1,547 research outputs found
Simulation of a Channel with Another Channel
In this paper, we study the problem of simulating a DMC channel from another
DMC channel under an average-case and an exact model. We present several
achievability and infeasibility results, with tight characterizations in
special cases. In particular for the exact model, we fully characterize when a
BSC channel can be simulated from a BEC channel when there is no shared
randomness. We also provide infeasibility and achievability results for
simulation of a binary channel from another binary channel in the case of no
shared randomness. To do this, we use properties of R\'enyi capacity of a given
order. We also introduce a notion of "channel diameter" which is shown to be
additive and satisfy a data processing inequality.Comment: 31 pages, 10 figures, and some parts of this work were published at
ITW 201
Simulating Vehicle Movement and Multi-Hop Connectivity from Basic Safety Messages
The Basic Safety Message (BSM) is a standardized communication packet that is
sent every tenth of a second between connected vehicles using Dedicated Short
Range Communication (DSRC). BSMs contain data about the sending vehicle's
state, such as speed, location, and the status of the turn signal. Currently,
many BSM datasets are available through the connected vehicle testbeds of U.S.
Department of Transportation from all over the country. However, without a
proper visualization tool, it is not possible to analyze or visually get an
overview of the spatio-temporal distribution of the data. With this goal, a web
application has been developed which can ingest a raw BSM dataset and display a
time-based simulation of vehicle movement. The simulation also displays
multi-hop vehicular network connectivity over DSRC. This paper gives details
about the application, including an explanation of the multi-hop partitioning
algorithm used to classify the vehicles into separate network partitions. A
performance analysis for the simulation is included, in which it is suggested
that calculating a connectivity matrix with the multi-hop partitioning
algorithm is computationally expensive for large number of vehicles
AC Electrokinetic Effect of V-Electrode Pattern on Microfluids
Electrokinetics has been used for guiding, pumping, and manipulating microfluidic particles for many years in the field of Biomedical, Microbiology, Chemistry, Medicine, and other fields of research, which makes it a ubiquitous tool for the multidisciplinary research on microfluidics. Between these two Alternating Current (AC) Electrokinetics have been proven to be more feasible for the researcher than the other one. In this research, we have investigated AC Electrokinetics and s effect on a new electrode configuration called V-electrode pattern. The V-electrode has been inspired and modified from the previous research work on the Orthogonal Electrode Pattern. In this research, this new electrode configuration has been analyzed using different types of setups, fabrication methods, and different fluidic conditions
Communication-Aware Computing for Edge Processing
We consider a mobile edge computing problem, in which mobile users offload
their computation tasks to computing nodes (e.g., base stations) at the network
edge. The edge nodes compute the requested functions and communicate the
computed results to the users via wireless links. For this problem, we propose
a Universal Coded Edge Computing (UCEC) scheme for linear functions to
simultaneously minimize the load of computation at the edge nodes, and maximize
the physical-layer communication efficiency towards the mobile users. In the
proposed UCEC scheme, edge nodes create coded inputs of the users, from which
they compute coded output results. Then, the edge nodes utilize the computed
coded results to create communication messages that zero-force all the
interference signals over the air at each user. Specifically, the proposed
scheme is universal since the coded computations performed at the edge nodes
are oblivious of the channel states during the communication process from the
edge nodes to the users.Comment: To Appear in ISIT 201
- …