Search results for "User equipment"

showing 10 items of 19 documents

Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

2018

IP Flow Mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network which has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO), and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an op…

Access networkComputer Networks and CommunicationsComputer sciencebusiness.industryIT service continuityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPreemptionLocal area networkAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBackhaul (telecommunications)0203 mechanical engineeringUser equipmentAutomotive Engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringbusinessMobility managementAlgorithmIEEE Transactions on Vehicular Technology
researchProduct

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Clustering-Assisted 3D Beamforming for Throughput Maximization in mmWave Networks

2021

Beamforming schemes have been widely used to improve network throughput in 5G mmWave networks. However, 3D beamforming schemes have hereto not been investigated in this context. In this work, a cluster-assisted 3D beamforming scheme is proposed to optimize the downtilt angle for network coverage and throughput maximization. User Equipment (UEs) are clustered based on inter-user and the inter-cluster distances. The interference is accounted from the adjacent clusters and thus frequency resources can be assigned to the non-adjacent clusters. Optimal downtilt angles are obtained for every cluster to maximize the throughput while considering the interference from adjacent clusters. 3D beam patt…

BeamformingUser equipmentComputer scienceComputer Science::Networking and Internet ArchitectureContext (language use)ThroughputMaximal-ratio combiningInterference (wave propagation)Cluster analysisAlgorithm5GComputer Science::Information Theory2021 IEEE International Conference on Communications Workshops (ICC Workshops)
researchProduct

Towards Efficient Control of Mobile Network-Enabled UAVs

2019

| openaire: EC/H2020/815191/EU//PriMO-5G The efficient control of mobile network-enabled unmanned aerial vehicles (UAVs) is targeted in this paper. In particular, a downlink scenario is considered, in which control messages are sent to UAVs via cellular base stations (BSs). Unlike terrestrial user equipment (UEs), UAVs perceive a large number of BSs, which can lead to increased interference causing poor or even unacceptable throughput. This paper proposes a framework for efficient control of UAVs. First, a communication model is introduced for flying UAVs taking into account interference, path loss and fast fading. The characteristics of UAVs make such model different compared to traditiona…

Computer science05 social sciencesReal-time computingComputerApplications_COMPUTERSINOTHERSYSTEMS050801 communication & media studies020206 networking & telecommunicationsThroughput02 engineering and technologyInterference (wave propagation)Base station0508 media and communicationsUser equipmentTelecommunications link0202 electrical engineering electronic engineering information engineeringCellular networkPath lossFading2019 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Enhancing HSUPA system level performance with dual carrier capability

2010

The purpose of this paper is to analyze how dual carrier capability can enhance High Speed Uplink Packet Access performance in comparison to using only single carrier. Dual carrier operation gives the User Equipment the possibility to transmit simultaneously using two 5 MHz bands, theoretically doubling the peak data rates and user throughput. The analysis is conducted with a system level simulation tool. This paper first indicates with single carrier simulations that, especially in small cells, terminals have spare power available for dual carrier operation. These observations are verified with dual carrier simulations by showing that the burst throughput can be practically doubled. In the…

Computer scienceCode division multiple accessbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSystem-level simulationData_CODINGANDINFORMATIONTHEORYInterference (wave propagation)Electronic mailSpread spectrumUser equipmentElectronic engineeringFadingbusinessThroughput (business)Computer networkIEEE 5th International Symposium on Wireless Pervasive Computing 2010
researchProduct

Computational Offloading in Mobile Edge with Comprehensive and Energy Efficient Cost Function: A Deep Learning Approach

2021

In mobile edge computing (MEC), partial computational offloading can be intelligently investigated to reduce the energy consumption and service delay of user equipment (UE) by dividing a single task into different components. Some of the components execute locally on the UE while the remaining are offloaded to a mobile edge server (MES). In this paper, we investigate the partial offloading technique in MEC using a supervised deep learning approach. The proposed technique, comprehensive and energy efficient deep learning-based offloading technique (CEDOT), intelligently selects the partial offloading policy and also the size of each component of a task to reduce the service delay and energy …

Computer scienceReal-time computingTP1-118502 engineering and technologyBiochemistryVDP::Teknologi: 500::Elektrotekniske fag: 540ArticleAnalytical Chemistry0202 electrical engineering electronic engineering information engineeringcomputational offloadingElectrical and Electronic EngineeringInstrumentationenergy efficiencyMobile edge computingArtificial neural networkbusiness.industryChemical technologyDeep learningdeep learning020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsTask (computing)cost functionUser equipment020201 artificial intelligence & image processingmobile edge computingArtificial intelligenceEnhanced Data Rates for GSM Evolutionremote executionbusinessEfficient energy useSensors
researchProduct

Genetic Algorithm Optimized Grid-based RF Fingerprint Positioning in Heterogeneous Small Cell Networks

2015

In this paper we propose a novel optimization algorithm for grid-based RF fingerprinting to improve user equipment (UE) positioning accuracy. For this purpose we have used Multi-objective Genetic Algorithm (MOGA) which enables autonomous calibration of gridcell layout (GCL) for better UE positioning as compared to that of the conventional fingerprinting approach. Performance evaluations were carried out using two different training data-sets consisting of Minimization of Drive Testing measurements obtained from a dynamic system simulation in a heterogeneous LTE small cell environment. The robustness of the proposed method has been tested analyzing positioning results from two different area…

EngineeringKullback-Leibler divergencebusiness.industryReal-time computingFingerprint recognitionGridmulti-objective genetic algorithmminimization of drive testsUser equipmentRobustness (computer science)Genetic algorithmElectronic engineeringgrid-based RF fingerprintingMinificationSmall cellRadio frequencybusiness
researchProduct

Effect of Channel-Quality Indicator Delay on HSDPA Performance

2007

This paper evaluates the effect of the channel estimation inaccuracy on the performance of an HSDPA system. This study provides some results from system level simulations that have been conducted over a very complete dynamic simulator which models an HSDPA system full compliant with specifications. This emulator allows performing multi-user transmission and link adaptation with a limited modulation and coding scheme (MCS) selection based on the channel quality indicator (CQI) modes. Many factors such as the user equipment (UE) speed, the employed scheduling algorithm or the traffic load have been considered in the assessment. Moreover the intrinsic constraints of a WCDMA system like HSDPA h…

EngineeringUser equipmentbusiness.industryCode division multiple accessComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTelecommunications linkElectronic engineeringLink adaptationChannelizedMobile telephonybusinessCoding (social sciences)Scheduling (computing)2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
researchProduct

A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing

2020

In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU, RAM, hard disk space, required time, and distance, to calculate a more realis…

FOS: Computer and information sciencesComputer sciencemedia_common.quotation_subjectG.3Cloud computingComputer Science - Networking and Internet ArchitectureC.2.3BiomaterialsC.2.1Resource (project management)Electrical and Electronic EngineeringFunction (engineering)media_commonNetworking and Internet Architecture (cs.NI)Mobile edge computingbusiness.industryEnergy consumptionComputer Science ApplicationsTask (computing)User equipmentMechanics of MaterialsModeling and SimulationResource allocationG.3; C.2.3; C.2.1business46FxxComputer networkComputers, Materials & Continua
researchProduct

Energy Efficient Scheduling in Content Distribution Collaborative Mobile Clusters

2020

Most of the existing literatures on green communications aimed to improve the energy efficiency at the base station or data server. However, in order to fully experience high rate broadband multimedia services, prolonging the battery life of user equipment is also critical for the mobile terminals, especially for the smartphone users. In this work, we investigate the problem of designing a content distribution mobile platform named collaborative mobile clusters (CMC) via user cooperation to reduce the energy consumption at the terminal side. Specifically, given numbers of users interested in downloading a common content from the operator, both centralized and distributed user grouping and s…

General Computer Sciencecollaborative mobile clusterComputer scienceenergiatehokkuuslangaton tekniikkamatkaviestinverkotScheduling (computing)UploadBase stationlangaton tiedonsiirtoBroadbandGeneral Materials ScienceGreen communicationsenergy efficiencyDatabase servercontent distributionbusiness.industryGeneral Engineeringuser schedulingEnergy consumptionuser cooperationUser equipmentgreen communicationslcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesslcsh:TK1-9971Efficient energy useComputer network
researchProduct