6,699 research outputs found

    A Universal Receiver for Uplink NOMA Systems

    Full text link
    Given its capability in efficient radio resource sharing, non-orthogonal multiple access (NOMA) has been identified as a promising technology in 5G to improve the system capacity, user connectivity, and scheduling latency. A dozen of uplink NOMA schemes have been proposed recently and this paper considers the design of a universal receiver suitable for all potential designs of NOMA schemes. Firstly, a general turbo-like iterative receiver structure is introduced, under which, a universal expectation propagation algorithm (EPA) detector with hybrid parallel interference cancellation (PIC) is proposed (EPA in short). Link-level simulations show that the proposed EPA receiver can achieve superior block error rate (BLER) performance with implementation friendly complexity and fast convergence, and is always better than the traditional codeword level MMSE-PIC receiver for various kinds of NOMA schemes.Comment: This paper has been accepted by IEEE/CIC International Conference on Communications in China (ICCC 2018). 5 pages, 4 figure

    Turbo-like Iterative Multi-user Receiver Design for 5G Non-orthogonal Multiple Access

    Full text link
    Non-orthogonal multiple access (NoMA) as an efficient way of radio resource sharing has been identified as a promising technology in 5G to help improving system capacity, user connectivity, and service latency in 5G communications. This paper provides a brief overview of the progress of NoMA transceiver study in 3GPP, with special focus on the design of turbo-like iterative multi-user (MU) receivers. There are various types of MU receivers depending on the combinations of MU detectors and interference cancellation (IC) schemes. Link-level simulations show that expectation propagation algorithm (EPA) with hybrid parallel interference cancellation (PIC) is a promising MU receiver, which can achieve fast convergence and similar performance as message passing algorithm (MPA) with much lower complexity.Comment: Accepted by IEEE 88th Vehicular Technology Conference (IEEE VTC-2018 Fall), 5 pages, 6 figure

    Get an A in Math: Progressive Rectification Prompting

    Full text link
    Chain-of-Thought (CoT) prompting methods have enabled large language models (LLMs) to generate reasoning paths and solve math word problems (MWPs). However, they are sensitive to mistakes in the paths, as any mistake can result in an incorrect answer. We propose a novel method named Progressive Rectification Prompting (PRP) to improve average accuracy on eight MWP datasets from 77.3 to 90.5. Given an initial answer from CoT, PRP iterates a verify-then-rectify process to progressively identify incorrect answers and rectify the reasoning paths. With the most likely correct answer, the LLM predicts a masked numerical value in the question; if the prediction does not match the masked value, the answer is likely incorrect. Then the LLM is prompted to re-generate the reasoning path hinted with a set of incorrect answers to prevent itself from repeating previous mistakes. PRP achieves the best performance compared against the CoT methods. Our implementation is made publicly available at https://wzy6642.github.io/prp.github.io/.Comment: AAAI 2024 - Camera Read

    Review of existing peer-to-peer energy trading projects

    Get PDF
    Peer-to-Peer (P2P) energy trading is a novel paradigm of power system operation, where people can generate their own energy from Renewable Energy Sources (RESs) in dwellings, offices and factories, and share it with each other locally. The number of projects and trails in this area has significantly increased recently all around the world. This paper elaborates main focuses and outcomes of those projects, and compares their similarities and differences. The results show that although many of the trails focus on the business models acting similarly to a supplier's role in the electricity sector, it is also necessary to design the necessary communication and control networks that could enable P2P energy trading in or among local Microgrids

    Characteristics of Parallel Inverters Applying Virtual Synchronous Generator Control

    Get PDF

    Understanding Concurrency Vulnerabilities in Linux Kernel

    Full text link
    While there is a large body of work on analyzing concurrency related software bugs and developing techniques for detecting and patching them, little attention has been given to concurrency related security vulnerabilities. The two are different in that not all bugs are vulnerabilities: for a bug to be exploitable, there needs be a way for attackers to trigger its execution and cause damage, e.g., by revealing sensitive data or running malicious code. To fill the gap, we conduct the first empirical study of concurrency vulnerabilities reported in the Linux operating system in the past ten years. We focus on analyzing the confirmed vulnerabilities archived in the Common Vulnerabilities and Exposures (CVE) database, which are then categorized into different groups based on bug types, exploit patterns, and patch strategies adopted by developers. We use code snippets to illustrate individual vulnerability types and patch strategies. We also use statistics to illustrate the entire landscape, including the percentage of each vulnerability type. We hope to shed some light on the problem, e.g., concurrency vulnerabilities continue to pose a serious threat to system security, and it is difficult even for kernel developers to analyze and patch them. Therefore, more efforts are needed to develop tools and techniques for analyzing and patching these vulnerabilities.Comment: It was finished in Oct 201
    • …
    corecore