328 research outputs found

    ARQ Protocols in Cognitive Decode-and-Forward Relay Networks: Opportunities Gain

    Get PDF
    In this paper, two novel automatic-repeat-request (ARQ) based protocols were proposed, which exploit coop- eration opportunity inherent in secondary retransmission to create access opportunities. If the signal was not decoded correctly in destination, another user can be acted as a relay to reduce retransmission rounds by relaying the signal. For comparison, we also propose a Direct ARQ Protocol. Specif- ically, we derive the exact closed-form outage probability of three protocols, which provides an effective means to evalu- ate the effects of several parameters. Moreover, we propose a new metric to evaluate the performance improvement for cognitive networks. Finally, Monte Carlo simulations were presented to validate the theory analysis, and a comparison is made among the three protocols

    Image based analysis of visibility in smoke laden environments

    Get PDF
    This study investigates visibility in a smoke laden environment. For many years, researchers and engineers in fire safety have criticized the inadequacy of existing theory in describing the effects such as colour, viewing angle, environmental lighting etc. on the visibility of an emergency sign. In the current study, the author has raised the fundamental question on the concept of visibility and how it should be measured in fire safety engineering and tried to address the problem by redefining visibility based on the perceived image of a target sign. New algorithms have been created during this study to utilise modern hardware and software technology in the simulation of human perceived image of object in both experiment and computer modelling. Unlike the traditional threshold of visual distance, visibility in the current study has been defined as a continuous function changing from clearly discemable to completely invisible. It allows the comparison of visibility under various conditions, not just limited to the threshold. Current experiment has revealed that different conditions may results in the same visual threshold but follow very different path on the way leading to the threshold. The new definition of visibility has made the quantification of visibility in the pre-threshold conditions possible. Such quantification can help to improve the performance of fire evacuation since most evacuees will experience the pre-threshold condition. With current measurement of visibility, all the influential factors such as colour, viewing angle etc. can be tested in experiment and simulated in numerical model.Based on the newly introduced definition of visibility, a set of experiments have been carried output in a purposed built smoke tunnel. Digital camera images of various illuminated signs were taken under different illumination, colour and smoke conditions. Using an algorithm developed by the author in this study, the digital camera images were converted into simulated human perceived images. The visibility of a target sign is measured against the quality of its image acquired. Conclusions have been drawn by comparing visibility under different conditions. One of them is that signs illuminated with red and green lights have the similar visibility that is far better than that with blue light. It is the first time this seemingly obvious conclusion has been quantified.In the simulation of visibility in participating media, the author has introduced an algorithm that combines irradiance catching in 3D space with Monte Carlo ray tracing. It can calculate the distribution of scattered radiation with good accuracy without the high cost typically related to zonal method and the limitations in discrete ordinate method. The algorithm has been combined with a two pass solution method to produce high resolution images without introducing excessive number of rays from the light source. The convergence of the iterative solution procedure implemented has been theoretically proven. The accuracy of the model is demonstrated by comparing with the analytical solution of a point radiant source in 3D space. Further validation of the simulation model has been carried out by comparing the model prediction with the data from the smoke tunnel experiments.The output of the simulation model has been presented in the form of an innovative floor map of visibility (FMV). It helps the fire safety designer to identify regions of poor visibility in a glance and will prove to be a very useful tool in performance based fire safety design

    Image based analysis of visibility in smoke laden environments

    Get PDF
    This study investigates visibility in a smoke laden environment. For many years, researchers and engineers in fire safety have criticized the inadequacy of existing theory in describing the effects such as colour, viewing angle, environmental lighting etc. on the visibility of an emergency sign. In the current study, the author has raised the fundamental question on the concept of visibility and how it should be measured in fire safety engineering and tried to address the problem by redefining visibility based on the perceived image of a target sign. New algorithms have been created during this study to utilise modern hardware and software technology in the simulation of human perceived image of object in both experiment and computer modelling. Unlike the traditional threshold of visual distance, visibility in the current study has been defined as a continuous function changing from clearly discemable to completely invisible. It allows the comparison of visibility under various conditions, not just limited to the threshold. Current experiment has revealed that different conditions may results in the same visual threshold but follow very different path on the way leading to the threshold. The new definition of visibility has made the quantification of visibility in the pre-threshold conditions possible. Such quantification can help to improve the performance of fire evacuation since most evacuees will experience the pre-threshold condition. With current measurement of visibility, all the influential factors such as colour, viewing angle etc. can be tested in experiment and simulated in numerical model. Based on the newly introduced definition of visibility, a set of experiments have been carried output in a purposed built smoke tunnel. Digital camera images of various illuminated signs were taken under different illumination, colour and smoke conditions. Using an algorithm developed by the author in this study, the digital camera images were converted into simulated human perceived images. The visibility of a target sign is measured against the quality of its image acquired. Conclusions have been drawn by comparing visibility under different conditions. One of them is that signs illuminated with red and green lights have the similar visibility that is far better than that with blue light. It is the first time this seemingly obvious conclusion has been quantified. In the simulation of visibility in participating media, the author has introduced an algorithm that combines irradiance catching in 3D space with Monte Carlo ray tracing. It can calculate the distribution of scattered radiation with good accuracy without the high cost typically related to zonal method and the limitations in discrete ordinate method. The algorithm has been combined with a two pass solution method to produce high resolution images without introducing excessive number of rays from the light source. The convergence of the iterative solution procedure implemented has been theoretically proven. The accuracy of the model is demonstrated by comparing with the analytical solution of a point radiant source in 3D space. Further validation of the simulation model has been carried out by comparing the model prediction with the data from the smoke tunnel experiments. The output of the simulation model has been presented in the form of an innovative floor map of visibility (FMV). It helps the fire safety designer to identify regions of poor visibility in a glance and will prove to be a very useful tool in performance based fire safety design

    The image of China in the poetry of A. S. Pushkin

    Full text link
    Статья посвящена исследованию образа Китая в поэзии А. С. Пушкина. Дан анализ ряда поэтических произведений. Автор указывает на интерес поэта к восточной и, в частности, китайской философии, истории и культуре, а также пытается выяснить, что повлияло на формирование его представлений о Китае.The article is devoted to the study of the image of China in the poetry of A. S. Pushkin. The analysis of some poetic works. The author points to the interest of the poet to the East and, in particular, Chinese philosophy, history and culture, while also trying to figure out what influenced the formation of his ideas about China

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    Distributed Relay Selection for Heterogeneous UAV Communication Networks Using A Many-to-Many Matching Game Without Substitutability

    Full text link
    This paper proposes a distributed multiple relay selection scheme to maximize the satisfaction experiences of unmanned aerial vehicles (UAV) communication networks. The multi-radio and multi-channel (MRMC) UAV communication system is considered in this paper. One source UAV can select one or more relay radios, and each relay radio can be shared by multiple source UAVs equally. Without the center controller, source UAVs with heterogeneous requirements compete for channels dominated by relay radios. In order to optimize the global satisfaction performance, we model the UAV communication network as a many-to-many matching market without substitutability. We design a potential matching approach to address the optimization problem, in which the optimizing of local matching process will lead to the improvement of global matching results. Simulation results show that the proposed distributed matching approach yields good matching performance of satisfaction, which is close to the global optimum result. Moreover, the many-to-many potential matching approach outperforms existing schemes sufficiently in terms of global satisfaction within a reasonable convergence time.Comment: 6 pages, 4 figures, conferenc
    corecore