1,547 research outputs found

    Simulation of a Channel with Another Channel

    Full text link
    In this paper, we study the problem of simulating a DMC channel from another DMC channel under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular for the exact model, we fully characterize when a BSC channel can be simulated from a BEC channel when there is no shared randomness. We also provide infeasibility and achievability results for simulation of a binary channel from another binary channel in the case of no shared randomness. To do this, we use properties of R\'enyi capacity of a given order. We also introduce a notion of "channel diameter" which is shown to be additive and satisfy a data processing inequality.Comment: 31 pages, 10 figures, and some parts of this work were published at ITW 201

    Simulating Vehicle Movement and Multi-Hop Connectivity from Basic Safety Messages

    Full text link
    The Basic Safety Message (BSM) is a standardized communication packet that is sent every tenth of a second between connected vehicles using Dedicated Short Range Communication (DSRC). BSMs contain data about the sending vehicle's state, such as speed, location, and the status of the turn signal. Currently, many BSM datasets are available through the connected vehicle testbeds of U.S. Department of Transportation from all over the country. However, without a proper visualization tool, it is not possible to analyze or visually get an overview of the spatio-temporal distribution of the data. With this goal, a web application has been developed which can ingest a raw BSM dataset and display a time-based simulation of vehicle movement. The simulation also displays multi-hop vehicular network connectivity over DSRC. This paper gives details about the application, including an explanation of the multi-hop partitioning algorithm used to classify the vehicles into separate network partitions. A performance analysis for the simulation is included, in which it is suggested that calculating a connectivity matrix with the multi-hop partitioning algorithm is computationally expensive for large number of vehicles

    AC Electrokinetic Effect of V-Electrode Pattern on Microfluids

    Get PDF
    Electrokinetics has been used for guiding, pumping, and manipulating microfluidic particles for many years in the field of Biomedical, Microbiology, Chemistry, Medicine, and other fields of research, which makes it a ubiquitous tool for the multidisciplinary research on microfluidics. Between these two Alternating Current (AC) Electrokinetics have been proven to be more feasible for the researcher than the other one. In this research, we have investigated AC Electrokinetics and s effect on a new electrode configuration called V-electrode pattern. The V-electrode has been inspired and modified from the previous research work on the Orthogonal Electrode Pattern. In this research, this new electrode configuration has been analyzed using different types of setups, fabrication methods, and different fluidic conditions

    Communication-Aware Computing for Edge Processing

    Full text link
    We consider a mobile edge computing problem, in which mobile users offload their computation tasks to computing nodes (e.g., base stations) at the network edge. The edge nodes compute the requested functions and communicate the computed results to the users via wireless links. For this problem, we propose a Universal Coded Edge Computing (UCEC) scheme for linear functions to simultaneously minimize the load of computation at the edge nodes, and maximize the physical-layer communication efficiency towards the mobile users. In the proposed UCEC scheme, edge nodes create coded inputs of the users, from which they compute coded output results. Then, the edge nodes utilize the computed coded results to create communication messages that zero-force all the interference signals over the air at each user. Specifically, the proposed scheme is universal since the coded computations performed at the edge nodes are oblivious of the channel states during the communication process from the edge nodes to the users.Comment: To Appear in ISIT 201
    • …
    corecore