4,015 research outputs found
Unequal Error Protection in Coded Slotted ALOHA
We analyze the performance of coded slotted ALOHA systems for a scenario
where users have different error protection requirements and correspondingly
can be divided into user classes. The main goal is to design the system so that
the requirements for each class are satisfied. To that end, we derive
analytical error floor approximations of the packet loss rate for each class in
the finite frame length regime, as well as the density evolution in the
asymptotic case. Based on this analysis, we propose a heuristic approach for
the optimization of the degree distributions to provide the required unequal
error protection. In addition, we analyze the decoding delay for users in
different classes and show that better protected users experience a smaller
average decoding delay
All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA
We propose an uncoordinated all-to-all broadcast protocol for periodic
messages in vehicular networks based on coded slotted ALOHA (CSA). Unlike
classical CSA, each user acts as both transmitter and receiver in a half-duplex
mode. As in CSA, each user transmits its packet several times. The half-duplex
mode gives rise to an interesting design trade-off: the more the user repeats
its packet, the higher the probability that this packet is decoded by other
users, but the lower the probability for this user to decode packets from
others. We compare the proposed protocol with carrier sense multiple access
with collision avoidance, currently adopted as a multiple access protocol for
vehicular networks. The results show that the proposed protocol greatly
increases the number of users in the network that reliably communicate with
each other. We also provide analytical tools to predict the performance of the
proposed protocol.Comment: v2: small typos fixe
Broadcast Coded Slotted ALOHA: A Finite Frame Length Analysis
We propose an uncoordinated medium access control (MAC) protocol, called
all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all
broadcast with strict latency constraints. In B-CSA, each user acts as both
transmitter and receiver in a half-duplex mode. The half-duplex mode gives rise
to a double unequal error protection (DUEP) phenomenon: the more a user repeats
its packet, the higher the probability that this packet is decoded by other
users, but the lower the probability for this user to decode packets from
others. We analyze the performance of B-CSA over the packet erasure channel for
a finite frame length. In particular, we provide a general analysis of stopping
sets for B-CSA and derive an analytical approximation of the performance in the
error floor (EF) region, which captures the DUEP feature of B-CSA. Simulation
results reveal that the proposed approximation predicts very well the
performance of B-CSA in the EF region. Finally, we consider the application of
B-CSA to vehicular communications and compare its performance with that of
carrier sense multiple access (CSMA), the current MAC protocol in vehicular
networks. The results show that B-CSA is able to support a much larger number
of users than CSMA with the same reliability.Comment: arXiv admin note: text overlap with arXiv:1501.0338
Error Floor Analysis of Coded Slotted ALOHA over Packet Erasure Channels
We present a framework for the analysis of the error floor of coded slotted
ALOHA (CSA) for finite frame lengths over the packet erasure channel. The error
floor is caused by stopping sets in the corresponding bipartite graph, whose
enumeration is, in general, not a trivial problem. We therefore identify the
most dominant stopping sets for the distributions of practical interest. The
derived analytical expressions allow us to accurately predict the error floor
at low to moderate channel loads and characterize the unequal error protection
inherent in CSA
Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA
We propose a probabilistic handshake mechanism for all-to-all broadcast coded
slotted ALOHA. We consider a fully connected network where each user acts as
both transmitter and receiver in a half-duplex mode. Users attempt to exchange
messages with each other and to establish one-to-one handshakes, in the sense
that each user decides whether its packet was successfully received by the
other users: After performing decoding, each user estimates in which slots the
resolved users transmitted their packets and, based on that, decides if these
users successfully received its packet. The simulation results show that the
proposed handshake algorithm allows the users to reliably perform the
handshake. The paper also provides some analytical bounds on the performance of
the proposed algorithm which are in good agreement with the simulation results
On the Information Loss of the Max-Log Approximation in BICM Systems
We present a comprehensive study of the information rate loss of the max-log
approximation for -ary pulse-amplitude modulation (PAM) in a bit-interleaved
coded modulation (BICM) system. It is widely assumed that the calculation of
L-values using the max-log approximation leads to an information loss. We prove
that this assumption is correct for all -PAM constellations and labelings
with the exception of a symmetric 4-PAM constellation labeled with a Gray code.
We also show that for max-log L-values, the BICM generalized mutual information
(GMI), which is an achievable rate for a standard BICM decoder, is too
pessimistic. In particular, it is proved that the so-called "harmonized" GMI,
which can be seen as the sum of bit-level GMIs, is achievable without any
modifications to the decoder. We then study how bit-level channel
symmetrization and mixing affect the mutual information (MI) and the GMI for
max-log L-values. Our results show that these operations, which are often used
when analyzing BICM systems, preserve the GMI. However, this is not necessarily
the case when the MI is considered. Necessary and sufficient conditions under
which these operations preserve the MI are provided
Optimal Control Algorithms and Their Analysis for Short-Term Scheduling in Manufacturing Systems
International audienceCurrent literature presents optimal control computational algorithms with regard to state, control, and conjunctive variable spaces. This paper first analyses the advantages and limitations of different optimal control computational methods and algorithms which can be used for short-term scheduling. Second, it develops an optimal control computational algorithm that allows for the solution of short-term scheduling in an optimal manner. Moreover, qualitative and quantitative analysis of the manufacturing system scheduling problem is presented. Results highlight computer experiments with a scheduling software prototype as well as potential future research avenues
Review of Quantitative Methods for Supply Chain Resilience Analysis
Supply chain resilience (SCR) manifests when the network is capable to withstand, adapt, and recover from disruptions to meet customer demand and ensure performance. This paper conceptualizes and comprehensively presents a systematic review of the recent literature on quantitative modeling the SCR while distinctively pertaining it to the original concept of resilience capacity. Decision-makers and researchers can benefit from our survey since it introduces a structured analysis and recommendations as to which quantitative methods can be used at different levels of capacity resilience. Finally, the gaps and limitations of existing SCR literature are identified and future research opportunities are suggested
Review of Quantitative Methods for Supply Chain Resilience Analysis
Supply chain resilience (SCR) manifests when the network is capable to withstand, adapt, and recover from disruptions to meet customer demand and ensure performance. This paper conceptualizes and comprehensively presents a systematic review of the recent literature on quantitative modeling the SCR while distinctively pertaining it to the original concept of resilience capacity. Decision-makers and researchers can benefit from our survey since it introduces a structured analysis and recommendations as to which quantitative methods can be used at different levels of capacity resilience. Finally, the gaps and limitations of existing SCR literature are identified and future research opportunities are suggested
Robust dynamic schedule coordination control in the supply chain
International audienceCoordination plays crucial role in supply chain management. In this paper, we extend the existing body of literature on supply chain coordination by representing a robust schedule coordination approach. A hybrid discrete/continuous flow shop supply chain with job shop processes at each supplier stage is studied. For this purpose, the developed scheduling model comprises operations control (for customer order fulfillment dynamics), channel control (production machine and transportation dynamics), resource control (material supply dynamics), and flow control (processing and shipment dynamics) with multiple objectives. Based on the scheduling model, we introduce a robust analysis of schedule coordination in the presence of disruptions in capacities and supply. The application of attainable sets opens a possibility to analyse schedule coordination dynamics under disruptions. The results provide insights of how to integrate the coordination issues into schedule robustness analysis. We exemplify the developed approach for the case of two-stage supply chain coordination, and derive managerial insights for both considered scheduling problem and application of dynamic control methods to supply chain coordination in general
- …