47,410 research outputs found
Matching Users' Preference Under Target Revenue Constraints in Optimal Data Recommendation Systems
This paper focuses on the problem of finding a particular data recommendation
strategy based on the user preferences and a system expected revenue. To this
end, we formulate this problem as an optimization by designing the
recommendation mechanism as close to the user behavior as possible with a
certain revenue constraint. In fact, the optimal recommendation distribution is
the one that is the closest to the utility distribution in the sense of
relative entropy and satisfies expected revenue. We show that the optimal
recommendation distribution follows the same form as the message importance
measure (MIM) if the target revenue is reasonable, i.e., neither too small nor
too large. Therefore, the optimal recommendation distribution can be regarded
as the normalized MIM, where the parameter, called importance coefficient,
presents the concern of the system and switches the attention of the system
over data sets with different occurring probability. By adjusting the
importance coefficient, our MIM based framework of data recommendation can then
be applied to system with various system requirements and data
distributions.Therefore,the obtained results illustrate the physical meaning of
MIM from the data recommendation perspective and validate the rationality of
MIM in one aspect.Comment: 36 pages, 6 figure
Tactical communication systems based on civil standards: Modeling in the MiXiM framework
In this paper, new work is presented belonging to an ongoing study, which
evaluates civil communication standards as potential candidates for the future
military Wide Band Waveforms (WBWFs). After an evaluation process of possible
candidates presented in [2], the selection process in [1] showed that the IEEE
802.11n OFDM could be a possible military WBWF candidate, but it should be
further investigated first in order to enhance or even replace critical
modules. According to this, some critical modules of the physical layer has
been further analyzed in [3] regarding the susceptibility of the OFDM signal
under jammer influences. However, the critical modules of the MAC layer (e.g.,
probabilistic medium access CSMA/CA) have not been analysed. In fact, it was
only suggested in [2] to replace this medium access by the better suited
Unified Slot Allocation Protocol - Multiple Access (USAP-MA) [4]. In this
regard, the present contribution describes the design paradigms of the new MAC
layer and explains how the proposed WBWF candidate has been modelled within the
MiXiM Framework of the OMNeT++ simulator.Comment: Published in: A. F\"orster, C. Sommer, T. Steinbach, M. W\"ahlisch
(Eds.), Proc. of 1st OMNeT++ Community Summit, Hamburg, Germany, September 2,
2014, arXiv:1409.0093, 201
Dependability in Aggregation by Averaging
Aggregation is an important building block of modern distributed
applications, allowing the determination of meaningful properties (e.g. network
size, total storage capacity, average load, majorities, etc.) that are used to
direct the execution of the system. However, the majority of the existing
aggregation algorithms exhibit relevant dependability issues, when prospecting
their use in real application environments. In this paper, we reveal some
dependability issues of aggregation algorithms based on iterative averaging
techniques, giving some directions to solve them. This class of algorithms is
considered robust (when compared to common tree-based approaches), being
independent from the used routing topology and providing an aggregation result
at all nodes. However, their robustness is strongly challenged and their
correctness often compromised, when changing the assumptions of their working
environment to more realistic ones. The correctness of this class of algorithms
relies on the maintenance of a fundamental invariant, commonly designated as
"mass conservation". We will argue that this main invariant is often broken in
practical settings, and that additional mechanisms and modifications are
required to maintain it, incurring in some degradation of the algorithms
performance. In particular, we discuss the behavior of three representative
algorithms Push-Sum Protocol, Push-Pull Gossip protocol and Distributed Random
Grouping under asynchronous and faulty (with message loss and node crashes)
environments. More specifically, we propose and evaluate two new versions of
the Push-Pull Gossip protocol, which solve its message interleaving problem
(evidenced even in a synchronous operation mode).Comment: 14 pages. Presented in Inforum 200
NOMA Assisted Wireless Caching: Strategies and Performance Analysis
Conventional wireless caching assumes that content can be pushed to local
caching infrastructure during off-peak hours in an error-free manner; however,
this assumption is not applicable if local caches need to be frequently updated
via wireless transmission. This paper investigates a new approach to wireless
caching for the case when cache content has to be updated during on-peak hours.
Two non-orthogonal multiple access (NOMA) assisted caching strategies are
developed, namely the push-then-deliver strategy and the push-and-deliver
strategy. In the push-then-deliver strategy, the NOMA principle is applied to
push more content files to the content servers during a short time interval
reserved for content pushing in on-peak hours and to provide more connectivity
for content delivery, compared to the conventional orthogonal multiple access
(OMA) strategy. The push-and-deliver strategy is motivated by the fact that
some users' requests cannot be accommodated locally and the base station has to
serve them directly. These events during the content delivery phase are
exploited as opportunities for content pushing, which further facilitates the
frequent update of the files cached at the content servers. It is also shown
that this strategy can be straightforwardly extended to device-to-device
caching, and various analytical results are developed to illustrate the
superiority of the proposed caching strategies compared to OMA based schemes
A 2.4-GHz, 2.2-W, 2-V fully-integrated CMOS circular-geometry active-transformer power amplifier
A 2.4-GHz, 2.2-W, 2-V fully integrated circular geometry power amplifier with 50 Ω input and output matching is fabricated using 2.5V, 0.35 pm CMOS transistors. It can also produce 450mW using a 1V supply. Harmonic suppression is 64dB or better. An on-chip circular-geometry active-transformer is used to combine several push-pull low-voltage amplifiers efficiently to produce a larger output power while maintaining a 50 Ω match. This new on-chip power combining and impedance matching method uses virtual ac grounds and magnetic couplings extensively to eliminate the need for any off-chip component such as wirebonds. It also desensitizes the operation of the amplifier to the inductance of bonding wires and makes the design more reproducible. This new topology makes possible a fully-integrated 2.2W, 2.4GHz, low voltage CMOS power amplifier for the first time
- âŠ