15,676 research outputs found

    Cognitive Orthogonal Precoder for Two-tiered Networks Deployment

    Full text link
    In this work, the problem of cross-tier interference in a two-tiered (macro-cell and cognitive small-cells) network, under the complete spectrum sharing paradigm, is studied. A new orthogonal precoder transmit scheme for the small base stations, called multi-user Vandermonde-subspace frequency division multiplexing (MU-VFDM), is proposed. MU-VFDM allows several cognitive small base stations to coexist with legacy macro-cell receivers, by nulling the small- to macro-cell cross-tier interference, without any cooperation between the two tiers. This cleverly designed cascaded precoder structure, not only cancels the cross-tier interference, but avoids the co-tier interference for the small-cell network. The achievable sum-rate of the small-cell network, satisfying the interference cancelation requirements, is evaluated for perfect and imperfect channel state information at the transmitter. Simulation results for the cascaded MU-VFDM precoder show a comparable performance to that of state-of-the-art dirty paper coding technique, for the case of a dense cellular layout. Finally, a comparison between MU-VFDM and a standard complete spectrum separation strategy is proposed. Promising gains in terms of achievable sum-rate are shown for the two-tiered network w.r.t. the traditional bandwidth management approach.Comment: 11 pages, 9 figures, accepted and to appear in IEEE Journal on Selected Areas in Communications: Cognitive Radio Series, 2013. Copyright transferred to IEE

    Spectrum Utilization and Congestion of IEEE 802.11 Networks in the 2.4 GHz ISM Band

    Get PDF
    Wi-Fi technology, plays a major role in society thanks to its widespread availability, ease of use and low cost. To assure its long term viability in terms of capacity and ability to share the spectrum efficiently, it is of paramount to study the spectrum utilization and congestion mechanisms in live environments. In this paper the service level in the 2.4 GHz ISM band is investigated with focus on todays IEEE 802.11 WLAN systems with support for the 802.11e extension. Here service level means the overall Quality of Service (QoS), i.e. can all devices fulfill their communication needs? A crosslayer approach is used, since the service level can be measured at several levels of the protocol stack. The focus is on monitoring at both the Physical (PHY) and the Medium Access Control (MAC) link layer simultaneously by performing respectively power measurements with a spectrum analyzer to assess spectrum utilization and packet sniffing to measure the congestion. Compared to traditional QoS analysis in 802.11 networks, packet sniffing allows to study the occurring congestion mechanisms more thoroughly. The monitoring is applied for the following two cases. First the influence of interference between WLAN networks sharing the same radio channel is investigated in a controlled environment. It turns out that retry rate, Clear-ToSend (CTS), Request-To-Send (RTS) and (Block) Acknowledgment (ACK) frames can be used to identify congestion, whereas the spectrum analyzer is employed to identify the source of interference. Secondly, live measurements are performed at three locations to identify this type of interference in real-live situations. Results show inefficient use of the wireless medium in certain scenarios, due to a large portion of management and control frames compared to data content frames (i.e. only 21% of the frames is identified as data frames)

    Optimal Pricing Effect on Equilibrium Behaviors of Delay-Sensitive Users in Cognitive Radio Networks

    Full text link
    This paper studies price-based spectrum access control in cognitive radio networks, which characterizes network operators' service provisions to delay-sensitive secondary users (SUs) via pricing strategies. Based on the two paradigms of shared-use and exclusive-use dynamic spectrum access (DSA), we examine three network scenarios corresponding to three types of secondary markets. In the first monopoly market with one operator using opportunistic shared-use DSA, we study the operator's pricing effect on the equilibrium behaviors of self-optimizing SUs in a queueing system. %This queue represents the congestion of the multiple SUs sharing the operator's single \ON-\OFF channel that models the primary users (PUs) traffic. We provide a queueing delay analysis with the general distributions of the SU service time and PU traffic using the renewal theory. In terms of SUs, we show that there exists a unique Nash equilibrium in a non-cooperative game where SUs are players employing individual optimal strategies. We also provide a sufficient condition and iterative algorithms for equilibrium convergence. In terms of operators, two pricing mechanisms are proposed with different goals: revenue maximization and social welfare maximization. In the second monopoly market, an operator exploiting exclusive-use DSA has many channels that will be allocated separately to each entering SU. We also analyze the pricing effect on the equilibrium behaviors of the SUs and the revenue-optimal and socially-optimal pricing strategies of the operator in this market. In the third duopoly market, we study a price competition between two operators employing shared-use and exclusive-use DSA, respectively, as a two-stage Stackelberg game. Using a backward induction method, we show that there exists a unique equilibrium for this game and investigate the equilibrium convergence.Comment: 30 pages, one column, double spac

    Assessing context-based learning: Not only rigorous but also relevant

    Get PDF
    Economic factors are driving significant change in higher education. There is increasing responsiveness to market demand for vocational courses and a growing appreciation of the importance of procedural (tacit) knowledge to service the needs of the Knowledge Economy; the skills in demand are information analysis, collaborative working and 'just-in-time learning'. New pedagogical methods go some way to accommodate these skills, situating learning in context and employing information and communications technology to present realistic simulations and facilitate collaborative exchange. However, what have so far proved resistant to change are the practices of assessment. This paper endorses the case for a scholarship of assessment and proposes the development of technology-supported tools and techniques to assess context-based learning. It also recommends a fundamental rethink of the norm-referenced and summative assessment of propositional knowledge as the principal criterion for student success in universities

    Endogenous Norm Formation Over the Life Cycle – The Case of Tax Evasion

    Get PDF
    This paper offers an explanation to why the general observation that elderly hold stronger moral attitudes than young ones may be an age rather than a cohort effect. We apply mechanisms from social psychology to explain how personal norms may evolve over the life cycle. We assume that people update their norms influenced by their own past behavior (e.g., cognitive dissonance) and/or by the attitudes of their peers (normative conformity). We apply the theory on actual norm distributions for young and old concerning tax evasion. Allowing for heterogeneous updating of norms where only those who identify with their network are actually conforming with it, while the others are only influenced by their own past behavior, we can explain the difference between young and old people’s moral values as an age effect through endogenous norm formation.Social norms; Endogenous norms; Tax evasion; Cognitive dissonance; Self-signaling; Normative conformity

    Cooperative medium access control based on spectrum leasing

    No full text
    Based on cooperative spectrum leasing, a distributed “win–win” (WW) cooperative framework is designed to encourage the licensed source node (SN) to lease some part of its spectral resources to the unlicensed relay node (RN) for the sake of simultaneously improving the SN’s achievable rate and for reducing the energy consumption (EC). The potential candidate RNs carry out autonomous decisions concerning whether to contend for a cooperative transmission opportunity, which could dissipate some of their battery power, while conveying their traffic in light of their individual service requirements. Furthermore, a WW cooperative medium-access-control (MAC) protocol is designed to implement the proposed distributed WW cooperative framework. Simulation results demonstrate that our WW cooperative MAC protocol is capable of providing both substantial rate improvements and considerable energy savings for the cooperative spectrum leasing system

    Metaethics in context of engineering ethical and moral systems

    Get PDF
    It is not clear to what the projects of creating an artificial intelligence (AI) that does ethics, is moral, or makes moral judgments amounts. In this paper we discuss some of the extant metaethical theories and debates in moral philosophy by which such projects should be informed, specifically focusing on the project of creating an AI that makes moral judgments. We argue that the scope and aims of that project depend a great deal on antecedent metaethical commitments. Metaethics, therefore, plays the role of an Archimedean fulcrum in this context, very much like the Archimedean role that it is often taken to take in context of normative ethics (Dworkin 1996; Dreier 2002; Fantl 2006; Ehrenberg 2008)
    corecore