5,229 research outputs found
Communication in a Poisson Field of Interferers -- Part I: Interference Distribution and Error Probability
We present a mathematical model for communication subject to both network
interference and noise. We introduce a framework where the interferers are
scattered according to a spatial Poisson process, and are operating
asynchronously in a wireless environment subject to path loss, shadowing, and
multipath fading. We consider both cases of slow and fast-varying interferer
positions. The paper is comprised of two separate parts. In Part I, we
determine the distribution of the aggregate network interference at the output
of a linear receiver. We characterize the error performance of the link, in
terms of average and outage probabilities. The proposed model is valid for any
linear modulation scheme (e.g., M-ary phase shift keying or M-ary quadrature
amplitude modulation), and captures all the essential physical parameters that
affect network interference. Our work generalizes the conventional analysis of
communication in the presence of additive white Gaussian noise and fast fading,
allowing the traditional results to be extended to include the effect of
network interference. In Part II of the paper, we derive the capacity of the
link when subject to network interference and noise, and characterize the
spectrum of the aggregate interference.Comment: To appear in IEEE Transactions on Wireless Communication
Device-To-Device Wireless Communications
The main topic investigated in this thesis is related to characterization of the performance of D2D wireless networks. Given this broad objective, analytical framework models based on stochastic geometry have been proposed. One of them deals with the study of the coverage probability of both cellular networks and D2D networks whereas the others are related to dynamic mobility models in which the effects of blockages on the link lifetime have been studied. On the other hand, the experimental activity based on UWB using passive tags has been presented in which a localization system based on the ultra-wideband (UWB) technology and high-level architectures to improve the cyclists safety has been proposed
Left-Right Organizer Flow Dynamics: How Much Cilia Activity Reliably Yields Laterality?
SummaryInternal organs are asymmetrically positioned inside the body. Embryonic motile cilia play an essential role in this process by generating a directional fluid flow inside the vertebrate left-right organizer. Detailed characterization of how fluid flow dynamics modulates laterality is lacking. We used zebrafish genetics to experimentally generate a range of flow dynamics. By following the development of each embryo, we show that fluid flow in the left-right organizer is asymmetric and provides a good predictor of organ laterality. This was tested in mosaic organizers composed of motile and immotile cilia generated by dnah7 knockdowns. In parallel, we used simulations of fluid dynamics to analyze our experimental data. These revealed that fluid flow generated by 30 or more cilia predicts 90% situs solitus, similar to experimental observations. We conclude that cilia number, dorsal anterior motile cilia clustering, and left flow are critical to situs solitus via robust asymmetric charon expression
A survey on web tracking: mechanisms, implications, and defenses
Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, the people they contact, and the products they buy. This information is mostly used for commercial purposes, which go far beyond targeted advertising. Although many users are already aware of the privacy risks involved in the use of internet services, the particular methods and technologies used for tracking them are much less known. In this survey, we review the existing literature on the methods used by web services to track the users online as well as their purposes, implications, and possible user's defenses. We present five main groups of methods used for user tracking, which are based on sessions, client storage, client cache, fingerprinting, and other approaches. A special focus is placed on mechanisms that use web caches, operational caches, and fingerprinting, as they are usually very rich in terms of using various creative methodologies. We also show how the users can be identified on the web and associated with their real names, e-mail addresses, phone numbers, or even street addresses. We show why tracking is being used and its possible implications for the users. For each of the tracking methods, we present possible defenses. Some of them are specific to a particular tracking approach, while others are more universal (block more than one threat). Finally, we present the future trends in user tracking and show that they can potentially pose significant threats to the users' privacy.Peer ReviewedPostprint (author's final draft
- …