10,570 research outputs found

    Capacity analysis of reservation-based random access for broadband wireless access networks

    Get PDF
    Abstract—In this paper we propose a novel model for the capacity analysis on the reservation-based random multiple access system, which can be applied to the medium access control protocol of the emerging WiMAX technology. In such a wireless broadband access system, in order to support QoS, the channel time is divided into consecutive frames, where each frame consists of some consequent mini-slots for the transmission of requests, used for the bandwidth reservation, and consequent slots for the actual data packet transmission. Three main outcomes are obtained: first, the upper and lower bounds of the capacity are derived for the considered system. Second, we found through the mathematical analysis that the transmission rate of reservationbased multiple access protocol is maximized, when the ratio between the number of mini-slots and that of the slots per frame is equal to the reciprocal of the random multiple access algorithm’s transmission rate. Third, in the case of WiMAX networks with a large number of subscribers, our analysis takes into account both the capacity and the mean packet delay criteria and suggests to keep such a ratio constant and independent of application-level data traffic arrival rate

    Aerospace Medicine and Biology. A continuing bibliography with indexes

    Get PDF
    This bibliography lists 244 reports, articles, and other documents introduced into the NASA scientific and technical information system in February 1981. Aerospace medicine and aerobiology topics are included. Listings for physiological factors, astronaut performance, control theory, artificial intelligence, and cybernetics are included

    The Search for Extraterrestrial Intelligence (SETI)

    Get PDF
    A bibliography of reports concerning the Search for Extraterrestrial Intelligence is presented. Cosmic evolution, space communication, and technological advances are discussed along with search strategies and search systems

    Aerospace medicine and biology: A continuing bibliography with indexes

    Get PDF
    This bibliography lists 138 reports, articles, and other documents introduced into the NASA scientific and technical information system in Jun. 1980

    Global crop production forecasting data system analysis

    Get PDF
    The author has identified the following significant results. Findings led to the development of a theory of radiometric discrimination employing the mathematical framework of the theory of discrimination between scintillating radar targets. The theory indicated that the functions which drive accuracy of discrimination are the contrast ratio between targets, and the number of samples, or pixels, observed. Theoretical results led to three primary consequences, as regards the data system: (1) agricultural targets must be imaged at correctly chosen times, when the relative evolution of the crop's development is such as to maximize their contrast; (2) under these favorable conditions, the number of observed pixels can be significantly reduced with respect to wall-to-wall measurements; and (3) remotely sensed radiometric data must be suitably mixed with other auxiliary data, derived from external sources

    An Achievability Bound of Energy per Bit for Stabilized Massive Random Access Gaussian Channel

    Get PDF

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    TOW ARDS NEW TECHNIQUES IN TELECOMMUNICATIONS TO SERVE LARGE USER POPULATIONS

    Get PDF
    An account is given in this paper of the industry oriented research at the Faculty of Electrical Engineering in the past five years in the field of Public Telecommunications and Telematics. Actual and realistically anticipated needs of the users are briefly surveyed at the outset. Facts and views, concerning specific projects and underlying methodologies, are considered. The paper was presented at a symposium, held at the Faculty of Electrical Engineering, April 19 and 20, 1983 as part of the bicentennary events at the Technical University of Budapest
    corecore