973 research outputs found

    A reusable web hosting control panel with billing system

    Get PDF
    El projecte Ă©s patrocinat per pangea.orgA reusable web hosting control panel with billing system based on Django applications

    Downlink Resource Allocation and Frequency Reuse Schemes for WiMAX Networks

    Get PDF

    User association strategies in HetNets leading to rate balancing under energy constraints

    Get PDF
    This paper deals with the development of several strategies for associating users to base stations (BSs) in heterogeneous networks. These strategies are able to balance the rate among users and BSs and increase the overall network utility. Constraints related to the energy availability at BSs are considered explicitly in the design, assuming that the BSs are equipped with batteries that are recharged through energy harvesting. We develop a general association strategy, and then we present several suboptimum but less complex solutions suitable for scenarios with high mobility or deployments of BSs with low computational capabilities. We also present an implementation that is to be executed in a distributed way among users and BSs without the need of having a central entity gathering all the information. The performance of the proposed strategies is evaluated through simulations in terms of rate balancing and the effect of the energy harvesting capabilities on the network throughput is shown. We also compare the proposed strategies with the traditional max-SINR user association approach.Peer ReviewedPostprint (published version

    Price, inventories, and volatility in the global wheat market

    Get PDF
    The study estimates a conditional mean model for international wheat prices and inventories. Endogenous price volatility and exogenous shocks in the price and inventory series are controlled for in estimation. Redressing the empirical linkage between volatility, prices, and inventories is important because volatility increases returns to inventories, which in turn may imply prices. The problem is also important from the regulator perspective, because publicly funded inventory programs have been traditional measures in stabilizing prices and improving food security by providing a buffer against adverse yield shocks and stock-outs. The structural model underlying the estimating equations is based on a dynamic inventory optimization problem. The data suggest that the price of both wheat and wheat inventories is nonstationary and that they are significantly linked to each other in the short run but do not exhibit a stationary long-run equilibrium relationship. Price volatility is an important determinant in the short-run conditional mean processes for both the price and inventories. The pairwise causal relationships have only one direction each. Inventories imply price volatility, price volatility implies price, and price implies inventories, but not vice versa. The parameter estimates suggest that when inventories decrease, price volatility increases. Thus, low inventories have likely been among the necessary conditions, but have not been a sufficient condition by themselves, for the price surge observed in 2008. The price and inventory movements have a significant negative relationship in the very short run, but it is leveled off over time. A decreasing price implies either inventory build-ups or postponement of inventory withdrawals. Overall, the current and past inventory and price movements are not very valuable in predicting the future price movements, and it is likely that the inventory information announced each month is already in the prices.international price, inventories, volatility, Wheat,

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    Average power contracts can mitigate carbon leakage

    Get PDF
    The progressive relocation of part of the Energy Intensive Industries (EIIs) out of Europe is one of the possible consequences of the combination of emission charges and higher electricity prices entailed by the EU-Emission Trading Scheme (EU-ETS). In order to mitigate this effect, EIIs have asked for special power contracts whereby they would be supplied from dedicated power capacities at average (capacity, fuel, transmission and emission allowance) costs. We model this situation on a prototype power system calibrated on four countries of Central Western Europe. In order to capture the main feature of EIIs' demand, we separate the consumer market in two segments: EIIs and the rest. EIIs buy electricity at average cost price while the rest pays marginal cost. We consider two different types of EIIs' contractual arrangements: a single region wide and zonal average cost prices. We also analyze the cases where generators only rely on existing capacities or can invest in new ones. We find that these average cost contracts can indeed partially mitigate the incentive to relocate activities but with quite diverse regional impacts depending on different national power policies. Models are formulated as a non-monotone complementarity problems with endogenous energy, transmission and allowance prices and are implemented in GAMS.average cost based contracts, carbon leakage, complementarity conditions, EU-ETS.

    Improving Age of Information with Interference Problem in Long-Range Wide Area Networks

    Get PDF
    Low Power Wide Area Networks (LPWAN) offer a promising wireless communications technology for Internet of Things (IoT) applications. Among various existing LPWAN technologies, Long-Range WAN (LoRaWAN) consumes minimal power and provides virtual channels for communication through spreading factors. However, LoRaWAN suffers from the interference problem among nodes connected to a gateway that uses the same spreading factor. Such interference increases data communication time, thus reducing data freshness and suitability of LoRaWAN for delay-sensitive applications. To minimize the interference problem, an optimal allocation of the spreading factor is requisite for determining the time duration of data transmission. This paper proposes a game-theoretic approach to estimate the time duration of using a spreading factor that ensures on-time data delivery with maximum network utilization. We incorporate the Age of Information (AoI) metric to capture the freshness of information as demanded by the applications. Our proposed approach is validated through simulation experiments, and its applicability is demonstrated for a crop protection system that ensures real-time monitoring and intrusion control of animals in an agricultural field. The simulation and prototype results demonstrate the impact of the number of nodes, AoI metric, and game-theoretic parameters on the performance of the IoT network
    • …
    corecore