24,368 research outputs found
Open-loop frequency acquisition for suppressed-carrier biphase signals using one-pole arm filters
Open loop frequency acquisition performance is discussed for suppressed carrier binary phase shift keyed signals in terms of the probability of detecting the carrier frequency offset when the arms of the Costas loop detector have one pole filters. The approach, which does not require symbol timing, uses fast Fourier transforms (FFTs) to detect the carrier frequency offset. The detection probability, which depends on both the 3 dB arm filter bandwidth and the received symbol signal to noise ratio, is derived and is shown to be independent of symbol timing. It is shown that the performance of this technique is slightly better that other open loop acquisition techniques which use integrators in the arms and whose detection performance varies with symbol timing
Fundamental Limits on Communication for Oblivious Updates in Storage Networks
In distributed storage systems, storage nodes intermittently go offline for
numerous reasons. On coming back online, nodes need to update their contents to
reflect any modifications to the data in the interim. In this paper, we
consider a setting where no information regarding modified data needs to be
logged in the system. In such a setting, a 'stale' node needs to update its
contents by downloading data from already updated nodes, while neither the
stale node nor the updated nodes have any knowledge as to which data symbols
are modified and what their value is. We investigate the fundamental limits on
the amount of communication necessary for such an "oblivious" update process.
We first present a generic lower bound on the amount of communication that is
necessary under any storage code with a linear encoding (while allowing
non-linear update protocols). This lower bound is derived under a set of
extremely weak conditions, giving all updated nodes access to the entire
modified data and the stale node access to the entire stale data as side
information. We then present codes and update algorithms that are optimal in
that they meet this lower bound. Next, we present a lower bound for an
important subclass of codes, that of linear Maximum-Distance-Separable (MDS)
codes. We then present an MDS code construction and an associated update
algorithm that meets this lower bound. These results thus establish the
capacity of oblivious updates in terms of the communication requirements under
these settings.Comment: IEEE Global Communications Conference (GLOBECOM) 201
Gas phase hydrogen permeation in alpha titanium and carbon steels
Commercially pure titanium and heats of Armco ingot iron and steels containing from 0.008-1.23 w/oC were annealed or normalized and machined into hollow cylinders. Coefficients of diffusion for alpha-Ti and alpha-Fe were determined by the lag-time technique. Steady state permeation experiments yield first power pressure dependence for alpha-Ti and Sievert's law square root dependence for Armco iron and carbon steels. As in the case of diffusion, permeation data confirm that alpha-titanium is subject to at least partial phase boundary reaction control while the steels are purely diffusion controlled. The permeation rate in steels also decreases as the carbon content increases. As a consequence of Sievert's law, the computed hydrogen solubility decreases as the carbon content increases. This decreases in explained in terms of hydrogen trapping at carbide interfaces. Oxidizing and nitriding the surfaces of alpha-titanium membranes result in a decrease in the permeation rate for such treatment on the gas inlet surfaces but resulted in a slight increase in the rate for such treatment on the gas outlet surfaces. This is explained in terms of a discontinuous TiH2 layer
India’s water supply and demand from 2025-2050: business-as-usual scenario and issues
Water demandEstimationIrrigation waterRiver basinsWater supplySimulation modelsPopulation growthFood productionFood consumptionCrop yieldGroundwater irrigation
India’s water future to 2025-2050: Business-as-usual scenario and deviations
Poverty / Mapping/ Water demand / Water supply / Population growth / Crop production / Crop yield / Groundwater irrigation / Food security
Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions
Regenerating codes are a class of recently developed codes for distributed
storage that, like Reed-Solomon codes, permit data recovery from any arbitrary
k of n nodes. However regenerating codes possess in addition, the ability to
repair a failed node by connecting to any arbitrary d nodes and downloading an
amount of data that is typically far less than the size of the data file. This
amount of download is termed the repair bandwidth. Minimum storage regenerating
(MSR) codes are a subclass of regenerating codes that require the least amount
of network storage; every such code is a maximum distance separable (MDS) code.
Further, when a replacement node stores data identical to that in the failed
node, the repair is termed as exact.
The four principal results of the paper are (a) the explicit construction of
a class of MDS codes for d = n-1 >= 2k-1 termed the MISER code, that achieves
the cut-set bound on the repair bandwidth for the exact-repair of systematic
nodes, (b) proof of the necessity of interference alignment in exact-repair MSR
codes, (c) a proof showing the impossibility of constructing linear,
exact-repair MSR codes for d < 2k-3 in the absence of symbol extension, and (d)
the construction, also explicit, of MSR codes for d = k+1. Interference
alignment (IA) is a theme that runs throughout the paper: the MISER code is
built on the principles of IA and IA is also a crucial component to the
non-existence proof for d < 2k-3. To the best of our knowledge, the
constructions presented in this paper are the first, explicit constructions of
regenerating codes that achieve the cut-set bound.Comment: 38 pages, 12 figures, submitted to the IEEE Transactions on
Information Theory;v3 - The title has been modified to better reflect the
contributions of the submission. The paper is extensively revised with
several carefully constructed figures and example
- …