Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413603
D. Sen
In this paper we derive the Modified Cramér-Rao Bound (MCRB) for symbol timing, phase and frequency offset in presence of non-linear self-phase modulation (SPM) in a dispersion compensated long-haul coherent fiber link. We consider dual polarization multilevel quadrature amplitude modulation and multiple span of fiber each associated with optical amplifier. In presence of a realistic low pass filter (LPF) at the receiver front end, we find that SPM degrades the MCRB significantly. Moreover, SPM induces underdamped oscillation on the bounds. Simulation is carried out with self-generated asymmetric pulse to verify the theoretical results.
{"title":"MCRB for synchronization parameters offset in the presence of self-phase modulation in coherent optical communication","authors":"D. Sen","doi":"10.1109/ANTS.2015.7413603","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413603","url":null,"abstract":"In this paper we derive the Modified Cramér-Rao Bound (MCRB) for symbol timing, phase and frequency offset in presence of non-linear self-phase modulation (SPM) in a dispersion compensated long-haul coherent fiber link. We consider dual polarization multilevel quadrature amplitude modulation and multiple span of fiber each associated with optical amplifier. In presence of a realistic low pass filter (LPF) at the receiver front end, we find that SPM degrades the MCRB significantly. Moreover, SPM induces underdamped oscillation on the bounds. Simulation is carried out with self-generated asymmetric pulse to verify the theoretical results.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413647
Shajahan Kutty, D. Sen
Directional communication is a key element in the sustenance of high data rate links in millimeter wave communications, and can be realized using antenna beamforming. To reduce training overhead and establish a reliable link in indoor millimeter wave communications, the beam switching technique is adopted with an objective to identify the optimal transmit-receive beam pair that maximizes the signal-to-noise ratio. Numerical optimization techniques based on direct search further seek to reduce the search complexity. The existing methods explored in literature work effectively for relatively smooth objective functions. However, indoor millimeter wave channels are typically characterized by non-smooth complicated objective functions. In this paper we propose a numerical search algorithm based on the Rosenbrock's direct search technique applicable for 60 GHz indoor millimeter wave systems. The proposed method is shown to yield an improved search success percentage during the beam search procedure without affecting the search complexity as compared to state-of-the-art techniques.
{"title":"An improved numerical optimization method for efficient beam search in 60 GHz indoor millimeter wave wireless networks","authors":"Shajahan Kutty, D. Sen","doi":"10.1109/ANTS.2015.7413647","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413647","url":null,"abstract":"Directional communication is a key element in the sustenance of high data rate links in millimeter wave communications, and can be realized using antenna beamforming. To reduce training overhead and establish a reliable link in indoor millimeter wave communications, the beam switching technique is adopted with an objective to identify the optimal transmit-receive beam pair that maximizes the signal-to-noise ratio. Numerical optimization techniques based on direct search further seek to reduce the search complexity. The existing methods explored in literature work effectively for relatively smooth objective functions. However, indoor millimeter wave channels are typically characterized by non-smooth complicated objective functions. In this paper we propose a numerical search algorithm based on the Rosenbrock's direct search technique applicable for 60 GHz indoor millimeter wave systems. The proposed method is shown to yield an improved search success percentage during the beam search procedure without affecting the search complexity as compared to state-of-the-art techniques.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130909017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413658
Rohit Singh, H. Jamadagni
In distributed wireless networks, nodes are expected to spend their own resources so as to relay other nodes messages. This setup is governed by the trade-off between connectivity across the network and minimum interference, which maps to the standard Random Geometric Graph model. Even though smart network helps here, problem is that cognitive nodes may violate rules of cooperation with selfish intention of reaping the benefits from other nodes without bearing its cost. This leads to a behavioral epidemic causing nodes to follow non-cooperative strategy bringing down the network performance. In this paper, we examine the optimal way to choose control nodes using a central coordinator. We show by analysis that contrary to the general intuition, there exists a range of interest where random selection of control nodes outperforms that by highest degree ordering for the number of control nodes. We then simulate the mechanisms of inspections and counter-epidemic for these two control node selection procedures and verify the result.
{"title":"Behavioral epidemic analysis on Random Graph model for smart wireless networks","authors":"Rohit Singh, H. Jamadagni","doi":"10.1109/ANTS.2015.7413658","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413658","url":null,"abstract":"In distributed wireless networks, nodes are expected to spend their own resources so as to relay other nodes messages. This setup is governed by the trade-off between connectivity across the network and minimum interference, which maps to the standard Random Geometric Graph model. Even though smart network helps here, problem is that cognitive nodes may violate rules of cooperation with selfish intention of reaping the benefits from other nodes without bearing its cost. This leads to a behavioral epidemic causing nodes to follow non-cooperative strategy bringing down the network performance. In this paper, we examine the optimal way to choose control nodes using a central coordinator. We show by analysis that contrary to the general intuition, there exists a range of interest where random selection of control nodes outperforms that by highest degree ordering for the number of control nodes. We then simulate the mechanisms of inspections and counter-epidemic for these two control node selection procedures and verify the result.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413643
Abhishek K. Gupta, M. F. Habib, P. Chowdhury, M. Tornatore, B. Mukherjee
Network functions (e.g., firewalls, load balancers, etc.) are traditionally implemented in hardware appliances and provide services to traffic flows. Since these functions are traditionally hardware-based, they make service innovation difficult in today's scenario of rapidly-increasing and evolving service demands. Network Function Virtualization (NFV) is seen as a key enabler for service innovation as it virtualizes these network functions that can be therefore located more flexibly in the network. In this paper, we analyze network resource consumption in a Network-enabled Cloud (NeC) where the cloud-computing paradigm also comprises of network nodes in addition to the data center, by employing service chaining of Virtual Network Functions (VNF). Using an Integer Linear Program formulation, we study different NeC scenarios having varying number of network nodes. Our results indicate that scenarios with distributed NFV capability (as in NeC) can reduce network resource consumption.
{"title":"On service chaining using Virtual Network Functions in Network-enabled Cloud systems","authors":"Abhishek K. Gupta, M. F. Habib, P. Chowdhury, M. Tornatore, B. Mukherjee","doi":"10.1109/ANTS.2015.7413643","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413643","url":null,"abstract":"Network functions (e.g., firewalls, load balancers, etc.) are traditionally implemented in hardware appliances and provide services to traffic flows. Since these functions are traditionally hardware-based, they make service innovation difficult in today's scenario of rapidly-increasing and evolving service demands. Network Function Virtualization (NFV) is seen as a key enabler for service innovation as it virtualizes these network functions that can be therefore located more flexibly in the network. In this paper, we analyze network resource consumption in a Network-enabled Cloud (NeC) where the cloud-computing paradigm also comprises of network nodes in addition to the data center, by employing service chaining of Virtual Network Functions (VNF). Using an Integer Linear Program formulation, we study different NeC scenarios having varying number of network nodes. Our results indicate that scenarios with distributed NFV capability (as in NeC) can reduce network resource consumption.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116719730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413614
Sayan Sen Sarma, G. Chakraborty
A transportation network describes a network structure to allow flow of some commodity. Flow maximization is a classical problem in this domain. In this paper, we address the problem of flow maximization in a transportation network with fix sources and a fixed sink. For simplicity to find an analytical solution, we start with a grid structured road network. The goal is to find a traffic distribution over the road network such that the total average time of travel from source to sink is minimized. The theoretical result obtained was verified using linear programming problem solving tool in MATLAB.
{"title":"Queuing model-based optimal traffic flow in a grid network","authors":"Sayan Sen Sarma, G. Chakraborty","doi":"10.1109/ANTS.2015.7413614","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413614","url":null,"abstract":"A transportation network describes a network structure to allow flow of some commodity. Flow maximization is a classical problem in this domain. In this paper, we address the problem of flow maximization in a transportation network with fix sources and a fixed sink. For simplicity to find an analytical solution, we start with a grid structured road network. The goal is to find a traffic distribution over the road network such that the total average time of travel from source to sink is minimized. The theoretical result obtained was verified using linear programming problem solving tool in MATLAB.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125778752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413610
V. Janardhanan, Nishad Muhammed, V. Gonuguntla, N. Akhtar
The proliferation of smart phones combined with increasing mobile data demand, cellular network operators around the world are considering various ways to augment network capacity. To meet the projected 1000x increase capacity by 2020 [3], a holistic approach is needed. The proposed solutions include hyper-dense small cell deployment, intelligent utilization of existing spectrum and offloading to other networks like Wi-Fi. Extending the LTE-Advanced (LTE-A) to unlicensed spectrum is a new approach being considered by the global standards body 3GPP, as part of LTE Release-13. The feasibility of LTE operation in 5 GHz band, also known as Licensed Assisted Access (LAA), is being studied. The main challenge is to ensure LTE do not affect the performance of existing technologies/systems in this band such as Wi-Fi, Radar etc. In this paper, we provide simulation study on LTE - Wi-Fi coexistence in the unlicensed spectrum.
{"title":"LTE - Wi-Fi coexistence in 5 GHz band","authors":"V. Janardhanan, Nishad Muhammed, V. Gonuguntla, N. Akhtar","doi":"10.1109/ANTS.2015.7413610","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413610","url":null,"abstract":"The proliferation of smart phones combined with increasing mobile data demand, cellular network operators around the world are considering various ways to augment network capacity. To meet the projected 1000x increase capacity by 2020 [3], a holistic approach is needed. The proposed solutions include hyper-dense small cell deployment, intelligent utilization of existing spectrum and offloading to other networks like Wi-Fi. Extending the LTE-Advanced (LTE-A) to unlicensed spectrum is a new approach being considered by the global standards body 3GPP, as part of LTE Release-13. The feasibility of LTE operation in 5 GHz band, also known as Licensed Assisted Access (LAA), is being studied. The main challenge is to ensure LTE do not affect the performance of existing technologies/systems in this band such as Wi-Fi, Radar etc. In this paper, we provide simulation study on LTE - Wi-Fi coexistence in the unlicensed spectrum.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413653
Sudipta Ghosh, S. Seetharaman
The expected proliferation of massive number of connected devices in the Internet of Things (IoT) context imposes several challenges and constraints to inter & intra IoT communication. Current mechanism has limited capability for handling a number of aspects associated with this exponential rise in connected devices, types and functions of IoT networks, and availability of heterogeneous modes of communications. Such aspects include network & device specific identity and session maintenance, context-aware and adaptive communication, security needs, reliability and criticality of communication, etc. To address some of these challenges, we present a novel approach for adaptive and context-aware inter-IoT communication across heterogeneous networks supporting IoT service requirements and mobility.
{"title":"Mechanism for adaptive and context-aware inter-IoT communication","authors":"Sudipta Ghosh, S. Seetharaman","doi":"10.1109/ANTS.2015.7413653","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413653","url":null,"abstract":"The expected proliferation of massive number of connected devices in the Internet of Things (IoT) context imposes several challenges and constraints to inter & intra IoT communication. Current mechanism has limited capability for handling a number of aspects associated with this exponential rise in connected devices, types and functions of IoT networks, and availability of heterogeneous modes of communications. Such aspects include network & device specific identity and session maintenance, context-aware and adaptive communication, security needs, reliability and criticality of communication, etc. To address some of these challenges, we present a novel approach for adaptive and context-aware inter-IoT communication across heterogeneous networks supporting IoT service requirements and mobility.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413623
Yan Shi, S. Biswas
This paper presents the concept and characterization of Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. Such identification can be used in enterprise firewalls for blocking unauthorized viewing of tunneled video. We attempt to characterize and evaluate the impacts of the primary TA-influencing factors, namely, streaming protocol, codec, and the actual video content. A test environment is built to study the influence of those factors while Packet Size Distribution is used as the classification feature during Traffic Analysis. Analysis done on data obtained from the test environment has shown that the streaming protocols provide the most dominant source identification distinction. Also, while the codecs provide some weak distinctions, the influence of video content is marginal. In addition to in-laboratory experiments, a real-world verification for corroborating those observations is also made with commercial streaming service providers. Such long-haul experiments indicate that the end-to-end network conditions between the streaming server and video client can act as an additional influencing factor for traffic analysis towards video stream source identification. Overall, the results suggest the feasibility of TA for unknown video stream source identification with sufficiently diverse video examples.
{"title":"Characterization of Traffic Analysis based video stream source identification","authors":"Yan Shi, S. Biswas","doi":"10.1109/ANTS.2015.7413623","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413623","url":null,"abstract":"This paper presents the concept and characterization of Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. Such identification can be used in enterprise firewalls for blocking unauthorized viewing of tunneled video. We attempt to characterize and evaluate the impacts of the primary TA-influencing factors, namely, streaming protocol, codec, and the actual video content. A test environment is built to study the influence of those factors while Packet Size Distribution is used as the classification feature during Traffic Analysis. Analysis done on data obtained from the test environment has shown that the streaming protocols provide the most dominant source identification distinction. Also, while the codecs provide some weak distinctions, the influence of video content is marginal. In addition to in-laboratory experiments, a real-world verification for corroborating those observations is also made with commercial streaming service providers. Such long-haul experiments indicate that the end-to-end network conditions between the streaming server and video client can act as an additional influencing factor for traffic analysis towards video stream source identification. Overall, the results suggest the feasibility of TA for unknown video stream source identification with sufficiently diverse video examples.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413608
Sourav Das, O. Turkcu, A. Malik, Pravin Mahajan, Biao Lu
In this paper, we analyze benefits of sliceable photonics based transponders (line modules) compared to designs with discrete optics transponder based solutions (CFP/CFP2 - C form-factor pluggable) in Metro Network. The parameters considered are the cost in terms of number of transponders and power utilization. We assume OTN based network with QPSK and 16QAM modulation schemes for the both. We observed that photonic integration based sliceable transponders (sliceable photonics) is much more advantageous than discrete transponder optics, both running with either QPSK or 16QAM modulation schemes. Finally, we compare the effect of modulation schemes on the efficiency of the network by comparing QPSK and 16QAM in discrete transponder optics and show that 16QAM in discrete transponder optics makes the network more inefficient.
{"title":"Benefits of sliceable photonic based transponders in metro networks","authors":"Sourav Das, O. Turkcu, A. Malik, Pravin Mahajan, Biao Lu","doi":"10.1109/ANTS.2015.7413608","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413608","url":null,"abstract":"In this paper, we analyze benefits of sliceable photonics based transponders (line modules) compared to designs with discrete optics transponder based solutions (CFP/CFP2 - C form-factor pluggable) in Metro Network. The parameters considered are the cost in terms of number of transponders and power utilization. We assume OTN based network with QPSK and 16QAM modulation schemes for the both. We observed that photonic integration based sliceable transponders (sliceable photonics) is much more advantageous than discrete transponder optics, both running with either QPSK or 16QAM modulation schemes. Finally, we compare the effect of modulation schemes on the efficiency of the network by comparing QPSK and 16QAM in discrete transponder optics and show that 16QAM in discrete transponder optics makes the network more inefficient.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/ANTS.2015.7413616
A. Mondal, S. Misra
In this paper, the problem of green electric vehicle energy networks management is studied using a non-cooperative Stackelberg game theoretic model. The micro-grid acts as the leader, and needs to decide the price per unit energy based on the amount of energy requested by the plug-in hybrid electric vehicles (PHEVs) for charging and the amount of energy to be requested to each PHEV for discharging, respectively. On the other hand, the PHEVs act as the followers, and need to decide the amount energy to be consumed and the price per unit energy for charging and discharging, respectively, in order to reduce CO2 emission, i.e., using green energy. Using the proposed electric vehicle energy networks management (EVENT) scheme, there exists Nash equilibrium solution for charging and discharging, and the satisfaction factors are high using proposed EVENT scheme.
{"title":"Game-theoretic green electric vehicle energy networks management in smart grid","authors":"A. Mondal, S. Misra","doi":"10.1109/ANTS.2015.7413616","DOIUrl":"https://doi.org/10.1109/ANTS.2015.7413616","url":null,"abstract":"In this paper, the problem of green electric vehicle energy networks management is studied using a non-cooperative Stackelberg game theoretic model. The micro-grid acts as the leader, and needs to decide the price per unit energy based on the amount of energy requested by the plug-in hybrid electric vehicles (PHEVs) for charging and the amount of energy to be requested to each PHEV for discharging, respectively. On the other hand, the PHEVs act as the followers, and need to decide the amount energy to be consumed and the price per unit energy for charging and discharging, respectively, in order to reduce CO2 emission, i.e., using green energy. Using the proposed electric vehicle energy networks management (EVENT) scheme, there exists Nash equilibrium solution for charging and discharging, and the satisfaction factors are high using proposed EVENT scheme.","PeriodicalId":347920,"journal":{"name":"2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130296171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}