10,180 research outputs found

    Nuts and Bolts of a Realistic Stochastic Geometric Analysis of mmWave HetNets: Hardware Impairments and Channel Aging

    Get PDF
    © 2019 IEEE.Motivated by heterogeneous network (HetNet) design in improving coverage and by millimeter-wave (mmWave) transmission offering an abundance of extra spectrum, we present a general analytical framework shedding light on the downlink of realistic mmWave HetNets consisting of K tiers of randomly located base stations. Specifically, we model, by virtue of stochastic geometry tools, the multi-Tier multi-user (MU) multiple-input multiple-output (MIMO) mmWave network degraded by the inevitable residual additive transceiver hardware impairments (RATHIs) and channel aging. Given this setting, we derive the coverage probability and the area spectral efficiency (ASE), and we subsequently evaluate the impact of residual transceiver hardware impairments and channel aging on these metrics. Different path-loss laws for line-of-sight and non-line-of-sight are accounted for the analysis, which are among the distinguishing features of mmWave systems. Among the findings, we show that the RATHIs have a meaningful impact at the high-signal-To-noise-ratio regime, while the transmit additive distortion degrades further than the receive distortion the system performance. Moreover, serving fewer users proves to be preferable, and the more directive the mmWaves are, the higher the ASE becomes.Peer reviewedFinal Accepted Versio

    The Future of the Internet III

    Get PDF
    Presents survey results on technology experts' predictions on the Internet's social, political, and economic impact as of 2020, including its effects on integrity and tolerance, intellectual property law, and the division between personal and work lives

    The Corporate Character of Eudaimonist Virtue Ethics Cautioning the Invisible Environment of Harmful EMFs Resulting from 5G Technology

    Get PDF
    There is a current concern in environmental ethics that stems from the development of cell phone communication technology; namely, do the electromagnetic frequencies (EMFs) linked to the development of technology of 4G and 5G cause harm to the environment (e.g., plants, bees and other insects, the animal kingdom, and human beings)? Do EMFs cause or correlate to the collapse of bee colonies and/or lower sperm counts in men and increased rates of breast cancer in women? This concern deals with EMFs that are inextricably linked to the development of telecommunication technology of current 4G and future 5G. More specifically, there are concerns that these EMFs may cause harm to various members of the environment, such as plants and trees, bees and insects, other members of the animal kingdom, and humans; and that some of these harms are expressed as sperm reduction in men, breast cancer in women, and brain cancer in men and women. The thesis of this dissertation is that a normative person-based theory of neo-Aristotelian eudaimonistic virtue ethics provides an ethical framework that gives strong support for the conclusion that it is morally impermissible for a telecommunications corporate person with good character, to allow harmful EMFs associated with the implementation of 5G technology. Particularly in light of numerous studies and anecdotal evidence that suggests that this technology might be harmful to humans and the environment. I draw an analogy between persons and corporate persons to argue that corporations ought to consider character when making decisions about whether to introduce new technologies--in this case, the EMFs that accompany 4G and 5G into the world. Furthermore, the primary point of this dissertation is the application of the practical ethics of character. I am specifically interested in the question of character in relation to the vetting questions, of the introduction, by telecommunications corporations, of new 5G technology into the world. The normative view developed in this dissertation has real-life practicality that if adopted by a telecommunications corporate person, of good character, would provide a model of practical moral reason sufficient to guide them to act compassionately towards the environment regarding the problem of 5G technology and the potential environmental harm EMFs can bring. Moreover, my argument based on eudaimonistic normative principles does something that utilitarian and deontological action-based normative theories do not do, namely, focus on the nature and role of character. Character is able to provide insight and explanatory power even for an ordinary person to see why their actions are guided a certain way. Finally, I will demonstrate the efficaciousness of the character-based, eudaimonistic normative framework that brings to the application of the problem 5G and potentially harmful EMFs in our environment

    Progress in information technology and tourism management: 20 years on and 10 years after the Internet—The state of eTourism research

    Get PDF
    This paper reviews the published articles on eTourism in the past 20 years. Using a wide variety of sources, mainly in the tourism literature, this paper comprehensively reviews and analyzes prior studies in the context of Internet applications to Tourism. The paper also projects future developments in eTourism and demonstrates critical changes that will influence the tourism industry structure. A major contribution of this paper is its overview of the research and development efforts that have been endeavoured in the field, and the challenges that tourism researchers are, and will be, facing

    Enforcement in Dynamic Spectrum Access Systems

    Get PDF
    The spectrum access rights granted by the Federal government to spectrum users come with the expectation of protection from harmful interference. As a consequence of the growth of wireless demand and services of all types, technical progress enabling smart agile radio networks, and on-going spectrum management reform, there is both a need and opportunity to use and share spectrum more intensively and dynamically. A key element of any framework for managing harmful interference is the mechanism for enforcement of those rights. Since the rights to use spectrum and to protection from harmful interference vary by band (licensed/unlicensed, legacy/newly reformed) and type of use/users (primary/secondary, overlay/underlay), it is reasonable to expect that the enforcement mechanisms may need to vary as well.\ud \ud In this paper, we present a taxonomy for evaluating alternative mechanisms for enforcing interference protection for spectrum usage rights, with special attention to the potential changes that may be expected from wider deployment of Dynamic Spectrum Access (DSA) systems. Our exploration of how the design of the enforcement regime interacts with and influences the incentives of radio operators under different rights regimes and market scenarios is intended to assist in refining thinking about appropriate access rights regimes and how best to incentivize investment and growth in more efficient and valuable uses of the radio frequency spectrum

    Minds Online: The Interface between Web Science, Cognitive Science, and the Philosophy of Mind

    Get PDF
    Alongside existing research into the social, political and economic impacts of the Web, there is a need to study the Web from a cognitive and epistemic perspective. This is particularly so as new and emerging technologies alter the nature of our interactive engagements with the Web, transforming the extent to which our thoughts and actions are shaped by the online environment. Situated and ecological approaches to cognition are relevant to understanding the cognitive significance of the Web because of the emphasis they place on forces and factors that reside at the level of agent–world interactions. In particular, by adopting a situated or ecological approach to cognition, we are able to assess the significance of the Web from the perspective of research into embodied, extended, embedded, social and collective cognition. The results of this analysis help to reshape the interdisciplinary configuration of Web Science, expanding its theoretical and empirical remit to include the disciplines of both cognitive science and the philosophy of mind

    RIS-Assisted Physical Layer Authentication for 6G Endogenous Security

    Full text link
    The physical layer authentication (PLA) is a promising technology which can enhance the access security of a massive number of devices in the near future. In this paper, we propose a reconfigurable intelligent surface (RIS)-assisted PLA system, in which the legitimate transmitter can customize the channel fingerprints during PLA by controlling the ON-OFF state of the RIS. Without loss of generality, we use the received signal strength (RSS) based spoofing detection approach to analyze the feasibility of the proposed architecture. Specifically, based on the RSS, we derive the statistical properties of PLA and give some interesting insights, which showcase that the RIS-assisted PLA is theoretically feasible. Then, we derive the optimal detection threshold to maximize the performance in the context of the presented performance metrics. Next, the actual feasibility of the proposed system is verified via proof-of-concept experiments on a RIS-assisted PLA prototype platform. The experiment results show that there are 3.5% and 76% performance improvements when the transmission sources are at different locations and at the same location, respectively
    corecore