52 research outputs found

    Successive Interference Cancellation and Fractional Frequency Reuse For LTE Uplink Communications

    Get PDF
    Cellular networks are increasingly densified to deal with fast growing wireless traffic. Interference mitigation plays a key role for the dense cellular networks. Successive interference cancellation (SIC) and fractional frequency reuse (FFR) are two representative inter-cell interference (ICI) mitigation techniques. In this paper we study the application of both SIC and FFR for LTE uplink networks, and develop an analytical model to investigate their interactions and impact on network performance. The performance gains with FFR and SIC are related to key system functionalities and variables, such as SIC parameters, FFR bandwidth partition, uplink power control and sector antennas. The ICIs from individual cell sectors are approximated by log-normal random variables, which enables low complexity computation of the aggregate ICI with FFR and SIC. Then network performance of site throughput and outage probability is computed. The model is fast and has small modelling deviation, which is validated by system level simulations. Numerical results show that both SIC and FFR can largely improve network performance, but SIC has an impact over FFR. In addition, most of the network performance gains with SIC could be obtained with a small number of SIC stages applied to a few sectors

    QoE-Driven Video Transmission: Energy-Efficient Multi-UAV Network Optimization

    Full text link
    This paper is concerned with the issue of improving video subscribers' quality of experience (QoE) by deploying a multi-unmanned aerial vehicle (UAV) network. Different from existing works, we characterize subscribers' QoE by video bitrates, latency, and frame freezing and propose to improve their QoE by energy-efficiently and dynamically optimizing the multi-UAV network in terms of serving UAV selection, UAV trajectory, and UAV transmit power. The dynamic multi-UAV network optimization problem is formulated as a challenging sequential-decision problem with the goal of maximizing subscribers' QoE while minimizing the total network power consumption, subject to some physical resource constraints. We propose a novel network optimization algorithm to solve this challenging problem, in which a Lyapunov technique is first explored to decompose the sequential-decision problem into several repeatedly optimized sub-problems to avoid the curse of dimensionality. To solve the sub-problems, iterative and approximate optimization mechanisms with provable performance guarantees are then developed. Finally, we design extensive simulations to verify the effectiveness of the proposed algorithm. Simulation results show that the proposed algorithm can effectively improve the QoE of subscribers and is 66.75\% more energy-efficient than benchmarks

    Flatten a Curved Space by Kernel: From Einstein to Euclid

    No full text
    Einstein’s general theory of relativity fundamentally changed our view about the physical world. Different from Newton’s theory, Einstein’s space and time are not flat but can be warped by matter. For a curved space such as Einstein’s space, Euclidean geometry is no longer suitable, and Riemannian geometry is usually used instead. In parallel with physics, due to an explosion of data from all fields of science, there is an increasing need for pattern analysis tools, which are capable of analyzing patterns of data in a non-Euclidean (curved) space. To handle data in a curved space, linear approaches are not directly applicable, and instead nonlinear approaches are the right weapon. However, early-day nonlinear approaches were usually based on gradient descent or greedy heuristics, and suffered from local minima and overfitting [1]. In contrast, kernel methods provide a powerful means for transforming data in a non-Euclidean curved space (such as Einstein space) into points in a highdimensional Euclidean flat space, so that linear approaches can be applied to the transformed points in the high-dimensional Euclidean space. With this flattening capability, kernel methods combine the best features of linear approaches and nonlinear approaches, i.e., kernel methods are capable of dealing with nonlinear structures while enjoying a low computational complexity like linear approaches. In this column, we provide important insights into kernel methods and illustrate the power of kerne

    An Efficient Mobile Authentication Scheme for Wireless Networks

    No full text
    Abstract — In this paper, an efficient authentication scheme is proposed which is suitable for low-power mobile devices. It uses an elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation passcode for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attack. Moreover, the mobile station only needs to receive one message and send one message to authenticate itself to a visitor’s location register, and the scheme only requires a single elliptic-curve scalar point multiplication on a mobile device. Therefore, this scheme enjoys both computation efficiency and communication efficiency as compared to known mobile authentication schemes. Index Terms — mobile authentication, denial-of-service attack, message en route attack, false base station attack, elliptic-curve cryptosystems. I

    Cross-modal Orthogonal High-rank Augmentation for RGB-Event Transformer-trackers

    Full text link
    This paper addresses the problem of cross-modal object tracking from RGB videos and event data. Rather than constructing a complex cross-modal fusion network, we explore the great potential of a pre-trained vision Transformer (ViT). Particularly, we delicately investigate plug-and-play training augmentations that encourage the ViT to bridge the vast distribution gap between the two modalities, enabling comprehensive cross-modal information interaction and thus enhancing its ability. Specifically, we propose a mask modeling strategy that randomly masks a specific modality of some tokens to enforce the interaction between tokens from different modalities interacting proactively. To mitigate network oscillations resulting from the masking strategy and further amplify its positive effect, we then theoretically propose an orthogonal high-rank loss to regularize the attention matrix. Extensive experiments demonstrate that our plug-and-play training augmentation techniques can significantly boost state-of-the-art one-stream and twostream trackers to a large extent in terms of both tracking precision and success rate. Our new perspective and findings will potentially bring insights to the field of leveraging powerful pre-trained ViTs to model cross-modal data. The code will be publicly available
    • …
    corecore