Principal Pivot Transforms on Radix -2 DFT type Matrices

  • Alloum A.
  • Sian-Jheng Lin
  • Tareq Al-Naffouri

In this paper, we discuss the principal pivot transforms (PPT) on a family of matrices, called the radix-2 DFTtype matrices. Given a transformation matrix, the PPT of the matrix is a transformation matrix with exchanging some entries between the input array and the output array. The radix- 2 DFT-type matrices ...

Coded Caching with Linear Subpacketization is Possible using Ruzsa-Szemeredi Graphs

  • Dimakis A.
  • Shanmugam K.
  • Tulino A.

Coded caching is a problem where encoded broadcasts are used to satisfy users requesting popular files and having caching capabilities. Recent work by Maddah-Ali and Niesen showed that it is possible to satisfy a scaling number of users with only a constant number of broadcast transmissions by exploiting coding and ...

Probabilistic Shaping via Non-Binary Codes

  • Jardel F.
  • Joseph J. Boutros
  • Measson C.

Shaping refers to engineering methods that adapt the signal distribution to a communication channel for increased efficiency. Recently, shaping methods have regained interest especially in optical communications where current technologies operate close the fundamental limits of the linear fiber channel model. Probabilistic amplitude shaping (PAS) has been proposed in [1] ...

Compressed Sensing of Compressible Signals

  • Beygi S.
  • Jalali S.
  • Maleki A.
  • Mitra U.

We present a novel and general approach that elevates the scope of compressed sensing recovery algorithms far beyond simple structures such as sparsity. The proposed method, referred to as compressionbased gradient descent (C-GD), is capable of employing state-of-the-art compression algorithms to solve structured signal recovery problems. This enables CGD to ...

Characterization of degrees of freedom versus receivers backhaul load in K-user interference channel

  • Kananian B.
  • Khalaj B.
  • Maddah-Ali M.
  • Shariatpanahi S.

We consider a K-user Interference Channel where each transmitter is interested in conveying a message to its corresponding receiver. In addition, we assume a fully connected noiseless backhaul network through which receivers can collaborate and help each other recover their desired messages. In this paper, we fully characterize the trade-off ...

On time-bandwidth product of multi-soliton pulses

  • Aref V.
  • Bulow H.
  • Span A.
  • Ten Brink S.

Multi-soliton pulses are potential candidates for fiber optical transmission where the information is modulated and recovered in the so-called nonlinear Fourier domain. While this is an elegant technique to account for the channel nonlinearity, the obtained spectral efficiency, so far, is not competitive with the classic Nyquist-based schemes. In this ...

The exact rate-memory tradeoff for caching with uncoded prefetching

  • Avestimehr A.
  • Maddah-Ali M.
  • Yu Q.

We consider a cache network, where a single server is connected to multiple users via a shared bottleneck link. The server has a set of files, which can be cached by each user in a prefetching phase. In a following delivery phase, each user requests a file and the server ...

Tablevisor 2.0: Towards full-featured, scalable and hardware-independent multi table processing

  • Bauer R.
  • Gebert S.
  • Geissler S.
  • Herrnleben S.
  • Jarschel M.
  • Zinner T.

Modern Software Defined Networking (SDN) applications rely on sophisticated packet processing. However, there is a mismatch between control plane requirements and data plane capabilities caused by increasing hardware heterogeneity. To overcome this challenge, we propose TableVisor, a proxy-layer for the OpenFlow control channel that enables the flexible and scalable abstraction ...

The Era of 5G and Its Impacts on EMC Design and Testing

  • Yu Q.

It is part of presentation in Workshop "Equipment & System Design for EMC" at 2017 IEEE International Symposium on EMC, Washington, D.C. The presentation agenda is: 5G Era - Coming, What is 5G?, What are 5G Capabilities?, What are 5G Performance Requirements?, What is mmWave?, Why use mmWave spectrum?, 5G ...

POUX: Performance Optimization Strategy for Cloud Platforms Based on User Experience

  • Guo Z.
  • Liu Y.
  • Qiu Z.
  • Sun Y.
  • Wang Y.

Cloud computing has been widely used in almost every areas of our life. System virtualization is one of the key technologies in cloud computing. However, it is a great challenge to achieve a balance among the virtual machines (VMs) in different physical machines (PMs) by migrating overloaded VMs to underloaded ...

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

5G US Spectrum Development , Products and mmWave Testing Including Measurements of Fixed Satellite Service (FSS) Earth Station Spillover Emissions.

  • Majkowski W.

The 5G shared spectrum for mobile wireless above 24 GHz was authorized by the FCC. This paper traces the development of the shared spectrum authorization, testing issues, 5G goals and interference measurements of Fixed Satellite Service (FSS) Earth Station Spillover Emissions.

Chirp Management in Silicon-Graphene Electro Absorption Modulators

  • Asselbergs I.
  • Contestabile G.
  • D'Errico A.
  • Galli P.
  • Huyghebaerts C.
  • Midrio M.
  • Pantouvaki M.
  • Romagnoli M.
  • Sorianello V.
  • Van Campenhout J.

We study the frequency chirp properties of Graphene-on- Silicon electro-absorption modulators (EAMs). By experimentally measuring the chirp of a 100 um long single layer Graphene EAM, we show that the optoelectronic properties of Graphene induce a large positive linear chirp (up to 1.8 GHz) on the optical signal generated by ...

Wireless MIMO Base Station Near and Far Field Measurement Challenges

  • Moongilan D.

Wireless communication systems use Multiple Input Multiple Output-antenna techniques to increase coverage, data throughput and spectral efficiency. Often beam forming techniques are used to provide additional antenna gain relative to Single Input Single Output systems. Regulatory compliance radiated emissions tests for wireless devices are performed using a single measurement antenna ...

The era of 5G and its impacts on EMC design and testing

  • Yu Q.

Agenda â?¢ 5G Era â?" Coming â?¢ What is 5G? â?¢ What are 5G Capabilities? â?¢ What are 5G Performance Requirements?

Service-tailored User-Plane Design Framework and Architecture Considerations in 5G Radio Access Networks

  • Gebert J.
  • Venkatasubramanian V.

This paper presents a novel user plane framework, tailored for different 5G services with diverse and conflicting key performance requirements (KPIs). Subsequently, the paper discusses how various user plane design decisions related to the functional split options, multi-connectivity aspects, control / user plane split options and network slicing can potentially ...

Security Trust Zone in 5G networks

  • Bin Han
  • Dohler M.
  • Mannweiler C.
  • Schotten H.
  • Stan Wong

Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds. We propose a novel architectural security solution that applies to 5G networks. It is called ...

Automation framework design to enhance the capabilities of IMS functional testing

The paper deals with the design of a Robot based automation framework that can be used for the enhancement of the capabilities and standards of an enterprise functional testing. The paper firstly introduces IMS (IP Multimedia Subsystems) and the necessity to build an end-to-end framework for functional testing. The protocol ...

NFV: Security Threats and Best Practices

  • Dutta A.
  • Lal S.
  • Taleb T.

Network function virtualization (NFV) yields numerous benefits, particularly the possibility of a cost-efficient transition of telco hardware functionalities on the software platform to break the vendor lock-in problem. These benefits come at the price of some security flaws. Indeed, with NFV, virtual mobile networks become vulnerable to a number of ...

Effective Design of Multi-User Reception and Fronthaul Rate Allocation in 5G Cloud RAN

  • Boviz D.
  • Chen C.
  • Yang S.

Cloud Radio Access Network (C-RAN) is becoming more than ever timely in 5G for dense network deployments, but its design has to be adapted to 5G requirements. To ensure high uplink throughput in cell-edge regions affected by inter-cell interference, C-RAN enables multi-user reception techniques among cells. In this paper, we ...