oscillating systems - Abstract
Passenger trains and especially metro trains have been identified as one of the key scenarios for 5G deployments. The wireless channel inside a train car is reported in the frequency range between 26.5 GHz and 40 GHz. These bands have received a lot of interest for high-density scenarios with a high-traffic demand, two of the most relevant aspects of a 5G network. In this paper we provide a full description of the wideband channel estimating Power-Delay Profiles (PDP), Saleh-Valenzuela model parameters, time-of-arrival (TOA) ranging, and path-loss results. Moreover, the performance of an automatic clustering algorithm is evaluated. The results show a remarkable degree of coherence and general conclusions are obtained. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
43. Current Use and Future Perspectives of Spatial Audio Technologies in Electronic Travel Aids.
- Author
-
Spagnol, Simone, Wersényi, György, Bujacz, Michał, Bălan, Oana, Herrera Martínez, Marcelo, Moldoveanu, Alin, and Unnthorsson, Runar
- Subjects
MOBILE communication systems ,ALGORITHMS ,MOBILE computing ,VIRTUAL reality ,VISION disorders - Abstract
Electronic travel aids (ETAs) have been in focus since technology allowed designing relatively small, light, and mobile devices for assisting the visually impaired. Since visually impaired persons rely on spatial audio cues as their primary sense of orientation, providing an accurate virtual auditory representation of the environment is essential. This paper gives an overview of the current state of spatial audio technologies that can be incorporated in ETAs, with a focus on user requirements. Most currently available ETAs either fail to address user requirements or underestimate the potential of spatial sound itself, which may explain, among other reasons, why no single ETA has gained a widespread acceptance in the blind community. We believe there is ample space for applying the technologies presented in this paper, with the aim of progressively bridging the gap between accessibility and accuracy of spatial audio in ETAs. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
44. Speaker Recognition Exploiting D2D Communications Paradigm: Performance Evaluation of Multiple Observations Approaches.
- Author
-
Bisio, Igor, Lavagetto, Fabio, Garibotto, Chiara, and Sciarrone, Andrea
- Subjects
MOBILE communication systems ,ALGORITHMS ,NUMERICAL analysis ,WIRELESS communications ,MACHINE learning - Abstract
The diffusion of Device-to-Device (D2D) communications opens the door to exploit the contributions of multiple Mobile Devices (MDs) to accomplish collaborative tasks. In this paper a speaker recognition algorithm for MDs based on a multiple-observations approach is presented. We propose various fusion and clustering algorithms aimed at efficiently exploiting data coming from MDs. Numerical results show that in many cases our multiple-observation approach is able to significantly improve the accuracy of the considered speaker recognition algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
45. Network selection in heterogeneous wireless networks using multi-criteria decision-making algorithms: a review.
- Author
-
Obayiuwana, Enoruwa and Falowo, Olabisi
- Subjects
WIRELESS sensor networks ,ROAMING (Telecommunication) ,MOBILE communication systems ,ALGORITHMS ,MULTIPLE criteria decision making - Abstract
It is expected that next-generation wireless networks will provide a plethora of mobile wireless services to users and ubiquitous network coverage at all times. Meeting these expected goals requires that new and existing networks be seamlessly integrated together to form Heterogeneous Wireless Networks (HWNs). Thus, seamless and efficient handover mechanisms are pertinent for optimal network performance in HWNs; so that the mobile user can switch from one access network to another, in search of the best connection for the demanded services. The HWNs' performance can be reduced, if efficient network selection is not achieved. In HWNs, network-selection decisions can be evaluated by using multi-criteria, or a single criterion. However, network selection and decision-making in HWNs often involves taking into account a large number of complex and conflicting network-decision factors, or criteria. Thus multi-criteria decision-making techniques are more efficient than single-criterion techniques. Multi-Criteria Decision-Making (MCDM) techniques comprise of a developed branch of operational research for assisting in the resolution of complex decision-making problems. MCDM is an important tool that has been used to model and analyze handover-decisions and network-selection problems in HWNs. This paper reviews and classifies the most significant MCDM algorithms that have been used to address the network decision-making problems in HWNs in terms of algorithmic approach, the type of calls, the cardinality of decision criteria employed, handover-control points and the types of network utilities. Comprehensive step-wise mathematical implementations of the reviewed MCDM schemes are presented, while pointing out their strengths and limitations. This paper review fills a research gap in the investigation on network-selection criteria's interdependence and interactions, and their effects on criteria's weight of importance. It then provides an insight into the importance of network-criteria weighting and the current research trend in the application of MCDM algorithms to network-selection problems in HWNs. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
46. Modern Fisher-Yates Shuffling Based Random Interleaver Design for SCFDMA-IDMA Systems.
- Author
-
Yadav, Manish, Gautam, Prateek, Shokeen, Vinod, and Singhal, Pramod
- Subjects
MOBILE communication systems ,ERRORS ,FREQUENCIES of oscillating systems ,ALGORITHMS ,TELECOMMUNICATION systems - Abstract
Random interleavers are the most preferred interleavers utilized in digital and cellular communication systems for burst errors control. Fisher-Yates shuffling algorithm and its several modified versions offer alternate techniques of generating random permutations popularly employed in the areas of computer programming, information theory and cryptography for data security purposes. In this short paper, Modern Fisher-Yates shuffling algorithm, also known as Durstenfeld's algorithm, has been explored to generate random interleavers and further applied in single carrier frequency division multiple access based interleave division multiple access (SCFDMA-IDMA) systems. The results show that random interleavers generated by applying this algorithm are suitable enough to be employed in SCFDMA-IDMA system without compromising its performance. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
47. Design and Analysis of an Efficient Energy Algorithm in Wireless Social Sensor Networks.
- Author
-
Naixue Xiong, Longzhen Zhang, Wei Zhang, Vasilakos, Athanasios V., and Imran, Muhammad
- Subjects
ALGORITHMS ,SENSOR networks ,AD hoc computer networks ,MOBILE communication systems ,COMMUNICATION - Abstract
Because mobile ad hoc networks have characteristics such as lack of center nodes, multi-hop routing and changeable topology, the existing checkpoint technologies for normal mobile networks cannot be applied well to mobile ad hoc networks. Considering the multi-frequency hierarchy structure of ad hoc networks, this paper proposes a hybrid checkpointing strategy which combines the techniques of synchronous checkpointing with asynchronous checkpointing, namely the checkpoints of mobile terminals in the same cluster remain synchronous, and the checkpoints in different clusters remain asynchronous. This strategy could not only avoid cascading rollback among the processes in the same cluster, but also avoid too many message transmissions among the processes in different clusters. What is more, it can reduce the communication delay. In order to assure the consistency of the global states, this paper discusses the correctness criteria of hybrid checkpointing, which includes the criteria of checkpoint taking, rollback recovery and indelibility. Based on the designed Intra-Cluster Checkpoint Dependence Graph and Inter-Cluster Checkpoint Dependence Graph, the elimination rules for different kinds of checkpoints are discussed, and the algorithms for the same cluster checkpoints, different cluster checkpoints, and rollback recovery are also given. Experimental results demonstrate the proposed hybrid checkpointing strategy is a preferable trade-off method, which not only synthetically takes all kinds of resource constraints of Ad hoc networks into account, but also outperforms the existing schemes in terms of the dependence to cluster heads, the recovery time compared to the pure synchronous, and the pure asynchronous checkpoint advantage. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
48. Proximity Classification for Mobile Devices Using Wi-Fi Environment Similarity.
- Author
-
Carlotto, Alessandro, Parodi, Matteo, Bonamico, Carlo, Lavagetto, Fabio, and Valla, Massimo
- Subjects
WIRELESS communications ,ALGORITHMS ,GAUSSIAN processes ,COMPUTER network protocols ,MOBILE communication systems - Abstract
This paper describes an algorithm to compute lists of people and devices that are physically nearby to a mobile user based on the analysis of signals from existing wireless networks. The system evaluates proximity by classifying the degree of similarity of the Wi-Fi scan data through a statistical Gaussian Mixture Model. It recognizes when the devices are in the same area, and, in this case, it distinguishes three proximity levels: High (e.g. same room), Medium (e.g. same floor) and Low (e.g. same building). The algorithm can be deployed on a remote server that receives Wi-Fi scanning data (including MAC addresses and signal strength) from mobile devices. The server estimates proximity by extracting a set of features from each received pair of Wi- Fi data, feeding them to the GMM model and selecting the category with greatest probability. The method presented in the paper does not require calibration and leverages on existing Wi-Fi signals, while obtaining a percentage of correct discrimination among three levels near to 90%. [ABSTRACT FROM AUTHOR]
- Published
- 2008
49. 3GPP LTE Random Access Channel Self-Optimization.
- Author
-
Amirijoo, Mehdi, Gunnarsson, Fredrik, and Andren, Filip
- Subjects
SELF-organizing systems ,MOBILE communication systems ,LONG-Term Evolution (Telecommunications) ,ROAMING (Telecommunication) ,NETWORK performance ,ALGORITHMS - Abstract
This paper addresses self-optimization of the random access channel (RACH) in the Third-Generation Partnership Project (3GPP) Long-Term Evolution (LTE). Ensuring satisfactory random access (RA) performance in terms of access delay (AD) is crucial for reducing the delays associated with initial access and handovers. The feasibility of self-optimization is investigated by means of simulations, where the coupling between several parameters and the RACH performance in terms of AD is provided. We present two candidate feedback control algorithms that automatically adjust key RACH parameters to meet specified AD targets. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
50. A battery lifetime guarantee scheme for selective applications in smart mobile devices.
- Author
-
Cho, Jungwook, Woo, Youngjoo, Kim, Suntae, and Seo, Euiseong
- Subjects
MOBILE communication systems ,ENERGY consumption ,BATTERY management systems ,SMARTPHONES ,ALGORITHMS ,MOBILE operating systems - Abstract
Unpredictable battery lifetime arising from multitasking can have a significant negative effect on availability for mobile devices. In practice, some applications are prioritized and required to remain in operation for certain duration. This paper suggests a battery lifetime guaranteeing scheme for prioritized applications in multitasking mobile systems. The proposed approach profiles and analyzes the battery usage pattern of each task dynamically, and preserves the energy budget for operation of prioritized tasks for a guaranteed time. In addition, this paper proposes an energyconstrained scheduler that limits the energy consumption of tasks while preserving scheduling patterns, which translates to the QoS. The suggested scheme is implemented in a commercial smartphone and evaluated. The evaluation showed that the proposed scheme successfully provides guaranteed operation time for prioritized tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.