41,398 research outputs found
Pilot Decontamination Through Pilot Sequence Hopping in Massive MIMO Systems
This work concerns wireless cellular networks applying massive multiple-input
multiple-output (MIMO) technology. In such a system, the base station in a
given cell is equipped with a very large number (hundreds or even thousands) of
antennas and serves multiple users. Estimation of the channel from the base
station to each user is performed at the base station using an uplink pilot
sequence. Such a channel estimation procedure suffers from pilot contamination.
Orthogonal pilot sequences are used in a given cell but, due to the shortage of
orthogonal sequences, the same pilot sequences must be reused in neighboring
cells, causing pilot contamination. The solution presented in this paper
suppresses pilot contamination, without the need for coordination among cells.
Pilot sequence hopping is performed at each transmission slot, which provides a
randomization of the pilot contamination. Using a modified Kalman filter, it is
shown that such randomized contamination can be significantly suppressed.
Comparisons with conventional estimation methods show that the mean squared
error can be lowered as much as an order of magnitude at low mobility
Log Skeletons: A Classification Approach to Process Discovery
To test the effectiveness of process discovery algorithms, a Process
Discovery Contest (PDC) has been set up. This PDC uses a classification
approach to measure this effectiveness: The better the discovered model can
classify whether or not a new trace conforms to the event log, the better the
discovery algorithm is supposed to be. Unfortunately, even the state-of-the-art
fully-automated discovery algorithms score poorly on this classification. Even
the best of these algorithms, the Inductive Miner, scored only 147 correct
classified traces out of 200 traces on the PDC of 2017. This paper introduces
the rule-based log skeleton model, which is closely related to the Declare
constraint model, together with a way to classify traces using this model. This
classification using log skeletons is shown to score better on the PDC of 2017
than state-of-the-art discovery algorithms: 194 out of 200. As a result, one
can argue that the fully-automated algorithm to construct (or: discover) a log
skeleton from an event log outperforms existing state-of-the-art
fully-automated discovery algorithms.Comment: 16 pages with 9 figures, followed by an appendix of 14 pages with 17
figure
Atomically thin dilute magnetism in Co-doped phosphorene
Two-dimensional dilute magnetic semiconductors can provide fundamental
insights in the very nature of magnetic orders and their manipulation through
electron and hole doping. Despite the fundamental physics, due to the large
charge density control capability in these materials, they can be extremely
important in spintronics applications such as spin valve and spin-based
transistors. In this article, we studied a two-dimensional dilute magnetic
semiconductors consisting of phosphorene monolayer doped with cobalt atoms in
substitutional and interstitial defects. We show that these defects can be
stabilized and are electrically active. Furthermore, by including holes or
electrons by a potential gate, the exchange interaction and magnetic order can
be engineered, and may even induce a ferromagnetic-to-antiferromagnetic phase
transition in p-doped phosphorene.Comment: 7 pages, 4 colorful figure
Recommended from our members
Terrorism, Punishment, and Recognition
This paper discusses some theoretical and practical challenges that terrorism poses to a normative theory of punishment, using a theory of recognition as the main basis for critique. Punishment exists in constant tension with principles such as individual autonomy and human dignity, which the contemporary legal framework strives to uphold. The limits of this tension are both defined and challenged by situations of radical deviance, of which the current paradigmatic case is terrorism. Theorists such as Antony Duff who attempt to define punishment as a communicative endeavor, and thus justified in the eyes of a liberal political community, find a hard case in the figure of the terrorist. But such an analysis misses an important point in relation to the social nature of autonomy, and such absence risks jeopardizing the whole communicative process that punishment presumably preserves. From the perspective of recognition, this paper aims to reflect upon the criminalization of the terrorist in a way that not only criticizes it, but also puts the aforementioned justification of punishment into question
Recommended from our members
Liberty and Insecurity in the Criminal Law: Lessons from Thomas Hobbes
In this paper, I provide an extensive examination of the political theory of Thomas Hobbes in order to discuss its relevance to an understanding of contemporary issues and challenges faced by criminal law and criminal justice theory. I start by proposing that a critical analysis of Hobbes’s account of punishment reveals a paradox that not only is fundamental to understanding his model of political society, but also can offer important insights into the preventive turn experienced by advanced liberal legal systems. I then suggest that the main importance of an analysis of Hobbes’s theoretical framework lies in how it reveals an inextricable and problematic link between individual autonomy and political authority in the normative conception of the modern liberal state, grounded on the notion of insecurity. By exploring how legal scholars have recently engaged with aspects of this problematic in criminal law and punishment posed by Hobbes’s work, I argue that the paradox found in punishment is such that it both legitimates the criminal law and undermines its normative aspirations, particularly the possibility of securing individual liberty against the power of the liberal state
- …