979 resultados para Communication situation
Resumo:
We consider optimal average power allocation policies in a wireless channel in the presence of individual delay constraints on the transmitted packets. Power is consumed in transmission of data only. We consider the case when the power used in transmission is a linear function of the data transmitted. The transmission channel may experience multipath fading. We have developed a computationally efficient online algorithm, when there is same hard delay constraint for all packets. Later on, we generalize it to the case when there are multiple real time streams with different hard deadline constraints. Our algorithm uses linear programming and has very low complexity.
Resumo:
Communication and environmental monitoring play a major role in underground mining both from production and safety point of view. However, underground mining communication as well as monitoring devices encounter several challenges because of the nature of underground features and characteristics. Lack of real time information from underground workings may hamper production and create serious safety risks. Proper communication and monitoring devices are inevitable requirements for better production and improved safety. Communication and environmental monitoring devices are basic element of underground mine infrastructure. This paper describes the performance of communication and monitoring devices being used in underground mines. An attempt has been made to assess the safety risks by these devices which may dictate future research directions.
Resumo:
Lightning strike to instrumented and communication towers can be a source of electromagnetic disturbance to the system connected. Long cables running on these towers can get significant induction to their sheath/core, which would then couple to the connected equipments. For a quantitative analysis of the situation, suitable theoretical analysis is necessary. Due to the dominance of the transverse magnetic mode during the fast rising portion of the stroke current, which is the period of significant induction, a full wave solution based on Maxwell's equations is necessary. Owing to the large geometric aspect ratio of tower lattice elements and for feasibility of a numerical solution, the thin-wire formulation for the electric field integral equation is generally adopted. However, the classical thin-wire formulation is not set for handling non-cylindrical conductors like tower lattice elements and the proximity of other conductors. The present work investigates further into a recently proposed method for handling such a situation and optimizes the numerical solution approach.
Resumo:
We consider near-optimal policies for a single user transmitting on a wireless channel which minimize average queue length under average power constraint. The power is consumed in transmission of data only. We consider the case when the power used in transmission is a linear function of the data transmitted. The transmission channel may experience multipath fading. Later, we also extend these results to the multiuser case. We show that our policies can be used in a system with energy harvesting sources at the transmitter. Next we consider data users which require minimum rate guarantees. Finally we consider the system which has both data and real time users. Our policies have low computational complexity, closed form expression for mean delays and require only the mean arrival rate with no queue length information.
Resumo:
The problem of secure unicast communication over a two hop Amplify-and-Forward wireless relay network with multiple eavesdroppers is considered. Assuming that a receiver (destination or eavesdropper) can decode a message only if the received SNR is above a predefined threshold, we consider this problem in two scenarios. In the first scenario, we maximize the SNR at the legitimate destination, subject to the condition that the received SNR at each eavesdropper is below the target threshold. Due to the non-convex nature of the objective function and eavesdroppers' constraints, we transform variables and obtain a quadratically constrained quadratic program (QCQP) with convex constraints, which can be solved efficiently. When the constraints are not convex, we consider a semidefinite relaxation (SDR) to obtain computationally efficient approximate solution. In the second scenario, we minimize the total power consumed by all relay nodes, subject to the condition that the received SNR at the legitimate destination is above the threshold and at every eavesdropper, it is below the corresponding threshold. We propose a semidefinite relaxation of the problem in this scenario and also provide an analytical lower bound.
Development of an audit tool for communication in product development: the communication grid method