ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (777)
  • 2015-2019  (777)
  • 1945-1949
  • 2015  (777)
  • 110151
  • 1283
  • 48794
  • Computer Science  (777)
  • Electrical Engineering, Measurement and Control Technology  (612)
  • 1
    Publication Date: 2015-08-12
    Description: We examine a distributed detection problem in a wireless sensor network, where sensor nodes collaborate to detect a Gaussian signal with an unknown change of power, i.e., a scale parameter. Due to power/bandwidth constraints, we consider the case where each sensor quantizes its observation into a binary digit. The binary data are then transmitted through error-prone wireless links to a fusion center, where a generalized likelihood ratio test (GLRT) detector is employed to perform a global decision. We study the design of a binary quantizer based on an asymptotic analysis of the GLRT. Interestingly, the quantization threshold of the quantizer is independent of the unknown scale parameter. Numerical results are included to illustrate the performance of the proposed quantizer and GLRT in binary symmetric channels (BSCs).
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2015-08-13
    Description: More and more hybrid electric vehicles are driven since they offer such advantages as energy savings and better active safety performance. Hybrid vehicles have two or more power driving systems and frequently switch working condition, so controlling stability is very important. In this work, a two-stage Kalman algorithm method is used to fuse data in hybrid vehicle stability testing. First, the RT3102 navigation system and Dewetron system are introduced. Second, a modeling of data fusion is proposed based on the Kalman filter. Then, this modeling is simulated and tested on a sample vehicle, using Carsim and Simulink software to test the results. The results showed the merits of this modeling.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2015-08-17
    Description: In this paper, a comprehensive comparison analysis in terms of outage probability and average symbol error ratio (SER) is presented for cooperative cognitive multiple-input and multiple-output (CC-MIMO) multiuser systems with amplify-and-forward (AF) protocol. Specially, we consider two scenarios where the CC-MIMO multiuser systems have the perfect and imperfect channel state information (CSI). The CC-MIMO multiuser systems consist of one multi-antenna source, one single-antenna relay, and multiple multi-antenna destinations. At the secondary source and destinations, the maximal ratio transmission (MRT) and maximal ratio combining (MRC) are employed, respectively. For such CC-MIMO multiuser systems, we first obtain the exact closed-form expressions of outage probability under the two cases where the CC-MIMO multiuser systems have the perfect and imperfect CSI. Then, to reduce the implementation complexity, the tight lower bounds of outage probability and average SER are derived. Finally, to obtain insight, by using the high signal-to-noise ratio (SNR) approximation, the asymptotic estimations of outage probability are achieved. The numerical results show that the derivations are agreed with the simulations, which validate our derivations. At the same time, the results show that, for the systems without perfect CSI, the achievable diversity order reduces to one, regardless of the number of antennas at the cognitive source and destinations as well as the number of the cognitive destinations. Nevertheless, these key parameters affect the coding gain of the CC-MIMO multiuser systems. When the systems have the perfect CSI (or without feedback delay), the achievable diversity gain is determined by the minimum between the number of source’s antennas and the product of the number of destinations and the number of destination’s antennas. For the effect of PU’s parameters, our results indicate that primary systems only affect the coding gain but not the diversity gain.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2015-08-05
    Description: Currently deep learning has made great breakthroughs in visual and speech processing, mainly because it draws lessons from the hierarchical mode that brain deals with images and speech. In the field of NLP, a topic model is one of the important ways for modeling documents. Topic models are built on a generative model that clearly does not match the way humans write. In this paper, we propose Event Model, which is unsupervised and based on the language processing mechanism of neurolinguistics, to model documents. In Event Model, documents are descriptions of concrete or abstract events seen, heard, or sensed by people and words are objects in the events. Event Model has two stages: word learning and dimensionality reduction. Word learning is to learn semantics of words based on deep learning. Dimensionality reduction is the process that representing a document as a low dimensional vector by a linear mode that is completely different from topic models. Event Model achieves state-of-the-art results on document retrieval tasks.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2015-08-22
    Description: Community detection in a complex network is an important problem of much interest in recent years. In general, a community detection algorithm chooses an objective function and captures the communities of the network by optimizing the objective function, and then, one uses various heuristics to solve the optimization problem to extract the interesting communities for the user. In this article, we demonstrate the procedure to transform a graph into points of a metric space and develop the methods of community detection with the help of a metric defined for a pair of points. We have also studied and analyzed the community structure of the network therein. The results obtained with our approach are very competitive with most of the well-known algorithms in the literature, and this is justified over the large collection of datasets. On the other hand, it can be observed that time taken by our algorithm is quite less compared to other methods and justifies the theoretical findings.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2015-08-21
    Description: A three-step iterative method with fifth-order convergence as a new modification of Newton’s method was presented. This method is for finding multiple roots of nonlinear equation with unknown multiplicity m whose multiplicity m is the highest multiplicity. Its order of convergence is analyzed and proved. Results for some numerical examples show the efficiency of the new method.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2015-08-23
    Description: To reduce the energy cost of underwater acoustic sensor networks (UWSNs), the duty cycle (i.e., periodic wake-up and sleep) concept has been used in several medium access control (MAC) protocols. Although these protocols are energy efficient, they sacrifice bandwidth utilization, which leads to lower transmission rate. In order to solve this problem, asynchronous duty cycle with network-coding Asynchronous Duty Cycle with Network-Coding MAC (ADCNC-MAC) is proposed. It contains initialization of the MAC protocol phase and data transmission phase. In the first phase, we use an asynchronous duty cycle to find a rendezvous time for exchanging data. A strategy to select network coder nodes is presented to confirm the number of network coder nodes and distribution in the network coder layer. In the data transmission phase, the network coder nodes transmit using the proposed network-coding-based algorithm and a higher volume of packet will be transmitted to the Sink with the same number of transmissions. Simulation results show that ADCNC-MAC achieves higher power efficiency, improves packet delivery ratio (PDR), and network throughput.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2015-08-07
    Description: The possibility of having information access anytime and anywhere has caused a huge increase of the popularity of wireless networks. Requirements of users and owners have been ever-increasing. However, concerns about the potential health impact of exposure to radio frequency (RF) sources have arisen and are getting accounted for in wireless network planning. In addition to adequate coverage and reduced human exposure, the installation cost of the wireless network is also an important criterion in the planning process. In this paper, a hybrid algorithm is used to optimize indoor wireless network planning while satisfying three demands: maximum coverage, minimal full installation cost (cabling, cable gutters, drilling holes, labor, etc.), and minimal human exposure. For the first time, wireless indoor networks are being optimized based on these advanced and realistic conditions. The algorithm is investigated for three scenarios and for different configurations. The impact of different exposure requirements and cost scenarios is assessed.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2015-08-08
    Description: Physical transceiver implementations for wireless communication systems usually suffer from transmit-radio frequency (Tx-RF) and receiver-RF (Rx-RF) impairments. In this paper, we aim to design efficient coordinated beamforming for multicell multiuser multi-antenna systems by fully taking into account the residual transceiver impairments. Our design objectives include both spectral efficiency and energy efficiency. In particular, we first derive the closed-form expression of the mean square error (MSE) which includes the impact of transceiver impairments. Based on that, we propose an alternating optimization algorithm to solve the coordinated multicell beamforming problems with the goal of minimizing the worst user MSE, and the sum MSE. Then, by exploiting the relationship between the minimum mean square error (MMSE) and the achievable rate, we develop a new algorithm to address the sum rate maximization problem. This approach is further generalized to solve the more intractable energy efficiency optimization problem. We prove that all the proposed iterative algorithms guarantee to converge to a stationary point. Numerical results show that our proposed schemes achieve a better performance than conventional coordinated beamforming algorithms that were designed ignoring the transceiver impairments.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2015-07-30
    Description: In this paper, we present three improvements to a three-point third order variant of Newton’s method derived from the Simpson rule. The first one is a fifth order method using the same number of functional evaluations as the third order method, the second one is a four-point 10th order method and the last one is a five-point 20th order method. In terms of computational point of view, our methods require four evaluations (one function and three first derivatives) to get fifth order, five evaluations (two functions and three derivatives) to get 10th order and six evaluations (three functions and three derivatives) to get 20th order. Hence, these methods have efficiency indexes of 1.495, 1.585 and 1.648, respectively which are better than the efficiency index of 1.316 of the third order method. We test the methods through some numerical experiments which show that the 20th order method is very efficient.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2015-07-30
    Description: Robust small target detection of low signal-to-noise ratio (SNR) is very important in infrared search and track applications for self-defense or attacks. Due to the complex background, current algorithms have some unsolved issues with false alarm rate. In order to reduce the false alarm rate, an infrared small target detection algorithm based on saliency detection and support vector machine was proposed. Firstly, we detect salient regions that may contain targets with phase spectrum Fourier transform (PFT) approach. Then, target recognition was performed in the salient regions. Experimental results show the proposed algorithm has ideal robustness and efficiency for real infrared small target detection applications.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2015-08-06
    Description: In dynamic propagation environments, beamforming algorithms may suffer from strong interference, steering vector mismatches, a low convergence speed and a high computational complexity. Reduced-rank signal processing techniques provide a way to address the problems mentioned above. This paper presents a low-complexity robust data-dependent dimensionality reduction based on an iterative optimization with steering vector perturbation (IOVP) algorithm for reduced-rank beamforming and steering vector estimation. The proposed robust optimization procedure jointly adjusts the parameters of a rank reduction matrix and an adaptive beamformer. The optimized rank reduction matrix projects the received signal vector onto a subspace with lower dimension. The beamformer/steering vector optimization is then performed in a reduced dimension subspace. We devise efficient stochastic gradient and recursive least-squares algorithms for implementing the proposed robust IOVP design. The proposed robust IOVP beamforming algorithms result in a faster convergence speed and an improved performance. Simulation results show that the proposed IOVP algorithms outperform some existing full-rank and reduced-rank algorithms with a comparable complexity.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2015-08-07
    Description: Recently, wireless sensor networks (WSNs) have drawn great interest due to their outstanding monitoring and management potential in medical, environmental and industrial applications. Most of the applications that employ WSNs demand all of the sensor nodes to run on a common time scale, a requirement that highlights the importance of clock synchronization. The clock synchronization problem in WSNs is inherently related to parameter estimation. The accuracy of clock synchronization algorithms depends essentially on the statistical properties of the parameter estimation algorithms. Recently, studies dedicated to the estimation of synchronization parameters, such as clock offset and skew, have begun to emerge in the literature. The aim of this article is to provide an overview of the state-of-the-art clock synchronization algorithms for WSNs from a statistical signal processing point of view. This article focuses on describing the key features of the class of clock synchronization algorithms that exploit the traditional two-way message (signal) exchange mechanism. Upon introducing the two-way message exchange mechanism, the main clock offset estimation algorithms for pairwise synchronization of sensor nodes are first reviewed, and their performance is compared. The class of fully-distributed clock offset estimation algorithms for network-wide synchronization is then surveyed. The paper concludes with a list of open research problems pertaining to clock synchronization of WSNs.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2015-08-09
    Description: Network coding is an emerging technique known to improve the network performance in many aspects. In Vehicular Ad-hoc Networks (VANET), the bandwidth is considered to be one of the most important network resources. In this paper, we propose a network coding technique to improve the bandwidth utilization for non-safety applications in VANET. In a scenario where there are two sources broadcasting the data into the same area at the same time, the relay will use the network coding technique to decrease the number of rebroadcasting events and the consumption of the bandwidth, However, a fundamental problem for the relay when it receives a packet, is whether to wait for a coding opportunity and save the bandwidth or send the packet directly and reduce the delay. In order to address such tradeoff, we introduce two versions of our protocol, namely buffer size control scheme (BSCS) and time control scheme (TCS); by both versions we aim to control the delay that is experienced by the packet at each hop, while achieving better bandwidth utilization.Up to 38 % improvement in the bandwidth utilization has been recorded, and both schemes have shown a considerable amount of control on the imposed delay.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2015-08-15
    Description: Long-Term Evolution (LTE) was implemented to fulfill and satisfy users’ needs as well as their demands for an improvised, fast and efficient Quality of service (QoS). A minimal aggregate of waiting time in return would give users a better Quality of experience (QoE). Real-time service packet scheduling is an important process in allocating resources to users. An efficient packet scheduling scheme will be able to cater fairly and efficiently to its users in the LTE network. Hence, studies are performed focusing on real-time traffic which includes video as well as Voice over Internet Protocol (VoIP) transmissions. In this work, the existing exponential rule (EXP rule) is utilized to benchmark our proposed packet scheduling techniques so that we are able to further evaluate the scheduling performance. In response to the increasing likelihood of losing packets in the EXP rule’s algorithm and maximizing the throughput rate, several schemes have been experimented with. The proposed schemes include 1) simplified EXP rule (sEXP Rule), 2) modified EXP rule (mEXP Rule), 3) EXP rule with maximum throughput (MT) (EXP_MT Rule), and 4) enhanced EXP rule with MT (E2M). By adding MT as a weight to the EXP rule, the throughput is maximized, thus providing higher throughput rates for real-time and non-real-time traffic. The simulation results show that the sEXP rule has a better performance in throughput, packet loss rate (PLR), and spectral efficiency for video traffic. Aside from this, our proposed E2M rule performs better than the benchmark EXP rule and outperforms the other proposed schemes, as well. It is observed that the E2M rule has better QoS support for real-time transmission in terms of delay, packet loss, throughput and spectral efficiency, within the LTE network. Hence, our proposed E2M rule is an enhancement of the benchmark EXP rule, which is commonly used in LTE packet scheduling.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Publication Date: 2015-08-15
    Description: In delay tolerant networks (DTNs), the network may not be fully connected at any instant of time, but connections occurring between nodes at different times make the network connected through the entire time continuum. In such a case, traditional routing methods fail to operate because there are no contemporaneous end-to-end paths between sources and destinations. This study examines the routing in DTNs where connections arise in a periodic nature. We analyze various levels of periodicity in order to meet the requirements of different network models. We propose different routing algorithms for different kinds of periodic connections. Our proposed routing methods guarantee the earliest delivery time and minimum hop-count, simultaneously. We evaluate our routing schemes via extensive simulation experiments and compare them to some other popular routing approaches proposed for DTNs. Our evaluations show the feasibility and effectiveness of our schemes as viable routing methods for delay tolerant networks.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Publication Date: 2015-09-12
    Description: Due to rapid developments in mobile technology as well as various multimedia features like messaging, browsing, and streaming, user-created mobile contents are increasing, both in terms of quantity and quality, and at the same time are shared in real time. To get into step with such movements, new content-centric networking (CCN) has appeared. However, CCN has not taken the effect of consumer device movements into consideration. So, this paper proposes a partial path extension scheme to provide lower communication overhead, shorter download time, and lower network resource consumption in mobile consumer environments.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2015-09-16
    Description: In this paper we investigate some parallel variants of Broyden’s method and, for the basic variant, we present its convergence properties. The main result is that the behavior of the considered parallel Broyden’s variants is comparable with the classical parallel Newton method, and significantly better than the parallel Cimmino method, both for linear and nonlinear cases. The considered variants are also compared with two more recently proposed parallel Broyden’s method. Some numerical experiments are presented to illustrate the advantages and limits of the proposed algorithms.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2015-09-26
    Description: The sign least mean square with reweighted L1-norm constraint (SLMS-RL1) algorithm is an attractive sparse channel estimation method among Gaussian mixture model (GMM) based algorithms for use in impulsive noise environments. The channel sparsity can be exploited by SLMS-RL1 algorithm based on appropriate reweighted factor, which is one of key parameters to adjust the sparse constraint for SLMS-RL1 algorithm. However, to the best of the authors’ knowledge, a reweighted factor selection scheme has not been developed. This paper proposes a Monte-Carlo (MC) based reweighted factor selection method to further strengthen the performance of SLMS-RL1 algorithm. To validate the performance of SLMS-RL1 using the proposed reweighted factor, simulations results are provided to demonstrate that convergence speed can be reduced by increasing the channel sparsity, while the steady-state MSE performance only slightly changes with different GMM impulsive-noise strengths.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2015-09-26
    Description: In modern mobile telecommunications, shadow fading has to be modeled by a two-dimensional (2D) correlated random variable since shadow fading may present both cross-correlation and spatial correlation due to the presence of similar obstacles during the propagation. In this paper, 2D correlated random shadowing is generated based on the multi-resolution frequency domain ParFlow (MR-FDPF) model. The MR-FDPF model is a 2D deterministic radio propagation model, so a 2D deterministic shadowing can be firstly extracted from it. Then, a 2D correlated random shadowing can be generated by considering the extracted 2D deterministic shadowing to be a realization of it. Moreover, based on the generated 2D correlated random shadowing, a complete 2D semi-deterministic path loss model can be proposed. The proposed methodology of this paper can be implemented into system-level simulators where it will be very useful due to its ability to generate realistic shadow fading.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Publication Date: 2015-11-21
    Description: We present a local convergence analysis of an eighth order three step methodin order to approximate a locally unique solution of nonlinear equation in a Banach spacesetting. In an earlier study by Sharma and Arora (2015), the order of convergence wasshown using Taylor series expansions and hypotheses up to the fourth order derivative oreven higher of the function involved which restrict the applicability of the proposed scheme.However, only first order derivative appears in the proposed scheme. In order to overcomethis problem, we proposed the hypotheses up to only the first order derivative. In this way,we not only expand the applicability of the methods but also propose convergence domain.Finally, where earlier studies cannot be applied, a variety of concrete numerical examplesare proposed to obtain the solutions of nonlinear equations. Our study does not exhibit thistype of problem/restriction.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Publication Date: 2015-11-21
    Description: Lung cancer continues to rank as the leading cause of cancer deaths worldwide. One of the most promising techniques for early detection of cancerous cells relies on sputum cell analysis. This was the motivation behind the design and the development of a new computer aided diagnosis (CAD) system for early detection of lung cancer based on the analysis of sputum color images. The proposed CAD system encompasses four main processing steps. First is the preprocessing step which utilizes a Bayesian classification method using histogram analysis. Then, in the second step, mean shift segmentation is applied to segment the nuclei from the cytoplasm. The third step is the feature analysis. In this step, geometric and chromatic features are extracted from the nucleus region. These features are used in the diagnostic process of the sputum images. Finally, the diagnosis is completed using an artificial neural network and support vector machine (SVM) for classifying the cells into benign or malignant. The performance of the system was analyzed based on different criteria such as sensitivity, specificity and accuracy. The evaluation was carried out using Receiver Operating Characteristic (ROC) curve. The experimental results demonstrate the efficiency of the SVM classifier over other classifiers, with 97% sensitivity and accuracy as well as a significant reduction in the number of false positive and false negative rates.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Publication Date: 2015-11-20
    Description: Near-infrared spectroscopy (NIRS) enables the non-invasive measurement of changes in hemodynamics and oxygenation in tissue. Changes in light-coupling due to movement of the subject can cause movement artifacts (MAs) in the recorded signals. Several methods have been developed so far that facilitate the detection and reduction of MAs in the data. However, due to fixed parameter values (e.g., global threshold) none of these methods are perfectly suitable for long-term (i.e., hours) recordings or were not time-effective when applied to large datasets. We aimed to overcome these limitations by automation, i.e., data adaptive thresholding specifically designed for long-term measurements, and by introducing a stable long-term signal reconstruction. Our new technique (“acceleration-based movement artifact reduction algorithm”, AMARA) is based on combining two methods: the “movement artifact reduction algorithm” (MARA, Scholkmann et al. Phys. Meas. 2010, 31, 649–662), and the “accelerometer-based motion artifact removal” (ABAMAR, Virtanen et al. J. Biomed. Opt. 2011, 16, 087005). We describe AMARA in detail and report about successful validation of the algorithm using empirical NIRS data, measured over the prefrontal cortex in adolescents during sleep. In addition, we compared the performance of AMARA to that of MARA and ABAMAR based on validation data.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Publication Date: 2015-08-27
    Description: This paper focuses on the parameter identification problem for Wiener nonlinear dynamic systems with moving average noises. In order to improve the convergence rate, the gradient-based iterative algorithm is presented by replacing the unmeasurable variables with their corresponding iterative estimates, and to compute iteratively the noise estimates based on the obtained parameter estimates. The simulation results show that the proposed algorithm can effectively estimate the parameters of Wiener systems with moving average noises.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2015-06-02
    Description: In this paper, the dynamical behavior of different optimal iterative schemes for solving nonlinear equations with increasing order, is studied. The tendency of the complexity of the Julia set is analyzed and referred to the fractal dimension. In fact, this fractal dimension can be shown to be a powerful tool to compare iterative schemes that estimate the solution of a nonlinear equation. Based on the box-counting algorithm, several iterative derivative-free methods of different convergence orders are compared.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2015-05-24
    Description: The basis of vehicular ad hoc networks (VANETs) is the exchange of data between entities, and making a decision on received data/event is usually based on information provided by other entities. Many researchers utilize the concept of trust to assess the trustworthiness of the received data. Nevertheless, the lack of a review to sum up the best available research on specific questions on trust management in vehicular ad hoc networks is sensible. This paper presents a systematic literature review to provide comprehensive and unbiased information about various current trust conceptions, proposals, problems, and solutions in VANETs to increase quality of data in transportation. For the purpose of the writing of this paper, a total of 111 articles related to the trust model in VANETs published between 2005 and 2014 were extracted from the most relevant scientific sources (IEEE Computer Society, ACM Digital Library, Springer Link, Science Direct, and Wiley Online Library). Finally, ten articles were eventually analyzed due to several reasons such as relevancy and comprehensiveness of discussion presented in the articles. Using the systematic method of review, this paper succeeds to reveal the main challenges and requirements for trust in VANETs and future research within this scope.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2015-05-24
    Description: Hardware imperfections can significantly reduce the performance of full-duplex wireless systems by introducing non-idealities and random effects that make it challenging to fully suppress self-interference. Previous research has mostly focused on analysing the impact of hardware imperfections on full-duplex systems, based on simulations and theoretical models. In this paper, we follow a measurement-based approach to experimentally identify and isolate these hardware imperfections leading to residual self-interference in full-duplex nodes. Our measurements show the important role of images arising from in-phase and quadrature (IQ) imbalance in the transmitter and receiver mixers. We also observe baseband non-linearities in the digital-to-analog converters (DAC), which can introduce strong harmonic components in the transmitted signal that have not been considered previously. A corresponding general mathematical model to suppress these components of the self-interference signal arising from the hardware non-idealities is developed from the observations and measurements. Results from a 10 MHz bandwidth full-duplex system, operating at 2.48 GHz, show that up to 13 dB additional suppression, relative to state-of-the-art implementations, can be achieved by jointly compensating for IQ imbalance and DAC non-linearities.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2015-05-24
    Description: Recent years have witnessed the increasing efforts toward making architecture standardization for the secured wireless mobile ad hoc networks. In this scenario when a node actively utilizes the other node resources for communicating and refuses to help other nodes in their transmission or reception of data, it is called a selfish node. As the entire mobile ad hoc network (MANETs) depends on cooperation from neighboring nodes, it is very important to detect and eliminate selfish nodes from being part of the network. In this paper, token-based umpiring technique (TBUT) is proposed, where every node needs a token to participate in the network and the neighboring nodes act as umpire. This proposed TBUT is found to be very efficient with a reduced detection time and less overhead. The security analysis and experimental results have shown that TBUT is feasible for enhancing the security and network performance of real applications.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2015-05-24
    Description: In this paper, multiple device-to-device (D2D) communication underlaying cellular multiuser multiple inputs multiple outputs (MU-MIMO) systems is investigated. This type of communication can improve spectral efficiency to address future demand, but interference management, user clustering, and resource allocation are three key problems related to resource sharing. Interference alignment (IA) is proposed to better mitigate in-cluster interference compared with a multiplex scheme, and user clustering and resource allocation are jointly investigated using binary-integer programming. In addition to an exhaustive search for a maximum throughput, we propose a two-step suboptimal algorithm by reducing the search space and applying branch-and-bound searching (BBS). To further obtain a good trade-off between performance and complexity, we propose a novel algorithm based on distance-constrained criteria for user clustering. The simulation results show that the IA and multiplex schemes acquiring user clustering gains outperform the orthogonal scheme without user clustering. Besides, the proposed two-step and location-based algorithms achieve little losses compared with the optimal algorithm under low complexities.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: Could crowd services be the next big thing? Here, Editor-in-Chief Brian Blake outlines the prospects of a world where we organize timely, instinctive information by harnessing the power of human crowds.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: The emergence of cyber-physical-social systems (CPSS) and context-aware technologies has helped boost a growing interest in building frameworks for adaptive smart services that hide heterogeneity in the infrastructure and support services by seamlessly integrating the cyber, physical, and social worlds. However, this entails an enormous amount of computational and networking contextual complexity. Here, the proposed smart services framework in CPSS (called Dynamic Social Structure of Things, or DSSoT) boosts sociality and narrows down the contextual complexity based on situational awareness. DSSoT monitors spatiotemporal situations and, depending on users' individual goals and other social aspects, induces and structures relevant social objects and smart services in a temporal network of interactions. An application using DSSoT, called Airport Dynamic Social, provides a proof of concept.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: Video constitutes a large fraction of Internet traffic today. The growth of mobile video has been significant in recent years, due to a tremendous increase in mobile device adoption and the ease with which videos are generated and consumed by such devices. Although the demand for mobile videos is significantly on the rise, the network infrastructure resources needed to deliver mobile videos haven't increased proportionally. This article discusses challenges in delivering streaming videos over cellular networks and possible ways to tackle those problems. Also considered is the potential impact of virtualizing network functions and services on mobile video delivery.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: The Internet of Things (IoT) envisions smart objects collecting and sharing data at a global scale via the Internet. One challenging issue is how to disseminate data to relevant data consumers efficiently. This article leverages semantic technologies, such as Linked Data, which can facilitate machine-to-machine communications to build an efficient stream dissemination system for Semantic IoT. The system integrates Linked Data streams generated from various data collectors and disseminates matched data to relevant data consumers based on user queries registered in the system. Here, the authors present a new data structure, TP-automata, designed to suit the high-performance needs of Linked Data stream dissemination. They evaluate the system using a real-world dataset generated in a Smart Building IoT Project. The proposed system can disseminate Linked Data streams at one million triples per second with 100,000 registered user queries, which is several orders of magnitude faster than existing techniques.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: Cyberspace is the processing, manipulation, and exploitation of information; the facilitation and augmentation of communication among people; and the interaction of people, information, and devices. The main characteristic of cyberspace is the interconnection of computers, information, devices, and people. Many actors are involved in cyberspace's construction and operation -- namely, telcos; application, service, and content providers; users; and governments. The issue of privacy protection is a global challenge that requires a global response. The regulation of privacy in cyberspace depends on regulatory, technical, and social factors. Multistakeholder mechanisms can be a promising way to deal with privacy policies in the global cyberspace.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: Physical-cyber-social (PCS) computing involves a holistic treatment of data, information, and knowledge from the physical, cyber, and social worlds to integrate, understand, correlate, and provide contextually relevant abstractions to humans and the applications that serve them. PCS computing extends current progress in cyber-physical, socio-technical, and cyber-social systems. Here, the guest editors consider powerful ways to exploit data available through various Internet of Things (IoT), citizen and social sensing, Web, and open data sources that are seeing explosive growth. This special issue highlights a variety of PCS applications, such as smart firefighting, intelligent infrastructure, and user guidance in an airport.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: Smart systems are everywhere. They have the unique ability to optimize their performance under a variety of inputs and recover quickly from a wide variety of disturbances. This ability depends on both the cognitive and physical capabilities of such systems. Currently available cyber technologies have dramatically increased the cognitive capabilities of machines. As these technologies advance, so will those cognitive capabilities. This means that humans and machines can work more collaboratively, as joint partners, to execute those capabilities. Here, a system is described that takes advantage of such technologies to deploy a smart firefighting approach.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-05-27
    Description: Cloud computing enables on-demand provisioning of computing resources to IT solutions, following a utility-based approach. Technology and standardization developments in traditional public utilities enable customers to seamlessly migrate across utility providers without being required to make changes to their home appliances. Dubbed as the fifth utility, cloud computing customers should have user-friendly tools and mechanisms at their disposal, which preserve application deployments across different resource providers. Here, the authors present current efforts to develop an open source Cloud Application Management Framework (CAMF) based on the Eclipse Rich Client Platform. This framework facilitates cloud application lifecycle management in a vendor-neutral approach.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2015-05-01
    Description: This paper addresses the problem of how to provide a more flexible service for complex event monitoring in wireless multimedia sensor networks (WMSNs). In particular, we propose C2EM, a cloud-assisted complex event monitoring architecture that involves scalar sensors, camera sensors, cloudlets, and clouds to leverage computation offloading reliability, service response time, coverage efficiency, and energy efficiency. On clouds, we design an opportunistic service access point selection scheme that provides quality of service (QoS) supports for scalar sensor computation offloading. Meanwhile, clouds are responsible for optimizing camera sensor utilization of the whole network. On cloudlets, we design a real-time camera actuation scheme with the objective of minimizing the possible coverage overlaps while providing probabilistic guarantee in residual energy. Through computation division, most complex computations and network environment profilers are executed on cloudlets or clouds. Sensors only need to carry out very simple operations. We evaluate the performance of C2EM through simulations under a complex event scenario. The results demonstrate that C2EM can enhance complex event monitoring performance with optimized energy efficiency, desirable event coverage quality, and potential adaptability to the dynamics of complex events.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Publication Date: 2015-05-01
    Description: Iterative decoding is an effective technique to approach the channel capacity for very large block sizes with enough iterations. However, due to the limitation of bandwidth and delay, small blocks of data are much more commonly applied in practical communications, and low iteration counts are usually preferred for both decoding complexity and delay consideration. In such cases, the design rules of near capacity decoding—which is generally asymptotic with respect to the block size—may cause inferior performance. To overcome this problem for 8-phase shift keying (8PSK) modulated variable length codes (VLCs), an irregular mapping scheme for the transmission system of bit-interleaved coded modulation with iterative decoding (BICM-ID) is studied in this paper. A submapping searching algorithm and an irregular mapping optimization algorithm are proposed aiming at maximizing the extrinsic mutual information after a target number of iterations. Simulation results show that for small data block size with a low iteration count, our scheme has advantages with respect to the existing near capacity systems optimized by the asymptotic tools.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Publication Date: 2015-05-01
    Description: The integration of wireless sensor network (WSN) and cognitive radio (CR) technology enables a new paradigm of communication: cognitive radio sensor networks (CRSN). The existing WSN clustering algorithm cannot consider the advantage of channel resource brought by CR function in CRSN, and the CR network (CRN) clustering algorithm is designed based on the infinite energy nodes; thus both algorithms cannot operate with energy efficiency in CRSN. The paper proposes a low-energy adaptive uneven clustering hierarchy for CRSN, which can not only consider the advantage of the channel resource in reducing the energy consumption but also employ uneven clustering method for balancing the energy consumption among the cluster heads under multiple hops transmission means. Simulation results show that compared with the existing several typical clustering algorithms including WSN and CRSN clustering algorithms, low-energy adaptive clustering hierarchy (LEACH), HEED, energy-efficient unequal clustering (EEUC), cognitive LEACH (CogLEACH), and distributed spectrum-aware clustering (DSAC), the proposed algorithm can not only efficiently balance the energy consumption among cluster heads and network load in CRSN but also remarkably prolong the network lifetime.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2015-05-04
    Description: Conditional mutual information (CMI) analysis and precoding design for generally correlated wireless multi-hop multi-input multi-output (MIMO) channels are presented in this paper. Although some particular scenarios have been examined in existing publications, this paper investigates a generally correlated transmission system having spatially correlated channel, mutually correlated source symbols, and additive colored Gaussian noise (ACGN). First, without precoding techniques, we derive the optimized source symbol covariances upon mutual information maximization. Secondly, we apply a precoding technique and then design the precoder in two cases: maximizing the mutual information and minimizing the detection error. Since the optimal design for the end-to-end system cannot be analytically obtained in closed form due to the non-monotonic nature, we relax the optimization problem and attain sub-optimal designs in closed form. Simulation results show that without precoding, the average mutual information obtained by the asymptotic design is very close to the one obtained by the optimal design, while saving a huge computational complexity. When having the proposed precoding matrices, the end-to-end mutual information significantly increases while it does not require resources of the system such as transmission power or bandwidth.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2015-05-04
    Description: The worldwide transition from analog to digital broadcasting has now been completed, and the need to study next-generation standards for ultra-high-definition TV (UHDTV) broadcasting, as well as broadcasting and communication convergence systems is rapidly growing. In particular, high-resolution mobile broadcasting services are needed to satisfy recent consumer demands. Therefore, the development of highly efficient convergence broadcasting systems that provide fixed/mobile broadcasting through a single channel is needed. In this paper, a service scenario and the requirements for providing 4 K UHD and high-definition (HD) convergence broadcasting services through a terrestrial single channel are analyzed by employing the latest transmission and video codec technologies. Optimized transmission parameters for 6- and 8-MHz terrestrial bandwidths are drawn, and receiving performances are measured under additive white Gaussian noise (AWGN) and time-varying typical urban (TU)-6 channel to find the threshold of visibility (TOV). From the results, reliable receiving of HD layer data can be achieved at a 6-MHz bandwidth when the maximum receiver velocity is 140 km/h and no higher due to the limit of bandwidth. When the bandwidth is extended to 8 MHz, reliable receiving of both 4 K UHD and HD layer data can be achieved under a very fast fading multipath channel.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2015-05-07
    Description: In this paper, we consider a two-tier macrocell/ femtocell overlaid heterogeneous network based on orthogonal frequency division multiple access (OFDMA) technology. Although the co-channel spectrum allocation provides larger bandwidth for both macrocell and femtocells, the resulting cross-tier interference may prevent macrocell users in the vicinity of femtocells to achieve their minimum required signal-to-interference plus noise ratio (SINR) in downlink. Therefore, we propose femtocell power control strategies for mitigating the interference experienced by macrocell users while preventing the femtocell throughput degradation. In particular, the proposed power control schemes make use of femto and macro users’ context information in terms of positioning for setting the appropriate prioritization weights among the current victim macro users and the femto users in outage. System-level simulations show that our schemes enhance the throughput of macrocell users while maintaining a high performance for femtocell users compared to a conventional power allocation. Moreover, we show that the proposed prioritization weights allow to achieve the required level of macrocell/femtocell throughput trade-off.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Publication Date: 2015-05-08
    Description: The construction of a similarity matrix is one significant step for the spectral clustering algorithm; while the Gaussian kernel function is one of the most common measures for constructing the similarity matrix. However, with a fixed scaling parameter, the similarity between two data points is not adaptive and appropriate for multi-scale datasets. In this paper, through quantitating the value of the importance for each vertex of the similarity graph, the Gaussian kernel function is scaled, and an adaptive Gaussian kernel similarity measure is proposed. Then, an adaptive spectral clustering algorithm is gotten based on the importance of shared nearest neighbors. The idea is that the greater the importance of the shared neighbors between two vertexes, the more possible it is that these two vertexes belong to the same cluster; and the importance value of the shared neighbors is obtained with an iterative method, which considers both the local structural information and the distance similarity information, so as to improve the algorithm’s performance. Experimental results on different datasets show that our spectral clustering algorithm outperforms the other spectral clustering algorithms, such as the self-tuning spectral clustering and the adaptive spectral clustering based on shared nearest neighbors in clustering accuracy on most datasets.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2015-05-09
    Description: In this paper, we propose a detection method of pulmonary nodules in X-ray computed tomography (CT) scans by use of three image filters and appearance-based k-means clustering. First, voxel values are suppressed in radial directions so as to eliminate extra regions in the volumes of interest (VOIs). Globular regions are enhanced by moment-of-inertia tensors where the voxel values in the VOIs are regarded as mass. Excessively enhanced voxels are reduced based on displacement between the VOI centers and the gravity points of the voxel values in the VOIs. Initial nodule candidates are determined by these filtering processings. False positives are reduced by, first, normalizing the directions of intensity distributions in the VOIs by rotating the VOIs based on the eigenvectors of the moment-of-inertia tensors, and then applying an appearance-based two-step k-means clustering technique to the rotated VOIs. The proposed method is applied to actual CT scans and experimental results are shown.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Publication Date: 2015-05-09
    Description: We propose a linear time algorithm, called G2DLP, for generating 2D lattice L(n1, n2) paths, equivalent to two-item  multiset permutations, with a given number of turns. The usage of turn has three meanings: in the context of multiset permutations, it means that two consecutive elements of a permutation belong to two different items; in lattice path enumerations, it means that the path changes its direction, either from eastward to northward or from northward to eastward; in open shop scheduling, it means that we transfer a job from one type of machine to another. The strategy of G2DLP is divide-and-combine; the division is based on the enumeration results of a previous study and is achieved by aid of an integer partition algorithm and a multiset permutation algorithm; the combination is accomplished by a concatenation algorithm that constructs the paths we require. The advantage of G2DLP is twofold. First, it is optimal in the sense that it directly generates all feasible paths without visiting an infeasible one. Second, it can generate all paths in any specified order of turns, for example, a decreasing order or an increasing order. In practice, two applications, scheduling and cryptography, are discussed.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Publication Date: 2015-05-09
    Description: Spectrum aggregation is an emerging technology to satisfy the data rate requirement of broadband services for next-generation wireless communication systems. In dynamic spectrum environment, in which the spectrum availability is time-varying, it is quite challenging to maintain the stability of spectrum aggregation. In this paper, we investigate the spectrum sensing and access schemes to minimize the times of channel switching for achieving stable dynamic spectrum aggregation, taking into consideration the hardware limitations of spectrum sensing and aggregation capability. We develop an analytical framework for the joint spectrum sensing and access problem based on partially observable Markov decision process (POMDP). Especially, we derive the reward function by estimation of the stability of different spectrum sensing and access strategies. Based on the POMDP framework, we propose a rollout-based suboptimal spectrum sensing and access scheme which approximates the value function of POMDP, and propose a differential training method to improve its robustness. It is proved that the rollout policy achieves performance improvement over the basis heuristics. The simulation results show that the proposed POMDP-based spectrum sensing and access scheme improves the system stability significantly and achieves near-optimal performance with a much lower complexity.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2015-05-10
    Description: Cognitive radio networks (CRNs) have emerged as a promising paradigm that can solve the shortage of spectrum resources, providing the ability to adapt and opportunistically exploit the spectrum holes. The rendezvous process allows cognitive users to find a common channel and establish a communication link. In this paper, we focus on the design of fast blind rendezvous algorithms to guarantee that every node should be able to rendezvous in all common available channels. We follow a systematic approach by first proposing a role-based algorithm that ensures maximum rendezvous diversity and then extending it to a common strategy through the use of multiples radios. Both proposals guarantee rendezvous under symmetric and asymmetric models. Simulation results show that our proposals outperform other recently developed rendezvous protocols with similar approaches in terms of expected time to rendezvous and maximum time to rendezvous.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2015-05-10
    Description: We consider a system that consists of two sources, a half-duplex relay and a destination. The sources want to transmit their messages reliably to the destination with the help of the relay. We study and analyze the performance of a transmission scheme in which the relay implements a decode-and-forward strategy. We assume that all the channels are frequency selective, and in order to cope with that, we incorporate Orthogonal Frequency-Division Multiplexing (OFDM) transmission into the system. In contrast to previous works, both sources can transmit their messages using all subcarriers and the relay can decide to help none, only one, or both sources. For this scheme, we discuss the design criteria and evaluate the achievable sum-rate. Next, we study and solve the problem of resource allocation aiming at maximizing the achievable sum-rate. We propose an iterative coordinate-descent algorithm that finds a solution that is at least a local optimum. We show through numerical examples the effectiveness of the algorithms and illustrate the benefits of allowing both sources to transmit on all subcarriers.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2015-05-10
    Description: In this paper, we consider a denoise-and-forward (DNF) two-way relay network (TWRN) with non-coherent differential binary phase-shift keying modulation, where a battery-free relay node harvests energy from the received radio frequency (RF) signals and uses the harvested energy to help the source nodes for information exchange. Based on the power splitting (PS) and time switching (TS) receiver architectures, power splitting relaying (PSR) and time switching relaying (TSR) protocols at relay are studied. In order to investigate the effect of power allocations on two source nodes, power splitting coefficient and time switching factor at relay on performance, the two proposed protocols are analyzed and the bit error rate (BER) expressions of end-to-end system are derived. Based on these expressions, the optimal power of sources, the power splitting ratio and the time switching factor are obtained via the numerical search method. The simulation and numerical results provide practical insights into the effect of various system parameters, such as the power splitting coefficient, the time switching factor, sources to relay distances, the noise power, and the energy harvesting efficiency on the performance of this TWRN. In addition, the results show that the PSR protocol outperforms the TSR protocol in terms of throughput under various network geometries.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2015-05-13
    Description: In this paper, we validate the availability of direct path in half-duplex-based cooperative relay networks from a practical point of view. Cooperative relaying is a low-complexity technique, which schedules orthogonal transmissions through the divided time slots. By doing so, transmission impairments due to multi-path fading and path loss are mitigated by obtaining a diversity gain. In conventional approaches, most researchers have focused on a role of relay and assumed that the received signal-to-noise ratio in source-to-destination link is doubled when source transmits the same signal twice during the two transmission phases. However, in practical wireless environments, a wireless channel is not static but varies with time. Thus, although the source retransmits the same signal during the second transmission phase instead of forwarding by a relay, the (time) diversity gain may be obtained. As a result, the performance of relaying-aided cooperative communication is not always better than that of the repeated transmission (RT), but the RT scheme may be a better option than a cooperative relaying scheme. To this end, we first show that the RT scheme is comparable to conventional cooperative relaying schemes. We then propose a selection decode-and-forward (DF) relaying scheme, which combines the DF relaying and RT schemes. The proposed selection DF relaying scheme has better outage performance than comparable relaying schemes in time-varying channels. Lastly, all the theoretical results are validated through numerical evaluations and Monte Carlo simulations.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2015-05-02
    Description: In 4G cellular networks, call admission control (CAC) has a direct impact on quality of service (QoS) for individual connections and overall system efficiency. Reservation-based CAC schemes have been previously proposed for cellular networks where a certain amount of system bandwidth is reserved for high-priority calls, e.g., hand-off calls and real-time new calls. Traditional reservation-based schemes are not efficient for 4G vehicular networks, as the reserved bandwidth may not be utilized effectively in low hand-off rates. We propose a channel borrowing approach in which new best effort (BE) calls can borrow the reserved bandwidth for high-priority calls. Later, if a hand-off call arrives and all the channels are busy, it will pre-empt the service of a borrower BE call if there exists any. The pre-empted BE calls are kept in a queue and resume their service whenever a channel becomes available. The analytical model for this scheme is a mixed loss-queueing system for which it is difficult to calculate call blocking probability (CBP) and call dropping probability (CDP). Our focus in this paper is on the system modeling and performance evaluation of the proposed scheme. We present two system models that approximate the operation of the proposed scheme. For these models, we derive the CBP and CDP analytically. It is shown that our analytical results are very close to the ones obtained from simulations. Furthermore, it is observed that our channel borrowing approach decreases the CBP considerably while increases the CDP slightly over a large range of hand-off rates.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2015-05-09
    Description: In this work we generate the numerical solutions of Burgers’ equation by applying the Crank-Nicholson method and different schemes for solving nonlinear systems, instead of using Hopf-Cole transformation to reduce Burgers’ equation into the linear heat equation. The method is analyzed on two test problems in order to check its efficiency on different kinds of initial conditions. Numerical solutions as well as exact solutions for different values of viscosity are calculated, concluding that the numerical results are very close to the exact solution.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Publication Date: 2015-05-10
    Description: The challenges of future wireless networks imply that the physical layer of the next generation mobile communication system needs to be compatible with multiple-input multiple-output and allow a flexible multiple access scheme. Time-reversal space-time coding can be applied to a recent filtered multicarrier modulation scheme, named generalized frequency division multiplexing, to achieve a multiple-input multiple-output non-orthogonal multicarrier modulation with flexibility to address the requirements of future mobile networks. In this paper, the subcarriers of the physical layer block are shared between multiple users, allowing for an efficient and simple multiple access solution. A channel estimation technique that can simultaneously estimate channel frequency response and timing misalignment in generalized frequency division multiple access is described. The paper also shows that the knowledge of channel state information can improve the overall performance when used to schedule the subchannel distribution among the users. Symbol error rate performance analysis shows that the resources of the time-reversal space-time coding generalized frequency division multiple access block can be shared among users that have one or two transmit antennas simultaneously under frequency-selective time-variant channels.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Publication Date: 2015-05-14
    Description: This paper proposes a Decode-and-Forward (DF) relaying scheme for the multi-hop transmission in wireless networks, where the information generated by an independent source has to be sent to a far destination based on multiple-relay cooperation. The proposed DF scheme blends together convolutional channel coding with linear combination of blocks of data over a finite field using very short block lengths (K=13). We provide an extrinsic information transfer (EXIT) chart analysis to understand the good performance behavior of the proposed scheme when compared with other referenced schemes using much larger block lengths. This fact is corroborated by a set of Monte Carlo simulations. Moreover, the proposed DF scheme is suitable for large multi-hop networks since a negligible performance degradation is obtained when adding more hops.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Publication Date: 2015-03-30
    Description: With the rapid development of cognitive radio technologies, spectrum sharing becomes a promising approach to improving the efficiency of spectrum utilization and mitigating the spectrum scarcity problem. Previous research on cognitive networks argues that secondary users can only work under a low-transmission power in an underlay spectrum sharing model, especially when the primary transmitter is far away from the primary receiver. Motivated by the idea of cooperative communications, in this paper, we propose a cooperative framework in which a primary transmitter, being aware of the existence of the secondary network, may select a secondary user that is not in transmitting or receiving mode to relay its traffic. The feasible relay location region and optimal power ratio between the primary network and the secondary network are derived in the underlay spectrum sharing model. Based on the optimal power ratio, we derive the maximum achievable transmission capacity of the secondary network under the outage constraints from both the primary and the secondary network with or without cooperative relaying. Numerical results indicate that secondary users can achieve a higher transmission capacity with cooperative relaying, and that the capacity gain of the cooperative network is significantly affected by the location of the relay and the network system parameters.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2015-03-28
    Description: An image analysis procedure based on a two dimensional Gaussian fitting is presented and applied to satellite maps describing the surface urban heat island (SUHI). The application of this fitting technique allows us to parameterize the SUHI pattern in order to better understand its intensity trend and also to perform quantitative comparisons among different images in time and space. The proposed procedure is computationally rapid and stable, executing an initial guess parameter estimation by a multiple regression before the iterative nonlinear fitting. The Gaussian fit was applied to both low and high resolution images (1 km and 30 m pixel size) and the results of the SUHI parameterization shown. As expected, a reduction of the correlation coefficient between the map values and the Gaussian surface was observed for the image with the higher spatial resolution due to the greater variability of the SUHI values. Since the fitting procedure provides a smoothed Gaussian surface, it has better performance when applied to low resolution images, even if the reliability of the SUHI pattern representation can be preserved also for high resolution images.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2015-03-28
    Description: In this paper, we consider a distributed virtual multiple-input multiple-output (MIMO) coalition formation algorithm. Energy savings are obtained in the reverse link by forming multi-antenna virtual arrays for information transmission. Virtual arrays are formed by finding a stable match between two sets of single antenna devices such as mobile stations (MSs) and relay stations (RSs) based on a game theoretic approach derived from the concept of the college admissions problem. Thus, power savings are obtained through multi-antenna arrays by implementing the concepts of spatial diversity and spatial multiplexing for reverse link transmission. We focus on optimizing the overall consumed power rather than the transmitted power of MSs and RSs. Furthermore, it is shown analytically and by simulation that when the overall consumed power is considered, the energy efficiency of the single antennas devices is not always improved by forming a virtual MIMO array. Hence, single antenna devices may prefer to transmit on their own when channel conditions are favorable. In addition, the simulation results show that the framework we propose provides comparable energy savings and a lower implementation complexity when compared to a centralized exhaustive search approach.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Publication Date: 2015-04-22
    Description: This article presents a characterization of different LTE-Advanced network deployments with regard to downlink interference and resource usage. The investigation focuses on heterogeneous networks (HetNets) with dedicated spectrum for each layer and, in particular, on cases where small cells are densely deployed. Thus, the main interference characteristics of the macro layer and the dense small cell layer are studied separately. Moreover, the potential benefit of mitigating the dominant interferer in such scenarios is quantified as an upper bound gain and its time variability is discussed and evaluated. A dynamic FTP traffic model is applied, with varying amounts of traffic in the network. The results present an uneven use of resources in all feasible load regions. The interference under the dynamic traffic model shows a strong variability, and the impact of the dominant interferer is such that 30% of the users could achieve at least a 50% throughput gain if said interferer were mitigated, with some users reaching a 300% improvement during certain time intervals. All the mentioned metrics are remarkably similar in the macro and small cell deployments, which suggests that densification does not necessarily imply stricter interference mitigation requirements. Therefore, the conclusion is that the same techniques could be applied in both scenarios to deal with the dominant interferer.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2015-04-23
    Description: The auxiliary problem principle is a powerful tool for solving multi-area economic dispatch problem. One of the main drawbacks of the auxiliary problem principle method is that the convergence performance depends on the selection of penalty parameter. In this paper, we propose a self-adaptive strategy to adjust penalty parameter based on the iterative information, the proposed approach is verified by two given test systems. The corresponding simulation results demonstrate that the proposed self-adaptive auxiliary problem principle iterative scheme is robust in terms of the selection of penalty parameter and has better convergence rate compared with the traditional auxiliary problem principle method.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2015-04-30
    Description: Direct-sequence optical code division multiple access technology is one efficient and simple way to reduce the multiple access interferences that existed in visible light communication system due to its ease implementation by simply turning the light-emitting diodes (LEDs) on and off. To overcome the multi-path effect and non-perfect clock impairment, an optical zero correlation zone code set is proposed in visible light communication quasi-synchronous optical code division multiple access system. Bit error rate performance is evaluated while taking into account the effects of phase-induced intensity noise, shot noise, and thermal noise. Based on the proposed optical zero correlation zone codes, the multiple access interference and phase-induced intensity noise can be eliminated finally; therefore, a better bit error rate can be obtained.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Publication Date: 2015-04-14
    Description: Aiming at improving the well-known fuzzy compactness and separation algorithm (FCS), this paper proposes a new clustering algorithm based on feature weighting fuzzy compactness and separation (WFCS). In view of the contribution of features to clustering, the proposed algorithm introduces the feature weighting into the objective function. We first formulate the membership and feature weighting, and analyze the membership of data points falling on the crisp boundary, then give the adjustment strategy. The proposed WFCS is validated both on simulated dataset and real dataset. The experimental results demonstrate that the proposed WFCS has the characteristics of hard clustering and fuzzy clustering, and outperforms many existing clustering algorithms with respect to three metrics: Rand Index, Xie-Beni Index and Within-Between(WB) Index.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2015-04-17
    Description: Cognitive radio is a promising technology that uses radio spectrum opportunistically and efficiently. In this paper, we present the performance of ‘Always transmit’ strategy, which consists of allowing the cognitive source to transmit over all time slots and in any time slot. Thus, the cognitive source will be able to operate continuously whenever either the primary user is active or absent. The proposed strategy is projected into dual-hop communication systems with decode-and-forward and relay selection over independent but not necessarily identically distributed Nakagami-m fading channels. We derive the closed-form expressions of the outage probability, and we analyze the performance. Simulation results show that the strategy ‘Always transmit + Relay’ outperforms other conventional cognitive radio strategies and the use of relays enhances the performance in deep fading channel.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Publication Date: 2015-04-17
    Description: An efficient data dissemination mechanism is very critical for traffic safety and inquiring path information. All vehicles go straight and do not consider the effect of traffic lights during its running in the motorway. But in view of characteristic of motorway, the fast moving of vehicles will cause the frequent changes of network topology, which is a challenge for data dissemination for motorway environment in Vehicular ad hoc networks (VANETs). This paper proposes a novel data dissemination mechanism for VANETs which apply to broadcasting and on-demand unicast scenarios. We firstly propose a weighted K-nearest neighbors prediction algorithm with self-feedback to predict the current speed of a vehicle and construct a set of forwarders for emergency message broadcasting. To satisfy users’ personal demands, the paper also designs a unicast mechanism based on information urgent level and the improved Greedy Perimeter Stateless Routing (GPSR) protocol. The simulation results show that our proposed method can achieve better performance with higher delivery ratio, lower number of forwarders, and less copies of messages.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2015-04-18
    Description: This paper reports on a real-world wireless channel measurement campaign for in-vehicle scenarios in the UWB frequency range of 3 to 11 GHz. The effects of antenna placement in the vehicle’s passenger compartment as well as the effects due to the presence of passengers are studied. The measurements have been carried out in the frequency domain, and the corresponding channel impulse responses (CIRs) have been estimated by inverse Fourier transform. The influence of a specific band group selection within the whole UWB range is also given. Statistical analysis of the measured channel transfer functions gives a description of the wireless channel statistics in the form of a generalized extreme value process. The corresponding parameter sets are estimated and documented for all permutations of antenna placement and occupancy patterns inside the vehicle’s passenger compartment. Further, we have carried out a feasibility study of an in-vehicle UWB-based localization system based on the TOA. The positioning performance is evaluated in terms of average error and standard deviation.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2015-12-25
    Description: The gravitational search algorithm (GSA) is a kind of swarm intelligence optimization algorithm based on the law of gravitation. The parameter initialization of all swarm intelligence optimization algorithms has an important influence on the global optimization ability. Seen from the basic principle of GSA, the convergence rate of GSA is determined by the gravitational constant and the acceleration of the particles. The optimization performances on six typical test functions are verified by the simulation experiments. The simulation results show that the convergence speed of the GSA algorithm is relatively sensitive to the setting of the algorithm parameters, and the GSA parameter can be used flexibly to improve the algorithm’s convergence velocity and improve the accuracy of the solutions.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2015-12-25
    Description: Kung-Traub’s conjecture states that an optimal iterative method based on d function evaluations for finding a simple zero of a nonlinear function could achieve a maximum convergence order of 2 d − 1 . During the last years, many attempts have been made to prove this conjecture or develop optimal methods which satisfy the conjecture. We understand from the conjecture that the maximum order reached by a method with three function evaluations is four, even for quadratic functions. In this paper, we show that the conjecture fails for quadratic functions. In fact, we can find a 2-point method with three function evaluations reaching fifth order convergence. We also develop 2-point 3rd to 8th order methods with one function and two first derivative evaluations using weight functions. Furthermore, we show that with the same number of function evaluations we can develop higher order 2-point methods of order r + 2 , where r is a positive integer, ≥ 1 . We also show that we can develop a higher order method with the same number of function evaluations if we know the asymptotic error constant of the previous method. We prove the local convergence of these methods which we term as Babajee’s Quadratic Iterative Methods and we extend these methods to systems involving quadratic equations. We test our methods with some numerical experiments including an application to Chandrasekhar’s integral equation arising in radiative heat transfer theory.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2015-12-16
    Description: Buffer-aided relaying has recently attracted a lot of attention due to the improvement in the system throughput. However, a side effect usually deemed is that buffering at relay nodes results in the increase of packet delays. In this paper, we study the effect of buffering at relays on the end-to-end delay of users’ data, from the time they arrive at the source until delivery to the destination. We use simple discussions to provide an insight on the overall waiting time of the packets in the system, taking into account the queue dynamics both in the source and relay. We analyze the end-to-end delay in the relay networks with Bernoulli data arrivals and channel conditions and prove that the data packets experience lower average end-to-end delay in the buffer-aided relaying system compared with the conventional one. Moreover, using intuitive generalizations, we conclude that the use of buffers at relays improves not only throughput but ironically the average end-to-end packet delay. Through extensive simulations, we validate our analytical results for the system when the data arrival and channel condition processes follow Bernoulli distribution. Furthermore, via the simulations under the settings of practical systems, we confirm our intuition for the general scenarios.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2015-12-12
    Description: Big data are everywhere as high volumes of varieties of valuable precise and uncertain data can be easily collected or generated at high velocity in various real-life applications. Embedded in these big data are rich sets of useful information and knowledge. To mine these big data and to discover useful information and knowledge, we present a data analytic algorithm in this article. Our algorithm manages, queries, and processes uncertain big data in cloud environments. More specifically, it manages transactions of uncertain big data, allows users to query these big data by specifying constraints expressing their interests, and processes the user-specified constraints to discover useful information and knowledge from the uncertain big data. As each item in every transaction in these uncertain big data is associated with an existential probability value expressing the likelihood of that item to be present in a particular transaction, computation could be intensive. Our algorithm uses the MapReduce model on a cloud environment for effective data analytics on these uncertain big data. Experimental results show the effectiveness of our data analytic algorithm for managing, querying, and processing uncertain big data in cloud environments.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2015-12-13
    Description: The throughput of high-speed railway (HSR) communication systems is limited not only by frequency spectrum but also by high mobility. Under the HSR scenario, one of the promising solutions to improve the throughput is multi-stream beamforming. However, severe performance degradation occurs due to larger inter-beam interference (IBI) as the number of beams is constant. In order to maximize the throughput, a massive multiple input and multiple output (MIMO)-based adaptive multi-stream beamforming scheme is proposed, which utilizes an adaptive beam-selection proposal by exploiting the location information of the train. By adaptively selecting the optimal subset of beams, including active subset size and active receive antenna indices, with respect to the location of the train, the proposed scheme significantly outperforms single/dual-stream beamforming and conventional massive MIMO. We also find that the throughput is not proportional to, but a nonlinear function of, the number of active receive antennas in this scenario.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2015-06-18
    Description: Smoothed particle hydrodynamics (SPH), as a Lagrangian, meshfree method, is supposed to be useful in solving acoustic problems, such as combustion noise, bubble acoustics, etc., and has been gradually used in sound wave computation. However, unphysical oscillations in the sound wave simulation cannot be ignored. In this paper, an artificial viscosity term is added into the standard SPH algorithm used for solving linearized acoustic wave equations. SPH algorithms with or without artificial viscosity are both built to compute sound propagation and interference in the time domain. Then, the effects of the smoothing kernel function, particle spacing and Courant number on the SPH algorithms of sound waves are discussed. After comparing SPH simulation results with theoretical solutions, it is shown that the result of the SPH algorithm with the artificial viscosity term added attains good agreement with the theoretical solution by effectively reducing unphysical oscillations. In addition, suitable computational parameters of SPH algorithms are proposed through analyzing the sound pressure errors for simulating sound waves.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2015-06-19
    Description: Routing in ad hoc networks is challenging as nodes are mobile and links are continuously created and broken. Current on-demand ad hoc routing algorithms start route discovery after path break, incurring high cost to detect the disconnection and to establish a new route. Specifically, when a path is liable to break, the source is warned about the likelihood of disconnection. The source then starts path discovery avoiding disconnection entirely. A path is likely to break when link availability decreases. Since routing is nondeterministic polynomial (NP) hard, this work proposes an improved ad hoc on-demand multipath distance vector (AOMDV) based on link availability, neighboring node’s queuing delay, node mobility, and bit error rate. The optimal path is selected using BAT meta-heuristic optimization. Simulation shows improved performance compared to AOMDV.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2015-06-19
    Description: Recently, several researchers have proposed adopting software-defined networking (SDN) concepts for mobile network architectures, particularly for LTE-evolved packet core (LTE/EPC). Although several new designs have been introduced for architectures based on SDN or its concrete realization, Openflow, few studies have presented in-depth discussions of real procedures that are relevant to such architectures. To this end, this paper first surveys the current approaches and solutions for adopting SDN/Openflow in LTE/EPC architectures and then introduces a new Openflow-enabled EPC (OEPC) architecture. This work provides detailed analyses of five procedures that commonly occur in LTE/EPC architectures, and the analyses are further elaborated with the separation of the control and data planes and the support of extended Openflow protocol. The analysis shows that the data management of these procedures is simpler relative to traditional LTE/EPC. In addition, in order to prove that efficient data management takes place for these procedures relative to a traditional LTE/EPC architecture, the numbers of signalling messages that are processed by control entities (i.e., the MME and the controller) are taken into account as a metric to evaluate the OEPC architecture. Moreover, the results of a numerical evaluation also show the benefits of this proposal relative to another Openflow-based LTE/EPC architecture.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2015-06-20
    Description: Cognitive radios are expected to play a major role towards meeting the exploding traffic demand over wireless systems. A cognitive radio node senses the environment, analyzes the outdoor parameters, and then makes decisions for dynamic time-frequency-space resource allocation and management to improve the utilization of the radio spectrum. For efficient real-time process, the cognitive radio is usually combined with artificial intelligence and machine-learning techniques so that an adaptive and intelligent allocation is achieved. This paper firstly presents the cognitive radio networks, resources, objectives, constraints, and challenges. Then, it introduces artificial intelligence and machine-learning techniques and emphasizes the role of learning in cognitive radios. Then, a survey on the state-of-the-art of machine-learning techniques in cognitive radios is presented. The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. This paper also discusses the cognitive radio implementation and the learning challenges foreseen in cognitive radio applications.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2015-06-21
    Description: Dynamic resource allocation scheme is a key component of 3GPP long-term evolution (LTE) for satisfying quality-of-service (QoS) requirement as well as improving the system throughput. In this paper, a buffer-aware adaptive resource allocation scheme for LTE downlink transmission is proposed for improving the overall system throughput while guaranteeing the statistic QoS and keeping certain fairness among users. Specifically, the priorities of the users’ data queues in the base station are ranked by their remaining life time or their queue overflow probability which is estimated by applying large deviation principle. An online measurement based algorithm which requires no statistical knowledge of the network conditions uses the queue priorities to dynamically allocate the resource blocks (RBs) for avoiding buffer overflow and providing statistic QoS guarantee. The simulation results show that the proposed algorithm improves the throughput and fairness while considerably reducing the average bit loss rate.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2015-06-21
    Description: With the rapid increase of energy consumption and environment problems, the need for green techniques and harvesting energy is emerging. Network coding can provide the solution by the reduction of the unnecessary data transmission and the estimated traffic patterns. It can also amplify the synergy in an energy harvesting capable cognitive radio (CR) network since the CR has the recognition and optimal decision functionalities. In this paper, we propose stochastic policy based wireless energy harvesting in green cognitive radio network. With the simulations, we show that the proposed scheme is better up to 20 % of the previous work.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2015-06-21
    Description: As billions of sensors and smart meters connect to the Internet of Things (IoT), current wireless technologies are taking decisive steps to ensure their sustainable operation. One popular IoT scenario features a smart home service gateway, which becomes the central point of user’s home environment facilitating a multitude of tasks. Given that most IoT devices connected to residential gateway are small-scale and battery-powered, the key challenge is to extend their lifetime without recharging/replacing batteries. To this end, a novel radio technology named Bluetooth low energy (BLE) has recently been completed to enable energy-efficient data transfer. Another inspiring innovation is the capability of sensors to harvest wireless energy in their local environment. In this work, we envision a scenario where many in-home sensors are communicating with a smart gateway over the BLE protocol, while at the same time harvesting RF energy transmitted from the gateway wirelessly via a dedicated radio interface. We thoroughly investigate performance limitations of such wireless energy transfer interface (WETI) with dynamic analytical model and with important practical considerations. Our methodology delivers the upper bound on WETI operation coupled with BLE-based communication, which characterizes ultimate system performance over the class of practical radio and energy resource management algorithms.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2015-06-24
    Description: In this paper, we present an experimental study on the performance of spatial interference alignment (IA) in indoor wireless local area network scenarios that use orthogonal frequency division multiplexing (OFDM) according to the physical-layer specifications of the IEEE 802.11a standard. Experiments have been carried out using a wireless network testbed capable of implementing a 3-user MIMO interference channel. We have implemented IA decoding schemes that can be designed according to distinct criteria (e.g., zero-forcing or MaxSINR). The measurement methodology has been validated considering practical issues like the number of OFDM training symbols used for channel estimation or feedback time. In case of asynchronous users, a time-domain IA decoding filter is also compared to its frequency-domain counterpart. We also evaluated the performance of IA from bit error ratio measurement-based results in comparison to different time-division multiple access transmission schemes. The comparison includes single- and multiple-antenna systems transmitting over the dominant mode of the MIMO channel. Our results indicate that spatial IA is suitable for practical indoor scenarios in which wireless channels often exhibit relatively large coherence times.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2015-06-24
    Description: The explosive growth of mobile data traffic and the shortage of the available spectral resources have created new challenges for future cellular networks. In particular, resource management in heterogeneous network environment has become a critical issue. In this paper, we propose software-defined networking (SDN)-based resource management algorithms for future cellular network. Specifically, in this work, we have a threefold objective: i) alleviate spectrum shortage concerns by efficiently offloading traffic over the Wi-Fi network, ii) address network congestion by optimally balancing loads across multiple cells and iii) achieve the aforementioned objectives while taking network conditions and the end user quality-of-service (QoS) requirements into consideration. To this end, we present SDN-based partial data offloading and load balancing algorithms. The proposed algorithms exploit an SDN controller’s global view of the network and take optimized resource allocation decisions. We analyze the performance of the proposed algorithms under realistic network model. Moreover, we also present an analytical framework to quantify the delay incurred due to the SDN-based data processing and forwarding. Our analysis and system-level simulations show that the proposed load balancing algorithm significantly improves the equilibrium extent and network stability as compared to the baseline algorithms. On the other hand, the proposed partial data offloading algorithm is shown to satisfy end user’s quality-of-service while saving a significant amount of cellular resources.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-06-27
    Description: Kieron O'Hara considers the right to be forgotten, including its potential ramifications and successes.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-06-27
    Description: Inevitably, as basic human needs are assured in any developed society, differentiating factors for quality of life (QoL) relate to a greater capacity to make informed decisions across daily life activities, especially those related to health. The availability of powerful, personalized, and wearable mobile devices facilitates the provision of ubiquitous computing applications that enable health monitoring and QoL improvements. Here, the authors discuss QoL technologies and present examples of currently researched mobile services for monitoring and improving individuals' physical and psychological health, social interactions, or environmental conditions. They also delineate future work areas for successfully deploying and adopting QoL technologies.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015-06-27
    Description: Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
    Print ISSN: 1089-7801
    Electronic ISSN: 1941-0131
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2015-07-19
    Description: This paper presents a methodology for the modelling and optimization of multi-service radio access for universal mobile telecommunications system (UMTS) networks. The paper provides a description of the basis for modelling of a tandem pair: a wideband code division multiple access (WCDMA) interface and a Iub interface. The models involved in the study take into consideration a possibility of setting priorities to a number of selected traffic classes. Particular attention is given to the development of simple computational algorithms that would make it possible to determine the blocking probability for call streams with different priorities. The results of the analytical calculations are then compared with the results of simulation experiments, which confirms the high accuracy of the proposed analytical solutions.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2015-09-11
    Description: DNA fragment assembly represents an important challenge to the development of efficient and practical algorithms due to the large number of elements to be assembled. In this study, we present some graph theoretical linear time algorithms to solve the problem. To achieve linear time complexity, a heap with constant time operations was developed, for the special case where the edge weights are integers and do not depend on the problem size. The experiments presented show that modified classical graph theoretical algorithms can solve the DNA fragment assembly problem efficiently.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2015-09-11
    Description: This paper considers identifying the multiple input single output finite impulse response (MISO-FIR) systems with unknown time delays and orders. Generally, parameters, orders and time delays of an MISO system are separately identified from different algorithms. In this paper, we aim to perform the model identification and time delay estimation simultaneously from a limited number of observations. For an MISO-FIR system with many inputs and unknown input time delays, the corresponding identification model contains a large number of parameters, requiring a great number of observations for identification and leading to a heavy computational burden. Inspired by the compressed sensing (CS) recovery theory, a threshold orthogonal matching pursuit algorithm (TH-OMP) is presented to simultaneously identify the parameters, the orders and the time delays of the MISO-FIR systems. The proposed algorithm requires only a small number of sampled data compared to the conventional identification methods, such as the least squares method. The effectiveness of the proposed algorithm is verified by simulation results.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2015-10-17
    Description: In designing wireless sensor networks (WSNs), it is important to reduce energy dissipation and prolong network lifetime. Clustering of nodes is one of the most effective approaches for conserving energy in WSNs. Cluster formation protocols generally consider the heterogeneity of sensor nodes in terms of energy difference of nodes but ignore the different transmission ranges of them. In this paper, we propose an effective data acquisition clustered protocol using compressive sensing (EDACP-CS) for heterogeneous WSNs that aims to conserve the energy of sensor nodes in the presence of energy and transmission range heterogeneity. In EDACP-CS, cluster heads are selected based on the distance from the base station and sensor residual energy. Simulation results show that our protocol offers a much better performance than the existing protocols in terms of energy consumption, stability, network lifetime, and throughput.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2015-10-20
    Description: With an explosive growth of Mobile Cloud and Internet of Things (IoT) technologies, the Mobile Cloud IoT (MCIoT) concept has become a new trend for the future Internet. MCIoT paradigm extends the existing facility of computing process to different mobile applications executing in mobile and portable devices. In this research, we provide a new nested game model to design an effective MCIoT computation offloading algorithm. First, each mobile device determines the portion of remote offloading computation based on the Rubinstein game approach. Then, a computation resource in the cloud system is dynamically assigned for the requested offloading computation. Based on the nested game principle, our proposed scheme can approach an optimal solution for the offloading computation in the MCIoT system. The simulation results show that our game-based method is effective in distributed IoT environments while supporting application executions timely and ubiquitously.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2015-10-22
    Description: It is known that the error rate can be used as a measure of reliability and security over the wire-tap channel when practical, finite length codes are used for transmission, and the security gap is an error rate based metric able to jointly treat these two aspects. In this paper, we consider several low-density parity-check (LDPC) coded transmissions, which represent the state of the art for transmissions over the wire-tap channel and we assess and compare their security gap performance. We consider two kinds of wire-tap channels: the flat and the fast fading wire-tap channels with additive white Gaussian noise. As a reference, we use the progressive edge growth (PEG) algorithm for the design of unstructured LDPC codes and compare its performance with that of four approaches for designing structured LDPC codes. We analyze both systematic and non-systematic transmissions and show that some structured code design techniques are able to achieve comparable or even better performance than the PEG algorithm over the considered channels, while taking advantage of their simpler encoding and decoding procedures.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2015-10-23
    Description: As one of the most popular and well-recognized clustering methods, fuzzy C-means (FCM) clustering algorithm is the basis of other fuzzy clustering analysis methods in theory and application respects. However, FCM algorithm is essentially a local search optimization algorithm. Therefore, sometimes, it may fail to find the global optimum. For the purpose of getting over the disadvantages of FCM algorithm, a new version of the krill herd (KH) algorithm with elitism strategy, called KHE, is proposed to solve the clustering problem. Elitism tragedy has a strong ability of preventing the krill population from degrading. In addition, the well-selected parameters are used in the KHE method instead of originating from nature. Through an array of simulation experiments, the results show that the KHE is indeed a good choice for solving general benchmark problems and fuzzy clustering analyses.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2015-07-04
    Description: Secure protocol is a vital guarantee in all kinds of communication network environment. Designing on authenticated key exchange protocols is a hotspot in the field of information security at present, and the related theories have been increasingly mature. However, there is still scarcely any appropriate security protocol to guarantee the communication security of wireless body area networks (WBANs). In this paper, according to the standards on WBAN, we define a layered network model in accordance with the definition of two-hop star network topology firstly. In line with this model, we put forward two new authenticated key exchange protocols based on symmetric cryptosystem, which are suitable for WBAN application scenario. The proposed protocols support the selective authentication between nodes in WBAN. Simultaneously, two pairs of session key are generated efficiently and succinctly in each certification process. Finally, after security analyzing and performance evaluating demonstrate that the proposed key agreement protocols are proved to meet desired security properties with light computation and communication overhead. The proposed protocols provide a primitive to develop efficient and secure WBAN systems.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2015-07-11
    Description: Aggregation delay is the minimum number of time slots required to aggregate data along the edges of a data gathering tree (DG tree) spanning all the nodes in a wireless sensor network (WSN). We propose a benchmarking algorithm to determine the minimum possible aggregation delay for DG trees in a WSN. We assume the availability of a sufficient number of unique CDMA (Code Division Multiple Access) codes for the intermediate nodes to simultaneously aggregate data from their child nodes if the latter are ready with the data. An intermediate node has to still schedule non-overlapping time slots to sequentially aggregate data from its own child nodes (one time slot per child node). We show that the minimum aggregation delay for a DG tree depends on the underlying design choices (bottleneck node-weight based or bottleneck link-weight based) behind its construction. We observe the bottleneck node-weight based DG trees incur a smaller diameter and a larger number of child nodes per intermediate node; whereas, the bottleneck link-weight based DG trees incur a larger diameter and a much lower number of child nodes per intermediate node. As a result, we observe a complex diameter-aggregation delay tradeoff for data gathering trees in WSNs.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2015-07-11
    Description: It is shown that the greedy algorithm for the \((n^2-1)\)-puzzle makes \(\tfrac{8}{3}n^3 +O(n^2)\) expected moves. This analysis is verified experimentally on 10,000 random instances each of the \((n^2-1)\)-puzzle for \(4 \leq n \leq 200\).
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2015-06-13
    Description: Vehicular networks are a cornerstone of the envisioned intelligent transportation system (ITS) by enabling vehicles to communicate with each other via vehicle-to-vehicle (V2V) communications to overcome the current and future needs for increasing traffic safety and efficiency. In this paper, we employ the knapsack problem (KP) to formulate the problem of cooperative scheduling and radio resource management in vehicular networks for non-real time services. For the sake of maximizing sum utility (MSU) of the networks, we propose two-dimensional-multi-choice knapsack problem (2D-MCKP)-based scheduling scheme to select the coordinator vehicles for the sink vehicle and allocate radio resource to V2V and vehicle-to-infrastructure (V2I) links to solve the MSU optimization problem. Simulation results indicate that the proposed scheme significantly improves the average utility and average data rates with sustainable computational complexity. Moreover, the designed cooperative communication system achieves higher spectral efficiency and better fairness.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2015-06-13
    Description: In this paper, we study the max-min fairness for robust secrecy beamforming design in a multiuser MISO communication system with simultaneous wireless information and power transfer (SWIPT). In particular, the imperfect channel state information (CSI) and power splitting information receiver (IR) are taken into account. We model the design as an optimization problem which maximizes the minimum harvested energy among the multi-antenna energy receivers (ERs). Besides, both the secure communication requirement and the lowest electrical energy storage threshold at IR must be guaranteed in our formulated optimization problem. The considered max-min problem is non-convex and hard to tackle. By introducing the technique of semidefinite relaxation (SDR), we prove the tightness of this relaxation and obtain the global optimal solution of our original optimization problem. Moreover, a suboptimal beamforming design scheme is proposed with low computational complexity. Simulation results show that our proposed robust schemes are more efficient than other schemes in terms of energy harvesting and transmit power saving.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2015-06-13
    Description: In this paper, we face the implementation of a non-linear kernel method for regression on a wireless sensor network (WSN) based on MICAz motes. The operating system used is TinyOS 2.1.1. The algorithm estimates the value of some magnitude from the measurements of the motes in a distributed approach where information and computations are performed asynchronously. This proposal includes a research on the potential problems encountered along with the developed solutions. Namely, matrix and floating computations, acknowledgement mechanisms and data loss.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2015-06-13
    Description: Maximum target coverage with minimum number of sensor nodes, known as an MCMS problem, is an important problem in directional sensor networks (DSNs). For guaranteed coverage and event reporting, the underlying mechanism must ensure that all targets are covered by the sensors and the resulting network is connected. Existing solutions allow individual sensor nodes to determine the sensing direction for maximum target coverage which produces sensing coverage redundancy and much overhead. Gathering nodes into clusters might provide a better solution to this problem. In this paper, we have designed distributed clustering and target coverage algorithms to address the problem in an energy-efficient way. To the best of our knowledge, this is the first work that exploits cluster heads to determine the active sensing nodes and their directions for solving target coverage problems in DSNs. Our extensive simulation study shows that our system outperforms a number of state-of-the-art approaches.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2015-06-03
    Description: For equation-error autoregressive (EEAR) systems, this paper proposes an identification algorithm by means of the model equivalence transformation. The basic idea is to eliminate the autoregressive term in the model using the model transformation, to estimate the parameters of the converted system and further to compute the parameter estimates of the original system using the comparative coefficient way and the model equivalence principle. For comparison, the recursive generalized least squares algorithm is given simply. The simulation results verify that the proposed algorithm is effective and can produce more accurate parameter estimates.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2015-10-14
    Description: For satisfying the quality of service (QoS) requirements and image denoising services in wireless sensor network (WSN) applications, based on opportunistic networking technology and generalized Gaussian mixture algorithm, an adaptive image processing and transmission scheme is proposed in this paper. According to the real-time state record matrix, the multi-objective optimization scheme with equalizer coefficients and the opportunistic cooperative scheme in view of energy and computing ability are studied, respectively. Then, the generalized Gaussian mixture algorithm is used to reduce the image data and eliminate the noise interference from the WSN environment. Finally, Simulation results show that the proposed scheme has better QoS support capability results such as reliability, real-time performance, and energy efficiency, as well as the image decoding accuracy including peak signal to noise ratio.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2015-10-17
    Description: Arc fault is one of the most critical reasons for electrical fires. Due to the diversity, randomness and concealment of arc faults in low-voltage circuits, it is difficult for general methods to protect all loads from series arc faults. From the analysis of many series arc faults, a large number of high frequency signals generated in circuits are found. These signals are easily affected by Gaussian noise which is difficult to be eliminated as a result of frequency aliasing. Thus, a novel detection algorithm is developed to accurately detect series arc faults in this paper. Initially, an autoregressive model of the mixed high frequency signals is modelled. Then, autoregressive bispectrum analysis is introduced to analyze common series arc fault features. The phase information of arc fault signal is preserved using this method. The influence of Gaussian noise is restrained effectively. Afterwards, several features including characteristic frequency, fluctuation of phase angles, diffused distribution and incremental numbers of bispectrum peaks are extracted for recognizing arc faults. Finally, least squares support vector machine is used to accurately identify series arc faults from the load states based on these frequency features of bispectrum. The validity of the algorithm is experimentally verified obtaining arc fault detection rate above 97%.
    Electronic ISSN: 1999-4893
    Topics: Computer Science
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2015-10-27
    Description: In a 3rd Generation Partnership Project Long Term Evolution-Advanced (3GPP LTE-A) uplink, user equipment (UE) has a maximum transmission power limit defined by the UE power class. Generally, the cell edge UE has a higher probability to be constrained by the maximum transmission power level owing to the compensation of the large pathloss. When the UE transmission power is constrained by the maximum level, allocating a higher number of physical resource blocks (PRBs) than the UE power capability can afford will reduce the transmission power to be allocated per PRB, resulting in inefficient use of power resources. To avoid this power inefficiency, the uplink transmission power can be controlled according to the number of PRBs allocated using the power headroom report-based power efficient resource allocation (PHR-PERA) scheme proposed in this paper. Furthermore, adaptive open-loop power control (OL-PC) based on the signal-to-interference-plus-noise ratio (SINR) and the uplink interference is used to improve the cell capacity. By the uplink power control employing the proposed PHR-PERA scheme, the macro and femto UE throughputs were increased by 49.9 and 5 %, respectively, compared to the case of conventional fractional power control (FPC). Additional gains of 21.9 and 4.8 % for macro and femto UE throughputs, respectively, were achieved by adaptive OL-PC. The performance of fast closed-loop power control (CL-PC) based on the received SINR is also evaluated in this paper. The simulation results demonstrate that CL-PC supports OL-PC by compensating the fading effect for the UE uplink SINR to meet the target SINR.
    Print ISSN: 1687-1472
    Electronic ISSN: 1687-1499
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Published by Springer
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...