208 research outputs found

    Multichannel Relay assisted NOMA-ALOHA with Reinforcement Learning based Random Access

    Get PDF
    © 2023, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is the accepted manuscript version of a conference paper which has been published in final form at https://doi.org/10.1109/VTC2023-Spring57618.2023.10200766We investigate multichannel relay assisted non-orthogonal multiple access (NOMA) in slotted ALOHA systems, where each user randomly accesses one of different channel slots and different transmit power for uplink transmissions over two-hop links, to and from the relay. By using multi-agent reinforcement learning, we propose greedy and non-greedy random access methods so that each user can learn its best strategies of random access over multiple relay slots. Random collisions and fading over the relay slots are both considered. The behaviors of relay-aided NOMA-ALOHA strategies are evaluated with the simulation. It is shown that the greedy method outperforms the non-greedy method in terms of average success rate. For deployment of relay, the greedy method benefits in improving transmission reliability under the symmetric relay channels (between the two-hop links) compared to asymmetric channels. Thus, it is interpreted that the proposed greedy method is more promising to the NOMA-ALOHA systems under a symmetric multichannel relay

    The Rhetoric of Ecological Food: Environmental and Technological God Terms in Blue Apron, Soylent, and Slow Food

    Get PDF
    The rhetoric and language surrounding technologically and environmentally oriented food systems illustrate that what and how we eat shapes the way we think about food, ecology, and the world. Analyzing the rhetoric of current food trends protects against the risk of reproducing unproductive dualisms between ecologically oriented technologists and environmentalists. To break this dualism, in this paper I will examine the rhetoric of ecological food underlying three cases of food innovation. I first examine Blue Apron to investigate the ways technology and environment intersect. I then examine Soylent to critique rhetorics of efficiency in food discourse. Lastly, I examine Slow Food to explore how rhetorics of nostalgia shape conceptions of environment and technology. Although Blue Apron and Soylent are companies with profit motivation, and Slow Food is a social movement, all reflect the reality that the term “sustainability” has been captured by various approaches to food that reproduce nature and technology as separate. The resulting effect is the reproduction of limited approaches and understandings of ecology and ecological food. The latter reflect the reality that older versions of nature as separate from technology no longer exist. Rather than focus on nature, the goal is ecology which does not ignore or distance itself from the presence of technology. Rather than a materialist analysis of food, which is a future goal, this paper instead analyzes the rhetoric behind food as a practical and potential starting point for recognizing and tracing the chaotic consequences of using terms such as “sustainable” in the pursuit of ecological food discourse

    Nodes Number Estimation based on ML for Multi-operator Unlicensed Band Sharing to Extend Indoor Connectivity

    Get PDF
    © 2023 IEEE. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1109/wcnc55385.2023.10118807Due to ever-increasing data and resource-hungry applications, the needs of new spectrum by mobile networks keep increasing. Unlicensed spectrum is still expected to play a crucial part in meeting the capacity demand for future mobile networks. But if this will be a reality, fair coexistence attained via practical and efficient channel access procedures would be necessary. In designing such channel access schemes, awareness of the number of nodes contending for the channel resource can be strategic. This paper investigates a node number estimation approach using machine learning (ML) techniques. When multiple nodes access the same unlicensed channel, varying idle-time can be associated to a statistical distribution. In this paper, a statistical distribution of the Idle-time slots over the channel are used to characterise and analyse the channel contention based on the number of nodes. Three ML model based approaches are evaluated and the results confirm that the proposed solution’s viability but also reveal the best performing ML technique for the task of node number estimations

    Practical Spectrum Aggregation for Secondary Networks with Imperfect Sensing

    Get PDF
    We investigate a collision-sensitive secondary network that intends to opportunistically aggregate and utilize spectrum of a primary network to achieve higher data rates. In opportunistic spectrum access with imperfect sensing of idle primary spectrum, secondary transmission can collide with primary transmission. When the secondary network aggregates more channels in the presence of the imperfect sensing, collisions could occur more often, limiting the performance obtained by spectrum aggregation. In this context, we aim to address a fundamental query, that is, how much spectrum aggregation is worthy with imperfect sensing. For collision occurrence, we focus on two different types of collision: one is imposed by asynchronous transmission; and the other by imperfect spectrum sensing. The collision probability expression has been derived in closed-form with various secondary network parameters: primary traffic load, secondary user transmission parameters, spectrum sensing errors, and the number of aggregated sub-channels. In addition, the impact of spectrum aggregation on data rate is analysed under the constraint of collision probability. Then, we solve an optimal spectrum aggregation problem and propose the dynamic spectrum aggregation approach to increase the data rate subject to practical collision constraints. Our simulation results show clearly that the proposed approach outperforms the benchmark that passively aggregates sub-channels with lack of collision awareness

    Contextual Multi-Armed Bandit based Beam Allocation in mmWave V2X Communication under Blockage

    Get PDF
    © 2023, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This is the accepted manuscript version of a conference paper which has been published in final form at https://doi.org/10.1109/VTC2023-Spring57618.2023.10200248Due to its low latency and high data rates support, mmWave communication has been an important player for vehicular communication. However, this carries some disadvantages such as lower transmission distances and inability to transmit through obstacles. This work presents a Contextual Multi-Armed Bandit Algorithm based beam selection to improve connection stability in next generation communications for vehicular networks. The algorithm, through machine learning (ML), learns about the mobility contexts of the vehicles (location and route) and helps the base station make decisions on which of its beam sectors will provide connection to a vehicle. In addition, the proposed algorithm also smartly extends, via relay vehicles, beam coverage to outage vehicles which are either in NLOS condition due to blockages or not served any available beam. Through a set of experiments on the city map, the effectiveness of the algorithm is demonstrated, and the best possible solution is presented

    Practical Spectrum Aggregation for Secondary Networks with Imperfect Sensing

    Get PDF
    We investigate a collision-sensitive secondary network that intends to opportunistically aggregate and utilize spectrum of a primary network to achieve higher data rates. In opportunistic spectrum access with imperfect sensing of idle primary spectrum, secondary transmission can collide with primary transmission. When the secondary network aggregates more channels in the presence of the imperfect sensing, collisions could occur more often, limiting the performance obtained by spectrum aggregation. In this context, we aim to address a fundamental query, that is, how much spectrum aggregation is worthy with imperfect sensing. For collision occurrence, we focus on two different types of collision: one is imposed by asynchronous transmission; and the other by imperfect spectrum sensing. The collision probability expression has been derived in closed-form with various secondary network parameters: primary traffic load, secondary user transmission parameters, spectrum sensing errors, and the number of aggregated sub-channels. In addition, the impact of spectrum aggregation on data rate is analysed under the constraint of collision probability. Then, we solve an optimal spectrum aggregation problem and propose the dynamic spectrum aggregation approach to increase the data rate subject to practical collision constraints. Our simulation results show clearly that the proposed approach outperforms the benchmark that passively aggregates sub-channels with lack of collision awareness

    Simultaneous deletion of floxed genes mediated by CaMKIIa-Cre in the brain and in male germ cells: application to conditional and conventional disruption of Go-alfa

    Get PDF
    The Cre/LoxP system is a well-established approach to spatially and temporally control genetic inactivation. The calcium/calmodulin-dependent protein kinase II alpha subunit (CaMKIIα) promoter limits expression to specific regions of the forebrain and thus has been utilized for the brain-specific inactivation of the genes. Here, we show that CaMKIIα-Cre can be utilized for simultaneous inactivation of genes in the adult brain and in male germ cells. Double transgenic Rosa26+/stop-lacZ::CaMKIIα-Cre+/Cre mice generated by crossing CaMKIIα-Cre+/Cre mice with floxed ROSA26 lacZ reporter (Rosa26+/stop-lacZ) mice exhibited lacZ expression in the brain and testis. When these mice were mated to wild-type females, about 27% of the offspring were whole body blue by X-gal staining without inheriting the Cre transgene. These results indicate that recombination can occur in the germ cells of male Rosa26+/stop-lacZ::CaMKIIα-Cre+/Cre mice. Similarly, when double transgenic Gnao+/f::CaMKIIα-Cre+/Cre mice carrying a floxed Go-alpha gene (Gnaof/f) were backcrossed to wild-type females, approximately 22% of the offspring carried the disrupted allele (GnaoΔ) without inheriting the Cre transgene. The GnaoΔ/Δ mice closely resembled conventional Go-alpha knockout mice (Gnao−/−) with respect to impairment of their behavior. Thus, we conclude that CaMKIIα-Cre mice afford recombination for both tissue- and time-controlled inactivation of floxed target genes in the brain and for their permanent disruption. This work also emphasizes that extra caution should be exercised in utilizing CaMKIIα-Cre mice as breeding pairs.Fil: Choi, Chan-Il. Ajou University. School of Medicine; Corea del SurFil: Yoon, Sang-Phil. Ajou University. School of Medicine; Corea del SurFil: Choi, Jung-Mi. Ajou University. School of Medicine; Corea del SurFil: Kim, Sung-Soo. Ajou University. School of Medicine; Corea del SurFil: Lee, Young-Don. Ajou University. School of Medicine; Corea del SurFil: Birnbaumer, Lutz. National Institute of Environmental Health Sciences; Estados Unidos. Pontificia Universidad Católica Argentina "Santa María de los Buenos Aires". Instituto de Investigaciones Biomédicas. Consejo Nacional de Investigaciones Científicas y Técnicas. Oficina de Coordinación Administrativa Houssay. Instituto de Investigaciones Biomédicas; ArgentinaFil: Suh-Kim. Haeyoung. Ajou University. School of Medicine; Corea del Su
    corecore