To meet the ever-increasing demand for the data rates of wireless communications,extremely large-scale antenna array(ELAA)has emerged as one of the candidate technologies for future 6G *** significantly increased numb...
详细信息
To meet the ever-increasing demand for the data rates of wireless communications,extremely large-scale antenna array(ELAA)has emerged as one of the candidate technologies for future 6G *** significantly increased number of antennas in ELAA gives rise to near-field communications,necessitating tailored beamforming techniques within the near-field regions to accommodate the spherical-wave propagation *** various array geometries of ELAA,uniform circular array(UCA)has gained much attention for its distinct capability of maintaining uniform beam pattern across different azimuth ***,existing analysis of near-field UCA beamforming indicates that the near-field region severely declines in the broadside of UCA,where the system fails to benefit from near-field *** tackle this problem,the near-field beamforming technique of uniform concentric circular arrays(UCCAs)is investigated in this paper,which has the potential to enlarge the near-field region in the broadside ***,the analysis of beamforming gain in the 3D space with UCA and UCCA is ***,the distinct beamforming characteristics that set UCCA apart from UCA are delineated,revealing the superiority of UCCA in extending the near-field region in broadside at the cost of slightly reduced near-field region in the *** results are provided to verify the effectiveness of the theoretical analysis of beamforming gain with UCCA and the enhanced focusing ability of UCCA in the broadside direction.
Emerging long-range industrial IoT applications(e.g.,remote patient monitoring)have increasingly higher requirements for global deterministic *** many existing methods have built deterministic networks in small-scale ...
详细信息
Emerging long-range industrial IoT applications(e.g.,remote patient monitoring)have increasingly higher requirements for global deterministic *** many existing methods have built deterministic networks in small-scale networks through centralized computing and resource reservation,they cannot be applied on a global *** emerging mega-constellations enable new opportunities for realizing deterministic delay *** one constellation(e.g.,Starlink)might be managed by a single operator(e.g.,spaceX),packets can be routed within deterministic number of ***,the path diversity brought by the highly symmetrical network structure in mega-constellations can help to construct a congestion free network by *** paper leverages these unique characteristics of mega-constellations to avoid the traditional network congestion caused by multiple inputs and single output,and to determine the routing hops,and thus realizing a global deterministic network(DETspace).The model based on the 2D Markov chain theoretically verifies the correctness of *** effectiveness of DETspace in different traffic load con-ditions is also verified by extensive simulations.
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t...
详细信息
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is to automate adaptive network defense, which is however a difficult problem. As a first step towards automation, we propose investigating how to attain semi-automated adaptive network defense(SAND). We propose an approach extending the architecture of software-defined networking, which is centered on providing defenders with the capability to program the generation and deployment of dynamic defense rules enforced by network defense tools. We present the design and implementation of SAND, as well as the evaluation of the prototype implementation. Experimental results show that SAND can achieve agile and effective dynamic adaptations of defense rules(less than 15 ms on average for each operation), while only incurring a small performance overhead.
A region's Wireless sensor networks consist of sensors distributed over a region that collect and send environmental data to a central station. It measures humidity and temperature. The formation is based on many ...
详细信息
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computin...
详细信息
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computing ability of mobile ***,devices’life and performance depend on ***,in many scenarios,such as industrial production and automotive systems,where the environmental temperatures are usually high,it is important to control devices’temperatures to maintain steady *** this paper,we propose a thermal-aware channel-wise heterogeneous NN inference *** contains two parts,the thermal-aware dynamic frequency(TADF)algorithm and the heterogeneous-processor single-layer workload distribution(HSWD)*** on a mobile device’s architecture characteristics and environmental temperature,TADF can adjust the appropriate running speed of the central processing unit and graphics processing unit,and then the workload of each layer in the NN model is distributed by HSWD in line with each processor’s running speed and the characteristics of the layers as well as heterogeneous *** experimental results,where representative NNs and mobile devices were used,show that the proposed method can considerably improve the speed of the on-device inference by 21%–43%over the traditional inference method.
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl...
详细信息
We present a faithful geometric picture for genuine tripartite entanglement of discrete, continuous, and hybrid quantum systems. We first find that the triangle relation Ei|jkα≤Ej|ikα+Ek|ijα holds for all subaddit...
详细信息
We present a faithful geometric picture for genuine tripartite entanglement of discrete, continuous, and hybrid quantum systems. We first find that the triangle relation Ei|jkα≤Ej|ikα+Ek|ijα holds for all subadditive bipartite entanglement measure E, all permutations under parties i,j,k, all α∈[0,1], and all pure tripartite states. Then, we rigorously prove that the nonobtuse triangle area, enclosed by side Eα with 0<α≤1/2, is a measure for genuine tripartite entanglement. Finally, it is significantly strengthened for qubits that given a set of subadditive and nonsubadditive measures, some state is always found to violate the triangle relation for any α>1, and the triangle area is not a measure for any α>1/2. Our results pave the way to study discrete and continuous multipartite entanglement within a unified framework.
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Hybrid organic-inorganic perovskites(HOIP)have attracted increasing interest in the last *** current research in this field focuses on metal halide HOIPs because of their excellent photovoltaic and optoelectronic prop...
详细信息
Hybrid organic-inorganic perovskites(HOIP)have attracted increasing interest in the last *** current research in this field focuses on metal halide HOIPs because of their excellent photovoltaic and optoelectronic properties,other hybrid perovskites are also being designed and developed for other *** them,HOIPs bridged by nitrate show structural diversity and a remarkable range of physical *** this mini review,we summarize their structural features and rich physical properties including structural phase transitions,ferroelectric,piezoelectric,piezomagnetic and photoluminescencent *** addition,the challenges for improving the physical properties achieved by such materials and the space for further development of such materials are also discussed.
Printing techniques hold great potential in the manufacture of electronics such as sensors,micro-supercapacitors,and flexible ***,developing large-scale functional conductive inks with appropriate rheological properti...
详细信息
Printing techniques hold great potential in the manufacture of electronics such as sensors,micro-supercapacitors,and flexible ***,developing large-scale functional conductive inks with appropriate rheological properties and active components still remains a ***,through optimizing the formulations of ink,iron single sites supported N-doped carbon black(Fe_(1)-NC)inks can serve as both conductive electrodes and high-reactive catalysts to realize convenient glucose detection,which pronouncedly reduces the dosage of enzyme and simplifies the sensors *** detail,utilizing in-situ pyrolysis method,Fe_(1)-NC single-atom catalysts(SACs)are prepared in bulk(dekagram-level).The batched Fe_(1)-NC SACs materials can be uniformly mixed with modulated ink to realize the screen printing with high resolution and ***,the whole scalable preparation and ink-functional process can be extended to various metals(including Co,Ni,Cu,and Mn).The introduction of highly active Fe_(1)-NC sites reduces the amount of enzyme used in glucose detection by at least 50%,contributing to the cost reduction of *** strategy in harnessing the SACs onto the carbon inks thus provides a broad prospect for the low-cost and large-scale printing of sensitive sensing devices.
暂无评论