6,476 research outputs found
A Universal Receiver for Uplink NOMA Systems
Given its capability in efficient radio resource sharing, non-orthogonal
multiple access (NOMA) has been identified as a promising technology in 5G to
improve the system capacity, user connectivity, and scheduling latency. A dozen
of uplink NOMA schemes have been proposed recently and this paper considers the
design of a universal receiver suitable for all potential designs of NOMA
schemes. Firstly, a general turbo-like iterative receiver structure is
introduced, under which, a universal expectation propagation algorithm (EPA)
detector with hybrid parallel interference cancellation (PIC) is proposed (EPA
in short). Link-level simulations show that the proposed EPA receiver can
achieve superior block error rate (BLER) performance with implementation
friendly complexity and fast convergence, and is always better than the
traditional codeword level MMSE-PIC receiver for various kinds of NOMA schemes.Comment: This paper has been accepted by IEEE/CIC International Conference on
Communications in China (ICCC 2018). 5 pages, 4 figure
Turbo-like Iterative Multi-user Receiver Design for 5G Non-orthogonal Multiple Access
Non-orthogonal multiple access (NoMA) as an efficient way of radio resource
sharing has been identified as a promising technology in 5G to help improving
system capacity, user connectivity, and service latency in 5G communications.
This paper provides a brief overview of the progress of NoMA transceiver study
in 3GPP, with special focus on the design of turbo-like iterative multi-user
(MU) receivers. There are various types of MU receivers depending on the
combinations of MU detectors and interference cancellation (IC) schemes.
Link-level simulations show that expectation propagation algorithm (EPA) with
hybrid parallel interference cancellation (PIC) is a promising MU receiver,
which can achieve fast convergence and similar performance as message passing
algorithm (MPA) with much lower complexity.Comment: Accepted by IEEE 88th Vehicular Technology Conference (IEEE VTC-2018
Fall), 5 pages, 6 figure
Review of existing peer-to-peer energy trading projects
Peer-to-Peer (P2P) energy trading is a novel paradigm of power system operation, where people can generate their own energy from Renewable Energy Sources (RESs) in dwellings, offices and factories, and share it with each other locally. The number of projects and trails in this area has significantly increased recently all around the world. This paper elaborates main focuses and outcomes of those projects, and compares their similarities and differences. The results show that although many of the trails focus on the business models acting similarly to a supplier's role in the electricity sector, it is also necessary to design the necessary communication and control networks that could enable P2P energy trading in or among local Microgrids
Understanding Concurrency Vulnerabilities in Linux Kernel
While there is a large body of work on analyzing concurrency related software
bugs and developing techniques for detecting and patching them, little
attention has been given to concurrency related security vulnerabilities. The
two are different in that not all bugs are vulnerabilities: for a bug to be
exploitable, there needs be a way for attackers to trigger its execution and
cause damage, e.g., by revealing sensitive data or running malicious code. To
fill the gap, we conduct the first empirical study of concurrency
vulnerabilities reported in the Linux operating system in the past ten years.
We focus on analyzing the confirmed vulnerabilities archived in the Common
Vulnerabilities and Exposures (CVE) database, which are then categorized into
different groups based on bug types, exploit patterns, and patch strategies
adopted by developers. We use code snippets to illustrate individual
vulnerability types and patch strategies. We also use statistics to illustrate
the entire landscape, including the percentage of each vulnerability type. We
hope to shed some light on the problem, e.g., concurrency vulnerabilities
continue to pose a serious threat to system security, and it is difficult even
for kernel developers to analyze and patch them. Therefore, more efforts are
needed to develop tools and techniques for analyzing and patching these
vulnerabilities.Comment: It was finished in Oct 201
A bidding system for peer-to-peer energy trading in a grid-connected microgrid
Peer-to-Peer (P2P) energy trading is a novel paradigm of power system operation, where people can generate their own energy from Renewable Energy Sources (RESs) in dwellings, offices and factories, and share it with each other locally. An architecture model was proposed to present the design and interoperability aspects of components for P2P energy trading in a microgrid. A specific Customer-to-Customer business model was introduced in a benchmark grid-connected microgrid based on the architecture model. The core component of a bidding system, called Elecbay, was also proposed and simulated using game theory. Test results show that P2P energy trading is able to balance local generation and demand, therefore, has a potential to enable a large penetration of RESs in the power grid
- …