Tags: 4g LTE

Autonomous driving is becoming more and more multidisciplinary. Not only vehicular technologies but also computing, networking, and data management technologies are involved in autonomous driving. Of particular interest includes the trade-off between in-vehicle computing and cloud computing to support artificial intelligence of autonomous driving. Perception and planning of autonomy requires high-performance computing while battery-driven vehicles must…

Visual sensor networks are receiving significant attention due to their potential applications ranging from surveillance to tracking domains. Nevertheless, due to the funneling effect, the unbalanced energy usage among visual sensor nodes (SNs) increases and leads to premature decrease in networklifetime. Firstly, considering Rayleigh fading channel and routing models, we analyze the optimization ofnetwork lifetime…

This paper designs a resource allocation to minimize the total transmit power of a multi-band wirelessnetwork under the required rate constraint. The required rate splitting scheme is proposed to reduce the computational complexity of the multi-band resource allocation. On the basis of the primal decomposition method, the multi-band resource allocation is decomposed into multiple sub-band…

Six-port technique is a very accurate and cost effective method to determine the amplitude and phase of any input signal with respect to a known signal using only power or voltage measurements. This property of six-port technique has been variously exploited in a number of RF (radio frequency) and microwave applications. The present paper provides a…

The use of femtocells with cognitive capabilities is considered as a promising way for interference mitigation. The femto access point (FAP) accesses the spectrum either in overlay or underlay fashion. In the former case, the FAPs utilize only radio resources currently not occupied by the macrocell. In the latter case, the whole bandwidth may be…

In multiuser information theory, it is often assumed that every node in the network possesses all codebooks used in the network. This assumption may be impractical in distributed ad hoc, cognitive, or heterogeneous networks. This paper considers the two-user interference channel with one oblivious receiver (IC-OR), i.e., one receiver lacks knowledge of the interfering cookbook,…

The localization of distributed and wirelessly connected sensor system is of decisive importance for many applications. This paper focuses on the range-based localization and tracking problem for very large dynamic, i.e. moving sensor networks. We study the inexorability of underwater systems with massive swarms of tiny sensors with reduced and restricted capabilities. In this context,…

Internet users are shifting from searching on traditional media to social network platforms (SNPs) to retrieve up-to-date and valuable information. SNPs have two unique characteristics: frequent content update and small world phenomenon. However, existing works are not able to support these two features simultaneously. To address this problem, we develop a general framework to enable…

Mobile ad-hoc networks have to suffer with different types of packet dropping attacks. Therefore, we need strong mechanism to detect these malevolent nodes and to classify normal and abnormal nodes as per the behavior of nodes. Machine learning techniques distinguish outlier nodes quickly and accurately provide classification by observing behavior of those nodes in the…

Fault diagnosis is a critical task for operators in the context of e-TOM (enhanced Telecom Operations Map) assurance process. Its purpose is to reduce network maintenance costs and to improve availability, reliability and performance of network services. Although necessary, this operation is complex and requires significant involvement of human expertise. The study of the fundamental…