One of the few works to analyze the establishment of a major global infrastructure project, this book provides an outstanding analytical overview of the history of global electronic communications ...from the mid-nineteenth century to the present.
Abstract The authors study the energy efficiency (EE) of ambient backscatter communication (AmBC) device‐assisted and reconfigurable intelligent surfaces (RIS)‐assisted non‐orthogonal multiple access ...(NOMA) downlinks. The authors establish two optimisation problems based on the two collaborative devices (AmBC devices, RIS) with the objective of maximising the EE of the system, taking into account the requirements of power limitation and rate limitation, etc. and also obtain the solutions of two problems by optimising the relevant performance metrics based on the alternating optimisation algorithm. For the backscatter device (BD)‐aided downlink NOMA network, the problem is first decoupled into three subproblems, where the power allocation optimisation subproblem is solved by using the quadratic transformation method and the subgradient algorithm. The maximum EE is obtained by iterating according to the Dinkelbach's algorithm. For the RIS‐aided downlink NOMA network, the power allocation problem is solved by the same method as above and the phase optimisation problem is solved by the successive convex approximation method. Numerical results show that the proposed algorithm can achieve convergence after several iterations, and the EE of systems with BD‐assisted and RIS‐assisted have different levels of sensitivity to different influencing factors.
In the public imagination, Silicon Valley embodies the newest of
the new-the cutting edge, the forefront of our social networks and
our globally interconnected lives. But the pressures exerted on
...many of today's communications tech workers mirror those of a much
earlier generation of laborers in a very different space: the
London workforce that helped launch and shape the massive
telecommunications systems operating at the turn of the twentieth
century. As the Victorian age ended, affluent Britons came to rely
on information exchanged along telegraph and telephone wires for
seamless communication: an efficient and impersonal mode of sharing
thoughts, demands, and desires. This embrace of seemingly
unmediated communication obscured the labor involved in the smooth
operation of the network, much as our reliance on social media and
app interfaces does today. Serving a Wired World is a
history of information service work embedded in the daily
maintenance of liberal Britain and the status quo in the early
years of the twentieth century. As Katie Hindmarch-Watson shows,
the administrators and engineers who crafted these
telecommunications systems created networks according to
conventional gender perceptions and social hierarchies, modeling
the operation of the networks on the dynamic between master and
servant. Despite attempts to render telegraphists and telephone
operators invisible, these workers were quite aware of their
crucial role in modern life, and they posed creative challenges to
their marginalized status-from organizing labor strikes to
participating in deviant sexual exchanges. In unexpected ways,
these workers turned a flatly neutral telecommunications network
into a revolutionary one, challenging the status quo in ways
familiar today.
Network Nation John, Richard R
2010, 2015-10-05, 20100101
eBook
Network Nation places the history of telecommunications within the broader context of American politics, business, and discourse. This engrossing and provocative book persuades us of the critical ...role of political economy in the development of new technologies and their implementation.
The European telecommunications sector has been radically transformed in the past 25 years: from a group of state monopolies to a set of increasingly competitive markets. In this paper we summarize ...how this process has unfolded—for both fixed and mobile telecommunications—by focusing on the evolution of the regulatory framework and by drawing some parallels with the evolution of the sector in the US. Given the major strategic importance of the sector, we highlight some of the challenges that lie ahead.
Many families of binary nonlinear codes (e.g., Kerdock, Goethals, Delsarte–Goethals, Preparata) can be very simply constructed from linear codes over the Zsub.4 ring (ring of integers modulo 4), by ...applying the Gray map to the quaternary symbols. Generalized Kerdock codes represent an extension of classical Kerdock codes to the Zsub.2S ring. In this paper, we develop two novel soft-input decoders, designed to exploit the unique structure of these codes. We introduce a novel soft-input ML decoding algorithm and a soft-input soft-output MAP decoding algorithm of generalized Kerdock codes, with a complexity of O(Nsup.Slogsub.2N), where N is the length of the Zsub.2S code, that is, the number of Zsub.2S symbols in a codeword. Simulations show that our novel decoders outperform the classical lifting decoder in terms of error rate by some 5 dB.
The emerging sixth generation (6G) is the integration of heterogeneous wireless networks, which can seamlessly support anywhere and anytime networking. But high quality of trust should be offered by ...6G to meet mobile user expectations. Artificial intelligence (AI) is considered as one of the most important components in 6G. AI-based trust management is a promising paradigm to provide trusted and reliable services. In this article, a generative-adversarial-learning-en-abled trust management method is presented for 6G wireless networks. Some typical AI-based trust management schemes are first reviewed, and then a potential heterogeneous and intelligent 6G architecture is introduced. Next, the integration of AI and trust management is developed to optimize intelligence and security. Finally, the presented AI-based trust management method is applied to secure clustering to achieve reliable and real-time communications. Simulation results have demonstrated its excellent performance in guaranteeing network security and service quality.
Networks deployed in harsh environments, such as high-speed trains, subways, deserts, trenches, forests, and underground mining, should be specially constructed to withstand extreme conditions such ...as high or low temperatures, corrosive humidity, extreme weather or excessive dust and dirt. Such applications require specially designed wireless networks, sensor networks, fiber optic networks, or satellite networks that can perform under extreme conditions and meet the quality of service (QoS), security, and reliability requirement. Quite often, networks in harsh environments have extremely low signal-to-noise ratio (SNR), high Doppler shift, and long latency, and often consumes more power and energy. Bandwidth limitation in harsh environments requires spectrum-efficient communications. The current state -of-the-art technologies such as edge computing, massive multiple-input multiple-output (MIMO), advanced modulation and channel coding, artificial intelligence, and signal processing provide different venues to explore this challenging area.
It has been recently shown that zero padding (ZP)-orthogonal frequency-division multiplexing (OFDM) is a promising candidate for 6G wireless systems requiring joint communication and sensing. In this ...paper, we consider a multiuser uplink scenario where users are separated in power domain, i.e., non-orthogonal multiple access (NOMA), and use ZP-OFDM signals. The uplink transmission is grant-free and users are allowed to transmit asynchronously. In this setup, we address the problem of time synchronization by estimating the timing offset (TO) of all the users. We propose two non-data-aided (NDA) estimators, i.e., the joint method of moment (JMoM) and the successive moment cancellation (SMC), that employ the periodicity of the second order moment (SoM) of the received samples for TO estimation. Moreover, the coding assisted (CA) version of the proposed estimators, i.e., CA-JMoM and CA-SMC, are developed for the case of short observation samples. We also extend the proposed estimators to multiuser multiple-input multiple-output (MIMO) systems. The effectiveness of the proposed estimators is evaluated in terms of lock-in probability under various practical scenarios. Simulation results show that the JMoM estimator can reach the lock-in probability of one for the moderate range of Esub.b/Nsub.0 values. While existing NDA TO estimators in the literature either offer low lock-in probability, high computational complexity that prevents them from being employed in MIMO systems, or are designed for single-user scenarios, the proposed estimators in this paper address all of these issues.
Digital marketplaces were created recently to accelerate the delivery of applications and services to customers. Their appealing feature is to activate and dynamize the demand, supply, and ...development of digital goods, applications, or services. By being an intermediary between producer and consumer, the primary business model for a marketplace is to charge the producer with a commission on the amount paid by the consumer. However, most of the time, the commission is dictated by the marketplace facilitator itself and creates an imbalance in value distribution, where producer and consumer sides suffer monetarily. In order to eliminate the need for a centralized entity between the producer and consumer, a blockchain-based decentralized digital marketplace concept was introduced. It provides marketplace actors with the tools to perform business transactions in a trusted manner and without the need for an intermediary. In this work, we provide a survey on Telecommunication Services Marketplaces (TSMs) which employ blockchain technology as the main trust enabling entity in order to avoid any intermediaries. We provide an overview of scientific and industrial proposals on the blockchain-based online digital marketplaces at large, and TSMs in particular. We consider in this study the notion of telecommunication services as any service enabling the capability for information transfer and, increasingly, information processing provided to a group of users by a telecommunications system. We discuss the main standardization activities around the concepts of TSMs and provide particular use-cases for the TSM business transactions such as SLA settlement. Also, we provide insights into the main foundational services provided by the TSM, as well as a survey of the scientific and industrial proposals for such services. Finally, a prospect for future developments is given.