-
Rate-Splitting Multiple Access for 6G Networks: Ten Promising Scenarios and Applications
Authors:
Jeonghun Park,
Byungju Lee,
**seok Choi,
Hoon Lee,
Namyoon Lee,
Seok-Hwan Park,
Kyoung-Jae Lee,
Junil Choi,
Sung Ho Chae,
Sang-Woon Jeon,
Kyung Sup Kwak,
Bruno Clerckx,
Wonjae Shin
Abstract:
In the upcoming 6G era, multiple access (MA) will play an essential role in achieving high throughput performances required in a wide range of wireless applications. Since MA and interference management are closely related issues, the conventional MA techniques are limited in that they cannot provide near-optimal performance in universal interference regimes. Recently, rate-splitting multiple acce…
▽ More
In the upcoming 6G era, multiple access (MA) will play an essential role in achieving high throughput performances required in a wide range of wireless applications. Since MA and interference management are closely related issues, the conventional MA techniques are limited in that they cannot provide near-optimal performance in universal interference regimes. Recently, rate-splitting multiple access (RSMA) has been gaining much attention. RSMA splits an individual message into two parts: a common part, decodable by every user, and a private part, decodable only by the intended user. Each user first decodes the common message and then decodes its private message by applying successive interference cancellation (SIC). By doing so, RSMA not only embraces the existing MA techniques as special cases but also provides significant performance gains by efficiently mitigating inter-user interference in a broad range of interference regimes. In this article, we first present the theoretical foundation of RSMA. Subsequently, we put forth four key benefits of RSMA: spectral efficiency, robustness, scalability, and flexibility. Upon this, we describe how RSMA can enable ten promising scenarios and applications along with future research directions to pave the way for 6G.
△ Less
Submitted 22 June, 2023;
originally announced June 2023.
-
Cognitive Radio-Inspired Rate-Splitting Multiple Access for Semi-Grant-Free Transmissions
Authors:
Hongwu Liu,
Kyeong ** Kim,
Theodoros A. Tsiftsis,
Bruno Clerckx,
Kyung Sup Kwak,
H. Vincent Poor
Abstract:
In this paper, we propose a cognitive radio-inspired rate-splitting multiple access (CR-RSMA) scheme to assist semi-grant-free (SGF) transmissions in which a grant-based user (GBU) and multiple grant-free users (GFUs) access the base-station (BS) by sharing the same resource block. Using the cognitive radio principle, the GBU and admitted GFU are treated as the primary and secondary users, respect…
▽ More
In this paper, we propose a cognitive radio-inspired rate-splitting multiple access (CR-RSMA) scheme to assist semi-grant-free (SGF) transmissions in which a grant-based user (GBU) and multiple grant-free users (GFUs) access the base-station (BS) by sharing the same resource block. Using the cognitive radio principle, the GBU and admitted GFU are treated as the primary and secondary users, respectively, and rate-splitting is applied at the admitted GFU to realize SGF transmissions. The admitted GFU's transmit power allocation, target rate allocation, and successive interference cancellation decoding order at the BS are jointly optimized to attain the maximum achievable rate for the admitted GFU without deteriorating the GBU's outage performance compared to orthogonal multiple access. Due to the extended non-outage zone, CR-RSMA-assised SGF (CR-RSMA-SGF) transmissions achieve a lower outage probability than SGF transmissions assisted by cognitive radio-inspired non-orthogonal multiple access. Exact expressions and asymptotic analysis for the admitted GFU's outage probability are derived to evaluate the system performance achieved by CR-RSMA-SGF transmissions. The superior outage performance and full multiuser diversity gain achieved by CR-RSMA-SGF transmissions are verified by the analytical and simulation results.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Rate Splitting Multiple Access for Semi-Grant-Free Transmissions
Authors:
Hongwu Liu,
Theodoros A. Tsiftsis,
Bruno Clerckx,
Kyeong ** Kim,
Kyung Sup Kwak,
H. Vincent Poor
Abstract:
Enabled by hybrid grant-based (GB) and grant-free (GF) transmission techniques, GF users of internet of things (IoT) devices and massive machine-type communications (mMTC) meet opportunities to share wireless resources with GB users. In this paper, we propose a rate splitting multiple access (RSMA) strategy for an emerging semi-grant-free (SGF) transmission system to increase connectivity and reli…
▽ More
Enabled by hybrid grant-based (GB) and grant-free (GF) transmission techniques, GF users of internet of things (IoT) devices and massive machine-type communications (mMTC) meet opportunities to share wireless resources with GB users. In this paper, we propose a rate splitting multiple access (RSMA) strategy for an emerging semi-grant-free (SGF) transmission system to increase connectivity and reliability. In the proposed RSMA assisted SGF (RSMA-SGF) scheme, the GF users apply the rate splitting principle to realize distributed contentions and utilize transmit power most effectively for robust transmissions, meanwhile kee** themselves transparent to the GB user. Compared to existing non-orthogonal multiple access (NOMA) assisted SGF schemes, the RSMA-SGF scheme significantly decreases outage probability and achieves full multiuser diversity gain without restricting the GB and GF users' target rates to a limited value region. Exact expressions and asymptotic analysis for the outage probability are provided to facilitate the system performance evaluation of the proposed RSMA-SGF scheme. Computer simulation results clarify the superior outage performance of the RSMA-SGF scheme and verify the accuracy of the developed analytical results.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing
Authors:
Zaiwar Ali,
Sadia Khaf,
Ziaul Haq Abba,
Ghulam Abbas,
Lei Jiao,
Amna Irshad,
Kyung Sup Kwak,
Muhammad Bilal
Abstract:
In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility…
▽ More
In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU, RAM, hard disk space, required time, and distance, to calculate a more realistic utility value for MESs. Moreover, we improve upon some general algorithms, used for resource allocation in MEC and cloud computing, by considering our proposed utility function. We name the improved versions of these resource allocation schemes as comprehensive resource allocation schemes. The UE requests are modeled to represent the amount of resources requested by the UE as well as the time for which the UE has requested these resources. The utility function depends upon the UE requests and the distance between UEs and MES, and serves as a realistic means of comparison between different types of UE requests. Choosing (or selecting) an optimal MES with the optimal amount of resources to be allocated to each UE request is a challenging task. We show that MES resource allocation is sub-optimal if CPU is the only resource considered. By taking into account the other resources, i.e., RAM, disk space, request time, and distance in the utility function, we demonstrate improvement in the resource allocation algorithms in terms of service rate, utility, and MES energy consumption.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
End to End Performance Analysis of Relay Cooperative Communication Based on Parked Cars
Authors:
Yingying Sun,
Lijun Wang,
Zhiquan Bai,
Kyung Sup Kwak,
Xuming Yao,
Tao Han
Abstract:
Parking lots (PLs) are usually full with cars. If these cars are formed into a self-organizing vehicular network, they can be new kind of road side units (RSUs) in urban area to provide communication data forwarding between mobile terminals nearby and a base station. However cars in PLs can leave at any time, which is neglected in the existing studies. In this paper, we investigate relay cooperati…
▽ More
Parking lots (PLs) are usually full with cars. If these cars are formed into a self-organizing vehicular network, they can be new kind of road side units (RSUs) in urban area to provide communication data forwarding between mobile terminals nearby and a base station. However cars in PLs can leave at any time, which is neglected in the existing studies. In this paper, we investigate relay cooperative communication based on parked cars in PLs. Taking the impact of the car's leaving behavior into consideration, we derive the expressions of outage probability in a two-hop cooperative communication and its link capacity. Finally, the numerical results show that the impact of a car's arriving time is greater than the impact of the duration the car has parked on outage probability.
△ Less
Submitted 28 January, 2018;
originally announced January 2018.
-
A Normalization Model for Analyzing Multi-Tier Millimeter Wave Cellular Networks
Authors:
Siqing Xiong,
Lijun Wang,
Kyung Sup Kwak,
Zhiquan Bai,
Jiang Wang,
Qiang Li,
Tao Han
Abstract:
Based on the distinguishing features of multi-tier millimeter wave (mmWave) networks such as different transmit powers, different directivity gains from directional beamforming alignment and path loss laws for line-of-sight (LOS) and non-line-of-sight (NLOS) links, we introduce a normalization model to simplify the analysis of multi-tier mmWave cellular networks. The highlight of the model is that…
▽ More
Based on the distinguishing features of multi-tier millimeter wave (mmWave) networks such as different transmit powers, different directivity gains from directional beamforming alignment and path loss laws for line-of-sight (LOS) and non-line-of-sight (NLOS) links, we introduce a normalization model to simplify the analysis of multi-tier mmWave cellular networks. The highlight of the model is that we convert a multi-tier mmWave cellular network into a single-tier mmWave network, where all the base stations (BSs) have the same normalized transmit power 1 and the densities of BSs scaled by LOS or NLOS scaling factors respectively follow piecewise constant function which has multiple demarcation points. On this basis, expressions for computing the coverage probability are obtained in general case with beamforming alignment errors and the special case with perfect beamforming alignment in the communication. According to corresponding numerical exploration, we conclude that the normalization model for multi-tier mmWave cellular networks fully meets requirements of network performance analysis, and it is simpler and clearer than the untransformed model. Besides, an unexpected but sensible finding is that there is an optimal beam width that maximizes coverage probability in the case with beamforming alignment errors.
△ Less
Submitted 7 January, 2018; v1 submitted 9 March, 2017;
originally announced March 2017.
-
Fuzzy Ontology-Based Sentiment Analysis of Transportation and City Feature Reviews for Safe Traveling
Authors:
Farman Ali,
D. Kwak,
Pervez Khan,
S. M. Riazul Islam,
K. H. Kim,
K. S. Kwak
Abstract:
Traffic congestion is rapidly increasing in urban areas, particularly in mega cities. To date, there exist a few sensor network based systems to address this problem. However, these techniques are not suitable enough in terms of monitoring an entire transportation system and delivering emergency services when needed. These techniques require real-time data and intelligent ways to quickly determine…
▽ More
Traffic congestion is rapidly increasing in urban areas, particularly in mega cities. To date, there exist a few sensor network based systems to address this problem. However, these techniques are not suitable enough in terms of monitoring an entire transportation system and delivering emergency services when needed. These techniques require real-time data and intelligent ways to quickly determine traffic activity from useful information. In addition, these existing systems and websites on city transportation and travel rely on rating scores for different factors (e.g., safety, low crime rate, cleanliness, etc.). These rating scores are not efficient enough to deliver precise information, whereas reviews or tweets are significant, because they help travelers and transportation administrators to know about each aspect of the city. However, it is difficult for travelers to read, and for transportation systems to process, all reviews and tweets to obtain expressive sentiments regarding the needs of the city. The optimum solution for this kind of problem is analyzing the information available on social network platforms and performing sentiment analysis. On the other hand, crisp ontology-based frameworks cannot extract blurred information from tweets and reviews; therefore, they produce inadequate results. In this regard, this paper proposes fuzzy ontology-based sentiment analysis and SWRL rule-based decision-making to monitor transportation activities and to make a city- feature polarity map for travelers. This system retrieves reviews and tweets related to city features and transportation activities. The feature opinions are extracted from these retrieved data, and then fuzzy ontology is used to determine the transportation and city-feature polarity. A fuzzy ontology and an intelligent system prototype are developed by using Protégé OWL and Java, respectively.
△ Less
Submitted 19 January, 2017;
originally announced January 2017.
-
5G Converged Cell-less Communications in Smart Cities
Authors:
Tao Han,
Xiaohu Ge,
Lijun Wang,
Kyung Sup Kwak,
Yujie Han,
Xiong Liu
Abstract:
Ubiquitous information service converged by different types of heterogeneous networks is one of fundamental functions for smart cities. Considering the deployment of 5G ultra-dense wireless networks, the 5G converged cell-less communication networks are proposed to support mobile terminals in smart cities. To break obstacles of heterogeneous wireless networks, the 5G converged cell-less communicat…
▽ More
Ubiquitous information service converged by different types of heterogeneous networks is one of fundamental functions for smart cities. Considering the deployment of 5G ultra-dense wireless networks, the 5G converged cell-less communication networks are proposed to support mobile terminals in smart cities. To break obstacles of heterogeneous wireless networks, the 5G converged cell-less communication network is vertically converged in different tiers of heterogeneous wireless networks and horizontally converged in celled architectures of base stations/access points. Moreover, the software defined network controllers are configured to manage the traffic scheduling and resource allocation in 5G converged cell-less communication networks. Simulation results indicate the coverage probability and the energy saving at both base stations and mobile terminals are improved by the cooperative grou** scheme in 5G converged cell-less communication networks.
△ Less
Submitted 15 March, 2017; v1 submitted 21 September, 2016;
originally announced September 2016.
-
Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges
Authors:
S. M. Riazul Islam,
Nurilla Avazov,
Octavia A. Dobre,
Kyung Sup Kwak
Abstract:
Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for performance enhancement in next-generation cellular communications. Compared to orthogonal frequency division multiple access (OFDMA), which is a well-known high-capacity orthogonal multiple access (OMA) technique, NOMA offers a set of desirable benefits, including greater spectrum efficiency. There are diffe…
▽ More
Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for performance enhancement in next-generation cellular communications. Compared to orthogonal frequency division multiple access (OFDMA), which is a well-known high-capacity orthogonal multiple access (OMA) technique, NOMA offers a set of desirable benefits, including greater spectrum efficiency. There are different types of NOMA techniques, including power-domain and code-domain. This paper primarily focuses on power-domain NOMA that utilizes superposition coding (SC) at the transmitter and successive interference cancellation (SIC) at the receiver. Various researchers have demonstrated that NOMA can be used effectively to meet both network-level and user-experienced data rate requirements of fifth-generation (5G) technologies. From that perspective, this paper comprehensively surveys the recent progress of NOMA in 5G systems, reviewing the state-of-the-art capacity analysis, power allocation strategies, user fairness, and user-pairing schemes in NOMA. In addition, this paper discusses how NOMA performs when it is integrated with various proven wireless communications techniques, such as cooperative communications, multiple input multiple output (MIMO), beamforming, space time coding, and network coding, among others. Furthermore, this paper discusses several important issues on NOMA implementation and provides some avenues for future research.
△ Less
Submitted 20 September, 2016;
originally announced September 2016.
-
Amplify-and-Forward Full-Duplex Relay with Power Splitting-Based SWIPT
Authors:
Hongwu Liu,
Kyung Sup Kwak
Abstract:
This paper proposes a virtual harvest-transmit model and a harvest-transmit-store model for amplify-and-forward full-duplex relay (FDR) networks with power splitting-based simultaneous wireless information and power transfer. The relay node employs a battery group consisting of two rechargeable batteries. By switching periodically between two batteries for charging and discharging in two consecuti…
▽ More
This paper proposes a virtual harvest-transmit model and a harvest-transmit-store model for amplify-and-forward full-duplex relay (FDR) networks with power splitting-based simultaneous wireless information and power transfer. The relay node employs a battery group consisting of two rechargeable batteries. By switching periodically between two batteries for charging and discharging in two consecutive time slots of each transmission block, all the harvested energy in each block has been applied for full duplex transmission in the virtual harvest-transmit model. By employing energy scheduling, the relay node switches among the harvesting, relaying, harvesting-relaying, and idle behaviors at a block level, so that a part of the harvested energy in a block can be scheduled for future usage in the harvest-transmit-store model. A greedy switching policy is designed to implement the harvest-transmit-store model, where the FDR node transmits when its residual energy ensures decoding at the destination. Numerical results verify the outage performance of the proposed schemes.
△ Less
Submitted 4 July, 2016;
originally announced July 2016.
-
Energy Saving of Base Stations Sleep Scheduling for Multi-Hop Vehicular Networks
Authors:
Tao Han,
Xiong Liu,
Lijun Wang,
Jiang Wang,
Kyung Sup Kwak,
Qiang Li
Abstract:
This paper investigates the energy saving of base station (BS) deployed in a 1-D multi-hop vehicular network with sleep scheduling strategy. We consider cooperative BS scheduling strategy where BSs can switch between sleep and active modes to reduce the average energy consumption utilizing the information of vehicular speeds and locations. Assuming a Poisson distribution of vehicles, we derive an…
▽ More
This paper investigates the energy saving of base station (BS) deployed in a 1-D multi-hop vehicular network with sleep scheduling strategy. We consider cooperative BS scheduling strategy where BSs can switch between sleep and active modes to reduce the average energy consumption utilizing the information of vehicular speeds and locations. Assuming a Poisson distribution of vehicles, we derive an appropriate probability distribution function of distance between two adjacent cluster heads, where a cluster is a maximal set of vehicles in which every two adjacent vehicles can communicate directly when their Euclidean distance is less than or equal to a threshold, known as the communication range of vehicles. Furthermore, the expected value of the sojourn time in the sleep mode and energy saving are obtained. The numerical results show that the sleep scheduling strategy significantly reduces the energy consumption of the base stations.
△ Less
Submitted 23 June, 2016;
originally announced June 2016.
-
Secure Ad-hoc Routing Scheme
Authors:
Anish Prasad Shrestha,
Kyung Sup Kwak
Abstract:
This paper investigates on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. We propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a safe routing scheme to transmit confidential message from transmitter to legitimate rece…
▽ More
This paper investigates on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. We propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a safe routing scheme to transmit confidential message from transmitter to legitimate receiver. The selection is based on the instantaneous channel conditions of relay and eavesdropper at each hop. A theoretical analysis is performed to derive new closed form expressions for probability of non-zero secrecy capacity along with the exact end to end secrecy outage probability at a normalized secrecy rate. Furthermore, we provide the asymptotic expression to gain insights on the diversity gain.
△ Less
Submitted 19 July, 2018; v1 submitted 8 June, 2015;
originally announced June 2015.
-
Power Splitting for Full-Duplex Relay with Wireless Information and Power Transfer
Authors:
Hongwu Liu,
Kyeong ** Kim,
Kyung Sup Kwak
Abstract:
This paper investigates power splitting for full-duplex relay networks with wireless information and energy transfer. By applying power splitting as a relay transceiver architecture, the full duplex information relaying can be powered by energy harvested from the source-emitted radio frequency signal. In order to minimize outage probability, power splitting ratios have been dynamically optimized a…
▽ More
This paper investigates power splitting for full-duplex relay networks with wireless information and energy transfer. By applying power splitting as a relay transceiver architecture, the full duplex information relaying can be powered by energy harvested from the source-emitted radio frequency signal. In order to minimize outage probability, power splitting ratios have been dynamically optimized according to full channel state information (CSI) and partial CSI, respectively. Under strong loop interference, the proposed full CSI-based and partial CSI-based power splitting schemes achieve the better outage performance than the fixed power splitting scheme, whereas the partial CSI-based power splitting scheme can ensure competitive outage performance without requiring CSI of the second-hop link. It is also observed that the worst outage performance is achieved when the relay is located midway between the source and destination, whereas the outage performance of partial CSI-based power splitting scheme approaches that of full CSI-based scheme when the relay is placed close to the destination.
△ Less
Submitted 18 April, 2015;
originally announced April 2015.
-
Relay Control for Full-Duplex Relaying with Wireless Information and Energy Transfer
Authors:
Hongwu Liu,
Kyeong ** Kim,
H. Vincent Poor,
Kyung Sup Kwak
Abstract:
This study investigates wireless information and energy transfer for dual-hop amplify-and-forward full-duplex relaying systems. By forming energy efficiency (EE) maximization problem into a concave fractional program of transmission power, three relay control schemes are separately designed to enable energy harvesting and full-duplex information relaying. With Rician fading modeled residual self-i…
▽ More
This study investigates wireless information and energy transfer for dual-hop amplify-and-forward full-duplex relaying systems. By forming energy efficiency (EE) maximization problem into a concave fractional program of transmission power, three relay control schemes are separately designed to enable energy harvesting and full-duplex information relaying. With Rician fading modeled residual self-interference channel, analytical expressions of outage probability and ergodic capacity are presented for the maximum relay, signal-to-interference-plus-noise-ratio (SINR) relay, and target relay. It has shown that EE maximization problem of the maximum relay is concave for time switching factor, so that bisection method has been applied to obtain the optimized value. By incorporating instantaneous channel information, the SINR relay with collateral time switching factor achieves an improved EE over the maximum relay in delay-limited and delay-tolerant transmissions. Without requiring channel information for the second-hop, the target relay ensures a competitive performance for outage probability, ergodic capacity, and EE. Comparing to the direct source-destination transmission, numerical results show that the proposed relaying scheme is beneficial in achieving a comparable EE for low-rate delay-limited transmission.
△ Less
Submitted 1 November, 2015; v1 submitted 14 March, 2015;
originally announced March 2015.
-
Enhanced Modulation Technique for Molecular Communication: OOMoSK
Authors:
Md. Humaun Kabir,
Kyung Sup Kwak
Abstract:
Molecular communication in nanonetworks is an emerging communication paradigm where molecules are used as information carriers. Concentration Shift Keying (CSK) and Molecule Shift Keying (MoSK) are being studied extensively for the short and medium range molecular nanonetworks. It is observed that MoSK outperforms CSK. However, MoSK requires different types of molecules for encoding which render t…
▽ More
Molecular communication in nanonetworks is an emerging communication paradigm where molecules are used as information carriers. Concentration Shift Keying (CSK) and Molecule Shift Keying (MoSK) are being studied extensively for the short and medium range molecular nanonetworks. It is observed that MoSK outperforms CSK. However, MoSK requires different types of molecules for encoding which render transmitter and receiver complexities. We propose a modulation scheme called On-Off MoSK (OOMoSK) in which, molecules are released for information bit 1 and no molecule is released for 0. The proposed scheme enjoys reduced number of the types of molecules for encoding. Numerical results show that the proposed scheme enhances channel capacity and Symbol Error Rate (SER).
△ Less
Submitted 11 November, 2014;
originally announced November 2014.
-
Robust Modulation Technique for Diffusion-based Molecular Communication in Nanonetworks
Authors:
Subodh Pudasaini,
Seokjoo Shin,
Kyung Sup Kwak
Abstract:
Diffusion-based molecular communication over nanonetworks is an emerging communication paradigm that enables nanomachines to communicate by using molecules as the information carrier. For such a communication paradigm, Concentration Shift Keying (CSK) has been considered as one of the most promising techniques for modulating information symbols, owing to its inherent simplicity and practicality. C…
▽ More
Diffusion-based molecular communication over nanonetworks is an emerging communication paradigm that enables nanomachines to communicate by using molecules as the information carrier. For such a communication paradigm, Concentration Shift Keying (CSK) has been considered as one of the most promising techniques for modulating information symbols, owing to its inherent simplicity and practicality. CSK modulated subsequent information symbols, however, may interfere with each other due to the random amount of time that molecules of each modulated symbols take to reach the receiver nanomachine. To alleviate Inter Symbol Interference (ISI) problem associated with CSK, we propose a new modulation technique called Zebra-CSK. The proposed Zebra-CSK adds inhibitor molecules in CSK-modulated molecular signal to selectively suppress ISI causing molecules. Numerical results from our newly developed probabilistic analytical model show that Zebra-CSK not only enhances capacity of the molecular channel but also reduces symbol error probability observed at the receiver nanomachine.
△ Less
Submitted 16 January, 2014; v1 submitted 16 January, 2014;
originally announced January 2014.
-
Optimum Tag Reading Efficiency of Multi-Packet Reception Capable RFID Readers
Authors:
Subodh Pudasaini,
Seokjoo Shin,
Kyung Sup Kwak
Abstract:
Maximizing the tag reading rate of a reader is one of the most important design objectives in RFID systems as the tag reading rate is inversely proportional to the time required to completely read all the tags within the reader's radio field. To this end, numerous techniques have been independently suggested so far and they can be broadly categorized into pure advancements in the link-layer tag an…
▽ More
Maximizing the tag reading rate of a reader is one of the most important design objectives in RFID systems as the tag reading rate is inversely proportional to the time required to completely read all the tags within the reader's radio field. To this end, numerous techniques have been independently suggested so far and they can be broadly categorized into pure advancements in the link-layer tag anti-collision protocols and pure advancements in the physical-layer RF transmission/reception model. In this paper, we show by rigorous mathematical analysis and Monte Carlo simulations that how such two independent approaches can be coupled to attain the optimum tag reading efficiency in a RFID system considering a Dynamic Frame Slotted Aloha based link layer anti-collision protocol at tags and a Multi-Packet Reception capable RF reception model at the reader.
△ Less
Submitted 28 November, 2013;
originally announced November 2013.
-
On Maximal Ratio Diversity with Weighting Errors for Physical Layer Security
Authors:
Anish Prasad Shrestha,
Kyung Sup Kwak
Abstract:
In this letter, we introduce the performance of maximal ratio combining (MRC) with weighting errors for physical layer security. We assume both legitimate user and eavesdropper each equipped with multiple antennas employ non ideal MRC. The non ideal MRC is designed in terms of power correlation between the estimated and actual fadings. We derive new closedform and generalized expressions for secre…
▽ More
In this letter, we introduce the performance of maximal ratio combining (MRC) with weighting errors for physical layer security. We assume both legitimate user and eavesdropper each equipped with multiple antennas employ non ideal MRC. The non ideal MRC is designed in terms of power correlation between the estimated and actual fadings. We derive new closedform and generalized expressions for secrecy outage probability. Next, we investigate the asymptotic behavior of secrecy outage probability for high signal-to-noise ratio in the main channel between legitimate user and transmitter. The asymptotic analysis provides the insights about actual diversity provided by MRC with weighting errors. We substantiate our claims with the analytic results and numerical evaluations.
△ Less
Submitted 9 November, 2013; v1 submitted 6 November, 2013;
originally announced November 2013.
-
An Overview of IEEE 802.15.6 Standard
Authors:
Kyung Sup Kwak,
Sana Ullah,
Niamat Ullah
Abstract:
Wireless Body Area Networks (WBAN) has emerged as a key technology to provide real-time health monitoring of a patient and diagnose many life threatening diseases. WBAN operates in close vicinity to, on, or inside a human body and supports a variety of medical and non-medical applications. IEEE 802 has established a Task Group called IEEE 802.15.6 for the standardization of WBAN. The purpose of th…
▽ More
Wireless Body Area Networks (WBAN) has emerged as a key technology to provide real-time health monitoring of a patient and diagnose many life threatening diseases. WBAN operates in close vicinity to, on, or inside a human body and supports a variety of medical and non-medical applications. IEEE 802 has established a Task Group called IEEE 802.15.6 for the standardization of WBAN. The purpose of the group is to establish a communication standard optimized for low-power in-body/on-body nodes to serve a variety of medical and non-medical applications. This paper explains the most important features of the new IEEE 802.15.6 standard. The standard defines a Medium Access Control (MAC) layer supporting several Physical (PHY) layers. We briefly overview the PHY and MAC layers specifications together with the bandwidth efficiency of IEEE 802.15.6 standard. We also discuss the security paradigm of the standard.
△ Less
Submitted 20 February, 2011;
originally announced February 2011.
-
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network
Authors:
Shahnaz Saleem,
Sana Ullah,
Kyung Sup Kwak
Abstract:
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) informatio…
▽ More
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
△ Less
Submitted 3 February, 2011;
originally announced February 2011.
-
Comparison of different Broadcast Schemes for Multi-Hop Wireless Sensor Networks
Authors:
S. Mehta,
K. S. Kwak
Abstract:
In this paper, we present the performance of different broadcast schemes for multihop sensor networks based on mathematical modeling. In near future many applications will demand multicast (Broadcast) communication feature from the sensor networks. This broadcast feature does not use virtual carrier sensing but relies on physical carrier sensing to reduce collision. For this paper, we analyze the…
▽ More
In this paper, we present the performance of different broadcast schemes for multihop sensor networks based on mathematical modeling. In near future many applications will demand multicast (Broadcast) communication feature from the sensor networks. This broadcast feature does not use virtual carrier sensing but relies on physical carrier sensing to reduce collision. For this paper, we analyze the different broadcast schemes for multihop wireless sensor networks and also calculated the achievable throughput.
△ Less
Submitted 17 August, 2010;
originally announced August 2010.
-
A Study of Medium Access Control Protocols for Wireless Body Area Networks
Authors:
Sana Ullah,
Bin Shen,
S. M. Riazul Islam,
Pervez Khan,
Shahnaz Saleem,
Kyung Sup Kwak
Abstract:
The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor n…
▽ More
The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent WBAN requirements.
△ Less
Submitted 31 July, 2010; v1 submitted 22 April, 2010;
originally announced April 2010.
-
H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks
Authors:
S. Mehta,
K. S. Kwak
Abstract:
In this paper, we propose a hybrid medium access control protocol (H-MAC) for wireless sensor networks. It is based on the IEEE 802.11's power saving mechanism (PSM) and slotted aloha, and utilizes multiple slots dynamically to improve performance. Existing MAC protocols for sensor networks reduce energy consumptions by introducing variation in an active/sleep mechanism. But they may not provide e…
▽ More
In this paper, we propose a hybrid medium access control protocol (H-MAC) for wireless sensor networks. It is based on the IEEE 802.11's power saving mechanism (PSM) and slotted aloha, and utilizes multiple slots dynamically to improve performance. Existing MAC protocols for sensor networks reduce energy consumptions by introducing variation in an active/sleep mechanism. But they may not provide energy efficiency in varying traffic conditions as well as they did not address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maintains energy efficiency as well as QoS issues like latency, throughput, and channel utilization. Our numerical results show that H-MAC has significant improvements in QoS parameters than the existing MAC protocols for sensor networks while consuming comparable amount of energy.
△ Less
Submitted 17 March, 2010;
originally announced March 2010.
-
A Review of Wireless Body Area Networks for Medical Applications
Authors:
Sana Ullah,
Pervez Khan,
Niamat Ullah,
Shahnaz Saleem,
Henry Higgins,
Kyung Sup Kwak
Abstract:
Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. They are widely used for ubiquitous healthcare, entertainme…
▽ More
Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solutions towards in-body and on-body sensor networks.
△ Less
Submitted 3 August, 2010; v1 submitted 6 January, 2010;
originally announced January 2010.
-
Applications of UWB Technology
Authors:
Sana Ullah,
Murad Ali,
Asdaque Hussain,
Kyung Sup Kwak
Abstract:
Recent advances in wideband impulse technology, low power communication along with unlicensed band have enabled ultra wide band (UWB) as a leading technology for future wireless applications. This paper outlines the applications of emerging UWB technology in a private and commercial sector. We further talk about UWB technology for a wireless body area network (WBAN).
Recent advances in wideband impulse technology, low power communication along with unlicensed band have enabled ultra wide band (UWB) as a leading technology for future wireless applications. This paper outlines the applications of emerging UWB technology in a private and commercial sector. We further talk about UWB technology for a wireless body area network (WBAN).
△ Less
Submitted 2 April, 2015; v1 submitted 9 November, 2009;
originally announced November 2009.
-
A Study of Implanted and Wearable Body Sensor Networks
Authors:
Sana Ullah,
Henry Higgins,
M. Arif Siddiqui,
Kyung Sup Kwak
Abstract:
Recent advances in intelligent sensors, microelectronics and integrated circuit, system-on-chip design and low power wireless communication introduced the development of miniaturised and autonomous sensor nodes. These tiny sensor nodes can be deployed to develop a proactive Body Sensor Network (BSN). The rapid advancement in ultra low-power RF (radio frequency) technology enables invasive and non-…
▽ More
Recent advances in intelligent sensors, microelectronics and integrated circuit, system-on-chip design and low power wireless communication introduced the development of miniaturised and autonomous sensor nodes. These tiny sensor nodes can be deployed to develop a proactive Body Sensor Network (BSN). The rapid advancement in ultra low-power RF (radio frequency) technology enables invasive and non-invasive devices to communicate with a remote station. This communication revolutionizes healthcare system by enabling long term health monitoring of a patient and providing real time feedback to the medical experts. In this paper, we present In-body and On-body communication networks with a special focus on the methodologies of wireless communication between implanted medical devices with external monitoring equipment and recent technological growth in both areas. We also discuss open issues and challenges in a BSN.
△ Less
Submitted 29 October, 2018; v1 submitted 8 November, 2009;
originally announced November 2009.
-
Towards Power Efficient MAC Protocol for In-Body and On-Body Sensor Networks
Authors:
Sana Ullah,
Xizhi An,
Kyung Sup Kwak
Abstract:
This paper presents an empirical discussion on the design and implementation of a power-efficient Medium Access Control (MAC) protocol for in-body and on-body sensor networks. We analyze the performance of a beacon-enabled IEEE 802.15.4, PB-TDMA, and S-MAC protocols for on-body sensor networks. We further present a Traffic Based Wakeup Mechanism that utilizes the traffic patterns of the BAN Node…
▽ More
This paper presents an empirical discussion on the design and implementation of a power-efficient Medium Access Control (MAC) protocol for in-body and on-body sensor networks. We analyze the performance of a beacon-enabled IEEE 802.15.4, PB-TDMA, and S-MAC protocols for on-body sensor networks. We further present a Traffic Based Wakeup Mechanism that utilizes the traffic patterns of the BAN Nodes (BNs) to accommodate the entire BSN traffic. To enable a logical connection between different BNs working on different frequency bands, a method called Bridging function is proposed. The Bridging function integrates all BNs working on different bands into a complete BSN.
△ Less
Submitted 2 February, 2010; v1 submitted 8 November, 2009;
originally announced November 2009.
-
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects
Authors:
Ahasanun Nessa,
M. A. Ameen,
Sana Ullah,
Kyung Sup Kwak
Abstract:
Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way to provide medical procedures or examinations to remote locations. It has the potential to improve both the quality and the access to health care services delivery while lowering costs even in the scarcity of resources. U…
▽ More
Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way to provide medical procedures or examinations to remote locations. It has the potential to improve both the quality and the access to health care services delivery while lowering costs even in the scarcity of resources. Understanding the potentiality of telemedicine, many develo** countries are implementing telemedicine to provide health care facility to remote area where health care facilities are deficient. Bangladesh is not an exception to this either. In this paper we mention the reasons why Bangladesh has to move for telemedicine. We also present the past and on-going telemedicine activities and projects in Bangladesh. Analyzing these projects we have found out some factors which should be assessed carefully for successful implementation of telemedicine application. Finally we propose a prototype telemedicine network for Bangladesh that can improve health facilities through telemedicine by making a connection between rural health facility providers and special hospitals.
△ Less
Submitted 8 November, 2009;
originally announced November 2009.
-
Resolution of Unidentified Words in Machine Translation
Authors:
Sana Ullah,
M. Asdaque Hussain,
Kyung Sup Kwak
Abstract:
This paper presents a mechanism of resolving unidentified lexical units in Text-based Machine Translation (TBMT). In a Machine Translation (MT) system it is unlikely to have a complete lexicon and hence there is intense need of a new mechanism to handle the problem of unidentified words. These unknown words could be abbreviations, names, acronyms and newly introduced terms. We have proposed an alg…
▽ More
This paper presents a mechanism of resolving unidentified lexical units in Text-based Machine Translation (TBMT). In a Machine Translation (MT) system it is unlikely to have a complete lexicon and hence there is intense need of a new mechanism to handle the problem of unidentified words. These unknown words could be abbreviations, names, acronyms and newly introduced terms. We have proposed an algorithm for the resolution of the unidentified words. This algorithm takes discourse unit (primitive discourse) as a unit of analysis and provides real time updates to the lexicon. We have manually applied the algorithm to news paper fragments. Along with anaphora and cataphora resolution, many unknown words especially names and abbreviations were updated to the lexicon.
△ Less
Submitted 28 July, 2010; v1 submitted 9 November, 2009;
originally announced November 2009.
-
A Discourse-based Approach in Text-based Machine Translation
Authors:
Sana Ullah,
M. A. Khan,
Kyung Sup Kwak
Abstract:
This paper presents a theoretical research based approach to ellipsis resolution in machine translation. The formula of discourse is applied in order to resolve ellipses. The validity of the discourse formula is analyzed by applying it to the real world text, i.e., newspaper fragments. The source text is converted into mono-sentential discourses where complex discourses require further dissection…
▽ More
This paper presents a theoretical research based approach to ellipsis resolution in machine translation. The formula of discourse is applied in order to resolve ellipses. The validity of the discourse formula is analyzed by applying it to the real world text, i.e., newspaper fragments. The source text is converted into mono-sentential discourses where complex discourses require further dissection either directly into primitive discourses or first into compound discourses and later into primitive ones. The procedure of dissection needs further improvement, i.e., discovering as many primitive discourse forms as possible. An attempt has been made to investigate new primitive discourses or patterns from the given text.
△ Less
Submitted 28 July, 2010; v1 submitted 8 November, 2009;
originally announced November 2009.
-
A Novel Cross Layer Scheme for Multi-Channel Hybrid Cognitive Ad-hoc Networks
Authors:
Yingji Zhong,
Sana Ullah,
Kyung Sup Kwak
Abstract:
A special scenario of the topology in the hybrid Cognitive Ad-hoc networks is studied and a novel cross layer scheme is proposed in this paper. The proposed scheme integrated the attributes both of the new performance evaluation machine check time metric and the topology space in special scenario. The topology and power consumption of each node can all be optimized due to the minimum link occupa…
▽ More
A special scenario of the topology in the hybrid Cognitive Ad-hoc networks is studied and a novel cross layer scheme is proposed in this paper. The proposed scheme integrated the attributes both of the new performance evaluation machine check time metric and the topology space in special scenario. The topology and power consumption of each node can all be optimized due to the minimum link occupation with the help of this scheme. Simulation results show that the novel scheme can give schedule guarantee to the multi-channel networks in the variable node loads and transmission powers, and make the node stable to support multi-hops at the same time.
△ Less
Submitted 8 November, 2009;
originally announced November 2009.
-
MIMO Cluster Cooperative Assignment Cross Layer Scheme for Hybrid Wireless Sensor Networks
Authors:
Yingji Zhong,
Kyung Sup Kwak,
Sana Ullah
Abstract:
The dual-cross scenario of the hybrid wireless sensor networks (WSNs) is studied and a novel MIMO Cluster Cooperative Assignment Cross Layer Scheduling Scheme (MCCA-CLSS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated, the clusters are optimized. With the help of the simulations, the relative energy consumption and the end-to-end blocking pro…
▽ More
The dual-cross scenario of the hybrid wireless sensor networks (WSNs) is studied and a novel MIMO Cluster Cooperative Assignment Cross Layer Scheduling Scheme (MCCA-CLSS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated, the clusters are optimized. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.
△ Less
Submitted 6 August, 2010; v1 submitted 8 November, 2009;
originally announced November 2009.
-
On the Development of Low Power MAC Protocol for WBANs
Authors:
Sana Ullah,
Pervez Khan,
Kyung Sup Kwak
Abstract:
Current advances in wireless communication, microelectronics, semiconductor technologies, and intelligent sensors have contributed to the development of unobtrusive WBANs. These networks provide long term health monitoring of patients without any constraint in their normal activities. Traditional MAC protocols do not accommodate the assorted WBAN traffic requirements in a power efficient manner. I…
▽ More
Current advances in wireless communication, microelectronics, semiconductor technologies, and intelligent sensors have contributed to the development of unobtrusive WBANs. These networks provide long term health monitoring of patients without any constraint in their normal activities. Traditional MAC protocols do not accommodate the assorted WBAN traffic requirements in a power efficient manner. In this paper, we present a brief discussion on the development process of a low power MAC protocol for WBANs. We observe the behavior of a beacon-enabled IEEE 802.15.4 for on-body sensor networks. We further propose a low power technique called traffic based wakeup mechanism for a WBAN that exploits the traffic patterns of the BAN Nodes to ensure power efficient and reliable communication.
△ Less
Submitted 25 October, 2018; v1 submitted 8 November, 2009;
originally announced November 2009.
-
Performance Analysis of Two-Hop Cooperative MIMO transmission with Relay Selection in Rayleigh Fading Channel
Authors:
Ahasanun Nessa,
Qinghai Yang,
Sana Ullah,
Humaun Kabir,
Kyung Sup Kwak
Abstract:
Wireless relaying is one of the promising solutions to overcome the channel impairments and provide high data rate coverage that appears for beyond 3G mobile communications. In this paper we present an end to end BER performance analysis of dual hop wireless communication systems equipped with multiple decode and forward relays over the Rayleigh fading channel with relay selection. We select the…
▽ More
Wireless relaying is one of the promising solutions to overcome the channel impairments and provide high data rate coverage that appears for beyond 3G mobile communications. In this paper we present an end to end BER performance analysis of dual hop wireless communication systems equipped with multiple decode and forward relays over the Rayleigh fading channel with relay selection. We select the best relay based on end to end channel conditions. We apply orthogonal space time block coding (OSTBC) at source, and also present how the multiple antennas at the source terminal affects the end to end BER performance. This intermediate relay technique will cover long distance where destination is out of reach from source.
△ Less
Submitted 8 November, 2009;
originally announced November 2009.
-
MAC Layer Hurdles in BSNs
Authors:
Sana Ullah,
Pervez Khan,
Young-Woo Choi,
Hyung-Soo Lee,
Kyung Sup Kwak
Abstract:
The last few decades have seen considerable research progress in microelectronics and integrated circuits, system-on-chip design, wireless communication, and sensor technology. This progress has enabled the seamless integration of autonomous wireless sensor nodes around a human body to create a Body Sensor Network (BSN). The development of a proactive and ambulatory BSN induces a number of enormou…
▽ More
The last few decades have seen considerable research progress in microelectronics and integrated circuits, system-on-chip design, wireless communication, and sensor technology. This progress has enabled the seamless integration of autonomous wireless sensor nodes around a human body to create a Body Sensor Network (BSN). The development of a proactive and ambulatory BSN induces a number of enormous issues and challenges. This paper presents the technical hurdles during the design and implementation of a low-power Medium Access Control (MAC) protocol for in-body and on-body sensor networks. We analyze the performance of IEEE 802.15.4 protocol for the on-body sensor network. We also provide a comprehensive insight into the heterogeneous characteristics of the in-body sensor network. A low-power technique called Pattern-Based Wake-up Table is proposed to handle the normal traffic in a BSN. The proposed technique provides a reliable solution towards low-power communication in the in-body sensor network.
△ Less
Submitted 25 October, 2018; v1 submitted 8 November, 2009;
originally announced November 2009.
-
Throughput Limits of IEEE 802.11 and IEEE 802.15.3
Authors:
Sana Ullah,
Yingji Zhong,
S. M. Riazul Islam,
Ahasanun Nessa,
Kyung Sup Kwak
Abstract:
IEEE 802.11 and IEEE 802.15.3 are wireless standards originally designed for wireless local area network (WLAN) and wireless personal area network (WPAN). This paper studies MAC throughput analysis of both standards. We present a comparative analysis of both standards in terms of MAC throughput and bandwidth efficiency. Numerical results show that the performance of IEEE 802.15.3 transcends IEEE…
▽ More
IEEE 802.11 and IEEE 802.15.3 are wireless standards originally designed for wireless local area network (WLAN) and wireless personal area network (WPAN). This paper studies MAC throughput analysis of both standards. We present a comparative analysis of both standards in terms of MAC throughput and bandwidth efficiency. Numerical results show that the performance of IEEE 802.15.3 transcends IEEE 802.11 in all cases.
△ Less
Submitted 8 November, 2009;
originally announced November 2009.
-
Photonic quantum ring laser
Authors:
J. C. Ahn,
K. S. Kwak,
B. H. Park,
H. Y. Kang,
J. Y. Kim,
O'Dae Kwon
Abstract:
We report a quantum ring-like toroidal cavity naturally formed in a vertical-cavity-like active microdisk plane due to Rayleigh's band of whispering gallery modes. The $\sqrt{T}$-dependent redshift and a square-law property of microampere-range threshold currents down to 2 $μ$A are consistent with a photonic quantum wire view, due to whispering gallery mode-induced dimensional reduction.
We report a quantum ring-like toroidal cavity naturally formed in a vertical-cavity-like active microdisk plane due to Rayleigh's band of whispering gallery modes. The $\sqrt{T}$-dependent redshift and a square-law property of microampere-range threshold currents down to 2 $μ$A are consistent with a photonic quantum wire view, due to whispering gallery mode-induced dimensional reduction.
△ Less
Submitted 20 December, 1998; v1 submitted 28 November, 1998;
originally announced November 1998.