Search results for " computing"

showing 10 items of 2075 documents

Incorporating Uncertainties into Traffic Simulators

2007

Computer scienceReal-time computingPosterior probabilityErrors-in-variables modelsHierarchical network modelTraffic generation modelTelecommunications networkVariable-order Bayesian networkSimulationNetwork simulationNetwork traffic simulation
researchProduct

Power allocation for two-cell two-user joint transmission

2012

In this paper, we develop a power allocation scheme for the downlink of a two-cell two-user joint transmission system. The objective is to maximize the sum rate under per-cell power constraints. We study a worst case scenario where the carrier phases between the two base stations are un-synchronized, so that joint transmission must be performed without precoding. The derived power allocation scheme is remarkably simple, i.e., each cell transmits with full power to only one user. Note that joint transmission is still possible, when two cells select the same user for data transmission. Moreover, we prove that, in this scenario, the joint transmission case happens with higher probability when …

Computer scienceReal-time computingPower allocation02 engineering and technologyData_CODINGANDINFORMATIONTHEORYPrecodingPower budgetTelecomunicacióBase station0203 mechanical engineeringTelecommunications link0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringComunicació i tecnologiabusiness.industryCommunication Systems020302 automobile design & engineering020206 networking & telecommunicationsTransmission systemTransmitter power outputComputer Science Applicationscoordinated multi-point (CoMP)Transmission (telecommunications)Modeling and SimulationSignal Processingimperfect synchronizationbusinessjoint transmissionComputer networkData transmission
researchProduct

Computational Offloading in Mobile Edge with Comprehensive and Energy Efficient Cost Function: A Deep Learning Approach

2021

In mobile edge computing (MEC), partial computational offloading can be intelligently investigated to reduce the energy consumption and service delay of user equipment (UE) by dividing a single task into different components. Some of the components execute locally on the UE while the remaining are offloaded to a mobile edge server (MES). In this paper, we investigate the partial offloading technique in MEC using a supervised deep learning approach. The proposed technique, comprehensive and energy efficient deep learning-based offloading technique (CEDOT), intelligently selects the partial offloading policy and also the size of each component of a task to reduce the service delay and energy …

Computer scienceReal-time computingTP1-118502 engineering and technologyBiochemistryVDP::Teknologi: 500::Elektrotekniske fag: 540ArticleAnalytical Chemistry0202 electrical engineering electronic engineering information engineeringcomputational offloadingElectrical and Electronic EngineeringInstrumentationenergy efficiencyMobile edge computingArtificial neural networkbusiness.industryChemical technologyDeep learningdeep learning020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsTask (computing)cost functionUser equipment020201 artificial intelligence & image processingmobile edge computingArtificial intelligenceEnhanced Data Rates for GSM Evolutionremote executionbusinessEfficient energy useSensors
researchProduct

Joint Usage of Dynamic Sensitivity Control and Time Division Multiple Access in Dense 802.11ax Networks

2016

It is well known that in case of high density deployments, Wi-Fi networks suffer from serious performance impairments due to hid- den and exposed nodes. The problem is explicitly considered by the IEEE 802.11ax developers in order to improve spectrum efficiency. In this pa- per, we propose and evaluate the joint usage of dynamic sensitivity con- trol (DSC) and time division multiple access (TDMA) for improving the spectrum allocation among overlapping 802.11ax BSSs. To validate the solution, apart from simulation, we used a testbed based on the Wireless MAC Processor (WMP), a prototype of a programmable wireless card.

Computer scienceReal-time computingTime division multiple access050801 communication & media studies02 engineering and technologyFrequency allocation0508 media and communications0202 electrical engineering electronic engineering information engineeringWirelessDense deploymentIEEE 802.11axHidden node problembusiness.industryExposed node problemSettore ING-INF/03 - TelecomunicazioniDynamic sensitivity control05 social sciencesTestbedSpectral efficiencyExposed node problemIEEE 802.11axTDMA020201 artificial intelligence & image processingHidden node problembusinessComputer network
researchProduct

Reducing Power Consumption of Wireless Networks Through Collaborative DMC Mobile Clusters

2017

Reducing the energy consumption of the wireless network is significantly important to the economic and ecological sustainability of the ICT industry, as high energy consumption may limit the performance of wireless networks and is one of the main network costs. To solve energy consumption problem, especially on the terminal side, a scheme known as distributed mobile cloud (DMC) is considered to be a potential solution. Multiple mobile terminals (MTs) can cooperative to take advantage of good quality links among the MTs to save energy when receiving from the Base Station (BS). In this paper, we aim to find the optimal transmit power to further reduce the energy consumption of DMC. From simul…

Computer scienceReal-time computingkulutusmatkaviestinverkot02 engineering and technologyteho (fysiikka)energiansäästöklusteritBase station0203 mechanical engineeringDMCLimit (music)0202 electrical engineering electronic engineering information engineeringtransmit powerElectrical and Electronic EngineeringConsumption (economics)business.industryWireless networkpower consumption020206 networking & telecommunications020302 automobile design & engineeringEnergy consumptionTransmitter power outputComputer Science ApplicationsTerminal (electronics)green communicationsbusinessEnergy (signal processing)Computer networkWireless Personal Communications
researchProduct

Dual Connectivity in Non-Stand Alone Deployment mode of 5G in Manhattan Environment

2020

| openaire: EC/H2020/815191/EU//PriMO-5G The main target of this paper is to analyze the performance of an outdoor user in a dense micro cellular Manhattan grid environment using a ray launching simulation tool. The radio propagation simulations are performed using a Shoot and Bouncing Ray (SBR) method. The network performance is analyzed at three different frequencies i.e. 1.8 GHz, 3.5 GHz, and 28 GHz. Additionally, the benefits of combining LTE and potential 5G frequency bands by using feature of Dual Connectivity (DC) in an outdoor scenario has been highlighted. The considered performance metrics are received signal level, SINR, application throughput. The acquired simulation results fro…

Computer scienceReal-time computingystem performancetiedonsiirtotekniikat5G-tekniikka02 engineering and technology7. Clean energyRadio spectrumlangaton tiedonsiirto0203 mechanical engineeringSignal strength0202 electrical engineering electronic engineering information engineeringNetwork performancedual connectivitysuorituskykyray tracing020302 automobile design & engineering020206 networking & telecommunicationsGridtiedonsiirtoSystem performanceLTERadio propagationSoftware deploymentverkkoympäristöRay tracing (graphics)5G5Glangattomat verkot
researchProduct

Dynamic Spectrum Reservation for CR Networks in the Presence of Channel Failures: Channel Allocation and Reliability Analysis

2018

[EN] Providing channel access opportunities for new service requests and guaranteeing continuous connections for ongoing flows until service completion are two challenges for service provisioning in wireless networks. Channel failures, which are typically caused by hardware and software failures or/and by intrinsic instability in radio transmissions, can easily result in network performance degradation. In cognitive radio networks (CRNs), secondary transmissions are inherently vulnerable to connection breaks due to licensed users' arrivals as well as channel failures. To explore the advantages of channel reservation on performance improvement in error-prone channels, we propose and analyze …

Computer scienceReliability (computer networking)Real-time computingCognitive radio networks02 engineering and technology0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringDynamic channel reservationElectrical and Electronic EngineeringLicensed shared accessCTMCChannel allocation schemesbusiness.industryWireless networkApplied MathematicsQuality of serviceReservation020206 networking & telecommunications020302 automobile design & engineeringINGENIERIA TELEMATICAComputer Science ApplicationsCognitive radioRetainabilitybusinessComputer networkCommunication channel
researchProduct

Efficient anomaly detection on sampled data streams with contaminated phase I data

2020

International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…

Computer scienceSample (material)0211 other engineering and technologies02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing010104 statistics & probabilitysymbols.namesake[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]ChartControl chartEWMA chart0101 mathematics021103 operations researchData stream miningbusiness.industryPattern recognition[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]OutliersymbolsAnomaly detection[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessGibbs sampling
researchProduct

Distributed Computing on Distributed Memory

2018

Distributed computation is formalized in several description languages for computation, as e.g. Unified Modeling Language (UML), Specification and Description Language (SDL), and Concurrent Abstract State Machines (CASM). All these languages focus on the distribution of computation, which is somewhat the same as concurrent computation. In addition, there is also the aspect of distribution of state, which is often neglected. Distribution of state is most commonly represented by communication between active agents. This paper argues that it is desirable to abstract from the communication and to consider abstract distributed state. This includes semantic handling of conflict resolution, e.g. i…

Computer scienceSemantics (computer science)ConcurrencyDistributed computing020207 software engineering0102 computer and information sciences02 engineering and technology01 natural sciencesSpecification and Description LanguageUnified Modeling Language010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringAbstract state machinesDistributed memoryMemory modelState (computer science)computercomputer.programming_language
researchProduct

Energy-Efficient Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT

2020

Edge computing provides a promising paradigm to support the implementation of industrial Internet of Things (IIoT) by offloading computational-intensive tasks from resource-limited machine-type devices (MTDs) to powerful edge servers. However, the performance gain of edge computing may be severely compromised due to limited spectrum resources, capacity-constrained batteries, and context unawareness. In this chapter, we consider the optimization of channel selection which is critical for efficient and reliable task delivery. We aim at maximizing the long-term throughput subject to long-term constraints of energy budget and service reliability. We propose a learning-based channel selection fr…

Computer scienceServerReliability (computer networking)Distributed computingResource allocationContext (language use)Lyapunov optimizationEnhanced Data Rates for GSM EvolutionEdge computingEfficient energy use
researchProduct