4,001 research outputs found

    A Quantum Multiparty Packing Lemma and the Relay Channel

    Get PDF
    Optimally encoding classical information in a quantum system is one of the oldest and most fundamental challenges of quantum information theory. Holevo's bound places a hard upper limit on such encodings, while the Holevo-Schumacher-Westmoreland (HSW) theorem addresses the question of how many classical messages can be "packed" into a given quantum system. In this article, we use Sen's recent quantum joint typicality results to prove a one-shot multiparty quantum packing lemma generalizing the HSW theorem. The lemma is designed to be easily applicable in many network communication scenarios. As an illustration, we use it to straightforwardly obtain quantum generalizations of well-known classical coding schemes for the relay channel: multihop, coherent multihop, decode-forward, and partial decode-forward. We provide both finite blocklength and asymptotic results, the latter matching existing classical formulas. Given the key role of the classical packing lemma in network information theory, our packing lemma should help open the field to direct quantum generalization.Comment: 20 page

    Cooperative medium access control based on spectrum leasing

    No full text
    Based on cooperative spectrum leasing, a distributed “win–win” (WW) cooperative framework is designed to encourage the licensed source node (SN) to lease some part of its spectral resources to the unlicensed relay node (RN) for the sake of simultaneously improving the SN’s achievable rate and for reducing the energy consumption (EC). The potential candidate RNs carry out autonomous decisions concerning whether to contend for a cooperative transmission opportunity, which could dissipate some of their battery power, while conveying their traffic in light of their individual service requirements. Furthermore, a WW cooperative medium-access-control (MAC) protocol is designed to implement the proposed distributed WW cooperative framework. Simulation results demonstrate that our WW cooperative MAC protocol is capable of providing both substantial rate improvements and considerable energy savings for the cooperative spectrum leasing system

    Energy efficient cooperative coalition selection in cluster-based capillary networks for CMIMO IoT systems

    Get PDF
    The Cooperative Multiple-input-multiple-output (CMIMO) scheme has been suggested to extend the lifetime of cluster heads (CHs) in cluster-based capillary networks in Internet of Things (IoT) systems. However, the CMIMO scheme introduces extra energy overhead to cooperative devices and further reduces the lifetime of these devices. In this paper, we first articulate the problem of cooperative coalition’s selection for CMIMO scheme to extend the average battery capacity among the whole network, and then propose to apply the quantum-inspired particle swarm optimization (QPSO) to select the optimum cooperative coalitions of each hop in the routing path. Simulation results proved that the proposed QPSO-based cooperative coalition’s selection scheme could select the optimum cooperative sender and receiver devices in every hop dynamically and outperform the virtual MIMO scheme with a fixed number of cooperative devices

    An effective transmit packet coding with trust-based relay nodes in VANETs

    Get PDF
    ehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate
    • …
    corecore