4,001 research outputs found
A Quantum Multiparty Packing Lemma and the Relay Channel
Optimally encoding classical information in a quantum system is one of the
oldest and most fundamental challenges of quantum information theory. Holevo's
bound places a hard upper limit on such encodings, while the
Holevo-Schumacher-Westmoreland (HSW) theorem addresses the question of how many
classical messages can be "packed" into a given quantum system. In this
article, we use Sen's recent quantum joint typicality results to prove a
one-shot multiparty quantum packing lemma generalizing the HSW theorem. The
lemma is designed to be easily applicable in many network communication
scenarios. As an illustration, we use it to straightforwardly obtain quantum
generalizations of well-known classical coding schemes for the relay channel:
multihop, coherent multihop, decode-forward, and partial decode-forward. We
provide both finite blocklength and asymptotic results, the latter matching
existing classical formulas. Given the key role of the classical packing lemma
in network information theory, our packing lemma should help open the field to
direct quantum generalization.Comment: 20 page
Cooperative medium access control based on spectrum leasing
Based on cooperative spectrum leasing, a distributed “win–win” (WW) cooperative framework is designed to encourage the licensed source node (SN) to lease some part of its spectral resources to the unlicensed relay node (RN) for the sake of simultaneously improving the SN’s achievable rate and for reducing the energy consumption (EC). The potential candidate RNs carry out autonomous decisions concerning whether to contend for a cooperative transmission opportunity, which could dissipate some of their battery power, while conveying their traffic in light of their individual service requirements. Furthermore, a WW cooperative medium-access-control (MAC) protocol is designed to implement the proposed distributed WW cooperative framework. Simulation results demonstrate that our WW cooperative MAC protocol is capable of providing both substantial rate improvements and considerable energy savings for the cooperative spectrum leasing system
Energy efficient cooperative coalition selection in cluster-based capillary networks for CMIMO IoT systems
The Cooperative Multiple-input-multiple-output (CMIMO) scheme has been suggested to extend the lifetime of cluster heads (CHs) in cluster-based capillary networks in Internet of Things (IoT) systems. However, the CMIMO scheme introduces extra energy overhead to cooperative devices and further reduces the lifetime of these devices. In this paper, we first articulate the problem of cooperative coalition’s selection for CMIMO scheme to extend the average battery capacity among the whole network, and then propose to apply the quantum-inspired particle swarm optimization (QPSO) to select the optimum cooperative coalitions of each hop in the routing path. Simulation results proved that the proposed QPSO-based cooperative coalition’s selection scheme could select the optimum cooperative sender and receiver devices in every hop dynamically and outperform the virtual MIMO scheme with a fixed number of cooperative devices
An effective transmit packet coding with trust-based relay nodes in VANETs
ehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate
- …