Swarm Optimization based Radio Resource Allocation for Dense Devices D2D Communication
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 6
Abstract
In Device to Device (D2D) communication two or more devices communicate directly with each other in the in-band cellular network. It enhances the spectral efficiency due to cellular radio resources (RR) are shared among the cellular users and D2D users. If the RR sharing is not legitimate properly, it causes interference and inefficient use. Therefore, management of RR between cellular users and D2D users is required to control the interference and inefficient use of RR. In D2D enabled cellular network, D2D users have a good signal to noise ratio (SNR) compared with cellular users due to the short distances and dedicated path. Using this advantage, an efficient RR allocation algorithm based on swarm optimization is proposed in this paper, that allows utmost spatial reuse in multi-users and OFDMA networks. The algorithm determines the required RR on the request of D2D users following the indicator variable. It enhances the capacity (Bit/Hz), overall system throughput and spectral efficiency with respect to sub-carriers in OFDMA networks. The performance of the proposed algorithm is evaluated via MATLAB simulations.
Authors and Affiliations
O. Hayat, R. Ngah, Siti Z. Mohd Hashim
SmileToPhone: A Mobile Phone System for Quadriplegic Users Controlled by EEG Signals
Quadriplegic people are unable to use mobile devices without the aid of other persons which can be devastating for them both socially and economically. This has motivated many researchers to propose hardware and software...
A Qualitative Comparison of NoSQL Data Stores
Due to the proliferation of big data with large volume, velocity, complexity, and distribution among remote servers, it became obvious that traditional relational databases are unsuitable for meeting the requirements of...
Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things
The Internet of Things (IoT) is now destroying the barriers between the real and digital worlds. However, one of the huge problems that can slow down the development of this global wave, or even stop it, concerns securit...
The Impact of Black-Hole Attack on ZRP Protocol
lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to sever...
Fast and Efficient In-Memory Big Data Processing
With the passage of time, the data is growing exponentially and the mostly endured areas are social media networks, media hosting applications, and servers. They have thousands of Tera-bytes of data and the efficient sys...