banner

Filter by

Comparison of statistical deterioration models for water distribution networks

The use of water main break history as a proxy for condition has become common practice because of the high costs associated with direct assessments. Statistical deterioration models predict future water main breaks on the basis of historical patterns. Many municipalities are beginning to understand the value of utilizing water pipe break histories to manage their noncritical distribution networks

Energy and Water

Constrained interference alignment and the spatial degrees of freedom of mimo cognitive networks

An interference alignment (IA) scheme is presented that allows multiple opportunistic transmitters (secondary users) to use the same frequency band of a pre-existing primary link without generating any interference. The primary and secondary transmit-receive pairs are equipped with multiple antennas. Under power constraints on the primary transmitter, the rate of the primary user is maximized by

Software and Communications

DPSK receiver-sensitivity enhancement using an SOA in front of the receiver

A technique for DPSK receiver-sensitivity improvement is demonstrated using numerical simulations. It is based on reshaping and reamplifying of received 80 Gbit/s DPSK using an SOA before a one bit delay interferometer. The SOA re-amplifies data without adding amplitude or differential phase noise due to its gain-compression. The system is tested using 231-1 PRBS RZ-DPSK (NRZ-DPSK) loaded with

Software and Communications

Proactive resource allocation in cognitive networks

Recently we have introduced the notion of proactive resource allocation and predictive wireless networks, where intelligent wireless networks are capable of tracking and exploiting the repetition patterns in human behavior while accessing the network resources. This predictability advantage grants the network more flexibility to schedule users' requests over a longer time horizon, and thereby

Software and Communications

Practical provably secure communication for half-duplex radios

In this paper, we present a practical and provably secure two-way wireless communication scheme in the presence of a passive eavesdropper. The scheme implements a randomized scheduling and power allocation mechanism, where each legitimate node transmits in random time slots and with random transmit power. Such randomization results in ambiguity at the eavesdropper with regard to the origin of each

Software and Communications

Cooperative sensing with sequential ordered transmissions to secondary fusion center

Successful spectrum sharing in a cognitive radio network depends on the correct and quick detection of primary activity. Cooperative spectrum sensing is therefore suggested to enhance the reliability of such detection. However, it renders another significant problem of increased detection delay and traffic burden. Moreover, efficient schemes for multi-sensor data fusion should be designed. In this

Software and Communications

A multiple performance analysis of market-capacity integration policies

A model that uses simulation augmented with Design of Experiments (DOE) is presented to analyse the performance of a Make-to-Order (MTO) reconfigurable manufacturing system with scalable capacity. Unlike the classical capacity scaling policies, the proposed hybrid capacity scaling policy is determined using multiple performance measures that reflect cost, internal stability and responsiveness. The

Polarization in bistatic radar probing of planetary surfaces: Application to mars express data

Spacecraft-to-ground bistatic radar provides a straightforward method for surveying planetary surfaces on scales of importance to landers and rovers. Centimeter wavelengths, currently in use for deep-space telecommunications, interact with surface structure of similar to somewhat larger scales. For the quasi-specular component of scattering and for surfaces uniformly illuminated by monochromatic

Keys through ARQ: Theory and practice

This paper develops a novel framework for sharing secret keys using the Automatic Repeat reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits, under different assumptions on the channel spatial and temporal correlation function. Our analysis reveals a novel role of dumb antennas in overcoming the negative impact of spatial correlation on the achievable secrecy

Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Multiuser MIMO relaying under quality of service constraints

We consider a wireless communication scenario with K source-destination pairs communicating through several half-duplex amplify-and-forward relays. We design the relay beamforming matrices by minimizing the total power transmitted from all the relays subject to quality of service constraints on the received signal to interference-plus-noise ratio at each destination node. We propose a novel method

Software and Communications
Innovation, Entrepreneurship and Competitiveness