5,229 research outputs found

    Communication in a Poisson Field of Interferers -- Part I: Interference Distribution and Error Probability

    Full text link
    We present a mathematical model for communication subject to both network interference and noise. We introduce a framework where the interferers are scattered according to a spatial Poisson process, and are operating asynchronously in a wireless environment subject to path loss, shadowing, and multipath fading. We consider both cases of slow and fast-varying interferer positions. The paper is comprised of two separate parts. In Part I, we determine the distribution of the aggregate network interference at the output of a linear receiver. We characterize the error performance of the link, in terms of average and outage probabilities. The proposed model is valid for any linear modulation scheme (e.g., M-ary phase shift keying or M-ary quadrature amplitude modulation), and captures all the essential physical parameters that affect network interference. Our work generalizes the conventional analysis of communication in the presence of additive white Gaussian noise and fast fading, allowing the traditional results to be extended to include the effect of network interference. In Part II of the paper, we derive the capacity of the link when subject to network interference and noise, and characterize the spectrum of the aggregate interference.Comment: To appear in IEEE Transactions on Wireless Communication

    Device-To-Device Wireless Communications

    Get PDF
    The main topic investigated in this thesis is related to characterization of the performance of D2D wireless networks. Given this broad objective, analytical framework models based on stochastic geometry have been proposed. One of them deals with the study of the coverage probability of both cellular networks and D2D networks whereas the others are related to dynamic mobility models in which the effects of blockages on the link lifetime have been studied. On the other hand, the experimental activity based on UWB using passive tags has been presented in which a localization system based on the ultra-wideband (UWB) technology and high-level architectures to improve the cyclists safety has been proposed

    Left-Right Organizer Flow Dynamics: How Much Cilia Activity Reliably Yields Laterality?

    Get PDF
    SummaryInternal organs are asymmetrically positioned inside the body. Embryonic motile cilia play an essential role in this process by generating a directional fluid flow inside the vertebrate left-right organizer. Detailed characterization of how fluid flow dynamics modulates laterality is lacking. We used zebrafish genetics to experimentally generate a range of flow dynamics. By following the development of each embryo, we show that fluid flow in the left-right organizer is asymmetric and provides a good predictor of organ laterality. This was tested in mosaic organizers composed of motile and immotile cilia generated by dnah7 knockdowns. In parallel, we used simulations of fluid dynamics to analyze our experimental data. These revealed that fluid flow generated by 30 or more cilia predicts 90% situs solitus, similar to experimental observations. We conclude that cilia number, dorsal anterior motile cilia clustering, and left flow are critical to situs solitus via robust asymmetric charon expression

    A survey on web tracking: mechanisms, implications, and defenses

    Get PDF
    Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, the people they contact, and the products they buy. This information is mostly used for commercial purposes, which go far beyond targeted advertising. Although many users are already aware of the privacy risks involved in the use of internet services, the particular methods and technologies used for tracking them are much less known. In this survey, we review the existing literature on the methods used by web services to track the users online as well as their purposes, implications, and possible user's defenses. We present five main groups of methods used for user tracking, which are based on sessions, client storage, client cache, fingerprinting, and other approaches. A special focus is placed on mechanisms that use web caches, operational caches, and fingerprinting, as they are usually very rich in terms of using various creative methodologies. We also show how the users can be identified on the web and associated with their real names, e-mail addresses, phone numbers, or even street addresses. We show why tracking is being used and its possible implications for the users. For each of the tracking methods, we present possible defenses. Some of them are specific to a particular tracking approach, while others are more universal (block more than one threat). Finally, we present the future trends in user tracking and show that they can potentially pose significant threats to the users' privacy.Peer ReviewedPostprint (author's final draft
    • …
    corecore