4,223 research outputs found
Throughput Maximization for Mobile Relaying Systems
This paper studies a novel mobile relaying technique, where relays of high
mobility are employed to assist the communications from source to destination.
By exploiting the predictable channel variations introduced by relay mobility,
we study the throughput maximization problem in a mobile relaying system via
dynamic rate and power allocations at the source and relay. An optimization
problem is formulated for a finite time horizon, subject to an
information-causality constraint, which results from the data buffering
employed at the relay. It is found that the optimal power allocations across
the different time slots follow a "stair-case" water filling (WF) structure,
with non-increasing and non-decreasing water levels at the source and relay,
respectively. For the special case where the relay moves unidirectionally from
source to destination, the optimal power allocations reduce to the conventional
WF with constant water levels. Numerical results show that with appropriate
trajectory design, mobile relaying is able to achieve tremendous throughput
gain over the conventional static relaying.Comment: submitted for possible conference publicatio
Online Bearing Remaining Useful Life Prediction Based on a Novel Degradation Indicator and Convolutional Neural Networks
In industrial applications, nearly half the failures of motors are caused by
the degradation of rolling element bearings (REBs). Therefore, accurately
estimating the remaining useful life (RUL) for REBs are of crucial importance
to ensure the reliability and safety of mechanical systems. To tackle this
challenge, model-based approaches are often limited by the complexity of
mathematical modeling. Conventional data-driven approaches, on the other hand,
require massive efforts to extract the degradation features and construct
health index. In this paper, a novel online data-driven framework is proposed
to exploit the adoption of deep convolutional neural networks (CNN) in
predicting the RUL of bearings. More concretely, the raw vibrations of training
bearings are first processed using the Hilbert-Huang transform (HHT) and a
novel nonlinear degradation indicator is constructed as the label for learning.
The CNN is then employed to identify the hidden pattern between the extracted
degradation indicator and the vibration of training bearings, which makes it
possible to estimate the degradation of the test bearings automatically.
Finally, testing bearings' RULs are predicted by using a -support
vector regression model. The superior performance of the proposed RUL
estimation framework, compared with the state-of-the-art approaches, is
demonstrated through the experimental results. The generality of the proposed
CNN model is also validated by transferring to bearings undergoing different
operating conditions
A Comparative Study of Leaf Litter Decomposition Rates in a Hill Forest and a Forest Plantation in Peninsular Malaysia
A comparison of seraya (Shorea curtisii Dyer ex. King) and pine (pinus caribaea var. Hondurensis)
leaf litter was made over a period of16 weeks in a Hill Dzpterocarp Forest (HDF) and in a pine
plantation (PP). At both sites, seraya leaves decomposed at a faster rate than pine needles. Weight
losses after 16 weeks from seraya leaves varied from 19.5% (PP) to 39.0% (HDF) while pine needles
showed weight losses varying from 10.3% (PP) to 13.6% (HDF). Soil microarthopods were suspected
to playa more important role in seraya leaf litter decomposition in the HDF than in the PP. The significance
ofthese findings onforest management is discussed.
Direct Observation of Long-Term Durability of Superconductivity in YBaCuO-AgO Composites
We report direct observation of long-term durability of superconductivity of
several YBaCuO-AgO composites that were first prepared and
studied almost 14 years ago [J. J. Lin {\it et al}., Jpn. J. Appl. Phys. {\bf
29}, 497 (1990)]. Remeasurements performed recently on both resistances and
magnetizations indicate a sharp critical transition temperature at 91 K. We
also find that such long-term environmental stability of high-temperature
superconductivity can only be achieved in YBaCuO with AgO
addition, but not with pure Ag addition.Comment: to be published in Jpn. J. Appl. Phy
High pressure effect on structure, electronic structure and thermoelectric properties of MoS
We systematically study the effect of high pressure on the structure,
electronic structure and transport properties of 2H-MoS, based on
first-principles density functional calculations and the Boltzmann transport
theory. Our calculation shows a vanishing anisotropy in the rate of structural
change at around 25 GPa, in agreement with the experimental data. A conversion
from van der Waals(vdW) to covalent-like bonding is seen. Concurrently, a
transition from semiconductor to metal occurs at 25 GPa from band structure
calculation. Our transport calculations also find pressure-enhanced electrical
conductivities and significant values of the thermoelectric figure of merit
over a wide temperature range. Our study supplies a new route to improve the
thermoelectric performance of MoS and of other transition metal
dichalcogenides by applying hydrostatic pressure.Comment: 6 pages, 6 figures; published in JOURNAL OF APPLIED PHYSICS 113, xxxx
(2013
Source attack of decoy-state quantum key distribution using phase information
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to
achieve information-theoretically secure key generation. This field is now
approaching the stage of commercialization, but many practical QKD systems
still suffer from security loopholes due to imperfect devices. In fact,
practical attacks have successfully been demonstrated. Fortunately, most of
them only exploit detection-side loopholes which are now closed by the recent
idea of measurement-device-independent QKD. On the other hand, little attention
is paid to the source which may still leave QKD systems insecure. In this work,
we propose and demonstrate an attack that exploits a source-side loophole
existing in qubit-based QKD systems using a weak coherent state source and
decoy states. Specifically, by implementing a linear-optics
unambiguous-state-discrimination measurement, we show that the security of a
system without phase randomization --- which is a step assumed in conventional
security analyses but sometimes neglected in practice --- can be compromised.
We conclude that implementing phase randomization is essential to the security
of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure
- …
