2,694,783 research outputs found
Asynchronous device detection for cognitive device-to-device communications
Dynamic spectrum sharing will facilitate the interference coordination in device-to-device (D2D) communications. In the absence of network level coordination, the timing synchronization among D2D users will be unavailable, leading to inaccurate channel state estimation and device detection, especially in time-varying fading environments. In this study, we design an asynchronous device detection/discovery framework for cognitive-D2D applications, which acquires timing drifts and dynamical fading channels when directly detecting the existence of a proximity D2D device (e.g. or primary user). To model and analyze this, a new dynamical system model is established, where the unknown timing deviation follows a random process, while the fading channel is governed by a discrete state Markov chain. To cope with the mixed estimation and detection (MED) problem, a novel sequential estimation scheme is proposed, using the conceptions of statistic Bayesian inference and random finite set. By tracking the unknown states (i.e. varying time deviations and fading gains) and suppressing the link uncertainty, the proposed scheme can effectively enhance the detection performance. The general framework, as a complimentary to a network-aided case with the coordinated signaling, provides the foundation for development of flexible D2D communications along with proximity-based spectrum sharing
Device-Aware Routing and Scheduling in Multi-Hop Device-to-Device Networks
The dramatic increase in data and connectivity demand, in addition to
heterogeneous device capabilities, poses a challenge for future wireless
networks. One of the promising solutions is Device-to-Device (D2D) networking.
D2D networking, advocating the idea of connecting two or more devices directly
without traversing the core network, is promising to address the increasing
data and connectivity demand. In this paper, we consider D2D networks, where
devices with heterogeneous capabilities including computing power, energy
limitations, and incentives participate in D2D activities heterogeneously. We
develop (i) a device-aware routing and scheduling algorithm (DARS) by taking
into account device capabilities, and (ii) a multi-hop D2D testbed using
Android-based smartphones and tablets by exploiting Wi-Fi Direct and legacy
Wi-Fi connections. We show that DARS significantly improves throughput in our
testbed as compared to state-of-the-art
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Device-Centric Monitoring for Mobile Device Management
The ubiquity of computing devices has led to an increased need to ensure not
only that the applications deployed on them are correct with respect to their
specifications, but also that the devices are used in an appropriate manner,
especially in situations where the device is provided by a party other than the
actual user. Much work which has been done on runtime verification for mobile
devices and operating systems is mostly application-centric, resulting in
global, device-centric properties (e.g. the user may not send more than 100
messages per day across all applications) being difficult or impossible to
verify. In this paper we present a device-centric approach to runtime verify
the device behaviour against a device policy with the different applications
acting as independent components contributing to the overall behaviour of the
device. We also present an implementation for Android devices, and evaluate it
on a number of device-centric policies, reporting the empirical results
obtained.Comment: In Proceedings FESCA 2016, arXiv:1603.0837
Komunikasi Device-to-Device pada Jaringan Seluler 5G Menggunakan MmWave
This article discusses about device-to-device communication on 5G cellular networks using mmWave. Device-to-device communication will support 5G cellular technology, because it can be a solution to overcome the limitations of cellular coverage and service capacity. D2D can be used in a variety of applications. The main problem in D2D is that interference between signals in one cell will be very vulnerable to occur, so that effective resource management is needed. In addition, the use of D2D will also increase the complexity of a cellular system, in terms of resource management, interference, and also the routing required. Several studies have been carried out to create D2D communication that can be implemented effectively on 5G. One of them is research to perfect the load balancing scheme which is one of the functions obtained from D2D communication. Load balancing is the distribution of cellular traffic loads, using D2D the traffic load is channeled to communication between devices and reduces the burden on the main network
Coupling device
Releasable coupling device designed to receive and retain matching ends of electrical connector
Filtering device
An electrical filter for removing noise from a voice communications signal is reported; seven sample values of the signal are obtained continuously, updated and subjected to filtering. Filtering is accomplished by adding balanced, with respect to a mid-point sample, spaced pairs of the sampled values, and then multiplying each pair by a selected filter constant. The signal products thus obtained are summed to provide a filtered version of the original signal
- …