12,082 research outputs found

    Topology design and performance analysis of an integrated communication network

    Get PDF
    A research study on the topology design and performance analysis for the Space Station Information System (SSIS) network is conducted. It is begun with a survey of existing research efforts in network topology design. Then a new approach for topology design is presented. It uses an efficient algorithm to generate candidate network designs (consisting of subsets of the set of all network components) in increasing order of their total costs, and checks each design to see if it forms an acceptable network. This technique gives the true cost-optimal network, and is particularly useful when the network has many constraints and not too many components. The algorithm for generating subsets is described in detail, and various aspects of the overall design procedure are discussed. Two more efficient versions of this algorithm (applicable in specific situations) are also given. Next, two important aspects of network performance analysis: network reliability and message delays are discussed. A new model is introduced to study the reliability of a network with dependent failures. For message delays, a collection of formulas from existing research results is given to compute or estimate the delays of messages in a communication network without making the independence assumption. The design algorithm coded in PASCAL is included as an appendix

    Multi-domain active sound control and noise shielding

    Get PDF
    This paper describes an active sound control methodology based on difference potentials. The main feature of this methodology is its ability to automatically preserve “wanted” sound within a domain while canceling “unwanted” noise from outside the domain. This method of preservation of the wanted sounds by active shielding control is demonstrated with various broadband and realistic sound sources such as human voice and music in multiple domains in a one-dimensional enclosure. Unlike many other conventional active control methods, the proposed approach does not require the explicit characterization of the wanted sound to be preserved. The controls are designed based on the measurements of the total field on the boundaries of the shielded domain only, which is allowed to be multiply connected. The method is tested in a variety of experimental cases. The typical attenuation of the unwanted noise is found to be about 20 dB over a large area of the shielded domain and the original wanted sound field is preserved with errors of around 1 dB and below through a broad frequency range up to 1 kHz. © 2011 Acoustical Society of Americ

    A one-sided Prime Ideal Principle for noncommutative rings

    Full text link
    Completely prime right ideals are introduced as a one-sided generalization of the concept of a prime ideal in a commutative ring. Some of their basic properties are investigated, pointing out both similarities and differences between these right ideals and their commutative counterparts. We prove the Completely Prime Ideal Principle, a theorem stating that right ideals that are maximal in a specific sense must be completely prime. We offer a number of applications of the Completely Prime Ideal Principle arising from many diverse concepts in rings and modules. These applications show how completely prime right ideals control the one-sided structure of a ring, and they recover earlier theorems stating that certain noncommutative rings are domains (namely, proper right PCI rings and rings with the right restricted minimum condition that are not right artinian). In order to provide a deeper understanding of the set of completely prime right ideals in a general ring, we study the special subset of comonoform right ideals.Comment: 38 page

    Residue codes of extremal Type II Z_4-codes and the moonshine vertex operator algebra

    Full text link
    In this paper, we study the residue codes of extremal Type II Z_4-codes of length 24 and their relations to the famous moonshine vertex operator algebra. The main result is a complete classification of all residue codes of extremal Type II Z_4-codes of length 24. Some corresponding results associated to the moonshine vertex operator algebra are also discussed.Comment: 21 pages, shortened from v

    Resolving the Large-N Nuclear Potential Puzzle

    Get PDF
    The large NcN_c nuclear potential puzzle arose because three- and higher-meson exchange contributions to the nucleon-nucleon potential did not automatically yield cancellations that make these contributions consistent with the general large NcN_c scaling rules for the potential. Here it is proposed that the resolution to this puzzle is that the scaling rules only apply for energy-independent potentials while all of the cases with apparent inconsistencies were for energy-dependent potentials. It is shown explicitly how energy-dependent potentials can have radically different large N behavior than an equivalent energy-independent one. One class of three-meson graphs is computed in which the contribution to the energy-independent potential is consistent with the general large N rules even though the energy-dependent potential is not.Comment: Corrections to the toy mode

    Living in the Intelligent Workplace Structuring and Managing Building Operation Information

    Get PDF
    • …
    corecore