This paper studies the performance of the hybrid radio-frequency (RF) and free-space optical (FSO) links assuming perfect channel state information (CSI) at the receiver. Considering the cases with and without hybrid ...
详细信息
ISBN:
(纸本)9781479959532
This paper studies the performance of the hybrid radio-frequency (RF) and free-space optical (FSO) links assuming perfect channel state information (CSI) at the receiver. Considering the cases with and without hybrid automatic repeat request (HARQ), we derive closed-form expressions for the message decoding probabilities as well as the throughput and the outage probability of the RF-FSO setups. We also evaluate the effect of different channel conditions on the throughput and the outage probability. The results show the efficiency of the RF-FSO links in different conditions.
The simultaneous lobing technique, also known as monopulse technique, has been widely used for fast target localization and tracking purposes. Many works focused on accurately localizing one or two targets laying with...
详细信息
ISBN:
(纸本)9781467396561
The simultaneous lobing technique, also known as monopulse technique, has been widely used for fast target localization and tracking purposes. Many works focused on accurately localizing one or two targets laying within a narrow beam centered around the monopulse antenna boresight direction. In this work, however, a new approach uses the outputs of a four quadrant antenna receiver to rapidly localize two point targets present in the hemisphere. A second set of antennas can be required to localize two targets sharing the same elevation or azimuth angles. To combine the outputs of both antenna sets and enhance the estimation performance of the algorithm, two methods are presented and compared.
In the version of this article originally published, the bottom of Figure 4f,g was partially truncated in the PDF. The error has been corrected in the PDF version of this article.
In the version of this article originally published, the bottom of Figure 4f,g was partially truncated in the PDF. The error has been corrected in the PDF version of this article.
In this paper, we use an extended version of the cardiovascular system's state space model presented by [1] and propose a fault detection and isolation methodology to study the problem of detecting cardiovascular ...
详细信息
ISBN:
(纸本)9781479917730
In this paper, we use an extended version of the cardiovascular system's state space model presented by [1] and propose a fault detection and isolation methodology to study the problem of detecting cardiovascular anomalies that can originate from variations in physiological parameters and deviations in the performance of the heart's mitral and aortic valves. An observer-based approach is discussed as the basis of the method. The approach contemplates a bank of Extended Kalman Filters to achieve joint estimation of the model's states and parameters and to detect malfunctions in the valves' performance.
We propose and test on real data a two-tier estimation strategy for inferring occupancy levels from measurements of CO_2 concentration and temperature levels. The first tier is a blind identification step, based eithe...
详细信息
ISBN:
(纸本)9781467371605
We propose and test on real data a two-tier estimation strategy for inferring occupancy levels from measurements of CO_2 concentration and temperature levels. The first tier is a blind identification step, based either on a frequentist Maximum Likelihood method, implemented using non-linear optimization, or on a Bayesian marginal likelihood method, implemented using a dedicated Expectation-Maximization algorithm. The second tier resolves the ambiguity of the unknown multiplicative factor, and returns the final estimate of the occupancy levels. The overall procedure addresses some practical issues of existing occupancy estimation strategies. More specifically, first it does not require the installation of special hardware, since it uses measurements that are typically available in many buildings. Second, it does not require apriori knowledge on the physical parameters of the building, since it performs system identification steps. Third, it does not require pilot data containing measured real occupancy patterns (i.e., physically counting people for some periods, a typically expensive and time consuming step), since the identification steps are blind.
This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS's) which are connected to the clouds through high capacity digital links. The network compr...
详细信息
This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS's) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions.
In this paper we study mean-field type control problems with risk-sensitive performance functionals. We establish a stochastic maximum principle (SMP) for optimal control of stochastic differential equations (SDEs) of...
详细信息
The availability and pervasive use of smart mobile devices makes it easy to upload videos and photos to the social websites and label them with any arbitrary tags from anywhere and anytime. This paper exploits the soc...
详细信息
The availability and pervasive use of smart mobile devices makes it easy to upload videos and photos to the social websites and label them with any arbitrary tags from anywhere and anytime. This paper exploits the social tagging information and reveals the latent hidden tags which might be relevant to a social media item to improve the tag-based search process. The proposed approach predicts links in undirected weighted tripartite graph. From a graph-based proximity perspective, our approach finds the appropriate personalized item in response to the user's query as well as uncovers the hidden tags potentially relevant to a given item. We evaluate our method on real-world social tagging system collected from MovieLens. The experimental evaluation shows that enriching the low annotated items with hidden tags improves the tag-based search performance.
We determine the upper and lower critical fields, the penetration depth and the vortex pinning characteristics of single crystals of overdoped Ba0.2K0.8Fe2As2 with Tc∼10K. We find that bulk vortex pinning is weak and...
详细信息
We determine the upper and lower critical fields, the penetration depth and the vortex pinning characteristics of single crystals of overdoped Ba0.2K0.8Fe2As2 with Tc∼10K. We find that bulk vortex pinning is weak and vortex dynamics to be dominated by the geometrical surface barrier. The temperature dependence of the lower critical field, Hc1, displays a distinctive upturn at low temperatures, which is suggestive of two distinct superconducting gaps. Furthermore, the penetration depth, λ, varies linearly with temperature below 4 K indicative of line nodes in the superconducting gap. These observations can be well described in a model based on a multiband nodal superconducting gap.
暂无评论