ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (5,142)
Collection
  • Articles  (5,142)
Publisher
Years
Journal
  • 1
    Publication Date: 2021-10-29
    Description: In this era of the digital world, data play a central role and are continuously challenging spectrum efficiency. With the introduction of enriched multimedia user-generated content, the challenges are even more aggravated. In this vein, uplink caching is considered as one of the promising solutions to effectively cater the user’s demands. One of the main challenges for uplink caching is duplication elimination. In this paper, a cache enabled uplink transmission with a duplication elimination scheme is proposed. The proposed scheme matches the mobile’s data to be uploaded with the cached contents both at mobile station (MS) and small base station (SBS). In contrast to existing techniques, the proposed scheme broadcasts the cached contents at an SBS to all the MSs under its footprint. This provides MS an opportunity to exploit the list of cached contents before uploading its data. A MS only uploads its data if it is not already cached at an SBS. This significantly reduces duplication before the real transmission takes place. Furthermore, the proposed technique reduces energy consumption in addition to improving spectral efficiency and network throughput. Besides, a higher caching hit ratio and lower caching miss ratio are also observed as compared to other schemes. The simulation results reveal that the proposed scheme saves 97% energy for SBS, whereas 96–100% energy is saved for MS on average.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2021-10-09
    Description: Layered decoding (LD) facilitates a partially parallel architecture for performing belief propagation (BP) algorithm for decoding low-density parity-check (LDPC) codes. Such a schedule for LDPC codes has, in general, reduced implementation complexity compared to a fully parallel architecture and higher convergence rate compared to both serial and parallel architectures, regardless of the codeword length or code-rate. In this paper, we introduce a modified shuffling method which shuffles the rows of the parity-check matrix (PCM) of a quasi-cyclic LDPC (QC-LDPC) code, yielding a PCM in which each layer can be produced by the circulation of its above layer one symbol to the right. The proposed shuffling scheme additionally guarantees the columns of a layer of the shuffled PCM to be either zero weight or single weight. This condition has a key role in further decreasing LD complexity. We show that due to these two properties, the number of occupied look-up tables (LUTs) on a field programmable gate array (FPGA) reduces by about 93% and consumed on-chip power by nearly 80%, while the bit error rate (BER) performance is maintained. The only drawback of the shuffling is the degradation of decoding throughput, which is negligible for low values of $$E_b/N_0$$ E b / N 0 until the BER of 1e−6.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2021-10-09
    Description: This paper investigated the spectral efficiency (SE) in massive multiple-input multiple-output systems, where all terminals have no fixed power supply and thus need to replenish energy via the received signals from the base station. The hybrid wireless energy harvesting (EH) protocol is applied for each terminal, which can switch to either existing time-switching (TS) protocol or power-splitting (PS) protocol. Based on the hybrid wireless EH protocol, a general system model is developed, which can switch to either only uplink data transmission or only downlink data transmission. As a result, a general analytical framework is formulated. Then, closed-form lower bound expressions on SE for each terminal are obtained on the uplink and downlink, respectively. According to these expressions, the joint SE of uplink and downlink maximization problem is designed with some practical constraints. As the designed optimization problem is non-linear and non-convex, it is hard to solve directly. To provide a solution, an iteration algorithm is proposed by utilizing one-dimensional search technique and successive approximation method based on geometric program. Additionally, the convergence and complexity of the proposed algorithm are discussed as well. Finally, the feasibility of the proposed algorithm is analyzed by simulations. Numerical results manifest that the proposed algorithm can provide good SE by optimizing relevant system parameters, and the system model can help to discuss the TS, PS or hybrid protocol for only uplink data transmission, only downlink data transmission or joint data transmission of uplink and downlink in the considered system.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2021-09-26
    Description: Multiple categories of electronic devices have been introduced recently in response to the demands and developments in the industry. Around 5.19 billion telecom services subscribers today have a significant effect on the allocation and utilization of bandwidth, and hence, there is extensive need to use higher-frequency bands, e.g., mm band to achieve the required quality of service since there is extensive need to shift the paradigm to the next generation. For 5G networks, antenna structuring and designing is an integral part of the communication system. In antenna theory, improving antenna gain is important to attain isotropic antenna, antenna gain can be improved by the controlled behavior of frequencies, beam forming and choosing the right antenna fabric. Through antenna design using different substrates thickness, the propagation losses are examined in order to determine the variation with radiation characteristics. In this way, the examination of the 5G mm-wave spectrum with comparative analysis of input impedance, gain and radiation efficiency is shown through mathematical modeling. Using this approach, the antenna efficiency is improved by up to 20% with increase in substrate thickness. Different antenna arrays have been designed for effective improvement in reflection coefficients. The results are obtained using simulation of antenna in CST and high-frequency structure simulator.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2021-09-25
    Description: Congestion-aware scheduling in case of downlink cellular communication has ignored the distribution of diverse content to different clients with heterogeneous secrecy requirements. Other possible application areas that encounter the preceding issue are secure offloading in mobile-edge computing, and vehicular communication. In this paper, we extend the work in Arvanitaki et al. (SN Comput Sci 1(1):53, 2019) by taking into consideration congestion and random access. Specifically, we study a two-user congestion-aware broadcast channel with heterogeneous traffic and different security requirements. We consider two randomized policies for selecting which packets to transmit, one is congestion-aware by taking into consideration the queue size, whereas the other one is congestion-agnostic. We analyse the throughput and the delay performance under two decoding schemes at the receivers, and provide insights into their relative security performance and into how congestion control at the queue holding confidential information can help decrease the average delay per packet. We show that the congestion-aware policy provides better delay, throughput, and secrecy performance for large arrival packet probabilities at the queue holding the confidential information. The derived results also take account of the self-interference caused at the receiver for whom confidential data is intended due to its full-duplex operation while jamming the communication at the other user. Finally, for two decoding schemes, we formulate our problems in terms of multi-objective optimization, which allows for finding a trade-off between the average packet delay for packets intended for the legitimate user and the throughput for the other user under congestion-aware policy.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2021-09-21
    Description: With the development of smart cities, network security has become more and more important. In order to improve the safety of smart cities, a situation prediction method based on feature separation and dual attention mechanism is presented in this paper. Firstly, according to the fact that the intrusion activity is a time series event, recurrent neural network (RNN) or RNN variant is used to stack the model. Then, we propose a feature separation method, which can alleviate the overfitting problem and reduce cost of model training by keeping the dimension unchanged. Finally, limited attention is proposed according to global attention. We sum the outputs of the two attention modules to form a dual attention mechanism, which can improve feature representation. Experiments have proved that compared with other existing prediction algorithms, the method has higher accuracy in network security situation prediction. In other words, the technology can help smart cities predict network attacks more accurately.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2021-09-10
    Description: Reconfigurable intelligent surface (RIS) is a programmable structure that can be used to control the propagation of electromagnetic waves by changing the electric and magnetic properties of the surface. By placing these surfaces in an environment, the properties of radio channels can be controlled. This opens up new opportunities to improve the performance of wireless systems. In this paper, the basic operation of antenna array and metasurface based RIS is described. While the current long term (6G) research on RIS often prioritizes very high frequencies from tens to hundreds of GHz, this paper puts emphasis rather on operating frequencies below 10 GHz which promise a much faster to market track for RIS applications. For this purpose, review of the literature on the use of RIS in wireless communication applications operating below 10 GHz frequency band is provided.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2021-09-06
    Description: Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an effective revocation method to revoke users in multi-user cryptosystems, when user’s secret keys are exposed. In this paper, we propose the first designated server-aided revocable identity-based encryption scheme with keyword search (dSR-IBKS) from lattice. The dSR-IBKS model requires each user to keep just one private key corresponding with his identity and does not need to communicate with the key generation center or the server during key updating. We have proved that our scheme can achieve chosen keyword indistinguishability in the standard model. In particular, our scheme can designate a unique tester to test and return the search results, therefore no other entity can guess the keyword embedded in the ciphertext by generating search queries and doing the test by itself. We provide a formal security proof of our scheme assuming the hardness of the learning with errors problem on the standard model.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2021-08-30
    Description: As a comprehensive utilization of pipeline resources, communication intelligent manhole cover (CIMC) can effectively real-time monitor communication manhole cover and protect the safety of communication pipeline. Due to the complex working environment of manhole cover and the random error of sensor, the traditional monitoring method usual leads to frequent false alarm in actual applications. In order to ensure the monitoring service quality and improve the service efficiency, a new alarm method of CIMC with multiple event fusion in this paper via jointing analysis of multi-sensor status signals is proposed based on the equipment status signals generated by the CIMC terminal and abnormal alarm events definition. The experimental result shows that the proposed CIMC alarm method by means of multiple sensor signals in this paper can not only make up for the defect of a single sensor, but also reduces the false alarm rate caused by the random error of sensor and CIMC system. It can promote the intelligent monitoring efficiency of the manhole cover and be conducive to the construction of intelligent transportation and smart city.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2021-08-28
    Description: Measuring the consumption of electronic devices is a difficult and sensitive task. Data acquisition (DAQ) systems are often used to determine such consumption. In theory, measuring energy consumption is straight forward, just by acquiring current and voltage signals we can determine the consumption. However, a number of issues arise when a fine analysis is required. The main problem is that sampling frequencies have to be high enough to detect variations in the assessed signals over time. In that regard, some popular DAQ systems are based on RISC ARM processors for microcontrollers combined with analog-to-digital converters to meet high-frequency acquisition requirements. The efficient use of direct memory access (DMA) modules combined with pipelined processing in a microcontroller allows to improve the sample rate overcoming the processing time and the internal communication protocol limitations. This paper presents a novel approach for high-frequency energy measurement composed of a DMA rate improvement (data acquisition logic), a data processing logic and a low-cost hardware. The contribution of the paper is the combination of a double-buffered signal acquisition mechanism and an algorithm that computes the device’s energy consumption using parallel data processing. The combination of these elements enables a high-frequency (continuous) energy consumption measurement of an electronic device, improving the accuracy and reducing the cost of existing systems. We have validated our approach by measuring the energy consumed by elemental circuits and wireless sensors networks (WSNs) motes. The results indicate that the energy measurement error is less than 5% and that the proposed method is suitable to measure WSN motes even during sleep cycles, enabling a better characterization of their consumption profile.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...