Pub Date : 2017-06-05DOI: 10.1109/BlackSeaCom.2017.8277664
Omer Narmanlioglu, E. Zeydan
Heterogeneous Networks (HetNets) adopted into Long Term Evolution Advanced networks, have become major candidate for next generation mobile networks. In HetNets, resource and interference management techniques become crucial to ensure high spectral as well as power efficiencies for Mobile Network Operators (MNOs) since they use frequency reuse of one and include cells that serve overlapping coverage regions. In this paper, we investigate a new architecture with emphasis on management applications of Heterogeneous Radio Access Networks (RANs) following Software-Defined Networking (SDN) paradigm. After giving brief explanations about advanced interference management techniques (i.e., enhanced inter-cell interference cancellation (eICIC) and Coordinated Multipoint (CoMP) transmission/reception) that are realized to top of the SDN/RAN controller, we present Monte-Carlo simulation results with the awareness of global view of the network infrastructure. Jain's fairness index and Shannon capacity are considered as key performance indicators. The simulation results indicate both fairness index and capacity value are improved with the use of eICIC technique and CoMP mechanism provides better service quality for cell-edge user equipments. SDN paradigm ensures realization of flexible architectures that can provide modular and pluggable platform for MNOs and we further provide joint evaluation of RAN controller's applications including radio resource management techniques.
{"title":"Interference coordination in SDN-based heterogeneous mobile networks","authors":"Omer Narmanlioglu, E. Zeydan","doi":"10.1109/BlackSeaCom.2017.8277664","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277664","url":null,"abstract":"Heterogeneous Networks (HetNets) adopted into Long Term Evolution Advanced networks, have become major candidate for next generation mobile networks. In HetNets, resource and interference management techniques become crucial to ensure high spectral as well as power efficiencies for Mobile Network Operators (MNOs) since they use frequency reuse of one and include cells that serve overlapping coverage regions. In this paper, we investigate a new architecture with emphasis on management applications of Heterogeneous Radio Access Networks (RANs) following Software-Defined Networking (SDN) paradigm. After giving brief explanations about advanced interference management techniques (i.e., enhanced inter-cell interference cancellation (eICIC) and Coordinated Multipoint (CoMP) transmission/reception) that are realized to top of the SDN/RAN controller, we present Monte-Carlo simulation results with the awareness of global view of the network infrastructure. Jain's fairness index and Shannon capacity are considered as key performance indicators. The simulation results indicate both fairness index and capacity value are improved with the use of eICIC technique and CoMP mechanism provides better service quality for cell-edge user equipments. SDN paradigm ensures realization of flexible architectures that can provide modular and pluggable platform for MNOs and we further provide joint evaluation of RAN controller's applications including radio resource management techniques.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115320834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277678
A. Gelgor, A. Gorlov
This paper proposes novel coded modulation schemes based on LDPC codes and optimal partial response (or Faster-than-Nyquist) signals. In these schemes coded bits are mapped into the points of QPSK constellation and the spectrum bandwidth (hence, the spectral efficiency) is widely handled by choosing the optimal finite impulse response (pulse) of the shaping filter. The shaping filter allows the intentional introduction of inter-symbol interference (ISI). The pulse optimization was based on the criterion of the minimal bandwidth comprising 99% of the signal power. It also included additional constraints of the ISI level and the signal peak-to-average power ratio. By simulation, we have shown that for the channel with additive white Gaussian noise the transition from conventional RRC-pulses to optimal finite pulses within the proposed coded modulation provide a reduction of bandwidth and energy consumption.
{"title":"A performance of coded modulation based on optimal Faster-than-Nyquist signals","authors":"A. Gelgor, A. Gorlov","doi":"10.1109/BlackSeaCom.2017.8277678","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277678","url":null,"abstract":"This paper proposes novel coded modulation schemes based on LDPC codes and optimal partial response (or Faster-than-Nyquist) signals. In these schemes coded bits are mapped into the points of QPSK constellation and the spectrum bandwidth (hence, the spectral efficiency) is widely handled by choosing the optimal finite impulse response (pulse) of the shaping filter. The shaping filter allows the intentional introduction of inter-symbol interference (ISI). The pulse optimization was based on the criterion of the minimal bandwidth comprising 99% of the signal power. It also included additional constraints of the ISI level and the signal peak-to-average power ratio. By simulation, we have shown that for the channel with additive white Gaussian noise the transition from conventional RRC-pulses to optimal finite pulses within the proposed coded modulation provide a reduction of bandwidth and energy consumption.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277702
M. F. Keskin, S. Gezici, O. Arikan
In this paper, direct positioning approaches are investigated for both synchronous and asynchronous visible light systems. First, the maximum likelihood estimator (MLE) and the Cramér-Rao lower bound (CRLB) are derived for the synchronous scenario by considering the information from both channel attenuation factors and time delay parameters. Then, asynchronous visible light positioning (VLP) systems are investigated and the corresponding CRLBs and MLEs are obtained based on received signal strength (RSS) information. It is shown that the direct and two-step position estimators are equivalent in the asynchronous scenario under mild conditions. Numerical examples are provided to illustrate the theoretical results.
{"title":"Direct positioning in synchronous and asynchronous visible light systems","authors":"M. F. Keskin, S. Gezici, O. Arikan","doi":"10.1109/BlackSeaCom.2017.8277702","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277702","url":null,"abstract":"In this paper, direct positioning approaches are investigated for both synchronous and asynchronous visible light systems. First, the maximum likelihood estimator (MLE) and the Cramér-Rao lower bound (CRLB) are derived for the synchronous scenario by considering the information from both channel attenuation factors and time delay parameters. Then, asynchronous visible light positioning (VLP) systems are investigated and the corresponding CRLBs and MLEs are obtained based on received signal strength (RSS) information. It is shown that the direct and two-step position estimators are equivalent in the asynchronous scenario under mild conditions. Numerical examples are provided to illustrate the theoretical results.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116234339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277669
M. Mohammadi, Z. Mobini
In this paper, we consider problem of relay selection In cognitive decode-and-forward (DF) relay networks subject to independent non-necessarily identically distributed Rayleigh fading. Specifically, we consider two variations of DF relay selection, namely best relay selection and partial relay selection, when the secondary transmissions are subject to interference from primary transmitter (PT) and transmissions of the secondary source and relay are powered by the energy harvested from radio frequency (RF) signal sent by the PT. For both these variations, we derive analytical expressions for the secondary delay-constrained throughput under the primary outage constraint and the peak power constraint at both secondary source node and secondary relay node. In order to shed insights into the systems performance, closed-form expressions for delay-constraint throughput of the noise-limited case are also derived for both relay selection strategies. The correctness of the proposed analysis is corroborated via Monte Carlo simulations and allows us to evaluate the impact of the key system parameters on the end-to-end performance.
{"title":"Wireless-powered cooperative systems with relay selection in spectrum-sharing scenario","authors":"M. Mohammadi, Z. Mobini","doi":"10.1109/BlackSeaCom.2017.8277669","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277669","url":null,"abstract":"In this paper, we consider problem of relay selection In cognitive decode-and-forward (DF) relay networks subject to independent non-necessarily identically distributed Rayleigh fading. Specifically, we consider two variations of DF relay selection, namely best relay selection and partial relay selection, when the secondary transmissions are subject to interference from primary transmitter (PT) and transmissions of the secondary source and relay are powered by the energy harvested from radio frequency (RF) signal sent by the PT. For both these variations, we derive analytical expressions for the secondary delay-constrained throughput under the primary outage constraint and the peak power constraint at both secondary source node and secondary relay node. In order to shed insights into the systems performance, closed-form expressions for delay-constraint throughput of the noise-limited case are also derived for both relay selection strategies. The correctness of the proposed analysis is corroborated via Monte Carlo simulations and allows us to evaluate the impact of the key system parameters on the end-to-end performance.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129495402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277694
Z. Mobini, M. Mohammadi
Security and energy are two critical Issues for emerging wireless networks and thus we study wireless energy harvesting and physical-layer security for a spectrum-sharing network with a multi-antenna full-duplex secondary receiver in the presence of an eavesdropper. We adopt a time-switching strategy where in the first phase, secondary users are powered through wireless energy transfer from the primary source. In the second phase, the secondary transmitter and receiver use the harvested energy to transmit the information and jamming signal, respectively. We propose a beamforming scheme at the secondary receiver with the main purpose of minimizing the outage probability of the secondary data transmission and maximizing the achievable secrecy rate of the primary system. We derive analytical expression for the outage probability at the secondary receiver and the achievable secrecy rate of the primary network. Moreover, asymptotic closed-form outage probability is presented. Numerical simulations verify the performance of the proposed scheme and analytical results and allow us to investigate the impact of the key system parameters on the network performance.
{"title":"Secure spectrum-sharing networks with full-duplex multiple-antenna wireless-powered secondary system","authors":"Z. Mobini, M. Mohammadi","doi":"10.1109/BlackSeaCom.2017.8277694","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277694","url":null,"abstract":"Security and energy are two critical Issues for emerging wireless networks and thus we study wireless energy harvesting and physical-layer security for a spectrum-sharing network with a multi-antenna full-duplex secondary receiver in the presence of an eavesdropper. We adopt a time-switching strategy where in the first phase, secondary users are powered through wireless energy transfer from the primary source. In the second phase, the secondary transmitter and receiver use the harvested energy to transmit the information and jamming signal, respectively. We propose a beamforming scheme at the secondary receiver with the main purpose of minimizing the outage probability of the secondary data transmission and maximizing the achievable secrecy rate of the primary system. We derive analytical expression for the outage probability at the secondary receiver and the achievable secrecy rate of the primary network. Moreover, asymptotic closed-form outage probability is presented. Numerical simulations verify the performance of the proposed scheme and analytical results and allow us to investigate the impact of the key system parameters on the network performance.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129904750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277717
Mohammed Al-Imari
Grant-free access represents one of the promising access schemes in 5G systems to meet the restrict power and delay requirements of the new usage scenarios. In grant-free access, the users transmit to the base-station without prior scheduling permission from the network. One of the challenges is that the base-station is not aware of how many users are transmitting at a given time. In this paper, we propose a method that enables the base-station blindly detect the number of active users in grant-free access. The proposed method capitalizes on the unique feature of frequency quadrature amplitude modulation (FQAM) that the number of active subcarriers in a FQAM symbol depends on the number of users transmitting on that symbol. Thus, in the proposed method, FQAM will be used by the users for grant-free transmission, and the base-station will estimate the number of active users based on the number of active subcarriers. We provide in details the channel structure, procedures and theoretical derivation of the average number of active subcarriers. Numerical simulations show that by using the proposed method the number of active users can be accurately detected at the base-station. Furthermore, it is shown that the performance of the method depends on the number of active users and the number of radio resources used to estimate the users' activity.
{"title":"A novel method for blind detection of users' activity in grant-free access for 5G networks","authors":"Mohammed Al-Imari","doi":"10.1109/BlackSeaCom.2017.8277717","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277717","url":null,"abstract":"Grant-free access represents one of the promising access schemes in 5G systems to meet the restrict power and delay requirements of the new usage scenarios. In grant-free access, the users transmit to the base-station without prior scheduling permission from the network. One of the challenges is that the base-station is not aware of how many users are transmitting at a given time. In this paper, we propose a method that enables the base-station blindly detect the number of active users in grant-free access. The proposed method capitalizes on the unique feature of frequency quadrature amplitude modulation (FQAM) that the number of active subcarriers in a FQAM symbol depends on the number of users transmitting on that symbol. Thus, in the proposed method, FQAM will be used by the users for grant-free transmission, and the base-station will estimate the number of active users based on the number of active subcarriers. We provide in details the channel structure, procedures and theoretical derivation of the average number of active subcarriers. Numerical simulations show that by using the proposed method the number of active users can be accurately detected at the base-station. Furthermore, it is shown that the performance of the method depends on the number of active users and the number of radio resources used to estimate the users' activity.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131293458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277707
Keyvan Aghababaiyan, B. Maham
Interference management and supporting quality of service (QoS) requirements are the principal challenges for the spectral resource allocation in orthogonal frequency division multiple access small cells networks. In this paper, we propose an algorithm for assigning physical resource block (PRB) with QoS constraints to omit interference among femtocells. We present our resource management method as an optimization problem where interference among femtocells is entirely avoided and multiple QoS are supported. The optimization problem imposes the fairness among different femtocells and maximizes the PRB efficiency. However, this problem is NP-complete, and thus, we propose a greedy algorithm for solving the problem. Simulation results show that the throughput of the greedy algorithm is close to the optimal solution of the optimization problem. Besides, the proposed algorithm improves the network throughput by over 30%–50% in various simulation scenarios with different femtocells densities in comparison to previous methods. Moreover, simulations illustrate the rejection ratio for all classes of services is lower than 3%.
{"title":"Downlink radio resource allocation in OFDMA-based small cells networks","authors":"Keyvan Aghababaiyan, B. Maham","doi":"10.1109/BlackSeaCom.2017.8277707","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277707","url":null,"abstract":"Interference management and supporting quality of service (QoS) requirements are the principal challenges for the spectral resource allocation in orthogonal frequency division multiple access small cells networks. In this paper, we propose an algorithm for assigning physical resource block (PRB) with QoS constraints to omit interference among femtocells. We present our resource management method as an optimization problem where interference among femtocells is entirely avoided and multiple QoS are supported. The optimization problem imposes the fairness among different femtocells and maximizes the PRB efficiency. However, this problem is NP-complete, and thus, we propose a greedy algorithm for solving the problem. Simulation results show that the throughput of the greedy algorithm is close to the optimal solution of the optimization problem. Besides, the proposed algorithm improves the network throughput by over 30%–50% in various simulation scenarios with different femtocells densities in comparison to previous methods. Moreover, simulations illustrate the rejection ratio for all classes of services is lower than 3%.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277704
Seyhan Uçar, S. Ergen, Öznur Özkasap
Platooning is a promising vehicle formation where autonomous vehicles are accessing each others information and grouped within a dose proximity. Multiplatoon, on the other hand, is an enhanced version of platooning that refers to the chain of platoons where platoons follow one another. One of the primary objectives for the multiplatoon system is to support data dissemination for different information types. Multiplatoon systems usually adopt the current dominant radio frequency (RF) technology IEEE 802.11p for communication. However, IEEE 802.11p suffers from problems of performance degradation due to the congestion, the scarcity of RF and security that may degrade the delay and delivery ratio of safety application. Visible Light Communication (VLC), on the other hand, is a promising complementary technology with the potential to address IEEE 802.11p problems. In this paper, we propose an IEEE 802.11p and VLC based hybrid safety dissemination protocol and investigate the hybrid safety message dissemination scheme in the presence of application level data traffic. We develop a simulation platform to realize the hybrid multiplatoon. We demonstrate that the packet loss results in low packet delivery ratio in IEEE 802.11p based multiplatoon. Although VLC increases the safety message dissemination performance, hybrid multiplatoon architecture still suffers from the disconnected network.
{"title":"Visible light communication assisted safety message dissemination in multiplatoon","authors":"Seyhan Uçar, S. Ergen, Öznur Özkasap","doi":"10.1109/BlackSeaCom.2017.8277704","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277704","url":null,"abstract":"Platooning is a promising vehicle formation where autonomous vehicles are accessing each others information and grouped within a dose proximity. Multiplatoon, on the other hand, is an enhanced version of platooning that refers to the chain of platoons where platoons follow one another. One of the primary objectives for the multiplatoon system is to support data dissemination for different information types. Multiplatoon systems usually adopt the current dominant radio frequency (RF) technology IEEE 802.11p for communication. However, IEEE 802.11p suffers from problems of performance degradation due to the congestion, the scarcity of RF and security that may degrade the delay and delivery ratio of safety application. Visible Light Communication (VLC), on the other hand, is a promising complementary technology with the potential to address IEEE 802.11p problems. In this paper, we propose an IEEE 802.11p and VLC based hybrid safety dissemination protocol and investigate the hybrid safety message dissemination scheme in the presence of application level data traffic. We develop a simulation platform to realize the hybrid multiplatoon. We demonstrate that the packet loss results in low packet delivery ratio in IEEE 802.11p based multiplatoon. Although VLC increases the safety message dissemination performance, hybrid multiplatoon architecture still suffers from the disconnected network.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277708
Salim Eryigit, M. Gokturk
This paper proposes a cloud-assisted channel selection method for multi-node wireless networks, in particular wireless mesh networks. Periodic channel idle airtime measurements of the access points (APs) that constitute the mesh network are accumulated at a remote controller that runs various forecasting methods on the aggregated data, and finds the best fitting method for each AP-channel pair. By using the selected forecasting method, for every channel and every AP, expected idle airtime in the near future is calculated. Channel assignment is carried out by the remote controller, based on the forecasted idle airtime of each AP. While performing the channel assignment, the remote controller takes into account the available frequency bands in the network, in particular, the band used by the wireless backbone of the mesh network, e.g. 5 GHz band, and the other frequency band, e.g., 2.4 GHz band. The proposed method is implemented and tested in a real test bed that comprises dual-band concurrent mesh APs, and a remote controller that runs in a cloud server. The results show that the proposed method accurately forecasts the idle airtime, and yields successful channel assignment for each frequency band the mesh network is operating in.
{"title":"Cloud-assisted channel selection for wireless mesh networks","authors":"Salim Eryigit, M. Gokturk","doi":"10.1109/BlackSeaCom.2017.8277708","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277708","url":null,"abstract":"This paper proposes a cloud-assisted channel selection method for multi-node wireless networks, in particular wireless mesh networks. Periodic channel idle airtime measurements of the access points (APs) that constitute the mesh network are accumulated at a remote controller that runs various forecasting methods on the aggregated data, and finds the best fitting method for each AP-channel pair. By using the selected forecasting method, for every channel and every AP, expected idle airtime in the near future is calculated. Channel assignment is carried out by the remote controller, based on the forecasted idle airtime of each AP. While performing the channel assignment, the remote controller takes into account the available frequency bands in the network, in particular, the band used by the wireless backbone of the mesh network, e.g. 5 GHz band, and the other frequency band, e.g., 2.4 GHz band. The proposed method is implemented and tested in a real test bed that comprises dual-band concurrent mesh APs, and a remote controller that runs in a cloud server. The results show that the proposed method accurately forecasts the idle airtime, and yields successful channel assignment for each frequency band the mesh network is operating in.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122105044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-06-01DOI: 10.1109/BlackSeaCom.2017.8277691
Shahriar Etemadi Tajbakhsh, Gaojie Chen, J. Coon
In this paper, we consider the problem of evaluating trust between individuals in social networks. The previously introduced three-valued subjective logic (3VSL) provides a set of useful tools in measuring interpersonal trust in social human networks. However, the number of required operations for such measurements grows exponentially with the size of network. Moreover, the correlations between different paths connecting the two individuals caused by common edges are not considered. In this paper, we show that the operators in 3VSL can still be used to give a lower-bound on trust even if such correlations are taken into account. We introduce a low complexity scalable algorithm to obtain this lower-bound. The numerical experiment results are represented and compared with the 3VSL.
{"title":"On computational approaches to trust evaluation in large-scale social networks","authors":"Shahriar Etemadi Tajbakhsh, Gaojie Chen, J. Coon","doi":"10.1109/BlackSeaCom.2017.8277691","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277691","url":null,"abstract":"In this paper, we consider the problem of evaluating trust between individuals in social networks. The previously introduced three-valued subjective logic (3VSL) provides a set of useful tools in measuring interpersonal trust in social human networks. However, the number of required operations for such measurements grows exponentially with the size of network. Moreover, the correlations between different paths connecting the two individuals caused by common edges are not considered. In this paper, we show that the operators in 3VSL can still be used to give a lower-bound on trust even if such correlations are taken into account. We introduce a low complexity scalable algorithm to obtain this lower-bound. The numerical experiment results are represented and compared with the 3VSL.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125220633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}