The idea of wirelessly connected vehicles has long ceased to be a vision as researchers from both academic and industrial institutions and field operational tests all over the world are contributing to bringing this t...
详细信息
ISBN:
(纸本)9781479907472
The idea of wirelessly connected vehicles has long ceased to be a vision as researchers from both academic and industrial institutions and field operational tests all over the world are contributing to bringing this technology to life. Both ETSI and IEEE have been working on respective standards (ETSI ITS G5 in Europe, IEEE WAVE in North America) to enable this new application of wireless communication. In this paper we compare medium access in these systems by means of an extensive simulation study while focusing on the transmission of periodic safety messages on the control channel. We observe that for different reasons high node density scenarios appear to be critical for the overall performance of both systems. This includes end-to-end delay, packet error rates and a non-optimal channel utilization that leaves room for improvement. We find that the approach proposed by ETSI ITS G5 with Decentralized Congestion Control (DCC) may access the channel rather conservatively but still outperforms IEEE WAVE in most of the scenarios.
We derive an exact formula of geometric measure of quantum discord (GMQD) for an arbitrary 3-qubit state. The dynamics of GMQD in a quantum spin system coupled to a thermal bath is studied by simulation and analytical...
详细信息
We derive an exact formula of geometric measure of quantum discord (GMQD) for an arbitrary 3-qubit state. The dynamics of GMQD in a quantum spin system coupled to a thermal bath is studied by simulation and analytical approximation. It is found that tripartite quantum discord has distinct time behaviors within two different eigenspaces. Further, we extend the square norm distance to define tripartite geometric quantifiers of total and classical correlations. We obtain their explicit expressions and discuss the possibility of having a closed additive relation among various kinds of correlations during the dynamical evolution.
Among all SLAs(Service Level Agreements) about network resources in the cloud, a critical problem would be achieving bandwidth guarantee under all communication environment (e.g., when misbehaved VMs exist) while keep...
详细信息
We propose a pipeline structure for Schnorr-Euchner sphere decoding algorithm in this article. It divides the search tree of the original algorithm into blocks and executes the search from block to block. When one blo...
详细信息
We propose a pipeline structure for Schnorr-Euchner sphere decoding algorithm in this article. It divides the search tree of the original algorithm into blocks and executes the search from block to block. When one block search of a signal is over, the part in the pipeline structure that processes this block search can load another signal and search. Several signals can be processed at the same time in one pipeline. Blocks are arranged to lower the whole complexity in the way that the previously search blocks are the blocks those have more probability to generate the final solution. Simulation experiment results show the average process delay can drop to the range from 48.77% to 60.18% in a 4-by-4 antenna system with 16QAM modulation, or from 30.31% to 61.59% in a 4-by-4 antenna system with 64QAM modulation.
We report on stable transfer of microwave frequency over 100km lab fiber at the fractional stability of 1.5×10-13/1s. A new scheme of round-trip phase noise detection based on an extended optical frequency comb i...
详细信息
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...
详细信息
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
We propose a pipeline structure for Schnorr-Euchner sphere decoding algorithm in this article. It divides the search tree of the original algorithm into blocks and executes the search from block to block. When one blo...
详细信息
We propose a pipeline structure for Schnorr-Euchner sphere decoding algorithm in this article. It divides the search tree of the original algorithm into blocks and executes the search from block to block. When one block search of a signal is over, the part in the pipeline structure that processes this block search can load another signal and search. Several signals can be processed at the same time in one pipeline. Blocks are arranged to lower the whole complexity in the way that the previously search blocks are the blocks those have more probability to generate the final solution. Simulation experiment results show the average process delay can drop to the range from 48.77% to 60.18% in a 4-by-4 antenna system with 16QAM modulation, or from 30.31% to 61.59% in a 4-by-4 antenna system with 64QAM modulation.
The topology of delay-tolerant network (DTN) changes frequently. The whole network is disconnected and there exists no end-to-end path for messages. We need a kind of mechanism called store-carry-forward to overcome t...
详细信息
The topology of delay-tolerant network (DTN) changes frequently. The whole network is disconnected and there exists no end-to-end path for messages. We need a kind of mechanism called store-carry-forward to overcome this fault in DTN. However, traditional end-to-end routing protocols do not meet this requirements. Researchers developed many kinds of DTN routing protocols and different routing protocol fits different application characteristics. Because of the variable application characteristics, we should choose suitable routing protocols according to application requirements. For example, if the current traffic is heavy or the size of the message is too big, we should use routing protocols with small copy number, if the transmission is emergent, we should use routing protocols with short delay. This paper proposes the concept of adaptive routing, meaning choosing routing protocols based on application characteristics in DTN. We develop an adaptive routing scheme according to particular requirements, history network information and current network conditions in network scenarios and validate that with adaptive routing scheme the network performances improve a lot in many aspects, such as delay, overhead and delivery through simulations.
Mobile devices, in particular smartphones, are battery powered. As their small size limits their energy capacity, an intelligent and energy-saving use of resources is crucial for the mobile user experience. Especially...
详细信息
Mobile devices, in particular smartphones, are battery powered. As their small size limits their energy capacity, an intelligent and energy-saving use of resources is crucial for the mobile user experience. Especially energy saving while sending and receiving data becomes important due to the always-on nature of smartphones. One solution for a sophisticated resource usage in wireless access networks is to tailor resource management to applications. The advantage of such mechanisms is to be able to address both the perceived quality of the users and the energy consumption of mobile devices at the same time. We propose several traffic scheduling algorithms for HTTP file download in wireless networks based on this application-aware paradigm. The core idea is to use download scheduling that avoids parallel transmissions and, in contrast, favors sequential *** have implemented and measured the algorithms in a wireless mesh network. The evaluation results quantify the gain of an application-aware resource management with respect to quality of experience and energy consumption.
We present the direct short pulse generation and spectrum broadening with ultra-high repetition rate fiber lasers that ensure the long-term stability of frequency combs.
ISBN:
(纸本)9781467364751
We present the direct short pulse generation and spectrum broadening with ultra-high repetition rate fiber lasers that ensure the long-term stability of frequency combs.
暂无评论