The problem of sharing radio spectrum is analyzed using a multiple server queueing model which represents channels owned by primary users and allowed opportunistic access by a secondary user group. The primary users a...
详细信息
Owing to ship's high inertia, strong time lag, non-linearity and under-actuated characteristics, as well as sustaining external disturbances frequently, designing a high performance ship tracking controller is sti...
详细信息
An analysis of spectrum sensing and transmission of a secondary user sharing a channel with a licensed primary user is presented. The primary user access patterns are modeled as an on-off Markov process. A five state ...
详细信息
An analysis of spectrum sensing and transmission of a secondary user sharing a channel with a licensed primary user is presented. The primary user access patterns are modeled as an on-off Markov process. A five state Markov model is derived to describe the performance of a secondary user that aims to utilize the channel during its idle state. Assuming perfect knowledge of the primary user access patterns, the model is analyzed with respect to the size of a back-off counter chosen when the channel is sensed busy and the size of the window allocated for secondary transmission when the channel is sensed idle. An analytical region is derived for the secondary users to operate in while the primary channel is free.
The framework is designed to provide a simple and powerful way of Web application component development. Components of the framework can nest, and the framework is designed to be easy to reuse as a component, thus pro...
详细信息
The framework is designed to provide a simple and powerful way of Web application component development. Components of the framework can nest, and the framework is designed to be easy to reuse as a component, thus providing its components to be used by the host application. We explain the interfaces required to make this possible - what they provide, what issues they solve, and how their requirement was discovered. We also identify shortcomings of this approach, and issues that will be addressed by future work.
Many properties of interest in graph structures are based on the nodes' average degree (i.e., the average number of edges incident to/from each node). In this work, we present asynchronous distributed algorithms, ...
详细信息
ISBN:
(纸本)9781467345378
Many properties of interest in graph structures are based on the nodes' average degree (i.e., the average number of edges incident to/from each node). In this work, we present asynchronous distributed algorithms, based on ratio consensus, that can be used to accurately estimate the number of nodes in a multi-component system whose communication topology is described by a directed graph. In addition, we describe an asynchronous distributed algorithm that allows each node to introduce or terminate links in order to reach a target average degree in the network. Such an approach can be useful in many realistic scenarios;for example, for the introduction and removal of renewable energy resources in a power network, while maintaining an average degree that fulfils some structural and dynamical properties and/or optimises some performance indicators of the network. The effectiveness of the proposed algorithms is demonstrated via illustrative examples.
We propose a new game theoretic approach to estimate a binary random variable based on a vector of sensor measurements that may be corrupted by an adversary. The problem is formulated as a zero-sum partial information...
详细信息
ISBN:
(纸本)9781467320658
We propose a new game theoretic approach to estimate a binary random variable based on a vector of sensor measurements that may be corrupted by an adversary. The problem is formulated as a zero-sum partial information game in which a detector attempts to minimize the probability of error and an attacker attempts to maximize this probability. Explicit mixed policies are computed using the matrix form of the game and exploiting sensor symmetry to reduce complexity and find closed-form solutions.
This paper is concerned with stabilization of a linear system with distributed input delay and input saturation. Both constant and time-varying delays are considered. In the case that the input delay is constant, unde...
详细信息
Wireless Capsule Endoscopy (WCE) is an almost new technology to capture images from the whole of Gastrointestinal (GI) tract, noninvasively. WCE is a very useful technology to detect various abnormalities like blood b...
详细信息
ISBN:
(纸本)9781467331289
Wireless Capsule Endoscopy (WCE) is an almost new technology to capture images from the whole of Gastrointestinal (GI) tract, noninvasively. WCE is a very useful technology to detect various abnormalities like blood based abnormalities, ulcers and polyps. We note that polyps are growing tissues occur on the surface of tissue instead of inside an organ. Most polyps are not cancerous but if one becomes larger than a centimeter, it can turn into cancer by great chance. So, one of the most important advantages of WCE can be the early detection of polyps and cancers. In this paper we proposed using region-based Active Contour Method (ACM) and geometric feature for automatic detection of polyps. The results on a set of images show that the proposed method can achieve %90.91 accuracy, %100 sensitivity and %-83.33 specificity on our data set.
Quantum entanglement is fundamentally related to the operational setting of local quantum operations and classical communication (LOCC). A more general class of operations known as separable operations (SEP) is often ...
详细信息
Quantum entanglement is fundamentally related to the operational setting of local quantum operations and classical communication (LOCC). A more general class of operations known as separable operations (SEP) is often employed to approximate LOCC, but the exact difference between LOCC and SEP is unknown. In this letter, we compare the two classes in performing particular tripartite to bipartite entanglement conversions and report a gap as large as 12.5% between SEP and LOCC, which is the first known appreciable gap between the classes. Our results rely on constructing a computable entanglement monotone with a clear operational meaning that, unlike all other such monotones previously studied, is not monotonic under SEP. Finally, we prove the curious fact that convergent sequences of LOCC protocols need not be LOCC feasible in the limit.
In this article, we extend recent results concerning random-pair Einstein-Podolsky-Rosen distillation and the operational gap between separable operations (SEPs) and local operations with classical communication (LOCC...
详细信息
In this article, we extend recent results concerning random-pair Einstein-Podolsky-Rosen distillation and the operational gap between separable operations (SEPs) and local operations with classical communication (LOCC). In particular, we consider the problem of obtaining bipartite maximal entanglement from an N-qubit W-class state (i.e., that of the form x0|00⋯0〉+x1|10⋯0〉+⋯+xn|00⋯1〉) when the target pairs are a priori unspecified. We show that when x0=0, the optimal probabilities for SEPs can be computed using semidefinite programming. On the other hand, to bound the optimal probabilities achievable by LOCC, we introduce entanglement monotones defined on the N-qubit W class of states. The LOCC monotones we construct can be increased by SEPs, and in terms of transformation success probability, we are able to quantify a gap as large as 37% between the two classes. Additionally, we demonstrate transformations ρ⊗n→σ⊗n that are feasible by SEP for any n but impossible by LOCC.
暂无评论