6,406 research outputs found

    A Universal Receiver for Uplink NOMA Systems

    Full text link
    Given its capability in efficient radio resource sharing, non-orthogonal multiple access (NOMA) has been identified as a promising technology in 5G to improve the system capacity, user connectivity, and scheduling latency. A dozen of uplink NOMA schemes have been proposed recently and this paper considers the design of a universal receiver suitable for all potential designs of NOMA schemes. Firstly, a general turbo-like iterative receiver structure is introduced, under which, a universal expectation propagation algorithm (EPA) detector with hybrid parallel interference cancellation (PIC) is proposed (EPA in short). Link-level simulations show that the proposed EPA receiver can achieve superior block error rate (BLER) performance with implementation friendly complexity and fast convergence, and is always better than the traditional codeword level MMSE-PIC receiver for various kinds of NOMA schemes.Comment: This paper has been accepted by IEEE/CIC International Conference on Communications in China (ICCC 2018). 5 pages, 4 figure

    Turbo-like Iterative Multi-user Receiver Design for 5G Non-orthogonal Multiple Access

    Full text link
    Non-orthogonal multiple access (NoMA) as an efficient way of radio resource sharing has been identified as a promising technology in 5G to help improving system capacity, user connectivity, and service latency in 5G communications. This paper provides a brief overview of the progress of NoMA transceiver study in 3GPP, with special focus on the design of turbo-like iterative multi-user (MU) receivers. There are various types of MU receivers depending on the combinations of MU detectors and interference cancellation (IC) schemes. Link-level simulations show that expectation propagation algorithm (EPA) with hybrid parallel interference cancellation (PIC) is a promising MU receiver, which can achieve fast convergence and similar performance as message passing algorithm (MPA) with much lower complexity.Comment: Accepted by IEEE 88th Vehicular Technology Conference (IEEE VTC-2018 Fall), 5 pages, 6 figure

    Review of existing peer-to-peer energy trading projects

    Get PDF
    Peer-to-Peer (P2P) energy trading is a novel paradigm of power system operation, where people can generate their own energy from Renewable Energy Sources (RESs) in dwellings, offices and factories, and share it with each other locally. The number of projects and trails in this area has significantly increased recently all around the world. This paper elaborates main focuses and outcomes of those projects, and compares their similarities and differences. The results show that although many of the trails focus on the business models acting similarly to a supplier's role in the electricity sector, it is also necessary to design the necessary communication and control networks that could enable P2P energy trading in or among local Microgrids

    Characteristics of Parallel Inverters Applying Virtual Synchronous Generator Control

    Get PDF

    Understanding Concurrency Vulnerabilities in Linux Kernel

    Full text link
    While there is a large body of work on analyzing concurrency related software bugs and developing techniques for detecting and patching them, little attention has been given to concurrency related security vulnerabilities. The two are different in that not all bugs are vulnerabilities: for a bug to be exploitable, there needs be a way for attackers to trigger its execution and cause damage, e.g., by revealing sensitive data or running malicious code. To fill the gap, we conduct the first empirical study of concurrency vulnerabilities reported in the Linux operating system in the past ten years. We focus on analyzing the confirmed vulnerabilities archived in the Common Vulnerabilities and Exposures (CVE) database, which are then categorized into different groups based on bug types, exploit patterns, and patch strategies adopted by developers. We use code snippets to illustrate individual vulnerability types and patch strategies. We also use statistics to illustrate the entire landscape, including the percentage of each vulnerability type. We hope to shed some light on the problem, e.g., concurrency vulnerabilities continue to pose a serious threat to system security, and it is difficult even for kernel developers to analyze and patch them. Therefore, more efforts are needed to develop tools and techniques for analyzing and patching these vulnerabilities.Comment: It was finished in Oct 201

    A bidding system for peer-to-peer energy trading in a grid-connected microgrid

    Get PDF
    Peer-to-Peer (P2P) energy trading is a novel paradigm of power system operation, where people can generate their own energy from Renewable Energy Sources (RESs) in dwellings, offices and factories, and share it with each other locally. An architecture model was proposed to present the design and interoperability aspects of components for P2P energy trading in a microgrid. A specific Customer-to-Customer business model was introduced in a benchmark grid-connected microgrid based on the architecture model. The core component of a bidding system, called Elecbay, was also proposed and simulated using game theory. Test results show that P2P energy trading is able to balance local generation and demand, therefore, has a potential to enable a large penetration of RESs in the power grid
    • …
    corecore