24,368 research outputs found

    Open-loop frequency acquisition for suppressed-carrier biphase signals using one-pole arm filters

    Get PDF
    Open loop frequency acquisition performance is discussed for suppressed carrier binary phase shift keyed signals in terms of the probability of detecting the carrier frequency offset when the arms of the Costas loop detector have one pole filters. The approach, which does not require symbol timing, uses fast Fourier transforms (FFTs) to detect the carrier frequency offset. The detection probability, which depends on both the 3 dB arm filter bandwidth and the received symbol signal to noise ratio, is derived and is shown to be independent of symbol timing. It is shown that the performance of this technique is slightly better that other open loop acquisition techniques which use integrators in the arms and whose detection performance varies with symbol timing

    Fundamental Limits on Communication for Oblivious Updates in Storage Networks

    Full text link
    In distributed storage systems, storage nodes intermittently go offline for numerous reasons. On coming back online, nodes need to update their contents to reflect any modifications to the data in the interim. In this paper, we consider a setting where no information regarding modified data needs to be logged in the system. In such a setting, a 'stale' node needs to update its contents by downloading data from already updated nodes, while neither the stale node nor the updated nodes have any knowledge as to which data symbols are modified and what their value is. We investigate the fundamental limits on the amount of communication necessary for such an "oblivious" update process. We first present a generic lower bound on the amount of communication that is necessary under any storage code with a linear encoding (while allowing non-linear update protocols). This lower bound is derived under a set of extremely weak conditions, giving all updated nodes access to the entire modified data and the stale node access to the entire stale data as side information. We then present codes and update algorithms that are optimal in that they meet this lower bound. Next, we present a lower bound for an important subclass of codes, that of linear Maximum-Distance-Separable (MDS) codes. We then present an MDS code construction and an associated update algorithm that meets this lower bound. These results thus establish the capacity of oblivious updates in terms of the communication requirements under these settings.Comment: IEEE Global Communications Conference (GLOBECOM) 201

    Gas phase hydrogen permeation in alpha titanium and carbon steels

    Get PDF
    Commercially pure titanium and heats of Armco ingot iron and steels containing from 0.008-1.23 w/oC were annealed or normalized and machined into hollow cylinders. Coefficients of diffusion for alpha-Ti and alpha-Fe were determined by the lag-time technique. Steady state permeation experiments yield first power pressure dependence for alpha-Ti and Sievert's law square root dependence for Armco iron and carbon steels. As in the case of diffusion, permeation data confirm that alpha-titanium is subject to at least partial phase boundary reaction control while the steels are purely diffusion controlled. The permeation rate in steels also decreases as the carbon content increases. As a consequence of Sievert's law, the computed hydrogen solubility decreases as the carbon content increases. This decreases in explained in terms of hydrogen trapping at carbide interfaces. Oxidizing and nitriding the surfaces of alpha-titanium membranes result in a decrease in the permeation rate for such treatment on the gas inlet surfaces but resulted in a slight increase in the rate for such treatment on the gas outlet surfaces. This is explained in terms of a discontinuous TiH2 layer

    India’s water supply and demand from 2025-2050: business-as-usual scenario and issues

    Get PDF
    Water demandEstimationIrrigation waterRiver basinsWater supplySimulation modelsPopulation growthFood productionFood consumptionCrop yieldGroundwater irrigation

    India’s water future to 2025-2050: Business-as-usual scenario and deviations

    Get PDF
    Poverty / Mapping/ Water demand / Water supply / Population growth / Crop production / Crop yield / Groundwater irrigation / Food security

    Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions

    Full text link
    Regenerating codes are a class of recently developed codes for distributed storage that, like Reed-Solomon codes, permit data recovery from any arbitrary k of n nodes. However regenerating codes possess in addition, the ability to repair a failed node by connecting to any arbitrary d nodes and downloading an amount of data that is typically far less than the size of the data file. This amount of download is termed the repair bandwidth. Minimum storage regenerating (MSR) codes are a subclass of regenerating codes that require the least amount of network storage; every such code is a maximum distance separable (MDS) code. Further, when a replacement node stores data identical to that in the failed node, the repair is termed as exact. The four principal results of the paper are (a) the explicit construction of a class of MDS codes for d = n-1 >= 2k-1 termed the MISER code, that achieves the cut-set bound on the repair bandwidth for the exact-repair of systematic nodes, (b) proof of the necessity of interference alignment in exact-repair MSR codes, (c) a proof showing the impossibility of constructing linear, exact-repair MSR codes for d < 2k-3 in the absence of symbol extension, and (d) the construction, also explicit, of MSR codes for d = k+1. Interference alignment (IA) is a theme that runs throughout the paper: the MISER code is built on the principles of IA and IA is also a crucial component to the non-existence proof for d < 2k-3. To the best of our knowledge, the constructions presented in this paper are the first, explicit constructions of regenerating codes that achieve the cut-set bound.Comment: 38 pages, 12 figures, submitted to the IEEE Transactions on Information Theory;v3 - The title has been modified to better reflect the contributions of the submission. The paper is extensively revised with several carefully constructed figures and example
    corecore