50 research outputs found

    The prediction of the effect of ocean engineering on Jintang tidal channel evolution

    Get PDF
    Tidal channel is the most important waterway of harbor in coastal area, Jintang tidal channel is a natural tidal passage and waterway of Ningbor Port in the south-east side of Hangzhou Bay,. It is an important passage for tide passing in and out in Hangzhou Bay too. There has been a continuous shoals reclamation in the west side of it because of the demand for land and other ocean engineering such as port and bridge recently, this is potential threaten to the channel. With investigation, shore evolution, dynamic analysis, numerical simulation and model prediction, This paper gives a research for the evolution of Jintang channel, the variation of dynamic induced by different reclamation and ocean engineering, and builds a prediction model using equilibrium theory of dynamic and water depth adaption in channel, it shows that the runoff will be reduced and the sea bed will be adjusted suitably after reclamation and related adjacent human activities around the channel

    Performance of location and orientation estimation in 5G mmWave systems: Uplink vs downlink

    Get PDF
    The fifth generation of mobile communications (5G) is expected to exploit the concept of location-aware communication systems. Therefore, there is a need to understand the localization limits in these networks, particularly, using millimeter-wave technology (mmWave). Contributing to this understanding, we consider single-anchor localization limits in terms of 3D position and orientation error bounds for mmWave multipath channels, for both the uplink and downlink. It is found that uplink localization is sensitive to the orientation angle of the user equipment (UE), whereas downlink is not. Moreover, in the considered outdoor scenarios, reflected and scattered paths generally improve localization. Finally, using detailed numerical simulations, we show that mmWave systems are in theory capable of localizing a UE with sub-meter position error, and sub-degree orientation error

    Molecular Signatures of Prostate Stem Cells Reveal Novel Signaling Pathways and Provide Insights into Prostate Cancer

    Get PDF
    BACKGROUND:The global gene expression profiles of adult and fetal murine prostate stem cells were determined to define common and unique regulators whose misexpression might play a role in the development of prostate cancer. METHODOLOGY/PRINCIPAL FINDINGS:A distinctive core of transcriptional regulators common to both fetal and adult primitive prostate cells was identified as well as molecules that are exclusive to each population. Elements common to fetal and adult prostate stem cells include expression profiles of Wnt, Shh and other pathways identified in stem cells of other organs, signatures of the aryl-hydrocarbon receptor, and up-regulation of components of the aldehyde dehydrogenase/retinoic acid receptor axis. There is also a significant lipid metabolism signature, marked by overexpression of lipid metabolizing enzymes and the presence of the binding motif for Srebp1. The fetal stem cell population, characterized by more rapid proliferation and self-renewal, expresses regulators of the cell cycle, such as E2f, Nfy, Tead2 and Ap2, at elevated levels, while adult stem cells show a signature in which TGF-beta has a prominent role. Finally, comparison of the signatures of primitive prostate cells with previously described profiles of human prostate tumors identified stem cell molecules and pathways with deregulated expression in prostate tumors including chromatin modifiers and the oncogene, Erg. CONCLUSIONS/SIGNIFICANCE:Our data indicate that adult prostate stem or progenitor cells may acquire characteristics of self-renewing primitive fetal prostate cells during oncogenesis and suggest that aberrant activation of components of prostate stem cell pathways may contribute to the development of prostate tumors

    On the physical layer security of backscatter wireless systems

    No full text
    Backscatter wireless communication lies at the heart of many practical low-cost, low-power, distributed passive sensing systems. The inherent cost restrictions coupled with the modest computational and storage capabilities of passive sensors, such as RFID tags, render the adoption of classical security techniques challenging; which motivates the introduction of physical layer security approaches. Despite their promising potential, little has been done to study the prospective benefits of such physical layer techniques in backscatter systems. In this paper, the physical layer security of wireless backscatter systems is studied and analyzed. First, the secrecy rate of a basic single-reader, single-tag model is studied. Then, the unique features of the backscatter channel are exploited to maximize this secrecy rate. In particular, the proposed approach allows a backscatter system's reader to inject a noise-like signal, added to the conventional continuous wave signal, in order to interfere with an eavesdropper's reception of the tag's information signal. The benefits of this approach are studied for a variety of scenarios while assessing the impact of key factors, such as antenna gains and location of the eavesdropper, on the overall secrecy of the backscatter transmission. Numerical results corroborate our analytical insights and show that, if properly deployed, the injection of artificial noise yields significant performance gains in terms of improving the secrecy of backscatter wireless transmission
    corecore