338,267 research outputs found

    Characterization of Hydraulic Properties of the Memphis Aquifer by Conducting Pumping Tests in the Memphis Area, Tennessee

    Get PDF
    The limitation of field measurements leads to parameter non-uniqueness of numerical models, which can be addressed by including more parameter data. Six pumping tests were conducted in five municipal well fields within Shelby County following the procedure described in the ASTM D4050-14 and considering strengthening factors to achieve greater reliability. Drawdown data of the pumping tests was analyzed using AQTESOLV, which allowed accounting for partial penetration and interference from neighboring production wells. The values of transmissivity and storativity estimated have a combined range of 600 to 3100 m2/day and 0.0005 to 0.002, respectively, varying within one order of magnitude on each well field. The average quality score of the tests, of 8.7 was higher than the average score of previous records of 4.1. The parameter values determined are expected to reduce non-uniqueness of numerical modeling solutions for groundwater flow, leading to improved evaluation of groundwater resources and environmental impact assessments

    Federated Deep Reinforcement Learning for THz-Beam Search with Limited CSI

    Full text link
    Terahertz (THz) communication with ultra-wide available spectrum is a promising technique that can achieve the stringent requirement of high data rate in the next-generation wireless networks, yet its severe propagation attenuation significantly hinders its implementation in practice. Finding beam directions for a large-scale antenna array to effectively overcome severe propagation attenuation of THz signals is a pressing need. This paper proposes a novel approach of federated deep reinforcement learning (FDRL) to swiftly perform THz-beam search for multiple base stations (BSs) coordinated by an edge server in a cellular network. All the BSs conduct deep deterministic policy gradient (DDPG)-based DRL to obtain THz beamforming policy with limited channel state information (CSI). They update their DDPG models with hidden information in order to mitigate inter-cell interference. We demonstrate that the cell network can achieve higher throughput as more THz CSI and hidden neurons of DDPG are adopted. We also show that FDRL with partial model update is able to nearly achieve the same performance of FDRL with full model update, which indicates an effective means to reduce communication load between the edge server and the BSs by partial model uploading. Moreover, the proposed FDRL outperforms conventional non-learning-based and existing non-FDRL benchmark optimization methods

    Model Dependence of the Properties of S11 Baryon Resonances

    Full text link
    The properties of baryon resonances are extracted from a complicated process of fitting sophisticated, empirical models to data. The reliability of this process comes from the quality of data and the robustness of the models employed. With the large of amount of data coming from recent experiments, this is an excellent time for a study of the model dependence of this extraction process. A test case is chosen where many theoretical details of the model are required, the S11 partial wave. The properties of the two lowest N* resonances in this partial wave are determined using various models of the resonant and non-resonant amplitudes.Comment: 24 pages, 10 figures; revised fits with error estimates, expanded comparison between CMB and K-matrix model

    Category-length and category-strength effects using images of scenes

    Get PDF
    Global matching models have provided an important theoretical framework for recognition memory. Key predictions of this class of models are that (1) increasing the number of occurrences in a study list of some items affects the performance on other items (list-strength effect) and that (2) adding new items results in a deterioration of performance on the other items (list-length effect). Experimental confirmation of these predictions has been difficult, and the results have been inconsistent. A review of the existing literature, however, suggests that robust length and strength effects do occur when sufficiently similar hard-to-label items are used. In an effort to investigate this further, we had participants study lists containing one or more members of visual scene categories (bathrooms, beaches, etc.). Experiments 1 and 2 replicated and extended previous findings showing that the study of additional category members decreased accuracy, providing confirmation of the category-length effect. Experiment 3 showed that repeating some category members decreased the accuracy of nonrepeated members, providing evidence for a category-strength effect. Experiment 4 eliminated a potential challenge to these results. Taken together, these findings provide robust support for global matching models of recognition memory. The overall list lengths, the category sizes, and the number of repetitions used demonstrated that scene categories are well-suited to testing the fundamental assumptions of global matching models. These include (A) interference from memories for similar items and contexts, (B) nondestructive interference, and (C) that conjunctive information is made available through a matching operation

    The PER model of abstract non-interference

    Get PDF
    Abstract. In this paper, we study the relationship between two models of secure information flow: the PER model (which uses equivalence relations) and the abstract non-interference model (which uses upper closure operators). We embed the lattice of equivalence relations into the lattice of closures, re-interpreting abstract non-interference over the lattice of equivalence relations. For narrow abstract non-interference, we show non-interference it is strictly less general. The relational presentation of abstract non-interference leads to a simplified construction of the most concrete harmless attacker. Moreover, the PER model of abstract noninterference allows us to derive unconstrained attacker models, which do not necessarily either observe all public information or ignore all private information. Finally, we show how abstract domain completeness can be used for enforcing the PER model of abstract non-interference

    Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective

    Full text link
    This article provides an overview of the state-of-art results on communication resource allocation over space, time, and frequency for emerging cognitive radio (CR) wireless networks. Focusing on the interference-power/interference-temperature (IT) constraint approach for CRs to protect primary radio transmissions, many new and challenging problems regarding the design of CR systems are formulated, and some of the corresponding solutions are shown to be obtainable by restructuring some classic results known for traditional (non-CR) wireless networks. It is demonstrated that convex optimization plays an essential role in solving these problems, in a both rigorous and efficient way. Promising research directions on interference management for CR and other related multiuser communication systems are discussed.Comment: to appear in IEEE Signal Processing Magazine, special issue on convex optimization for signal processin

    Improving Resource Efficiency with Partial Resource Muting for Future Wireless Networks

    Full text link
    We propose novel resource allocation algorithms that have the objective of finding a good tradeoff between resource reuse and interference avoidance in wireless networks. To this end, we first study properties of functions that relate the resource budget available to network elements to the optimal utility and to the optimal resource efficiency obtained by solving max-min utility optimization problems. From the asymptotic behavior of these functions, we obtain a transition point that indicates whether a network is operating in an efficient noise-limited regime or in an inefficient interference-limited regime for a given resource budget. For networks operating in the inefficient regime, we propose a novel partial resource muting scheme to improve the efficiency of the resource utilization. The framework is very general. It can be applied not only to the downlink of 4G networks, but also to 5G networks equipped with flexible duplex mechanisms. Numerical results show significant performance gains of the proposed scheme compared to the solution to the max-min utility optimization problem with full frequency reuse.Comment: 8 pages, 9 figures, to appear in WiMob 201
    • …
    corecore