The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Maintaining high utilization rates of transmission lines is significant to the economic operation of power grid. For large-scale transmission network, it can be divided into several smaller areas. This paper studies the overall efficiencies of different areas and figures out the relatively inefficient area that deserves more attention in the further reconstruction of the whole network. Based on entropy...
Based on one dimensional first-order basis function, the construction process of the second and third-order scalar hierarchical basis functions in two dimensional case is given. The second and the third-order basis functions are applied to discontinuous Galerkin time domain (DGTD) algorithm. The influence of order of the basis function in accuracy of DGTD is analyzed.
A new method called the SO-DGTD method is proposed for solving the time-dependent Maxwell's equations via the Discontinuous Galerkin Time Domain (DGTD) method with dispersive media, the Shift Operator (SO) method is used to represent the constitutive relations. This method has a universal equation for dispersive media models, i.e. the Debye model, the Drude model, the Lorentz model, the SO-DGTD method...
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and passive eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by letting a fraction of legitimate receivers work in the full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon their own information...
In this paper, we investigate physical-layer security in a wireless ad hoc network in which a large number of legitimate transmitter-receiver pairs coexist with randomly distributed eavesdroppers; each legitimate receiver works in either half-duplex (HD) or full-duplex (FD) mode. We aim to increase the number of secure links per unit area in the network of interest by determining the allocation between...
In this paper, the outage performance of nonorthogonal multiple access (NOMA) is investigated in a downlink space division multiple access (SDMA) network with a multi-antenna base station and randomly deployed users. The NOMA technology is concurrently exploited with SDMA to further improve spectral efficiency. With limited channel state information (CSI) feedback taken into account, an analytical...
An autonomous current-sensing system consisting of a SmFe2/PZT/SmFe2 self-biased magnetoelectric (ME) composite and a Fe73.5Cu1Nb3Si13.5B9 nanocrystalline flux concentrator for weak current detection at the power-line frequency is presented and characterized. Giant magnetostrictive material of SmFe2 plate with large anisotropic constant provides a huge internal anisotropic field to bias the ME sensors...
We presented a new algorithm of underwater bubble recognition, which employs background modeling, image segmentation and pattern recognition. After obtaining underwater bubble images, we can separate single bubble from it manually and construct the database. Having computed Hu moment of samples for training and test, we can get the threshold and store. Then inputting the other images of sample, we...
Multi-region geocast, an efficient technique for routing protocols at the network layer, realizes the delivery of different information to different user groups that are differentiated from each other by their geographical locations. This paper studies multi-region geocast at the physical layer for the first time by exploiting non- orthogonal multiple access (NOMA) which is one of the promising technologies...
A 25Gb/s CMOS optical receiver with superior noise performance is presented. The fully integrated receiver comprises a transimpedance amplifier (TIA), a main amplifier (MA), auxiliary analog loops and on-chip bias circuitry. The receiver employs a novel noise optimization technique for BJT-based shunt-feedback TIA, together with gain and bandwidth boosting methods to achieve low noise. Designed and...
In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing physical layer security for a two-tier heterogeneous distributed wireless network, with each tier deployed with multiple pairs of a single-antenna transmitter (Tx) and a multi-antenna receiver (Rx). In the first tier, each Tx sends unclassified information and each Rx works in the half-duplex (HD) mode just receiving...
Develop an mural coronary artery simulative device in vitro and analyze the relationship between characteristics of mural coronary artery hemodynamics parameters and atherosclerosis. The simulative device was used to simulate experiments in vitro. In the condition of keeping any related parameters unchanged, such as system temperature, the average flow rate and heart rate, we calculated and observed...
Non-orthogonal multiple access (NOMA) has been recognized as a potential technique to achieve higher spectral efficiency (SE) for future 5G systems. However, the anticipated thousand-fold increase in wireless data traffic urgently calls for new designs of power-efficient communication systems. In this paper, we investigate NOMA from the perspective of energy efficiency (EE) in a multiuser downlink...
In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For the specific propagation characteristics of millimeter wave, we provide transmission scheme designs and a comprehensive secrecy performance analysis. Specifically, we maximize the secrecy throughput under a secrecy outage probability (SOP) constraint through a...
This paper investigates the problem of robustly globally uniformly exponential stability and L2 control for a class of switched systems with time-varying delay by using mode-dependent average dwell time (MDADT) approach. The MDADT approach is more applicable in practice than the average dwell time method in which each mode in the underlying system has its own average dwell time. Firstly, some sufficient...
The snowmelt runoff model (SRM) is used to simulate streamflow from snowmelt in the Er'dao-Songhua basin of upper Songhuajiang basin from March to August in 2010. The basin is divided into three elevation zones based on SRTM DEM data. MODIS flexible snow cover products (MODISMC) are generated form daily Terra/Aqua products and used as snow cover area input for SRM model. The precipitation and temperature...
This paper tried to find the best interpolation method for Xinjiang average annual temperature estimation based on exploratory data analysis and 9 spatial interpolation methods comparison. The research used part of annual data set of Chinese terrestrial climatic data from 1951 to 2013 to evaluate Xinjiang average annual temperature, which contained data from 64 meteorological stations in Xinjiang...
The robust exponential stability and L2-gain analysis of the uncertain switched nonlinear cascade systems with time varying delay are considered in this paper. Firstly, a sufficient condition for robustly exponential stability is studied by using the average dwell-time method, piecewise Lyapunov function and free weighting matrix approach, and then the L2-gain of the uncertain switched nonlinear cascaded...
In this paper, we investigate the impact of relative distance and large-scale fading of legitimate user and eavesdropper on the artificial noise (AN) assisted secrecy scheme in a multiple-input single-output (MISO) wiretap channel. We show that AN does not always improve the achievable ergodic secrecy rate (ESR), and provide an exact signal-to-noise ratio (SNR) threshold below which AN does not work...
Combining the advantages of empirical mode decomposition (EMD) and kernel independent component analysis (KICA), an underdetermined blind source separation method of nonlinear mixed wind turbine faults based on EMD-KICA in combination with PSO (Particle Swarm Optimization) is proposed. In the proposed method, the nonlinear mixed signals are firstly decomposed into a set of intrinsic mode function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.