In the recent year, wireless sensor has become the interest of research due to their ability to monitor remotely especially in harsh condition. Here a double surface acoustic wave (SAW) resonator system for wireless h...
详细信息
A fabrication friendly crossing-coupled microring resonator was utilized to construct a compact and robust optical sensor which demonstrated a high sensitivity of 225nm/RIU experimentally.
A fabrication friendly crossing-coupled microring resonator was utilized to construct a compact and robust optical sensor which demonstrated a high sensitivity of 225nm/RIU experimentally.
We found a network version of water-filling, named polite water-filling, that is optimal for all boundary points of the capacity regions of MAC and BC and for all boundary points of a set of achievable regions of a ge...
详细信息
We found a network version of water-filling, named polite water-filling, that is optimal for all boundary points of the capacity regions of MAC and BC and for all boundary points of a set of achievable regions of a general class of interference networks, named MIMO B-MAC networks that include BC, MAC, interference channels, X networks, and most practical networks as special cases. It is polite because it strikes an optimal balance between reducing interference to others and maximizing a link's own rate. Unlike in single-user MIMO channels, where the optimal input covariance can be solved by the water-filling, the traditional water-filling is far from optimal in networks. Thus, general purpose optimization algorithms have been used for networks but have high complexity and do not work well for non-convex cases. Together with our duality result, the polite water-filling can be used to design highly efficient low-complexity iterative centralized/distributed algorithms for the optimization of input covariance matrices, including both power and beamforming matrices, because it takes the advantage of the structure of the problems. References to the resulting algorithms that outperform the state-of-the-art by a wide margin are provided.
We experimentally demonstrated an ultra-broadband supercontinuum source by using two low-cost multimode lasers, Erbium-Yerbium co-doped fiber and highly nonlinear fiber. The bandwidth of the generated broadband source...
详细信息
We experimentally demonstrated an ultra-broadband supercontinuum source by using two low-cost multimode lasers, Erbium-Yerbium co-doped fiber and highly nonlinear fiber. The bandwidth of the generated broadband source is almost 1100nm, covering from 900 to 2000nm. In addition, the supercontinum source output is smooth and stable.
We propose a novel way to eliminate the imperfection induced by the noise of experimental equipments and environment in a physical realization of true random number *** operating such post processing on the data,the a...
详细信息
We propose a novel way to eliminate the imperfection induced by the noise of experimental equipments and environment in a physical realization of true random number *** operating such post processing on the data,the autocorrelation coefficient and bias contained in the original data are successfully *** entropy of our random sequence is also approaching to the ideal limit and we finally obtain a 150G bps generation rate of random bits.
The polarization of non-paraxial partially coherent light scattered from nanospheres cannot be described easily. We utilize the degree of polarization to quantify Mie scattered partially coherent light and demonstrate...
详细信息
ISBN:
(纸本)9780977565771
The polarization of non-paraxial partially coherent light scattered from nanospheres cannot be described easily. We utilize the degree of polarization to quantify Mie scattered partially coherent light and demonstrate that this form regular polarization lattices.
Several methods exist for the assignment of trust to the nodes present in a Wireless Sensor Network (WSN). In this paper we develop a new algorithm for calculation of trust of individual nodes using both Direct and In...
详细信息
Several methods exist for the assignment of trust to the nodes present in a Wireless Sensor Network (WSN). In this paper we develop a new algorithm for calculation of trust of individual nodes using both Direct and Indirect Trusts and thereby use the calculated trusts for determination of the different route trusts (RTs) to the Base Station. We present a link state routing protocol based on trust which protects the WSN against routing attacks by eliminating the un-trusted nodes beforehand. It then forms the routes and finds the best trustworthy route among them by comparing the values of all the calculated route trusts as for each and every route present in the network. This paper also shows the advantage of inclusion of Indirect Trusts in addition to the Direct Trusts. Finally, we compare our work with the most prevalent routing protocols and show its benefits over them.
The algorithms in this paper exploit optimal input structure in interference networks and is a major advance from the state-of-the-art. Optimization under multiple linear constraints is important for interference netw...
详细信息
ISBN:
(纸本)9781457705960
The algorithms in this paper exploit optimal input structure in interference networks and is a major advance from the state-of-the-art. Optimization under multiple linear constraints is important for interference networks with individual power constraints, per-antenna power constraints, and/or interference constraints as in cognitive radios. While for single-user MIMO channel transmitter optimization, no one uses general purpose optimization algorithms such as steepest ascent because water-filling is optimal and much simpler, this is not true for MIMO multiaccess channels (MAC), broadcast channels (BC), and the non-convex optimization of interference networks because the traditional water-filling is far from optimal for networks. We recently found the right form of water-filling, polite water-filling, for some capacity/achievable regions of the general MIMO interference networks, named B-MAC networks, which include BC, MAC, interference channels, X networks, and most practical wireless networks as special cases. In this paper, we use weighted sum-rate maximization under multiple linear constraints in interference tree networks, a natural extension of MAC and BC, as an example to show how to design highly efficiency and low complexity algorithms. Several times faster convergence speed and orders of magnitude higher accuracy than the state-of-the-art are demonstrated by numerical examples.
The conventional protection scheme, including sequential components and wide differential area protection, may not be suitable for the FREEDM system mostly because of the unique characteristics of this new system. In ...
详细信息
The conventional protection scheme, including sequential components and wide differential area protection, may not be suitable for the FREEDM system mostly because of the unique characteristics of this new system. In this paper, the characteristics of FREEDM system are analyzed and a novel protection strategy, which makes full use of the system characteristics, is presented. This protection scheme makes use not only of the system configuration but mostly of the solid state transformer capability and design, to minimize the protection configuration and communication that are needed for a successful protection strategy. A Real Time Digital Simulator (RTDS) is used to model a sample FREEDM system in order to verify the proposed protection scheme. Simulation results are presented to support the proposed idea.
Interference alignment (IA) has been well recognized as a promising technique to obtain a large multiplexing gain in multiple input multiple output (MIMO) interference channels. However, most of the existing IA scheme...
详细信息
ISBN:
(纸本)9781467303217
Interference alignment (IA) has been well recognized as a promising technique to obtain a large multiplexing gain in multiple input multiple output (MIMO) interference channels. However, most of the existing IA schemes require global channel state information (CSI) at the transmitter to design precoding vectors, which causes a large amount of feedback bits. To reduce the feedback overhead, in this paper, we model the evolution and dynamic behavior of the CSI feedback rate control problem using the evolutionary game theory over orthogonal feedback channels with a total bandwidth constraint. The game utility is defined as the performance gain by CSI feedback minus the price as a linear function of the CSI feedback rate, subject to an overall bandwidth constraint. Then, an algorithm for the implementation of the evolution process is also presented. The proposed game-theoretic framework for modeling the interactions among the feedback of multiple users can be used to efficiently control the CSI feedback amount while achieving fairness among all the mobile receivers.
暂无评论