2014 IEEE Global Communications Conference最新文献

筛选
英文 中文
Power efficient uplink resource allocation in LTE networks under delay QoS constraints 时延QoS约束下LTE网络的高效上行资源分配
2014 IEEE Global Communications Conference Pub Date : 2014-12-10 DOI: 10.1109/GLOCOM.2014.7036978
Adnan Aijaz, M. R. Nakhai, H. Aghvami
{"title":"Power efficient uplink resource allocation in LTE networks under delay QoS constraints","authors":"Adnan Aijaz, M. R. Nakhai, H. Aghvami","doi":"10.1109/GLOCOM.2014.7036978","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036978","url":null,"abstract":"In this paper, we investigate power efficient resource allocation for the uplink of LTE networks under delay Quality-of-Service (QoS) constraints. We formulate the resource allocation problem as the minimization of sum power in the uplink under statistical delay QoS provisioning, which is complicated due to the specific constraints of SC-FDMA (uplink air interface in LTE networks). We solve the problem using Canonical duality theory. Numerical results which are obtained using the Invasive Weed Optimization algorithm, show that the proposed resource allocation algorithm not only outperforms classical algorithms in terms of power efficiency while satisfying the QoS requirements, but also performs closer to the optimal solution.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"26 1","pages":"1239-1244"},"PeriodicalIF":0.0,"publicationDate":"2014-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84970636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks 收获和干扰:提高无线能量收集合作网络的安全性
2014 IEEE Global Communications Conference Pub Date : 2014-12-09 DOI: 10.1109/GLOCOM.2014.7037289
Hong Xing, Zheng Chu, Z. Ding, A. Nallanathan
{"title":"Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks","authors":"Hong Xing, Zheng Chu, Z. Ding, A. Nallanathan","doi":"10.1109/GLOCOM.2014.7037289","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037289","url":null,"abstract":"The emerging radio signal enabled simultaneous wireless information and power transfer (SWIPT), has drawn significant attention. To achieve secrecy transmission by cooperative jamming, especially in the upcoming 5G networks with self-sustainable mobile base stations (BSs) and yet not to add extra power consumption, we propose in this paper a new relay protocol, i.e., harvest-and-jam (HJ), in a relay wiretap channel with an additional set of spare helpers. Specifically, in the first transmission phase, a single-antenna transmitter (Tx) transfers signals carrying both information and energy to a multi-antenna amplify-and-forward (AF) relay and a group of multi-antenna helpers; in the second transmission phase, the AF relay processes the information and forwards it to the receiver while each of the helpers generates an artificial noise (AN), the power of which is constrained by its previously harvested energy, to interfere with the eavesdropper. By optimizing the transmit beamforming matrix for the AF relay and the covariance matrix for the AN, we maximize the secrecy rate for the receiver subject to transmit power constraints for the AF relay and all helpers. The formulated problem is shown to be non-convex, for which we propose an iterative algorithm based on alternating optimization. Finally, the performance of the proposed scheme is evaluated by simulations as compared to other heuristic schemes.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"28 1","pages":"3145-3150"},"PeriodicalIF":0.0,"publicationDate":"2014-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78134255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Two-way relaying networks with wireless power transfer: Policies design and throughput analysis 具有无线电力传输的双向中继网络:策略设计和吞吐量分析
2014 IEEE Global Communications Conference Pub Date : 2014-12-09 DOI: 10.1109/GLOCOM.2014.7037438
Yuanwei Liu, Lifeng Wang, M. Elkashlan, T. Duong, A. Nallanathan
{"title":"Two-way relaying networks with wireless power transfer: Policies design and throughput analysis","authors":"Yuanwei Liu, Lifeng Wang, M. Elkashlan, T. Duong, A. Nallanathan","doi":"10.1109/GLOCOM.2014.7037438","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037438","url":null,"abstract":"This paper exploits an amplify-and-forward (AF) two-way relaying network (TWRN), where an energy constrained relay node harvests energy with wireless power transfer. Two bidirectional protocols, multiple access broadcast (MABC) protocol and time division broadcast (TDBC) protocol, are considered. Three wireless power transfer policies, namely, dual-source (DS) power transfer; single-fixed-source (SFS) power transfer; and single-best-source (SBS) power transfer are proposed and well-designed based on time switching receiver architecture. We derive analytical expressions to determine the throughput both for delay-limited transmission and delay-tolerant transmission. Numerical results corroborate our analysis and show that MABC protocol achieves a higher throughput than TDBC protocol. An important observation is that SBS policy offers a good tradeoff between throughput and power.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"14 1","pages":"4030-4035"},"PeriodicalIF":0.0,"publicationDate":"2014-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87739660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Resource management in cognitive opportunistic access femtocells with imperfect spectrum sensing 不完全频谱感知下认知机会接入飞基站的资源管理
2014 IEEE Global Communications Conference Pub Date : 2014-12-09 DOI: 10.1109/GLOCOM.2014.7037281
Haijun Zhang, Chunxiao Jiang, Xiaotao Mao, A. Nallanathan
{"title":"Resource management in cognitive opportunistic access femtocells with imperfect spectrum sensing","authors":"Haijun Zhang, Chunxiao Jiang, Xiaotao Mao, A. Nallanathan","doi":"10.1109/GLOCOM.2014.7037281","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037281","url":null,"abstract":"Recently, cognitive radio enabled femtocell is regarded as a promising technique in wireless communications, where the issues of resource allocation and interference management have been investigated intensively. However, spectrum sensing errors are neglected in most of the existing works. In this paper, we propose a resource allocation scheme for orthogonal frequency division multiple access (OFDMA) based cognitive femtocells. The target is to maximize the sum rate of all femtocell users (FUs) under QoS constraints and co-tier/cross-tier interference constraints under imperfect channel sensing. The subchannel and power allocation problem is first modeled as a mixed integer programming problem, and then transformed into a convex optimization problem by relaxing subchannel sharing and imposing co-tier interference constraints, which is finally solved using the dual decomposition method. Based on the obtained solution, an iterative subchannel and power allocation algorithm is proposed. The effectiveness in terms of instantaneous maximum achievable rate of the proposed algorithm as compared with perfect spectrum sensing schemes is verified by simulations.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"40 1","pages":"3098-3102"},"PeriodicalIF":0.0,"publicationDate":"2014-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88034584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance analysis of energy-efficient MAC protocols using bidirectional transmissions and sleep periods in IEEE 802.11 WLANs IEEE 802.11无线局域网中使用双向传输和睡眠周期的节能MAC协议的性能分析
2014 IEEE Global Communications Conference Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036980
Raúl Palacios, El Moatez Billah Larbaa, J. Alonso-Zarate, F. Granelli
{"title":"Performance analysis of energy-efficient MAC protocols using bidirectional transmissions and sleep periods in IEEE 802.11 WLANs","authors":"Raúl Palacios, El Moatez Billah Larbaa, J. Alonso-Zarate, F. Granelli","doi":"10.1109/GLOCOM.2014.7036980","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036980","url":null,"abstract":"The Distributed Coordination Function (DCF) is the mandatory access method for any compliant device in Wireless Local Area Networks (WLANs) based on the IEEE 802.11 Standard. WLAN Access Points (APs) and stations (STAs) contend for the access to the wireless channel in order to transmit data by using a variation of Carrier Sense Multiple Access (CSMA). In doing so, they consume a significant amount of energy for continuously monitoring the channel state. In this paper we investigate backwards-compatible mechanisms to increase throughput and energy efficiency in WLANs during contention periods based on DCF. The first mechanism is called Bi-Directional DCF (BD-DCF) because it allows for bidirectional transmissions between APs and STAs with a single channel access invocation. The second mechanism is called Bi-Directional Sleep DCF (BDSL-DCF) as it allows overhearing STAs to enter the sleep state, i.e. switch off the radio transceiver, during bidirectional transmissions. We analyze the performance limits of the proposed protocols in terms of throughput and energy efficiency considering different values for the data packet length and data rate. The results of this work show that the BD-DCF and BDSL-DCF protocols can improve throughput up to 60% and energy efficiency up to 360% when compared to legacy DCF.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"6 1","pages":"1252-1258"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82275247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Self organising network techniques to maximise traffic offload onto a 3G/WCDMA small cell network using MDT UE measurement reports 自组织网络技术,利用MDT终端测量报告,最大限度地将流量卸载到3G/WCDMA小型蜂窝网络上
2014 IEEE Global Communications Conference Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037136
R. Joyce, Li X. Zhang
{"title":"Self organising network techniques to maximise traffic offload onto a 3G/WCDMA small cell network using MDT UE measurement reports","authors":"R. Joyce, Li X. Zhang","doi":"10.1109/GLOCOM.2014.7037136","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037136","url":null,"abstract":"This paper presents a number of Self-Organising Network (SON) based methods using a 3GPP Minimisation of Drive Testing (MDT) approach or similar and the analysis of these geo-located UE measurements to maximise traffic offload onto lamppost mounted 3G/WCDMA microcells. Simulations have been performed for a real 3G/WCDMA microcell deployment in a busy area of central London and the results suggest that for the network studied a traffic increase on the microcell layer of up to 175% is achievable through the novel SON methods presented.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"23 1","pages":"2212-2217"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90282839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An extended Hop-by-hop interest shaping mechanism for content-centric networking 一种扩展的逐跳兴趣塑造机制,用于以内容为中心的网络
2014 IEEE Global Communications Conference Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7389766
Natalya Rozhnova, S. Fdida
{"title":"An extended Hop-by-hop interest shaping mechanism for content-centric networking","authors":"Natalya Rozhnova, S. Fdida","doi":"10.1109/GLOCOM.2014.7389766","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7389766","url":null,"abstract":"The evolution of the Internet has triggered a significant activity exploring new architectures among which the concept of Information-Centric-Networks (ICN) has emerged. Considering the various ICN solutions, Content-Centric Networking (CCN) is the one that received most attention. The design of CCN is progressing albeit many important issues still deserve a careful analysis and design. In this paper, we cover the important problem of congestion control in CCN and develop our hop-by-hop Interest Shaping mechanism (HoBHIS) framework. We present the foundation and general properties of our solution. We then study the behaviour of HoBHIS and demonstrate the fairness of resource sharing in presence of multiple active conversations. Further, we introduce a mechanism to control the user behavior in order to limit its ability to submit requests in excess creating a potential risk for buffer overflow. We demonstrate the effectiveness of the proposed solutions and provide a performance analysis using the implementation of our schemes in ndnSIM. We show that HoBHIS provides an adequate and efficient solution to the general problem of congestion control in CCN.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"19 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89292461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Analysis of dependency evaluation models for eHealth services 电子医疗服务依赖评估模型分析
2014 IEEE Global Communications Conference Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7037172
H. Mshali, Tayeb Lemlouma, D. Magoni
{"title":"Analysis of dependency evaluation models for eHealth services","authors":"H. Mshali, Tayeb Lemlouma, D. Magoni","doi":"10.1109/GLOCOM.2014.7037172","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7037172","url":null,"abstract":"This work focuses on the evaluation of the need and help required by elderly and dependent persons. We study the most widely used evaluation models in the health domain. We propose a new algorithm to assess and compare the performance of these models and the possibility to use them in future eHealth systems and platforms. The objective is to shed some light on the weakness of existing models and to gain a better knowledge about the context of persons in order to provide them with eHealth services that match their context and meet their needs.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"27 1","pages":"2429-2435"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77253451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SOCRATIC: A social approach to network coding rate control 网络编码速率控制的社会方法
2014 IEEE Global Communications Conference Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036833
Samuel B. Wood, H. Sadjadpour, J. Garcia-Luna-Aceves
{"title":"SOCRATIC: A social approach to network coding rate control","authors":"Samuel B. Wood, H. Sadjadpour, J. Garcia-Luna-Aceves","doi":"10.1109/GLOCOM.2014.7036833","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036833","url":null,"abstract":"Tactical and emergency-response networks require efficient communication without a managed infrastructure. Recent work demonstrates that applying information-centric paradigms to the tactical edge can provide performance benefits over traditional address centric approaches. We propose SOCRATIC (SOCial RATe control for Information Centric networks), an approach that unifies replication and network coding to disseminate content by taking advantage of social content and context heuristics. SOCRATIC replicates network encoded blocks according to a popularity index metric that is shared during neighbor discovery. The number of encoded blocks that is relayed to a node depends on its own interest in a data object and its social popularity, i.e., how often and for how long the node meets other nodes. These blocks are subsequently replicated towards the subscriber if a stable path exists. We evaluate an implementation of SOCRATIC through network emulation of a tactical scenario and demonstrate that it can achieve better performance than traditional socially agnostic approaches.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"41 1","pages":"352-356"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87280302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outage analysis of integrated mesh LTE femtocell networks 综合网状LTE飞蜂窝网络的中断分析
2014 IEEE Global Communications Conference Pub Date : 2014-12-08 DOI: 10.1109/GLOCOM.2014.7036805
A. Busson, Lynda Zitoune, V. Vèque, B. Jabbari
{"title":"Outage analysis of integrated mesh LTE femtocell networks","authors":"A. Busson, Lynda Zitoune, V. Vèque, B. Jabbari","doi":"10.1109/GLOCOM.2014.7036805","DOIUrl":"https://doi.org/10.1109/GLOCOM.2014.7036805","url":null,"abstract":"The femtocell - Wi-Fi integration is a promising approach to solve the problem of inter-tier or intra-tier interference in heterogeneous networks. In this paper, multimode femtocell base stations are deployed which form a Wi-Fi mesh network to communicate between themselves while deploying cellular technology (e.g., LTE) for communications with mobile users, thus ensuring ultimately connectivity between mobile users and their macro base stations to improve the network coverage. We propose a tractable model for coverage/outage to evaluate the benefits of such integration in terms of SINR and received signal strength. Our work is based on point processes in two-dimensional plane that models locations of femtocell - Wi-Fi (also referred to as multimode) nodes. The proposed model is more realistic than the classical Poisson point process, as the distribution of points is more homogeneous and it ensures that the nodes are not too close to each other. The derivation of coverage/outage formula allows us to determine operational parameter ranges for the Wi-Fi network to form a mesh network. In addition, it helps in the design of the femtocell network to ensure a suitable coverage for users in terms of SINR and received signal strength.","PeriodicalId":6492,"journal":{"name":"2014 IEEE Global Communications Conference","volume":"30 1","pages":"187-192"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83402354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信