1,833 research outputs found
Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis
In evolved Multimedia Broadcast/Multicast Service (eMBMS), service continuity enables users move from one cell to another without interrupting eMBMS service. Unlike traditional handover in unicast transmission, a UE can receive eMBMS service in either unicast or multicast mode. In this paper, we point out a new handover failure problem in eMBMS due to the miss of rekeying information. We first take a close look at the new handover scenarios. We then investigate the problem by using comprehensive mathematical models. Our models provide insights on the new handover problem and introduce theoretical guidelines for mobile operators to design and optimize their networks without wide deployment to save cost and time. Moreover, we propose a solution to combat against the handover failure. Both the simulation and analytical results demonstrate that the impacts of the eMBMS handover failure are reduced significantly. In this paper, we present a systematic way to investigate the handover failure problem in eMBMS
Qubit Mapping Toward Quantum Advantage
Qubit Mapping is a pivotal stage in quantum compilation flow. Its goal is to
convert logical circuits into physical circuits so that a quantum algorithm can
be executed on real-world non-fully connected quantum devices. Qubit Mapping
techniques nowadays still lack the key to quantum advantage, scalability.
Several studies have proved that at least thousands of logical qubits are
required to achieve quantum computational advantage. However, to our best
knowledge, there is no previous research with the ability to solve the qubit
mapping problem with the necessary number of qubits for quantum advantage in a
reasonable time. In this work, we provide the first qubit mapping framework
with the scalability to achieve quantum advantage while accomplishing a fairly
good performance. The framework also boasts its flexibility for quantum
circuits of different characteristics. Experimental results show that the
proposed mapping method outperforms the state-of-the-art methods on quantum
circuit benchmarks by improving over 5% of the cost complexity in one-tenth of
the program running time. Moreover, we demonstrate the scalability of our
method by accomplishing mapping of an 11,969-qubit Quantum Fourier Transform
within five hours
Representation Learning for Sequential Volumetric Design Tasks
Volumetric design, also called massing design, is the first and critical step
in professional building design which is sequential in nature. As the
volumetric design process is complex, the underlying sequential design process
encodes valuable information for designers. Many efforts have been made to
automatically generate reasonable volumetric designs, but the quality of the
generated design solutions varies, and evaluating a design solution requires
either a prohibitively comprehensive set of metrics or expensive human
expertise. While previous approaches focused on learning only the final design
instead of sequential design tasks, we propose to encode the design knowledge
from a collection of expert or high-performing design sequences and extract
useful representations using transformer-based models. Later we propose to
utilize the learned representations for crucial downstream applications such as
design preference evaluation and procedural design generation. We develop the
preference model by estimating the density of the learned representations
whereas we train an autoregressive transformer model for sequential design
generation. We demonstrate our ideas by leveraging a novel dataset of thousands
of sequential volumetric designs. Our preference model can compare two
arbitrarily given design sequences and is almost 90% accurate in evaluation
against random design sequences. Our autoregressive model is also capable of
autocompleting a volumetric design sequence from a partial design sequence
The History, Mechanism, and Clinical Application of Auricular Therapy in Traditional Chinese Medicine
Auricular therapy includes acupuncture, electroacupuncture, acupressure, lasering, cauterization, moxibustion, and bloodletting in the auricle. For 2500 years, people have employed auricular therapy for treating diseases, but the methods have been limited to bloodletting and cauterization. Only after 1957, the international scientific community became aware that the map of the ear resembles an inverted fetus, its introduction has led to auricular acupuncture (AA) becoming a more systemic approach, and, following the identification and standardization of more precise points, AA has been employed in clinical applications. The mechanisms of AA are considered to have a close relationship with the autonomic nervous system, the neuroendocrine system, neuroimmunological factors, neuroinflammation, and neural reflex, as well as antioxidation. Auricular therapy has been applied, for example, for pain relief, for the treatment of epilepsy, anxiety, and obesity, and for improving sleep quality. However, the mechanisms and evidence for auricular therapy warrant further study
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service
3GPP introduced the key management mechanism (KMM) in evolved multimedia broadcast/multicast service (eMBMS) to provide forward security and backward security for multicast contents. In this paper, we point out that KMM may lead to frequent rekeying and re-authentication issues due to eMBMS's characteristics: 1) massive group members; 2) dynamic group topology; and 3) unexpected wireless disconnections. Such issues expose extra load for both user equipment (UE) terminals and mobile operators. It seems prolonging the rekeying interval is an intuitive solution to minimizing the impact of the issues. However, a long rekeying interval is not considered the best operational solution due to revenue loss of content providers. This paper quantifies the tradeoff between the load of the UEs and the operators as well as the revenue loss of the content providers. Moreover, we emphasize how essential this rekeying interval has impacts on the problems. Using our proposed tradeoff model, the operators can specify a suitable rekeying interval to best balance the interest between the above three parties. The tradeoff model is validated by extensive simulations and is demonstrated to be an effective approach for the tradeoff analysis and optimization on eMBMS
Quantum Simulation of Dissipative Energy Transfer via Noisy Quantum Computer
In recent years, due to its formidable potential in computational theory,
quantum computing has become a very popular research topic. However, the
implementation of practical quantum algorithms, which hold the potential to
solve real-world problems, is often hindered by the significant error rates
associated with quantum gates and the limited availability of qubits. In this
study, we propose a practical approach to simulate the dynamics of an open
quantum system on a noisy computer, which encompasses general and valuable
characteristics. Notably, our method leverages gate noises on the IBM-Q real
device, enabling us to perform calculations using only two qubits. The results
generated by our method performed on IBM-Q Jakarta aligned with the those
calculated by hierarchical equations of motion (HEOM), which is a classical
numerically-exact method, while our simulation method runs with a much better
computing complexity. In the last, to deal with the increasing depth of quantum
circuits when doing Trotter expansion, we introduced the transfer tensor
method(TTM) to extend our short-term dynamics simulation. Based on quantum
simulator, we show the extending ability of TTM, which allows us to get a
longer simulation using a relatively short quantum circuits
- …