{"title":"Adaptive multiresolution modulation for multimedia traffic in dynamic wireless environment","authors":"O. Odejide, C. Bazil, A. Annamalai","doi":"10.1109/SARNOF.2011.5876475","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876475","url":null,"abstract":"Modern day wireless systems requires the ability to support multitude of services with different reliability requirements. Challenges of achieving reliable multimedia services include limited battery resources at mobile nodes, coupled with hostile propagation environments. We believe that adaptive signaling techniques can be designed to take advantage of differences in the quality of service (QoS) requirements among different types of multimedia traffic besides improving spectral efficiency. Furthermore, we also demonstrate that it is essential to have a readily invertible equation for different multiresolution modulation types in order to automatically execute an Adaptive Multiresolution Modulation (AMM) scheme. Exponential approximation was used for generating invertible expression for asymmetrical quadrature amplitude modulation. We also generated the curve fitting approximations for the average BER probability and individual BER for 4-PSK, 8-PSK, 16-QAM and 64-QAM by using the complementary error function approximation. In this article, we demonstrate the efficacy of the complimentary error function approximation as a better curve fitting approximation in comparison to exponential approximation. We also illustrated the benefits that can be gained from using the adaptive multiresolution modulation.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123672637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced diagnostic system with ventilation on demand for underground mines","authors":"Wisam Farjow, Mohamed Daoud, Xavier N Fernando","doi":"10.1109/SARNOF.2011.5876449","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876449","url":null,"abstract":"After a series of recent world wide mine tragedies, ranging from collapsing mines in China and Colombia to trapped miners in Chile, the importance of robust and reliable underground communication networks has become evident once again. A reliable underground communication network in mines will not only facilitate the day to day operations but will also help save many lives. However, designing reliable and robust underground network has always been a challenge due to the special nature of mines. These extreme and harsh mine conditions require special communication systems like leaky feeders, Through The Earth (TTE), and wireless mesh networks. While TTE is used in case of disaster recovery and locating trapped miners and wireless mesh is used for sensing the mine conditions, the leaky feeder system can be considered the most popular communication system used for daily operations. It carries voice, video, and data; however, the leaky feeder system is not reliable and problems are hard to diagnose. This paper describes a novel advanced diagnostic system with a ventilation on demand capability that enhances leaky feeders; this system will not only allow monitoring of all underground nodes connected to the leaky feeder. It will also allow remote programming from the control room above ground and monitoring the losses in the leaky feeder in the sense that the infrastructure will be able to monitor itself. Ventilation on demand is another advantage of this system as it will operate the underground mine ventilation fans depending on data collected from sensors attached to the leaky feeder. This will provide huge power savings since ventilation fans are responsible for about 60% of power consumption in mines. The system is described here along with simulation results proving its performance.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121810055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of energy detection using averaging and maximum values detection for dynamic spectrum access","authors":"J. Boksiner, S. Dehnie","doi":"10.1109/SARNOF.2011.5876479","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876479","url":null,"abstract":"Opportunistic Dynamic Spectrum Access (DSA) systems are emerging as a key to enable the Department of Defense (DoD) to meet its technology requirements for access to the electromagnetic spectrum. One of the main goals of DSA is to protect incumbent spectrum users from interference that could be caused by DSA emitters. One of the ways to accomplish this is through spectrum sensing as means to enable the DSA system to detect the presence of emissions from other spectrum users. A simple and practical approach to spectrum sensing is energy sensing that detects other users on the basis of the total signal energy in channel of a given bandwidth. In this paper our goal is to investigate the performance of energy sensing for constant and random power signals using two approaches. The first approach that has been investigated extensively in the past uses the total energy, or equivalent average power, over the entire signal bandwidth as the basis for detecting incumbent signals. The second approach, which needs to be used for wideband signals if the bandwidth of the incumbent signal is not known, uses signal energy in individual FFT bins as the basis for detection. We examine the performance of these detection approach under the Neyman-Pearson criterion and also using the Chernoff-Stein Lemma to obtain the achievable detection probability as a function of detection delay. We find that the method using average over the entire signal achieves better performance than the method that uses values of individual bins. This shows the importance of prior knowledge that can be expressed as radio policy to enable coexistence of DSA with incumbent systems.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122441710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel rank-constrained maximum capacity MIMO designs under practical per-antenna power constraint","authors":"I. Lu, Jialing Li","doi":"10.1109/SARNOF.2011.5876469","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876469","url":null,"abstract":"Two novel numerically efficient approaches are proposed for maximum capacity designs in multiple-input multiple-output (MIMO) systems under the practical per-antenna power constraint. One is an explicit solution (ES) when the rank of the channel matrix is equal to the number of transmit antennas. And the other is an efficient iterative approach (EIA). The ES is optimum and the EIA is nearly optimum in the maximum capacity sense. The key advantage of the EIA is that the number of data streams (i.e., the rank of the transmit covariant matrix) can be pre-specified and therefore tradeoffs between multiplexing and diversity gains can be facilitated. Numerical results show that the capacity and MSE performances with the more practical per-antenna power constraint are very similar to those with the less practical total power constraint.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Mayer, Georg Neugebauer, Ulrike Meyer, S. Wetzel
{"title":"Enabling fair and privacy-preserving applications using reconciliation protocols on ordered sets","authors":"D. Mayer, Georg Neugebauer, Ulrike Meyer, S. Wetzel","doi":"10.1109/SARNOF.2011.5876461","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876461","url":null,"abstract":"Fair and privacy-preserving reconciliation protocols on ordered sets have been introduced recently. Despite the fact that these protocols promise to have a great impact in a variety of applications, so far their practical use has been explored to a limited extent only. This paper addresses this gap. As main contributions, this paper identifies e-voting, auctions, event scheduling, and policy reconciliation as four far-reaching areas of application and shows how fair and privacy-preserving reconciliation protocols can be used effectively in these contexts.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ubiquity and integration in m-Health: Implications for brand management","authors":"D. Helman, E. Addeo, D. Walters","doi":"10.1109/SARNOF.2011.5876453","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876453","url":null,"abstract":"The purpose of this paper is to discuss the widespread changes impacting consumers and business in the e-Landscape, with a focus upon the idea that market pull is resulting in demand for m-Health, which encompasses mobile health related devices and applications that enable consumers to manage healthcare anywhere, anytime and with security. The e-Landscape model is reviewed and implementation issues are broached by exploring the notions of the value proposition and value chain networks. The value proposition is regarded as a central organizing principle around which a business can be configured. This enables managers to align changing customer needs, resources, internal relationships and external partnerships, to deliver the brand promise to the marketplace.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123220989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bifurcations of nonlinear circuits with mixed mode and chaotic oscillations","authors":"W. Marszalek, Z. Trzaska","doi":"10.1109/SARNOF.2011.5876472","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876472","url":null,"abstract":"Two special nonlinear circuits, each with a cubic nonlinearity, controlled element, constant source and R, L, C components, are considered in this paper. The circuits can operate in various oscillating conditions (mixed-mode, quasi-periodic and chaotic). The circuits can be considered as a coupling of two oscillators (linear and nonlinear ones). Although simple topologically, the circuits exhibit complex dynamical responses and dynamical properties of the circuits can be characterized through Farey arithmetic and fractal dimensions of their devil's staircases. Several interesting properties of the circuits are illustrated through bifurcation diagrams, phase plane and time series responses.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122045217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kanghee Lee, H. Kwon, Yanwu Ding, Y. Ibdah, Zuojun Wang, Yu Bi
{"title":"Node geometry and broadband jamming in noncooperative relay networks under received power constraint","authors":"Kanghee Lee, H. Kwon, Yanwu Ding, Y. Ibdah, Zuojun Wang, Yu Bi","doi":"10.1109/SARNOF.2011.5876476","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876476","url":null,"abstract":"This paper presents node geometry and broadband jamming in noncooperative wireless relay networks under the received power constraint. Diagonal relay amplifying matrices based on minimum mean square error (MMSE) criteria corresponding to node geometry and broadband jamming in wireless networks under the received power constraint are derived. All relay nodes are assumed not to communicate with their received signals for no cooperation. N relay nodes and one-source-one-destination node pair for amplify-and-forward (AF) strategy are employed. Bit error rate of the wireless relay network using the derived diagonal relay amplifying matrices is presented.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128236070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Reznik, Chunxuan Ye, Yuying Dai, Samian Kaur, J. Tomici
{"title":"Mobility management for dense networks","authors":"A. Reznik, Chunxuan Ye, Yuying Dai, Samian Kaur, J. Tomici","doi":"10.1109/SARNOF.2011.5876483","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876483","url":null,"abstract":"This paper considers a Wireless Local Area Network consisting of Access Points that can provide only a limited cone of coverage. A dense access point deployment is required for such a network to provide coverage over a substantial area. Such a deployment introduces challenges associated with support of terminal mobility, backhaul management load and association. In this paper, we propose simple yet effective solutions to these problems.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124538446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tagged user approach for finite-user finite-buffer S-Aloha analysis in AWGN and frequency selective fading channels","authors":"Sanqing Hu, Yu-dong Yao, A. Sheikh, M. A. Haleem","doi":"10.1109/SARNOF.2011.5876474","DOIUrl":"https://doi.org/10.1109/SARNOF.2011.5876474","url":null,"abstract":"The tagged user approach (TUA) is shown to be an effective method based on queueing theories to analyze random multiple access systems and avoid the high computational complexities of Markovian analysis. In this paper, we investigate using the TUA to analyze a finite-user finite-buffer slotted Aloha system considering AWGN and frequency selective fading effects respectively. The theoretical derivations based on TUA are presented in this paper and computer simulations are performed to evaluate the TUA accuracy. Performance results of system throughput, packet blocking probability, queue length, packet waiting time and response time are presented.","PeriodicalId":339596,"journal":{"name":"34th IEEE Sarnoff Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}