1,943,319 research outputs found
Two Results about Quantum Messages
We show two results about the relationship between quantum and classical
messages. Our first contribution is to show how to replace a quantum message in
a one-way communication protocol by a deterministic message, establishing that
for all partial Boolean functions we
have . This bound was previously
known for total functions, while for partial functions this improves on results
by Aaronson, in which either a log-factor on the right hand is present, or the
left hand side is , and in which also no entanglement is
allowed.
In our second contribution we investigate the power of quantum proofs over
classical proofs. We give the first example of a scenario, where quantum proofs
lead to exponential savings in computing a Boolean function. The previously
only known separation between the power of quantum and classical proofs is in a
setting where the input is also quantum.
We exhibit a partial Boolean function , such that there is a one-way
quantum communication protocol receiving a quantum proof (i.e., a protocol of
type QMA) that has cost for , whereas every one-way quantum
protocol for receiving a classical proof (protocol of type QCMA) requires
communication
Keep Your Nice Friends Close, but Your Rich Friends Closer -- Computation Offloading Using NFC
The increasing complexity of smartphone applications and services necessitate
high battery consumption but the growth of smartphones' battery capacity is not
keeping pace with these increasing power demands. To overcome this problem,
researchers gave birth to the Mobile Cloud Computing (MCC) research area. In
this paper we advance on previous ideas, by proposing and implementing the
first known Near Field Communication (NFC)-based computation offloading
framework. This research is motivated by the advantages of NFC's short distance
communication, with its better security, and its low battery consumption. We
design a new NFC communication protocol that overcomes the limitations of the
default protocol; removing the need for constant user interaction, the one-way
communication restraint, and the limit on low data size transfer. We present
experimental results of the energy consumption and the time duration of two
computationally intensive representative applications: (i) RSA key generation
and encryption, and (ii) gaming/puzzles. We show that when the helper device is
more powerful than the device offloading the computations, the execution time
of the tasks is reduced. Finally, we show that devices that offload application
parts considerably reduce their energy consumption due to the low-power NFC
interface and the benefits of offloading.Comment: 9 pages, 4 tables, 13 figure
An Experiment on Prisoner’s Dilemma with Confirmed Proposals
We apply an alternating proposals protocol with a confirmation stage as a way of solving a Prisoner’s Dilemma game. We interpret players’ proposals and (no) confirmation of outcomes of the game as a tacit communication device. The protocol leads to unprecedented high levels of cooperation in the laboratory. Assigning the power of confirmation to one of the two players alone, rather than alternating the role of a leader significantly increases the probability of signing a cooperative agreement in the first bargaining period. We interpret pre-agreement strategies as tacit messages on players’ willingness to cooperate and on their beliefs about the others’ type.Prisoner’s Dilemma; Bargaining; Confirmed Proposals; Confirmed Agreement; Tacit Communication.
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network
Power management is one of the vital issue in wireless sensor networks, where
the lifetime of the network relies on battery powered nodes. Transmitting at
high power reduces the lifetime of both the nodes and the network. One
efficient way of power management is to control the power at which the nodes
transmit. In this paper, a virtual multiple input multiple output wireless
sensor network (VMIMO-WSN)communication architecture is considered and the
power control of sensor nodes based on the approach of game theory is
formulated. The use of game theory has proliferated, with a broad range of
applications in wireless sensor networking. Approaches from game theory can be
used to optimize node level as well as network wide performance. The game here
is categorized as an incomplete information game, in which the nodes do not
have complete information about the strategies taken by other nodes. For
virtual multiple input multiple output wireless sensor network architecture
considered, the Nash equilibrium is used to decide the optimal power level at
which a node needs to transmit, to maximize its utility. Outcome shows that the
game theoretic approach considered for VMIMO-WSN architecture achieves the best
utility, by consuming less power.Comment: 12 pages, 8 figure
Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications
In this paper, we study a cooperative cognitive radio network (CCRN) where
the secondary user-transmitter (SU-Tx) assists bi-directional communication
between a pair of primary users (PUs) following the principle of two-way
relaying. In return, it gets access to the spectrum of the PUs to enable its
own transmission to SU-receiver (SU-Rx). Further, in order to support
sustainable operation of the network, SU-Tx is assumed to harvest energy from
the RF signals received from the PUs, using the technique of simultaneous
wireless information and power transfer (SWIPT). Assuming a decode-and-forward
behaviour and power-splitting based relaying protocol at SU-Tx, closed form
expressions for outage probability of PU and SU are obtained. Simulation
results validate our analytical results and illustrate spectrum-efficiency and
energy-efficiency advantages of the proposed system over one-way relaying.Comment: 15 pages, 5 figures, Submitted to IEEE Transactions on Vehicular
Technolog
Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications
In this paper, we study a cooperative cognitive radio network (CCRN) where
the secondary user-transmitter (SU-Tx) assists bi-directional communication
between a pair of primary users (PUs) following the principle of two-way
relaying. In return, it gets access to the spectrum of the PUs to enable its
own transmission to SU-receiver (SU-Rx). Further, in order to support
sustainable operation of the network, SU-Tx is assumed to harvest energy from
the RF signals received from the PUs, using the technique of simultaneous
wireless information and power transfer (SWIPT). Assuming a decode-and-forward
behaviour and power-splitting based relaying protocol at SU-Tx, closed form
expressions for outage probability of PU and SU are obtained. Simulation
results validate our analytical results and illustrate spectrum-efficiency and
energy-efficiency advantages of the proposed system over one-way relaying.Comment: 15 pages, 5 figures, Submitted to IEEE Transactions on Vehicular
Technolog
Communication Technologies for Smart Grid: A Comprehensive Survey
With the ongoing trends in the energy sector such as vehicular
electrification and renewable energy, smart grid is clearly playing a more and
more important role in the electric power system industry. One essential
feature of the smart grid is the information flow over the high-speed, reliable
and secure data communication network in order to manage the complex power
systems effectively and intelligently. Smart grids utilize bidirectional
communication to function where traditional power grids mainly only use one-way
communication. The communication requirements and suitable technique differ
depending on the specific environment and scenario. In this paper, we provide a
comprehensive and up-to-date survey on the communication technologies used in
the smart grid, including the communication requirements, physical layer
technologies, network architectures, and research challenges. This survey aims
to help the readers identify the potential research problems in the continued
research on the topic of smart grid communications
- …