52,171 research outputs found
The Necessity of Relay Selection
We determine necessary conditions on the structure of symbol error rate (SER)
optimal quantizers for limited feedback beamforming in wireless networks with
one transmitter-receiver pair and R parallel amplify-and-forward relays. We
call a quantizer codebook "small" if its cardinality is less than R, and
"large" otherwise. A "d-codebook" depends on the power constraints and can be
optimized accordingly, while an "i-codebook" remains fixed. It was previously
shown that any i-codebook that contains the single-relay selection (SRS)
codebook achieves the full-diversity order, R. We prove the following:
Every full-diversity i-codebook contains the SRS codebook, and thus is
necessarily large. In general, as the power constraints grow to infinity, the
limit of an optimal large d-codebook contains an SRS codebook, provided that it
exists. For small codebooks, the maximal diversity is equal to the codebook
cardinality. Every diversity-optimal small i-codebook is an orthogonal
multiple-relay selection (OMRS) codebook. Moreover, the limit of an optimal
small d-codebook is an OMRS codebook.
We observe that SRS is nothing but a special case of OMRS for codebooks with
cardinality equal to R. As a result, we call OMRS as "the universal necessary
condition" for codebook optimality. Finally, we confirm our analytical findings
through simulations.Comment: 29 pages, 4 figure
Topological optimization of hybrid quantum key distribution networks
With the growing complexity of quantum key distribution (QKD) network
structures, aforehand topology design is of great significance to support a
large-number of nodes over a large-spatial area. However, the exclusivity of
quantum channels, the limitation of key generation capabilities, the variety of
QKD protocols and the necessity of untrusted-relay selection, make the optimal
topology design a very complicated task. In this research, a hybrid QKD network
is studied for the first time from the perspective of topology, by analyzing
the topological differences of various QKD protocols. In addition, to make full
use of hybrid networking, an analytical model for optimal topology calculation
is proposed, to reach the goal of best secure communication service by
optimizing the deployment of various QKD devices and the selection of
untrusted-relays under a given cost limit. Plentiful simulation results show
that hybrid networking and untrusted-relay selection can bring great
performance advantages, and then the universality and effectiveness of the
proposed analytical model are verified.Comment: 12 pages, 4 figure
Chance and Necessity in Evolution: Lessons from RNA
The relationship between sequences and secondary structures or shapes in RNA
exhibits robust statistical properties summarized by three notions: (1) the
notion of a typical shape (that among all sequences of fixed length certain
shapes are realized much more frequently than others), (2) the notion of shape
space covering (that all typical shapes are realized in a small neighborhood of
any random sequence), and (3) the notion of a neutral network (that sequences
folding into the same typical shape form networks that percolate through
sequence space). Neutral networks loosen the requirements on the mutation rate
for selection to remain effective. The original (genotypic) error threshold has
to be reformulated in terms of a phenotypic error threshold. With regard to
adaptation, neutrality has two seemingly contradictory effects: It acts as a
buffer against mutations ensuring that a phenotype is preserved. Yet it is
deeply enabling, because it permits evolutionary change to occur by allowing
the sequence context to vary silently until a single point mutation can become
phenotypically consequential. Neutrality also influences predictability of
adaptive trajectories in seemingly contradictory ways. On the one hand it
increases the uncertainty of their genotypic trace. At the same time neutrality
structures the access from one shape to another, thereby inducing a topology
among RNA shapes which permits a distinction between continuous and
discontinuous shape transformations. To the extent that adaptive trajectories
must undergo such transformations, their phenotypic trace becomes more
predictable.Comment: 37 pages, 14 figures; 1998 CNLS conference; high quality figures at
http://www.santafe.edu/~walte
Energy-Aware Wireless Relay Selection in Load-Coupled OFDMA Cellular Networks
We investigate transmission energy minimization via optimizing wireless relay
selection in orthogonal-frequency-division multiple access (OFDMA) networks. We
take into account the impact of the load of cells on transmission energy. We
prove the NP-hardness of the energy-aware wireless relay selection problem. To
tackle the computational complexity, a partial optimality condition is derived
for providing insights in respect of designing an effective and efficient
algorithm. Numerical results show that the resulting algorithm achieves high
energy performance.Comment: 4 pages, 2 figure
Asynchronous quantum key distribution on a relay network
We show how quantum key distribution on a multi-user, multi-path, network can be used to establish a key between any two end-users in an asynchronous fashion using the technique of bit-transport. By a suitable adaptation of our previous secret-sharing scheme we show that an attacker has to compromise all of the intermediate relays on the network in order to obtain the key. Thus, two end-users can establish a secret key provided they trust at least one of the network relays
Tactical communication systems based on civil standards: Modeling in the MiXiM framework
In this paper, new work is presented belonging to an ongoing study, which
evaluates civil communication standards as potential candidates for the future
military Wide Band Waveforms (WBWFs). After an evaluation process of possible
candidates presented in [2], the selection process in [1] showed that the IEEE
802.11n OFDM could be a possible military WBWF candidate, but it should be
further investigated first in order to enhance or even replace critical
modules. According to this, some critical modules of the physical layer has
been further analyzed in [3] regarding the susceptibility of the OFDM signal
under jammer influences. However, the critical modules of the MAC layer (e.g.,
probabilistic medium access CSMA/CA) have not been analysed. In fact, it was
only suggested in [2] to replace this medium access by the better suited
Unified Slot Allocation Protocol - Multiple Access (USAP-MA) [4]. In this
regard, the present contribution describes the design paradigms of the new MAC
layer and explains how the proposed WBWF candidate has been modelled within the
MiXiM Framework of the OMNeT++ simulator.Comment: Published in: A. F\"orster, C. Sommer, T. Steinbach, M. W\"ahlisch
(Eds.), Proc. of 1st OMNeT++ Community Summit, Hamburg, Germany, September 2,
2014, arXiv:1409.0093, 201
- …