An Abstract of the Thesis of Title: Malicious-proof and Fair Credit-based Resource Allocation Techniques for Dsa Systems Malicious-proof and Fair Credit-based Resource Allocation Techniques for Dsa Systems

نویسندگان

  • Bechir Hamdaoui
  • Tamara AlShammari
چکیده

approved: Bechir Hamdaoui In this paper, we propose a credit-based resource allocation technique for dynamic spectrum access (DSA) systems that is robust against malicious and sel sh behaviors and ensures good overall system fairness performance while also allowing spectrum users to achieve high amounts of service. We also propose a new objective function that, when combined with the proposed credit-based technique, leads to further improvements of the system fairness performance. Our proposed techniques overcome user misbehavior by masking the impact of the users' pursued private objectives on the overall system performance. They also improve fairness among users by allocating service to users adaptively by accounting for how much service each user has received in the past. Our simulation results show that our proposed techniques maintain high system performance by allowing users to achieve high amounts of service and by ensuring fair allocation of spectrum resources among users even in the presence of misbehaved users. Using simulations, we also show that these high performances are also achievable under various di erent network scenarios. Tamara AlShammari for the degree of Master of Science in Electrical and Computer Engineering presented on July 17, 2014.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wesley RESOURCE ALLOCATION AND PRICING FOR QOS MANAGEMENT IN COMPUTER NETWORKS

Fulp, Errin Wesley RESOURCE ALLOCATION AND PRICING FOR QOS MANAGEMENT IN COMPUTER NETWORKS. (Under the direction of Douglas S. Reeves) Computer networks must accommodate a wide variety of applications, ranging from simple file transfer programs to complex multimedia applications. Many of these applications require certain Quality of Service (QoS) guarantees for their proper operation. QoS guara...

متن کامل

Performance of Multi-beam Satellite Systems With A New Bandwidth Sharing Algorithm

An efficient resource allocation is important to guarantee the best performance with a fair distribution of multi-beam satellite capacity to provide satellite multimedia and broadcasting services. In this way, available bandwidth and capacity problems in new satellite system likes Multi-Input-Multi-Output (MIMO), exploring new techniques for enhancing spectral efficiency in satellite communicat...

متن کامل

A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain

This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their performance. Thus, NOMA users can achieve rates higher than, or equal to, the rates obtained with the convent...

متن کامل

Resource allocation based on DEA for distance improvement to MPSS points considering environmental factors

This paper proposes a new resource allocation model which is based on data envelopment analysis (DEA) and concerns systems with several homogeneous units operating under supervision of a central unit. The previous studies in DEA literature deal with reallocating/allocating organizational resource to improve performance or maximize the total amount of outputs produced by individual units. In tho...

متن کامل

Providing a Method to Identify Malicious Users in Electronic Banking System Using Fuzzy Clustering Techniques

Money-Laundering causes a higher prevalence of crime and reduces the desire tending to invest in productive activities. Also, it leads to weaken the integrity of financial markets and decrease government control over economic policy. Banks are able to prevent theft, fraud, money laundering conducted by customers through identification of their clients’ behavioral characteristics. This leads to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014