Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 5G HetNets (1)
- Authentication (1)
- BBU (1)
- C-Ran (1)
- Computer resource allocation. (1)
-
- Data offloading (1)
- Frequency domain modeling (1)
- Interconnect modeling (1)
- Iterative Loewner method (1)
- LTE (1)
- Large change sensitivity (1)
- Load balancing (1)
- Location Management (1)
- MME pooling (1)
- Noisy frequency responses (1)
- Power consumption (1)
- RRH (1)
- Resource allocation (1)
- SON (1)
- Spectrum sharing (1)
- Tracking Area (TA) (1)
- Tracking Area List (TAL) (1)
- Transient analysis. (1)
- VANET (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Intelligent Advancements In Location Management And C-Ran Power-Aware Resource Allocation, Emad Ali Aqeeli
Electronic Thesis and Dissertation Repository
The evolving of cellular networks within the last decade continues to focus on delivering a robust and reliable means to cope with the increasing number of users and demanded capacity. Recent advancements of cellular networks such as Long-Term Evolution (LTE) and LTE-advanced offer a remarkable high bandwidth connectivity delivered to the users. Signalling overhead is one of the vital issues that impact the cellular behavior. Causing a significant load in the core network hence effecting the cellular network reliability. Moreover, the signaling overhead decreases the Quality of Experience (QoE) of users. The first topic of the thesis attempts to reduce …
Efficiency And Accuracy Enhancement Of Intrusion Detection System Using Feature Selection And Cross-Layer Mechanism, Mahsa Bataghva
Efficiency And Accuracy Enhancement Of Intrusion Detection System Using Feature Selection And Cross-Layer Mechanism, Mahsa Bataghva
Electronic Thesis and Dissertation Repository
The dramatic increase in the number of connected devices and the significant growth of the network traffic data have led to many security vulnerabilities and cyber-attacks. Hence, developing new methods to secure the network infrastructure and protect data from malicious and unauthorized access becomes a vital aspect of communication network design. Intrusion Detection Systems (IDSs), as common widely used security techniques, are critical to detect network attacks and unauthorized network access and thus minimize further cyber-attack damages. However, there are a number of weaknesses that need to be addressed to make reliable IDS for real-world applications. One of the fundamental …
Software-Defined Networking Enabled Resource Management And Security Provisioning In 5g Heterogeneous Networks, Xiaoyu Duan
Software-Defined Networking Enabled Resource Management And Security Provisioning In 5g Heterogeneous Networks, Xiaoyu Duan
Electronic Thesis and Dissertation Repository
Due to the explosive growth of mobile data traffic and the shortage of spectral resources, 5G networks are envisioned to have a densified heterogeneous network (HetNet) architecture, combining multiple radio access technologies (multi-RATs) into a single holistic network. The co-existing of multi-tier architectures bring new challenges, especially on resource management and security provisioning, due to the lack of common interface and consistent policy across HetNets. In this thesis, we aim to address the technical challenges of data traffic management, coordinated spectrum sharing and security provisioning in 5G HetNets through the introduction of a programmable management platform based on Software-defined networking …
Efficient Macromodeling And Fast Transient Simulation Of High Speed Distributed Interconnects, Sadia Wahid
Efficient Macromodeling And Fast Transient Simulation Of High Speed Distributed Interconnects, Sadia Wahid
Electronic Thesis and Dissertation Repository
In the first part of the thesis, an efficient macromodeling technique based on Loewner Matrix (LM) approach has been presented to model multi-port distributed systems using tabulated noisy data. In the proposed method, Loewner Model data from previous rational approximation are used to create less noisy eigenvectors in an iterative manner. As a result, the biasing effect of the LM model approximated by the noisy data is reduced. It is illustrated that this method improves the accuracy of the Loewner Matrix modeling for noisy frequency data.
In the second part, a fast and robust algorithm is introduced for time-domain simulation …