Browse ORBi

- What it is and what it isn't
- Green Road / Gold Road?
- Ready to Publish. Now What?
- How can I support the OA movement?
- Where can I learn more?

ORBi

Index assignment for multiple description repair in distributed storage systems Kapetanovic, Dzevdan ; Chatzinotas, Symeon ; Ottersten, Björn in ICC 2014 (2014) Distributed storage systems have been receiving increasing attention lately due to the developments in cloud and grid computing. Furthermore, a major part of the stored information comprises of multimedia ... [more ▼] Distributed storage systems have been receiving increasing attention lately due to the developments in cloud and grid computing. Furthermore, a major part of the stored information comprises of multimedia, whose content can be communicated even with a lossy (non-perfect) reconstruction. In this context, Multiple Description Lattice Quantizers (MDLQ) can be employed to encode such sources for distributed storage and store them across distributed nodes. Their inherent properties yield that having access to all nodes gives perfect reconstruction of the source, while the reconstruction quality decreases gracefully with fewer available nodes. If a set of nodes fails, lossy repair techniques could be applied to reconstruct the failed nodes from the available ones. This problem has mostly been studied with the lossless (perfect) reconstruction assumption. In this work, a general model, Multiple Description Lattice Quantizer with Repairs (MDLQR), is introduced that encompasses the lossy repair problem for distributed storage applications. New performance measures and repair techniques are introduced for MDLQR, and a non-trivial identity is derived, which is related to other results in the literature. This enables us to find the optimal encoder for a certain repair technique used in the MDLQR. Furthermore, simulation results are used to evaluate the performance of the different repair techniques. © 2014 IEEE. [less ▲] Detailed reference viewed: 167 (0 UL)Detection of Pilot Contamination Attack Using Random Training and Massive MIMO Kapetanovic, Dzevdan ; Zheng, Gan ; et al in IEEE Personal Indoor, Mobile and Radio Conference (PIMRC) 2013 (2013, September 09) Channel estimation attacks can degrade the performance of the legitimate system and facilitate eavesdropping. It is known that pilot contamination can alter the legitimate transmit precoder design and ... [more ▼] Channel estimation attacks can degrade the performance of the legitimate system and facilitate eavesdropping. It is known that pilot contamination can alter the legitimate transmit precoder design and strengthen the quality of the received signal at the eavesdropper, without being detected. In this paper, we devise a technique which employs random pilots chosen from a known set of phase-shift keying (PSK) symbols to detect pilot contamination. The scheme only requires two training periods without any prior channel knowledge. Our analysis demonstrates that using the proposed technique in a massive MIMO system, the detection probability of pilot contamination attacks can be made arbitrarily close to 1. Simulation results reveal that the proposed technique can significantly increase the detection probability and is robust to noise power as well as the eavesdropper’s power. [less ▲] Detailed reference viewed: 190 (1 UL)Secondary User Scheduling Under Throughput Guarantees for the Primary Network Kapetanovic, Dzevdan ; ; Chatzinotas, Symeon et al in IEEE Vehicular Technology Conference (VTC), Fall 2013 (2013, September 02) This work addresses scheduling in a cognitive radio scenario where a minimum throughput for the downlink primary network (PN) is guaranteed to each user with an associated violation probability ... [more ▼] This work addresses scheduling in a cognitive radio scenario where a minimum throughput for the downlink primary network (PN) is guaranteed to each user with an associated violation probability (probability of not obtaining the guaranteed throughput). The primary network is surrounded by multiple downlink secondary networks, each aiming to maximize its network throughput. Scheduling in PN is performed independent of the secondary networks. Some information about the PN is available at the central scheduler that is responsible for scheduling the secondary networks. The contribution of this work is to apply a novel scheduler to the PN which is more robust to QoS degradations resulting from the secondary networks than other state of the art schedulers. This is validated by numerical simulations of the cognitive radio network. [less ▲] Detailed reference viewed: 180 (1 UL)Optimal Two-Dimensional Lattices for Precoding of Linear Channels Kapetanovic, Dzevdan ; ; et al in IEEE Transactions on Wireless Communications (2013), 12(5), 2104-2113 Consider the communication system model y = HFx+n, where H and F are the channel and precoder matrices, x is a vector of data symbols drawn from some lattice-type constellation, such as M-QAM, n is an ... [more ▼] Consider the communication system model y = HFx+n, where H and F are the channel and precoder matrices, x is a vector of data symbols drawn from some lattice-type constellation, such as M-QAM, n is an additive white Gaussian noise vector and y is the received vector. It is assumed that both the transmitter and the receiver have perfect knowledge of the channel matrix H and that the transmitted signal Fx is subject to an average energy constraint. The columns of the matrix HF can be viewed as the basis vectors that span a lattice, and we are interested in the precoder F that maximizes the minimum distance of this lattice. This particular problem remains open within the theory of lattices and the communication theory. This paper provides the complete solution for any nonsingular M ×2 channel matrix H. For real-valued matrices and vectors, the solution is that HF spans the hexagonal lattice. For complex-valued matrices and vectors, the solution is that HF, when viewed in four-dimensional real-valued space, spans the Schlafli lattice D4. [less ▲] Detailed reference viewed: 121 (1 UL)Maximizing Minimum Throughput Guarantees: The Small Violation Probability Region Butt, Majid ; Kapetanovic, Dzevdan ; Ottersten, Björn in IEEE Wireless Communications Letters (2013) Providing minimum throughput guarantees is one of the goals for radio resource allocation schemes. It is difficult to provide these guarantees without defining violation probability due to limited power ... [more ▼] Providing minimum throughput guarantees is one of the goals for radio resource allocation schemes. It is difficult to provide these guarantees without defining violation probability due to limited power budget and rapidly changing conditions of the wireless channel. For every practical scheduling scheme, there is a feasibility region defined by the minimum guaranteed throughput and the corresponding probability that the users fail to get the guaranteed throughput (violation probability). In this work, we focus on minimizing the violation probability specifically in the small probability region. We compare our results with major schedulers available in literature and show that our scheme outperforms them in the small violation probability region. [less ▲] Detailed reference viewed: 239 (12 UL) |
||