925 research outputs found
On rate capacity and signature sequence adaptation in downlink of MC-CDMA system
This dissertation addresses two topics in the MC-CDMA system: rate capacity and adaptation of users\u27 signature sequences. Both of them are studied for the downlink communication scenario with multi-code scheme.
The purpose of studying rate capacity is to understand the potential of applying MC-CDMA technique for high speed wireless data communications. It is shown that, to maintain high speed data transmission with multi-code scheme, each mobile should cooperatively decode its desired user\u27s encoded data symbols which are spread with different signature sequences simultaneously. Higher data rate can be achieved by implementing dirty paper coding (DPC) to cooperatively encode all users\u27 data symbols at the base station. However, the complexity of realizing DPC is prohibitively high. Moreover, it is found that the resource allocation policy has profound impact on the rate capacity that can be maintained in the system. Nevertheless, the widely adopted proportional resource allocation policy is only suitable for the communication scenario in which the disparity of users\u27 channel qualities is small. When the difference between users\u27 channel qualities is large, one must resort to non-proportional assignment of power and signature sequences.
Both centralized and distributed schemes are proposed to adapt users\u27 signature sequences in the downlink of MC-CDMA system. With the former, the base station collects complete channel state information and iteratively adapts all users\u27 signature sequences to optimize an overall system performance objective function, e.g. the weighted total mean square error (WTMSE). Since the proposed centralized scheme is designed such that each iteration of signature sequence adaptation decreases the WTMSE which is lower bounded, the convergence of the proposed centralized scheme is guaranteed.
With the distributed signature sequence adaptation, each user\u27s signature sequences are independently adapted to optimize the associated user\u27s individual performance objective function with no regard to the performance of other users in the system. Two distributed adaptation schemes are developed. In one scheme, each user adapts its signature sequences under a pre-assigned power constraint which remains unchanged during the process of adaptation. In the other scheme, pricing methodology is applied so that the transmission power at the base station is properly distributed among users when users\u27 signature sequences are adapted. The stability issue of these distributed adaptation schemes is analyzed using game theory frame work. It is proven that there always exists a set of signature sequences at which no user can unilaterally adapt its signature sequences to further improve its individual performance, given the signature sequences chosen by other users in the system
A Study on Correlations Between the Initial Optical and Scintillation Properties and Their Radiation Damage for Lead Tungstate Crystals
This paper presents a study of correlations between the initial optical and scintillation properties and their radiation damage for mass produced lead tungstate crystals. A correlation was observed between crystal's initial light outputs and the values of its initial longitudinal transmittance at 360 nm. A strong correlation was found between the emission weighted radiation induced absorption coefficients and the relative losses of the longitudinal transmittance at 440 nm. Correlations were also observed between the relative losses of crystal's light output and the relative losses of its longitudinal transmittance at 440 nm, or the emission weighted radiation induced absorption coefficients. No correlations were observed between crystal's radiation hardness and its initial longitudinal transmittance or the slope of the initial longitudinal transmittance across the band edge
Large size LYSO crystals for future high energy physics experiments
Because of their high stopping power and fast bright scintillation, cerium doped silicate based heavy crystal scintillators, such as GSO, LSO, and LYSO, have been developed for medical instruments. Their applications in high energy and nuclear physics, however, are limited by lacking high quality crystals in sufficiently large size. The optical and scintillation properties, including the transmittance, emission and excitation spectra and the light output, decay kinetics and light response uniformity, as well as their degradation under /spl gamma/-ray irradiation were measured for two long (2.5/spl times/2.5/spl times/20 cm) LYSO samples from CPI and Saint-Gobain, and were compared to a BGO sample of the same size from SIC. Possible applications for crystal calorimetry in future high energy and nuclear physics experiments are discussed
A Radiation Damage and Recovery Study for Lead Tungstate Crystals from BTCP and SIC
This paper presents result of a study on radiation damage and recovery for lead tungstate
crystals produced at BTCP and SIC. Correlations were observed between initial light output and
initial longitudinal transmittance at 360 nm, between the loss of longitudinal transmittance at 440
nm and the loss of light output, and between radiation damages levels at different dose rates. No
correlations, however, were found between crystal’s initial optical properties and radiation hardness.
Excellent linearity was observed between the variations of crystal’s light output and its longitudinal
transmittance at 440 nm in several cycles of irradiation followed by recovery, indicating these PWO
crystals can be monitored in situ at LHC
A novel traveling-wave-based method improved by unsupervised learning for fault location of power cables via sheath current monitoring
In order to improve the practice in maintenance of power cables, this paper proposes a novel traveling-wave-based fault location method improved by unsupervised learning. The improvement mainly lies in the identification of the arrival time of the traveling wave. The proposed approach consists of four steps: (1) The traveling wave associated with the sheath currents of the cables are grouped in a matrix; (2) the use of dimensionality reduction by t-SNE (t-distributed Stochastic Neighbor Embedding) to reconstruct the matrix features in a low dimension; (3) application of the DBSCAN (density-based spatial clustering of applications with noise) clustering to cluster the sample points by the closeness of the sample distribution; (4) the arrival time of the traveling wave can be identified by searching for the maximum slope point of the non-noise cluster with the fewest samples. Simulations and calculations have been carried out for both HV (high voltage) and MV (medium voltage) cables. Results indicate that the arrival time of the traveling wave can be identified for both HV cables and MV cables with/without noise, and the method is suitable with few random time errors of the recorded data. A lab-based experiment was carried out to validate the proposed method and helped to prove the effectiveness of the clustering and the fault location
Network Supplier Credit Management: Models Based on Petri Net
In current credit evaluation methods, the credit condition of the network supplier and the credit degree of each index cannot be described well, and the credit evaluation data only source of the transaction platform have much limitation. This research proposes the method of calculating the importance and the value of the credit evaluation indexes, and proposes to put credit evaluation into big data environment. This research uses the transaction process of B2C as the case, and constructs multiple attribute weighted Petri net credit index subnet (CWPSN) for realizing the credit evaluation of the network supplier, and for presenting the correlations among the evaluation results of the credit evaluation indexes, and for presenting the importance of the indexes and the credit degree of each index, and describes the cost optimization process with credit cost optimization investment process Petri net (CCOIPPN). By the case to verify the credit evaluation method based on Petri net and the cost optimization method based on Petri net. The researches have provided methods for clearly and concretely describing the process of credit evaluation and cost optimization of network supplier, and have guidance significance for similar other researches
Design, Construction and Monitoring for the Excavation of Shanghai World Plaza
The Shanghai World Plaza is a multi-function building located in Shanghai Pudong New Development Area. It is a steel structure with thirty eight stories (199m) above the ground and three stories of basement. The excavation area of this building is 75m by 100m. The depth of the excavation is 16m to 18m (kernel part). The construction site is covered with soft soils up to a depth of 25m. Main streets, pipelines and existing buildings surround the site. The retaining structure employs a diaphragm with 1m in thickness, 30m in depth and 340m in total length. Three levels of H shaped steel supports are placed on 163 steel columns. De-watering of groundwater was applied during the excavation in order to decrease the hydraulic gradient and to improve the soils at the bottom of the excavation. Field monitoring includes 40 settlement/displacement points to cover main street pavements, pipelines and diaphragm units. Other items of monitoring include the excessive pore water pressure within the soils, multi-layer settlement, inclination of the retaining walls, lateral soil pressure, axial supporting force and, stresses within the diaphragm
Efficient and Provably-secure Certificateless Strong Designated Verifier Signature Scheme without Pairings
Strong designated verifier signature (generally abbreviated to SDVS) allows signers to obtain absolute control over who can verify the signature, while only the designated verifier other than anyone else can verify the validity of a SDVS without being able to transfer the conviction. Certificateless PKC has unique advantages comparing with certificate-based cryptosystems and identity-based PKC, without suffering from key escrow. Motivated by these attractive features, we propose a novel efficient CL-SDVS scheme without bilinear pairings or map-to-point hash operations. The proposed scheme achieves all the required security properties including EUF-CMA, non-transferability, strongness and non-delegatability. We also estimate the computational and communication efficiency. The comparison shows that our scheme outperforms all the previous CL-(S)DVS schemes. Furthermore, the crucial security properties of the CL-SDVS scheme are formally proved based on the intractability of SCDH and ECDL assumptions in random oracle model
- …