The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, conventional modal wavefront reconstruction is compared with compressed wavefront sensing to reconstruct freeform surface profiles using the Shack-Hartmann wavefront sensor. The modal wavefront reconstruction represents the phase or the wavefront in the Zernike domain. The compressed wavefront sensing method based on the sparse Zernike representation (SPARZER) represents the phase slopes...
The 5th generation of mobile communications system (5G) is nowadays expected to support very diverse applications, devices, and services such as enhanced mobile broadband (eMBB) and the Internet of things (IoTs). In order to meet the future requirements, new 5G candidate radio access technologies have been proposed and studied. For example, Massive multiple-input multiple-output (MIMO) is an attractive...
This paper develops a generalized channel-aware power control scheme to enhance the multi-packet reception (MPR) capability for random access. In the proposed scheme, each user randomly selects its transmit power with a probability in accordance with a distribution function based on its own channel state. For two-user systems, we show that the optimal power distribution function has a simple discrete...
A novel joint detector is proposed for the quadrature amplitude modulation (QAM) filter-bank multicarrier (FBMC) system with the prototype filter of the conventional FBMC. Based on the inter-carrier-correlation (ICC) matrices, the intrinsic interference model of the QAM FBMC is derived. The total interference can be divided into inter-carrier interference (ICI) and inter-symbol interference (ISI)...
We study the classical communication over quantum channels when assisted by no-signalling (NS) and PPT-preserving (PPT) codes. We first show that both the optimal success probability of a given transmission rate and one-shot ∊-error capacity can be formalized as semidefinite programs (SDPs) when assisted by NS or NS∩PPT codes. Based on this, we derive SDP finite blocklength converse bounds for general...
The mobile facility routing problem involves routing and scheduling a set of mobile facilities from a central depot to serve geographically dispersed customers. In this paper, service-time-related demand rate and fairness constraints are considered. The demand rate of a location is a piece-wise function, which decreases step by step over the service time from an initial value. To guarantee fairness,...
With the constant increase of social-network data published, the privacy preservation becomes more and more important. Although some literature algorithms apply K-anonymity to the relational data to prevent an adversary from significantly perpetrating privacy breaches, the inappropriate choice of K has a big impact on the quality of privacy protection and data utility. We propose a technique named...
The demand for sensorless control of surface permanent magnet synchronous motor (SPM) drives has grown tremendously over the past decade in a wide variety of industrial applications. Many different sensorless control methods have been proposed for SPM, especially the Matsui's current model-based method and the extended Kalman filter based methods have gained much attention. However, the performance...
In this paper, an improved saliency detection method based on superpixel is proposed. First, the original image is segmented into a number of superpixels by simple linear iterative clustering, each of which has the consistent color and texture characteristics. Second, two different methods, namely, the sparse representation-based method as well as a center-surrounding idea-based approach, are applied...
As many applications today migrate to distributed computing and cloud platforms, their user experience depends heavily on network performance. Software Defined Networking (SDN) makes it possible to obtain a global view of the network, introducing the new paradigm of developing adaptive applications with network views. A naive approach of realizing the paradigm, such as distributing the whole network...
Corporate social responsibility (CSR) has received growing attention in the past decade by both researchers and practitioners. However, prior hospitality research has mainly studied CSR from the firm's and customer's perspectives, our current understanding of CSR from employees' perspective is limited. In this study, we collected data from 260 employees of four hotels in China to test the effect of...
As Internet applications have become more diverse in recent years, users having heavy demand for online video services are more willing to pay higher prices for better services than light users that mainly use e-mails and instant messages. This encourages the Internet Service Providers (ISPs) to explore service differentiations so as to optimize their profits and allocation of network resources. Much...
The inference of the network traffic matrix from partial measurement data becomes increasingly critical for various network engineering tasks, such as capacity planning, load balancing, path setup, network provisioning, anomaly detection, and failure recovery. The recent study shows it is promising to more accurately interpolate the missing data with a three-dimensional tensor as compared to interpolation...
Detecting anomalous traffic is a critical task for advanced Internet management. The traditional approaches based on Principal Component Analysis (PCA) are effective only when the corruption is caused by small additive i.i.d. Gaussian noise. The recent Direct Robust Matrix Factorization (DRMF) is proven to be more robust and accurate in anomaly detection, but it incurs a high computation cost due...
Large-scale MU-MIMO is a promising technology to scale network capacity and the capacity gain grows linearly with the numbers of antennas and users in theory. However, its practical deployment faces three critical challenges in the state-of-the-art WLANs: i) the demand of a large number of expensive RF chains; ii) the linear growth of feedback overheads with the number of antennas; iii) the lack of...
Nowadays, despite the use of efficient LED lighting, lighting consumes a considerable amount of energy. To reduce the energy consumption, many office lighting systems are equipped with occupancy sensors. Since these sensors have a limited reliability in detecting presence, usually very conservative strategies are used such as keeping the lights on for fifteen minutes after the last detected presence...
Integrating mobile-edge computing (MEC) and wireless power transfer (WPT) is a promising technique in the Internet of Things (IoT) era. It can provide massive low-power mobile devices with enhanced computation capability and sustainable energy supply. In this paper, we consider a wireless powered multiuser MEC system, where a multi-antenna access point (AP) (integrated with an MEC server) broadcasts...
This paper focus on the problem of passivity of neural networks in the presence of time-varying discrete and distributed delays. By constructing a novel and suitable augment Lyapunov-Krasovskii functional(ALKF) and employing some useful inequality formula, especially generalized free-weighting-matrix(GFWM) approach, improved sufficient conditions for checking the passivity of the neural networks are...
This paper is concerned with the absolute stability analysis of neutral-type Lur'e systems with interval time-varying delays and sector-bounded nonlinearity. By using the reciprocally convex technique, convex technique and Wirtinger-type integral inequality simultaneously, neutral-delay-range-dependent absolute stability criteria are presented. The obtained criteria can be regarded as an extensive...
The disturbance in chemical process is complex and has the multiple characteristics, and the control performance assessment of multivariable system with multiple disturbances is one of the hot topics. In this paper, the control performance assessment method of multivariable systems, based on multi-time-variant-disturbances mixing generalized minimum variance (MMGMV), is proposed. Firstly, the generalized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.