144 research outputs found

    Proportional fairness in wireless powered CSMA/CA based IoT networks

    Get PDF
    This paper considers the deployment of a hybrid wireless data/power access point in an 802.11-based wireless powered IoT network. The proportionally fair allocation of throughputs across IoT nodes is considered under the constraints of energy neutrality and CPU capability for each device. The joint optimization of wireless powering and data communication resources takes the CSMA/CA random channel access features, e.g. the backoff procedure, collisions, protocol overhead into account. Numerical results show that the optimized solution can effectively balance individual throughput across nodes, and meanwhile proportionally maximize the overall sum throughput under energy constraints.Comment: Accepted by Globecom 201

    Real-time optimal control for attitude-constrained solar sailcrafts via neural networks

    Full text link
    This work is devoted to generating optimal guidance commands in real time for attitude-constrained solar sailcrafts in coplanar circular-to-circular interplanetary transfers. Firstly, a nonlinear optimal control problem is established, and necessary conditions for optimality are derived by the Pontryagin's Minimum Principle. Under some assumptions, the attitude constraints are rewritten as control constraints, which are replaced by a saturation function so that a parameterized system is formulated to generate an optimal trajectory via solving an initial value problem. This approach allows for the efficient generation of a dataset containing optimal samples, which are essential for training Neural Networks (NNs) to achieve real-time implementation. However, the optimal guidance command may suddenly change from one extreme to another, resulting in discontinuous jumps that generally impair the NN's approximation performance. To address this issue, we use two co-states that the optimal guidance command depends on, to detect discontinuous jumps. A procedure for preprocessing these jumps is then established, thereby ensuring that the preprocessed guidance command remains smooth. Meanwhile, the sign of one co-state is found to be sufficient to revert the preprocessed guidance command back into the original optimal guidance command. Furthermore, three NNs are built and trained offline, and they cooperate together to precisely generate the optimal guidance command in real time. Finally, numerical simulations are presented to demonstrate the developments of the paper

    A New Smoothing Technique for Bang-Bang Optimal Control Problems

    Full text link
    Bang-bang control is ubiquitous for Optimal Control Problems (OCPs) where the constrained control variable appears linearly in the dynamics and cost function. Based on the Pontryagin's Minimum Principle, the indirect method is widely used to numerically solve OCPs because it enables to derive the theoretical structure of the optimal control. However, discontinuities in the bang-bang control structure may result in numerical difficulties for gradient-based indirect method. In this case, smoothing or regularization procedures are usually applied to eliminating the discontinuities of bang-bang controls. Traditional smoothing or regularization procedures generally modify the cost function by adding a term depending on a small parameter, or introducing a small error into the state equation. Those procedures may complexify the numerical algorithms or degenerate the convergence performance. To overcome these issues, we propose a bounded smooth function, called normalized L2-norm function, to approximate the sign function in terms of the switching function. The resulting optimal control is smooth and can be readily embedded into the indirect method. Then, the simplicity and improved performance of the proposed method over some existing methods are numerically demonstrated by a minimal-time oscillator problem and a minimal-fuel low-thrust trajectory optimization problem that involves many revolutions.Comment: This paper has been accpted for presentation at the 2024 AIAA Scitec

    Time Reversal Enabled Fiber-Optic Time Synchronization

    Full text link
    Over the past few decades, fiber-optic time synchronization (FOTS) has provided fundamental support for the efficient operation of modern society. Looking toward the future beyond fifth-generation/sixth-generation (B5G/6G) scenarios and very large radio telescope arrays, developing high-precision, low-complexity and scalable FOTS technology is crucial for building a large-scale time synchronization network. However, the traditional two-way FOTS method needs a data layer to exchange time delay information. This increases the complexity of system and makes it impossible to realize multiple-access time synchronization. In this paper, a time reversal enabled FOTS method is proposed. It measures the clock difference between two locations without involving a data layer, which can reduce the complexity of the system. Moreover, it can also achieve multiple-access time synchronization along the fiber link. Tests over a 230 km fiber link have been carried out to demonstrate the high performance of the proposed method

    A Tampering Risk of Fiber-Based Frequency Synchronization Networks and Its Countermeasures

    Full text link
    Fiber optic networks are used worldwide and have been regarded as excellent media for transmitting time-frequency (TF) signals. In the past decades, fiber-based TF synchronization techniques have been extensively studied. Instruments based on these techniques have been successfully applied. With the increasing application of TF synchronization instruments, their security has become an important issue. Unfortunately, the security risks of fiber-based frequency synchronization (FbFS) instruments have been overlooked. This paper proposes a frequency tampering method called "frequency lens". On a 200 km fiber link, we demonstrate a frequency tampering scenario using a frequency lens-enabled frequency tampering module (FTM). On the user side, the frequency value of the recovered 100 MHz signal can be stealthily altered within a range of 100 MHz-100 Hz to 100 MHz+100 Hz, while the frequency dissemination stability of the system remains normal. Related to this tampering risk, potential hazards in three different application scenarios, which rely on precise frequency references, are analyzed. Two countermeasures are also proposed to solve this tampering risk

    The State of Library Makerspaces

    Get PDF
    In this paper we describe the maker concept, movement and culture and its impact on and relationship with libraries. We provide a comprehensive review of library makerspaces in North America supported by several case studies. We intend this review to be used as a reference resource or tool for libraries planning to implement a new makerspace
    • …
    corecore