317 research outputs found

    From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks

    Full text link
    We describe a non-cooperative interference alignment (IA) technique which allows an opportunistic multiple input multiple output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmiting along the spatial directions (SD) associated with the singular values of its channel matrix using a water-filling power allocation (PA) scheme. Often, power limitations lead the primary transmitter to leave some of its SD unused. Here, it is shown that the opportunistic link can transmit its own data if it is possible to align the interference produced on the primary link with such unused SDs. We provide both a processing scheme to perform IA and a PA scheme which maximizes the transmission rate of the opportunistic link. The asymptotes of the achievable transmission rates of the opportunistic link are obtained in the regime of large numbers of antennas. Using this result, it is shown that depending on the signal-to-noise ratio and the number of transmit and receive antennas of the primary and opportunistic links, both systems can achieve transmission rates of the same order.Comment: Submitted to IEEE Trans. in Signal Processing. Revised on 23-11-0

    Anomalous elasticity in a disordered layered XY model

    Full text link
    We investigate the effects of layered quenched disorder on the behavior of planar magnets, superfluids, and superconductors by performing large-scale Monte-Carlo simulations of a three-dimensional randomly layered XY model. Our data provide numerical evidence for the recently predicted anomalously elastic (sliding) intermediate phase between the conventional high-temperature and low-temperature phases. In this intermediate phase, the spin-wave stiffness perpendicular to the layers vanishes in the thermodynamic limit while the stiffness parallel to the layers as well as the spontaneous magnetization are nonzero. In addition, the susceptibility displays unconventional finite-size scaling properties. We compare our Monte-Carlo results with the theoretical predictions, and we discuss possible experiments in ultracold atomic gases, layered superconductors and in nanostructures.Comment: 6 pages, 4 eps figures included, proceedings of FQMT11, final version as publishe

    Composition-tuned smeared phase transitions

    Get PDF
    Phase transitions in random systems are smeared if individual spatial regions can order independently of the bulk system. In this paper, we study such smeared phase transitions (both classical and quantum) in substitutional alloys A1−x_{1-x}Bx_x that can be tuned from an ordered phase at composition x=0x=0 to a disordered phase at x=1x=1. We show that the ordered phase develops a pronounced tail that extends over all compositions x<1x<1. Using optimal fluctuation theory, we derive the composition dependence of the order parameter and other quantities in the tail of the smeared phase transition. We also compare our results to computer simulations of a toy model, and we discuss experiments.Comment: 6 pages, 4 eps figures included, final version as publishe

    A Study of Z-Transform Based Encryption Algorithm

    Get PDF
    It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms

    Effect of construction joints on the splitting tensile strength of concrete

    Get PDF
    AbstractThe purpose of this study is to experimentally correlate the compressive strength (f′c) of concrete to the splitting tensile strength (T) for plain concrete in the existence of a construction joint, and formulate an empirical equation relating T to f′c. Both the American Concrete Institute code (ACI 318-08 (ACI Committee 318, 2008)) and the American Society for Testing and Materials (ASTM (ASTM Standard C496, 2002; ASTM Standard C192/C192M, 2002; ASTM Standard C39/C39M, 2005; ASTM Standard C617, 2002)) provide the testing methods and standards, as well as the applicable theoretical and experimental formulas for the correlation between T to f′c for concrete specimens, which are monolithic, indicating that the specimens lack any construction joints. Providing a useful reduction factor in the splitting tensile strength of concrete due the existence of a construction joint is essential. It is a well known fact that construction joints are used in every concrete structure, which indicates that engineers would definitely benefit from an equation that could relate the splitting tensile strength of concrete in function of its compressive strength.The results suggest that the reduction in the splitting tensile strength in the presence of a construction joint is not as much as most engineers tend to believe. Due to that belief, most engineers tend to overdesign for steel reinforcement at those joints to compensate for this reduction. The objective of the study is to better the understanding of the effects of a construction joint on the splitting tensile strength. Thus provide an empirical equation to assist engineers in their design calculations, therefore reducing the amount of steel reinforcement at the construction joints. Thus also leading to cost saving on projects

    Immunoexpression of E-cadherin and Vimentin in Normal Oral Mucosa, Oral Epithelial Displasia and Oral Squamous Cell Carcinoma

    Get PDF
    Indexación: Web of Science; Scopus; Scielo.El objetivo fue evaluar la inmunoexpresión de E-cadherina y Vimentina en mucosa oral normal (MON), displasia epitelial oral (DEO) y carcinoma oral de células escamosas (COCE). Se realizó un estudio descriptivo de una serie de casos analizandolos mediante técnica de inmunohistoquímica contra E-cadherina y Vimentina 16 muestras de MON, 16 de DEO y 19 de COCE. La inmunotinción fue evaluada cualitativamente considerando extensión e intensidad para E-cadherina e intensidad para Vimentina. El análisis de la extensión e intensidad de la inmunotinción de E-cadherina y Vimentina según diagnóstico reveló una asociación estadísticamente significativa (p<0,001). Siendo la expresión de E-cadherina más alta en MON, seguido por DEO y más baja en COCE, inversamente a lo que se observó con Vimentina. El presente estudio reveló la subregulación del marcador molecular E-cadherina junto con la expresión aberrante por parte de células epiteliales del marcador mesenquimal Vimentina en muestras de MON, DEO y COCE.The aim was to evaluate the expression of E-cadherin and Vimentin in oral epithelial dysplasia (OED) and oral squamous cell carcinoma (OSCC), in comparison with normal oral mucosa (NOM) in a descriptive case study using immunohistochemistry. A total of fifty-one (N=51) histological samples were included; as follows: n = 16 (NOM), n = 16 (OED) and n = 19 (OSCC). All samples were analyzed using immunohistochemistry against the expression of E-cadherin and Vimentin. Immunostaining was qualitatively evaluated by extent and intensity of its expression for E-cadherin and intensity for Vimentin. Extension and intensity analysis of E-cadherin and Vimentin immunostaining according to group revealed a statistically significant association (r<0.001). E-cadherin expression was found to be highest in NOM followed by OED and lowest in OSCC, inverse to what was observed with Vimentin. The present study revealed the down regulation of the molecular marker E-cadherin, suggestive of reduction in dysplastic cells on comparison to NOM cells, and aberrant expression of the mesenchymal marker Vimentin by epithelial cells in samples of NOM, OED and OSCC; questioning their value as a prognostic marker.http://ref.scielo.org/pk8s6

    The effect of strict state measures on the epidemiologic curve of COVID-19 infection in the context of a developing country : a simulation from Jordan

    Get PDF
    COVID-19 has posed an unprecedented global public health threat and caused a significant number of severe cases that necessitated long hospitalization and overwhelmed health services in the most affected countries. In response, governments initiated a series of non-pharmaceutical interventions (NPIs) that led to severe economic and social impacts. The effect of these intervention measures on the spread of the COVID-19 pandemic are not well investigated within developing country settings. This study simulated the trajectories of the COVID-19 pandemic curve in Jordan between February and May and assessed the effect of Jordan’s strict NPI measures on the spread of COVID-19. A modified susceptible, exposed, infected, and recovered (SEIR) epidemic model was utilized. The compartments in the proposed model categorized the Jordanian population into six deterministic compartments: suspected, exposed, infectious pre-symptomatic, infectious with mild symptoms, infectious with moderate to severe symptoms, and recovered. The GLEAMviz client simulator was used to run the simulation model. Epidemic curves were plotted for estimated COVID-19 cases in the simulation model, and compared against the reported cases. The simulation model estimated the highest number of total daily new COVID-19 cases, in the pre-symptomatic compartmental state, to be 65 cases, with an epidemic curve growing to its peak in 49 days and terminating in a duration of 83 days, and a total simulated cumulative case count of 1048 cases. The curve representing the number of actual reported cases in Jordan showed a good pattern compatibility to that in the mild and moderate to severe compartmental states. The reproduction number under the NPIs was reduced from 5.6 to less than one. NPIs in Jordan seem to be effective in controlling the COVID-19 epidemic and reducing the reproduction rate. Early strict intervention measures showed evidence of containing and suppressing the disease

    Adulteration of hypoglycemic products: the silent threat

    Get PDF
    Background. The growing tendency toward the adulteration of hypoglycemic products in the market to increase the seller’s profits, the increased promotions of such products by unscrupulous promoters, and the higher rate of consumption by diabetic patients in the community all of these represent an alarm for serious health problems that could be fatal and have a potential threat to public health when using them. Aim. This review aims to attract the attention of the researchers to the hazardous clinical outcomes of adulterated hypoglycemic products and encourage them to do further studies analyzing the compositions of the available hypoglycemic products. Results. Based on the obtained data from the latest studies, the available hypoglycemic products have undeclared and banned anti-diabetic agents that lead to serious side effects. Conclusion. The popularity and abundance of adulterated hypoglycemic products in the market that are claimed to be effective for type 2 diabetes mellitus (Ty2DM) are hazardous to public health and have significant clinical outcomes due to their undeclared anti-diabetic agents which could be lethal to diabetic patients

    Timage -- A Robust Time Series Classification Pipeline

    Full text link
    Time series are series of values ordered by time. This kind of data can be found in many real world settings. Classifying time series is a difficult task and an active area of research. This paper investigates the use of transfer learning in Deep Neural Networks and a 2D representation of time series known as Recurrence Plots. In order to utilize the research done in the area of image classification, where Deep Neural Networks have achieved very good results, we use a Residual Neural Networks architecture known as ResNet. As preprocessing of time series is a major part of every time series classification pipeline, the method proposed simplifies this step and requires only few parameters. For the first time we propose a method for multi time series classification: Training a single network to classify all datasets in the archive with one network. We are among the first to evaluate the method on the latest 2018 release of the UCR archive, a well established time series classification benchmarking dataset.Comment: ICANN19, 28th International Conference on Artificial Neural Network

    Critical care nurses' experiences during the Illness of family members : a qualitative study

    Get PDF
    Introduction: A loved one's hospitalization in a critical care unit is a traumatic experience for families. However, because of their status and professional competence, a family member who is also a critical care nurse has additional obstacles and often long-term consequences. Objectives: To describe the experiences of critical care nurse-family members when a loved one is admitted to a critical care unit at the Hotel-Dieu de France hospital. Methods: A qualitative path based on van Manen's hermeneutic phenomenology combining both descriptive and interpretive models were adopted. Results: The lived experience of critical care nurses in providing care for their family members admitted into the same critical care were summarized in five themes. Nurses were torn between roles, consisting of confounding roles, their registered nurse status, and watchfulness. The lived experience of critical care nurses in providing care for their family members admitted into the same critical care was summarized into specialized knowledge that included a double-edged sword of seeking information and difficulty delivering the information. Critical nurses compete for expectations, including those placed on self and family members, resulting in emotional and personal sacrifice while gaining insight into the experiences. Conclusions: Critical care nurse-family members have a unique experience compared to the rest of the family, necessitating specialized care and attention. Increased awareness among healthcare providers could be a start in the right direction
    • …
    corecore