Search results for "Wire"
showing 10 items of 1383 documents
Joint Sub-Carrier and Power Allocation for Efficient Communication of Cellular UAVs
2020
| openaire: EC/H2020/857031/EU//5G!Drones Cellular networks are expected to be the main communication infrastructure to support the expanding applications of Unmanned Aerial Vehicles (UAVs). As these networks are deployed to serve ground User Equipment (UEs), several issues need to be addressed to enhance cellular UAVs’ services. In this paper, we propose a realistic communication model on the downlink, and we show that the Quality of Service (QoS) for the users is affected by the number of interfering BSs and the impact they cause. The joint problem of sub-carrier and power allocation is therefore addressed. Given its complexity, which is known to be NP-hard, we introduce a solution based …
Humidity-enhanced sub-ppm sensitivity to ammonia of covalently functionalized single-wall carbon nanotube bundle layers
2017
International audience; A low-cost method for carbon nanotubes (CNTs) network production from solutions on flexible polyethylene naphthalate substrates has been adopted to prepare high quality and well characterized SWCNT bundle layers to be used as the active layer in chemiresistor gas sensors. Two types of SWCNTs have been tested: pristine SWCNTs, deposited from a surfactant solution, and covalently functionalized SWCNTs, deposited from a dimethyl-acetamide solution. The humidity effects on the sensitivity of the SWCNTs network to NH3 have been investigated. The results show that relative humidity favors the response to NH3, confirming recent theoretical predictions. The COOH-functionaliz…
Requirements for Energy Efficient Edge Computing: A Survey
2018
Internet of Things is evolving heavily in these times. One of the major obstacle is energy consumption in the IoT devices (sensor nodes and wireless gateways). The IoT devices are often battery powered wireless devices and thus reducing the energy consumption in these devices is essential to lengthen the lifetime of the device without battery change. It is possible to lengthen battery lifetime by efficient but lightweight sensor data analysis in close proximity of the sensor. Performing part of the sensor data analysis in the end device can reduce the amount of data needed to transmit wirelessly. Transmitting data wirelessly is very energy consuming task. At the same time, the privacy and s…
Optimization of Linearized Belief Propagation for Distributed Detection
2020
In this paper, we investigate distributed inference schemes, over binary-valued Markov random fields, which are realized by the belief propagation (BP) algorithm. We first show that a decision variable obtained by the BP algorithm in a network of distributed agents can be approximated by a linear fusion of all the local log-likelihood ratios. The proposed approach clarifies how the BP algorithm works, simplifies the statistical analysis of its behavior, and enables us to develop a performance optimization framework for the BP-based distributed inference systems. Next, we propose a blind learning-adaptation scheme to optimize the system performance when there is no information available a pr…
Modeling and Mitigating Errors in Belief Propagation for Distributed Detection
2021
We study the behavior of the belief-propagation (BP) algorithm affected by erroneous data exchange in a wireless sensor network (WSN). The WSN conducts a distributed multidimensional hypothesis test over binary random variables. The joint statistical behavior of the sensor observations is modeled by a Markov random field whose parameters are used to build the BP messages exchanged between the sensing nodes. Through linearization of the BP message-update rule, we analyze the behavior of the resulting erroneous decision variables and derive closed-form relationships that describe the impact of stochastic errors on the performance of the BP algorithm. We then develop a decentralized distribute…
'Good to Repeat': Making Random Access Near-Optimal with Repeated Contentions
2020
Recent advances on WLAN technology have been focused mostly on boosting network capacity by means of a more efficient and flexible physical layer. A new concept is required at MAC level to exploit fully the new capabilities of the PHY layer. In this article, we propose a contention mechanism based on Repeated Contentions (ReCo) in frequency domain. It provides a simple-to-configure, robust and short-term fair algorithm for the random contention component of the MAC protocol. The throughput efficiency of ReCo is not sensitive to the number of contending stations, so that ReCo does not require adaptive tuning of the access parameters for performance optimization. Efficiency and robustness is …
Intrinsic spin-orbit interaction in diffusive normal wire Josephson weak links: Supercurrent and density of states
2015
We study the effect of the intrinsic (Rashba or Dresselhaus) spin-orbit interaction in superconductor--nanowire--superconductor (SNS) weak links in the presence of a spin-splitting field that can result either from an intrinsic exchange field or the Zeeman effect of an applied field. We solve the full non-linear Usadel equations numerically and analyze the resulting supercurrent through the weak link and the behavior of the density of states in the center of the wire. We point out how the presence of the spin-orbit interaction gives rise to a long-range spin triplet supercurrent, which remains finite even in the limit of very large exchange fields. In particular, we show how rotating the fi…
LoRa interference simulator
2018
This is a simulation tool for testing the performance of a LoRa link in case of collision between LoRa packets modulated with different spreading factors. You can use it for obtaining the results presented in Table 1 of our paper.
Anomaly detection in wireless sensor networks
2016
Wireless Sensor Network can be defined as a network of integrated sensors responsible for environmental sensing, data processing and communication with other sensors and the base station while consuming low power. Today, WSNs are being used in almost every part of life. The cost effective nature of WSNs is beneficial for environmental monitoring, production facilities and security monitoring. At the same time WSNs are vulnerable to security breaches, attacks and information leakage. Anomaly detection techniques are used to detect such activities over the network that do not conform to the normal behavior of the network communication. Supervised Machine learning approach is one way to detect…
Requirements for using simulation to design and assess wireless ATM handover solutions
1999
Wireless ATM (WATM) has been widely considered as a solution for broadband wireless services. Handover is one of the most important mobility support functions in the WATM network. Many handover solutions have been proposed, analysed, and benchmarked. Simulations have been broadly used to assess these solutions. However, there are many dilemmas in how simulation has been applied as a research methodology: heterogeneous simulation systems used, lack of comparison with other related work, biased conclusions, and unavailability of simulation models and systems to researchers. The WATM research community lacks a standard and commonly acceptable methodology for applying simulation. To address thi…