9,456,771 research outputs found
Theory of Quantum Pulse Position Modulation and Related Numerical Problems
The paper deals with quantum pulse position modulation (PPM), both in the
absence (pure states) and in the presence (mixed states) of thermal noise,
using the Glauber representation of coherent laser radiation. The objective is
to find optimal (or suboptimal) measurement operators and to evaluate the
corresponding error probability. For PPM, the correct formulation of quantum
states is given by the tensorial product of m identical Hilbert spaces, where m
is the PPM order. The presence of mixed states, due to thermal noise, generates
an optimization problem involving matrices of huge dimensions, which already
for 4-PPM, are of the order of ten thousand. To overcome this computational
complexity, the currently available methods of quantum detection, which are
based on explicit results, convex linear programming and square root
measurement, are compared to find the computationally less expensive one. In
this paper a fundamental role is played by the geometrically uniform symmetry
of the quantum PPM format. The evaluation of error probability confirms the
vast superiority of the quantum detection over its classical counterpart.Comment: 10 pages, 7 figures, accepted for publication in IEEE Trans. on
Communication
Life
This project is about offering a solution to nationally displaced populations. Our group has created a system that will not only provide people with housing but a piece of mind.
Nexus Maximus IV
The Challenge: Innovation for Refugees and Displaced Populations
One of the great challenges of our time is how to help refugees and displaced populations, and how to prevent the causes in the first place. Every minute, 24 people around the world are forced to flee their homes. That’s 34,000 people a day who leave everything behind in the hope of finding safety and a better tomorrow. The impact of war, political, racial and religious conflict, and environmental crises of famine and climate change, have caused great suffering and there is a great opportunity to do better.
The issues these populations and the countries who receive them face are diverse and complex. They include public health, housing/built environment, cultural integration, public safety, employment/economic and more.
How can innovation address these challenges? How do we create the social systems and products to support a healthy, safe and integrated program for refugees? How do we address the physical, emotional, and social needs of refugees to restore hope and opportunity? The solutions may be as far ranging as the challenges, exploring the acute needs during a crisis, as well as the chronic needs of the permanently displaced; looking at immigration and adjustments to new cultures. We encourage participants to draw upon all disciplines, from health professions to architecture, engineering to design, ethics, communication and every way of thinking we have, to find better ways to innovate on physical solutions, processes, policies, systems, and more.
Recap of poster presentations.https://jdc.jefferson.edu/nexusmaximus/1021/thumbnail.jp
Report from U.S. Coalition for Life
Summary of The Population Slowdown - A Challenge to the Military by Colonel Robert X. de Marcellus, from a special issue of the The Prolife Reporte
Clayville Rural Life Center and Museum - Publications Series I - Living History Resource List #05: Metal Trades and Crafts
This resource list pertains to the study of metal trades and crafts. The list is divided into two parts: Bibliography and the Conservation and Testing of Metal Artifacts. The Bibliography is further divided into four sections: Primary Production and General; Blacksmithing: Tools, Processes, and Products; Pewter and Pewtersmithing; and Tinware and Tinsmithing. The list contains both primary and secondary sources and their locations. 10p.published or submitted for publicationis peer reviewe
Clayville Rural Life Center and Museum - Publications Series I - Living History Resource List #12: Inns, Taverns and Hotels in the Midwest to 1860: Materials Useful for the Study of Their Architecture and Functions, and a Checklist of Surviving Buildings in Illinois and in the Midwest
This resource list contains sources pertaining to Inns, Taverns, and Hotels in the Midwest to 1860. The publication is divided into three parts: a bibliography, existing structures in Illinois, and existing structures in the Midwest. The bibliography is divided into three parts: the United States, the Midwest, and Illinois. Sources listed include secondary, primary, and archival resources. 14p.published or submitted for publicationis peer reviewe
Channel-Aware Random Access in the Presence of Channel Estimation Errors
In this work, we consider the random access of nodes adapting their
transmission probability based on the local channel state information (CSI) in
a decentralized manner, which is called CARA. The CSI is not directly available
to each node but estimated with some errors in our scenario. Thus, the impact
of imperfect CSI on the performance of CARA is our main concern. Specifically,
an exact stability analysis is carried out when a pair of bursty sources are
competing for a common receiver and, thereby, have interdependent services. The
analysis also takes into account the compound effects of the multipacket
reception (MPR) capability at the receiver. The contributions in this paper are
twofold: first, we obtain the exact stability region of CARA in the presence of
channel estimation errors; such an assessment is necessary as the errors in
channel estimation are inevitable in the practical situation. Secondly, we
compare the performance of CARA to that achieved by the class of stationary
scheduling policies that make decisions in a centralized manner based on the
CSI feedback. It is shown that the stability region of CARA is not necessarily
a subset of that of centralized schedulers as the MPR capability improves.Comment: The material in this paper was presented in part at the IEEE
International Symposium on Information Theory, Cambridge, MA, USA, July 201
On the Stability of Random Multiple Access with Stochastic Energy Harvesting
In this paper, we consider the random access of nodes having energy
harvesting capability and a battery to store the harvested energy. Each node
attempts to transmit the head-of-line packet in the queue if its battery is
nonempty. The packet and energy arrivals into the queue and the battery are all
modeled as a discrete-time stochastic process. The main contribution of this
paper is the exact characterization of the stability region of the packet
queues given the energy harvesting rates when a pair of nodes are randomly
accessing a common channel having multipacket reception (MPR) capability. The
channel with MPR capability is a generalized form of the wireless channel
modeling which allows probabilistic receptions of the simultaneously
transmitted packets. The results obtained in this paper are fairly general as
the cases with unlimited energy for transmissions both with the collision
channel and the channel with MPR capability can be derived from ours as special
cases. Furthermore, we study the impact of the finiteness of the batteries on
the achievable stability region.Comment: The material in this paper was presented in part at the IEEE
International Symposium on Information Theory, Saint Petersburg, Russia, Aug.
201
[Develop and Evaluate the Performance of Single and Multi-Specimen Respirometers.] Technical Report, 4 Nov. 1968 - 4 Feb. 1969
Development and performance of respirometers for biorhythmic studies of gravity effect
Subspace Methods for Data Attack on State Estimation: A Data Driven Approach
Data attacks on state estimation modify part of system measurements such that
the tempered measurements cause incorrect system state estimates. Attack
techniques proposed in the literature often require detailed knowledge of
system parameters. Such information is difficult to acquire in practice. The
subspace methods presented in this paper, on the other hand, learn the system
operating subspace from measurements and launch attacks accordingly. Conditions
for the existence of an unobservable subspace attack are obtained under the
full and partial measurement models. Using the estimated system subspace, two
attack strategies are presented. The first strategy aims to affect the system
state directly by hiding the attack vector in the system subspace. The second
strategy misleads the bad data detection mechanism so that data not under
attack are removed. Performance of these attacks are evaluated using the IEEE
14-bus network and the IEEE 118-bus network.Comment: 12 page
- …