9,456,771 research outputs found

    Theory of Quantum Pulse Position Modulation and Related Numerical Problems

    Full text link
    The paper deals with quantum pulse position modulation (PPM), both in the absence (pure states) and in the presence (mixed states) of thermal noise, using the Glauber representation of coherent laser radiation. The objective is to find optimal (or suboptimal) measurement operators and to evaluate the corresponding error probability. For PPM, the correct formulation of quantum states is given by the tensorial product of m identical Hilbert spaces, where m is the PPM order. The presence of mixed states, due to thermal noise, generates an optimization problem involving matrices of huge dimensions, which already for 4-PPM, are of the order of ten thousand. To overcome this computational complexity, the currently available methods of quantum detection, which are based on explicit results, convex linear programming and square root measurement, are compared to find the computationally less expensive one. In this paper a fundamental role is played by the geometrically uniform symmetry of the quantum PPM format. The evaluation of error probability confirms the vast superiority of the quantum detection over its classical counterpart.Comment: 10 pages, 7 figures, accepted for publication in IEEE Trans. on Communication

    Life

    Get PDF
    This project is about offering a solution to nationally displaced populations. Our group has created a system that will not only provide people with housing but a piece of mind. Nexus Maximus IV The Challenge: Innovation for Refugees and Displaced Populations One of the great challenges of our time is how to help refugees and displaced populations, and how to prevent the causes in the first place. Every minute, 24 people around the world are forced to flee their homes. That’s 34,000 people a day who leave everything behind in the hope of finding safety and a better tomorrow. The impact of war, political, racial and religious conflict, and environmental crises of famine and climate change, have caused great suffering and there is a great opportunity to do better. The issues these populations and the countries who receive them face are diverse and complex. They include public health, housing/built environment, cultural integration, public safety, employment/economic and more. How can innovation address these challenges? How do we create the social systems and products to support a healthy, safe and integrated program for refugees? How do we address the physical, emotional, and social needs of refugees to restore hope and opportunity? The solutions may be as far ranging as the challenges, exploring the acute needs during a crisis, as well as the chronic needs of the permanently displaced; looking at immigration and adjustments to new cultures. We encourage participants to draw upon all disciplines, from health professions to architecture, engineering to design, ethics, communication and every way of thinking we have, to find better ways to innovate on physical solutions, processes, policies, systems, and more. Recap of poster presentations.https://jdc.jefferson.edu/nexusmaximus/1021/thumbnail.jp

    Report from U.S. Coalition for Life

    Get PDF
    Summary of The Population Slowdown - A Challenge to the Military by Colonel Robert X. de Marcellus, from a special issue of the The Prolife Reporte

    Clayville Rural Life Center and Museum - Publications Series I - Living History Resource List #05: Metal Trades and Crafts

    Get PDF
    This resource list pertains to the study of metal trades and crafts. The list is divided into two parts: Bibliography and the Conservation and Testing of Metal Artifacts. The Bibliography is further divided into four sections: Primary Production and General; Blacksmithing: Tools, Processes, and Products; Pewter and Pewtersmithing; and Tinware and Tinsmithing. The list contains both primary and secondary sources and their locations. 10p.published or submitted for publicationis peer reviewe

    Clayville Rural Life Center and Museum - Publications Series I - Living History Resource List #12: Inns, Taverns and Hotels in the Midwest to 1860: Materials Useful for the Study of Their Architecture and Functions, and a Checklist of Surviving Buildings in Illinois and in the Midwest

    Get PDF
    This resource list contains sources pertaining to Inns, Taverns, and Hotels in the Midwest to 1860. The publication is divided into three parts: a bibliography, existing structures in Illinois, and existing structures in the Midwest. The bibliography is divided into three parts: the United States, the Midwest, and Illinois. Sources listed include secondary, primary, and archival resources. 14p.published or submitted for publicationis peer reviewe

    Channel-Aware Random Access in the Presence of Channel Estimation Errors

    Full text link
    In this work, we consider the random access of nodes adapting their transmission probability based on the local channel state information (CSI) in a decentralized manner, which is called CARA. The CSI is not directly available to each node but estimated with some errors in our scenario. Thus, the impact of imperfect CSI on the performance of CARA is our main concern. Specifically, an exact stability analysis is carried out when a pair of bursty sources are competing for a common receiver and, thereby, have interdependent services. The analysis also takes into account the compound effects of the multipacket reception (MPR) capability at the receiver. The contributions in this paper are twofold: first, we obtain the exact stability region of CARA in the presence of channel estimation errors; such an assessment is necessary as the errors in channel estimation are inevitable in the practical situation. Secondly, we compare the performance of CARA to that achieved by the class of stationary scheduling policies that make decisions in a centralized manner based on the CSI feedback. It is shown that the stability region of CARA is not necessarily a subset of that of centralized schedulers as the MPR capability improves.Comment: The material in this paper was presented in part at the IEEE International Symposium on Information Theory, Cambridge, MA, USA, July 201

    On the Stability of Random Multiple Access with Stochastic Energy Harvesting

    Full text link
    In this paper, we consider the random access of nodes having energy harvesting capability and a battery to store the harvested energy. Each node attempts to transmit the head-of-line packet in the queue if its battery is nonempty. The packet and energy arrivals into the queue and the battery are all modeled as a discrete-time stochastic process. The main contribution of this paper is the exact characterization of the stability region of the packet queues given the energy harvesting rates when a pair of nodes are randomly accessing a common channel having multipacket reception (MPR) capability. The channel with MPR capability is a generalized form of the wireless channel modeling which allows probabilistic receptions of the simultaneously transmitted packets. The results obtained in this paper are fairly general as the cases with unlimited energy for transmissions both with the collision channel and the channel with MPR capability can be derived from ours as special cases. Furthermore, we study the impact of the finiteness of the batteries on the achievable stability region.Comment: The material in this paper was presented in part at the IEEE International Symposium on Information Theory, Saint Petersburg, Russia, Aug. 201

    [Develop and Evaluate the Performance of Single and Multi-Specimen Respirometers.] Technical Report, 4 Nov. 1968 - 4 Feb. 1969

    Get PDF
    Development and performance of respirometers for biorhythmic studies of gravity effect

    Subspace Methods for Data Attack on State Estimation: A Data Driven Approach

    Full text link
    Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters. Such information is difficult to acquire in practice. The subspace methods presented in this paper, on the other hand, learn the system operating subspace from measurements and launch attacks accordingly. Conditions for the existence of an unobservable subspace attack are obtained under the full and partial measurement models. Using the estimated system subspace, two attack strategies are presented. The first strategy aims to affect the system state directly by hiding the attack vector in the system subspace. The second strategy misleads the bad data detection mechanism so that data not under attack are removed. Performance of these attacks are evaluated using the IEEE 14-bus network and the IEEE 118-bus network.Comment: 12 page
    • …
    corecore