4,223 research outputs found

    Throughput Maximization for Mobile Relaying Systems

    Full text link
    This paper studies a novel mobile relaying technique, where relays of high mobility are employed to assist the communications from source to destination. By exploiting the predictable channel variations introduced by relay mobility, we study the throughput maximization problem in a mobile relaying system via dynamic rate and power allocations at the source and relay. An optimization problem is formulated for a finite time horizon, subject to an information-causality constraint, which results from the data buffering employed at the relay. It is found that the optimal power allocations across the different time slots follow a "stair-case" water filling (WF) structure, with non-increasing and non-decreasing water levels at the source and relay, respectively. For the special case where the relay moves unidirectionally from source to destination, the optimal power allocations reduce to the conventional WF with constant water levels. Numerical results show that with appropriate trajectory design, mobile relaying is able to achieve tremendous throughput gain over the conventional static relaying.Comment: submitted for possible conference publicatio

    Online Bearing Remaining Useful Life Prediction Based on a Novel Degradation Indicator and Convolutional Neural Networks

    Full text link
    In industrial applications, nearly half the failures of motors are caused by the degradation of rolling element bearings (REBs). Therefore, accurately estimating the remaining useful life (RUL) for REBs are of crucial importance to ensure the reliability and safety of mechanical systems. To tackle this challenge, model-based approaches are often limited by the complexity of mathematical modeling. Conventional data-driven approaches, on the other hand, require massive efforts to extract the degradation features and construct health index. In this paper, a novel online data-driven framework is proposed to exploit the adoption of deep convolutional neural networks (CNN) in predicting the RUL of bearings. More concretely, the raw vibrations of training bearings are first processed using the Hilbert-Huang transform (HHT) and a novel nonlinear degradation indicator is constructed as the label for learning. The CNN is then employed to identify the hidden pattern between the extracted degradation indicator and the vibration of training bearings, which makes it possible to estimate the degradation of the test bearings automatically. Finally, testing bearings' RULs are predicted by using a ϵ\epsilon-support vector regression model. The superior performance of the proposed RUL estimation framework, compared with the state-of-the-art approaches, is demonstrated through the experimental results. The generality of the proposed CNN model is also validated by transferring to bearings undergoing different operating conditions

    A Comparative Study of Leaf Litter Decomposition Rates in a Hill Forest and a Forest Plantation in Peninsular Malaysia

    Get PDF
    A comparison of seraya (Shorea curtisii Dyer ex. King) and pine (pinus caribaea var. Hondurensis) leaf litter was made over a period of16 weeks in a Hill Dzpterocarp Forest (HDF) and in a pine plantation (PP). At both sites, seraya leaves decomposed at a faster rate than pine needles. Weight losses after 16 weeks from seraya leaves varied from 19.5% (PP) to 39.0% (HDF) while pine needles showed weight losses varying from 10.3% (PP) to 13.6% (HDF). Soil microarthopods were suspected to playa more important role in seraya leaf litter decomposition in the HDF than in the PP. The significance ofthese findings onforest management is discussed.

    Direct Observation of Long-Term Durability of Superconductivity in YBa2_2Cu3_3O7_7-Ag2_2O Composites

    Full text link
    We report direct observation of long-term durability of superconductivity of several YBa2_2Cu3_3O7_7-Ag2_2O composites that were first prepared and studied almost 14 years ago [J. J. Lin {\it et al}., Jpn. J. Appl. Phys. {\bf 29}, 497 (1990)]. Remeasurements performed recently on both resistances and magnetizations indicate a sharp critical transition temperature at 91 K. We also find that such long-term environmental stability of high-temperature superconductivity can only be achieved in YBa2_2Cu3_3O7_7 with Ag2_2O addition, but not with pure Ag addition.Comment: to be published in Jpn. J. Appl. Phy

    High pressure effect on structure, electronic structure and thermoelectric properties of MoS2_2

    Full text link
    We systematically study the effect of high pressure on the structure, electronic structure and transport properties of 2H-MoS2_2, based on first-principles density functional calculations and the Boltzmann transport theory. Our calculation shows a vanishing anisotropy in the rate of structural change at around 25 GPa, in agreement with the experimental data. A conversion from van der Waals(vdW) to covalent-like bonding is seen. Concurrently, a transition from semiconductor to metal occurs at 25 GPa from band structure calculation. Our transport calculations also find pressure-enhanced electrical conductivities and significant values of the thermoelectric figure of merit over a wide temperature range. Our study supplies a new route to improve the thermoelectric performance of MoS2_2 and of other transition metal dichalcogenides by applying hydrostatic pressure.Comment: 6 pages, 6 figures; published in JOURNAL OF APPLIED PHYSICS 113, xxxx (2013

    Source attack of decoy-state quantum key distribution using phase information

    Get PDF
    Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous-state-discrimination measurement, we show that the security of a system without phase randomization --- which is a step assumed in conventional security analyses but sometimes neglected in practice --- can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure
    corecore