338,267 research outputs found
Characterization of Hydraulic Properties of the Memphis Aquifer by Conducting Pumping Tests in the Memphis Area, Tennessee
The limitation of field measurements leads to parameter non-uniqueness of numerical models, which can be addressed by including more parameter data. Six pumping tests were conducted in five municipal well fields within Shelby County following the procedure described in the ASTM D4050-14 and considering strengthening factors to achieve greater reliability. Drawdown data of the pumping tests was analyzed using AQTESOLV, which allowed accounting for partial penetration and interference from neighboring production wells. The values of transmissivity and storativity estimated have a combined range of 600 to 3100 m2/day and 0.0005 to 0.002, respectively, varying within one order of magnitude on each well field. The average quality score of the tests, of 8.7 was higher than the average score of previous records of 4.1. The parameter values determined are expected to reduce non-uniqueness of numerical modeling solutions for groundwater flow, leading to improved evaluation of groundwater resources and environmental impact assessments
Federated Deep Reinforcement Learning for THz-Beam Search with Limited CSI
Terahertz (THz) communication with ultra-wide available spectrum is a
promising technique that can achieve the stringent requirement of high data
rate in the next-generation wireless networks, yet its severe propagation
attenuation significantly hinders its implementation in practice. Finding beam
directions for a large-scale antenna array to effectively overcome severe
propagation attenuation of THz signals is a pressing need. This paper proposes
a novel approach of federated deep reinforcement learning (FDRL) to swiftly
perform THz-beam search for multiple base stations (BSs) coordinated by an edge
server in a cellular network. All the BSs conduct deep deterministic policy
gradient (DDPG)-based DRL to obtain THz beamforming policy with limited channel
state information (CSI). They update their DDPG models with hidden information
in order to mitigate inter-cell interference. We demonstrate that the cell
network can achieve higher throughput as more THz CSI and hidden neurons of
DDPG are adopted. We also show that FDRL with partial model update is able to
nearly achieve the same performance of FDRL with full model update, which
indicates an effective means to reduce communication load between the edge
server and the BSs by partial model uploading. Moreover, the proposed FDRL
outperforms conventional non-learning-based and existing non-FDRL benchmark
optimization methods
Model Dependence of the Properties of S11 Baryon Resonances
The properties of baryon resonances are extracted from a complicated process
of fitting sophisticated, empirical models to data. The reliability of this
process comes from the quality of data and the robustness of the models
employed. With the large of amount of data coming from recent experiments, this
is an excellent time for a study of the model dependence of this extraction
process. A test case is chosen where many theoretical details of the model are
required, the S11 partial wave. The properties of the two lowest N* resonances
in this partial wave are determined using various models of the resonant and
non-resonant amplitudes.Comment: 24 pages, 10 figures; revised fits with error estimates, expanded
comparison between CMB and K-matrix model
Category-length and category-strength effects using images of scenes
Global matching models have provided an important theoretical framework for recognition memory. Key predictions of this class of models are that (1) increasing the number of occurrences in a study list of some items affects the performance on other items (list-strength effect) and that (2) adding new items results in a deterioration of performance on the other items (list-length effect). Experimental confirmation of these predictions has been difficult, and the results have been inconsistent. A review of the existing literature, however, suggests that robust length and strength effects do occur when sufficiently similar hard-to-label items are used. In an effort to investigate this further, we had participants study lists containing one or more members of visual scene categories (bathrooms, beaches, etc.). Experiments 1 and 2 replicated and extended previous findings showing that the study of additional category members decreased accuracy, providing confirmation of the category-length effect. Experiment 3 showed that repeating some category members decreased the accuracy of nonrepeated members, providing evidence for a category-strength effect. Experiment 4 eliminated a potential challenge to these results. Taken together, these findings provide robust support for global matching models of recognition memory. The overall list lengths, the category sizes, and the number of repetitions used demonstrated that scene categories are well-suited to testing the fundamental assumptions of global matching models. These include (A) interference from memories for similar items and contexts, (B) nondestructive interference, and (C) that conjunctive information is made available through a matching operation
The PER model of abstract non-interference
Abstract. In this paper, we study the relationship between two models of secure information flow: the PER model (which uses equivalence relations) and the abstract non-interference model (which uses upper closure operators). We embed the lattice of equivalence relations into the lattice of closures, re-interpreting abstract non-interference over the lattice of equivalence relations. For narrow abstract non-interference, we show non-interference it is strictly less general. The relational presentation of abstract non-interference leads to a simplified construction of the most concrete harmless attacker. Moreover, the PER model of abstract noninterference allows us to derive unconstrained attacker models, which do not necessarily either observe all public information or ignore all private information. Finally, we show how abstract domain completeness can be used for enforcing the PER model of abstract non-interference
Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective
This article provides an overview of the state-of-art results on
communication resource allocation over space, time, and frequency for emerging
cognitive radio (CR) wireless networks. Focusing on the
interference-power/interference-temperature (IT) constraint approach for CRs to
protect primary radio transmissions, many new and challenging problems
regarding the design of CR systems are formulated, and some of the
corresponding solutions are shown to be obtainable by restructuring some
classic results known for traditional (non-CR) wireless networks. It is
demonstrated that convex optimization plays an essential role in solving these
problems, in a both rigorous and efficient way. Promising research directions
on interference management for CR and other related multiuser communication
systems are discussed.Comment: to appear in IEEE Signal Processing Magazine, special issue on convex
optimization for signal processin
Improving Resource Efficiency with Partial Resource Muting for Future Wireless Networks
We propose novel resource allocation algorithms that have the objective of
finding a good tradeoff between resource reuse and interference avoidance in
wireless networks. To this end, we first study properties of functions that
relate the resource budget available to network elements to the optimal utility
and to the optimal resource efficiency obtained by solving max-min utility
optimization problems. From the asymptotic behavior of these functions, we
obtain a transition point that indicates whether a network is operating in an
efficient noise-limited regime or in an inefficient interference-limited regime
for a given resource budget. For networks operating in the inefficient regime,
we propose a novel partial resource muting scheme to improve the efficiency of
the resource utilization. The framework is very general. It can be applied not
only to the downlink of 4G networks, but also to 5G networks equipped with
flexible duplex mechanisms. Numerical results show significant performance
gains of the proposed scheme compared to the solution to the max-min utility
optimization problem with full frequency reuse.Comment: 8 pages, 9 figures, to appear in WiMob 201
- …