The major challenge faced by the fifth generation(5G) mobile network is higher spectral efficiency and massive connectivity,i.e.,the target spectrum efficiency is 3 times over 4G,and the target connection density is o...The major challenge faced by the fifth generation(5G) mobile network is higher spectral efficiency and massive connectivity,i.e.,the target spectrum efficiency is 3 times over 4G,and the target connection density is one million devices per square kilometer.These requirements are difficult to be satisfied with orthogonal multiple access(OMA) schemes.Non-orthogonal multiple access(NOMA) has thus been proposed as a promising candidate to address some of the challenges for 5G.In this paper,a comprehensive survey of different candidate NOMA schemes for 5G is presented,where the usage scenarios of5 G and the application requirements for NOMA are firstly discussed.A general framework of NOMA scheme is established and the features of typical NOMA schemes are analyzed and compared.We focus on the recent progress and challenge of NOMA in standardization of international telecommunication union(ITU),and 3rd generation partnership project(3GPP).In addition,prototype development and future research directions are also provided respectively.展开更多
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches ab...Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of loT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT.展开更多
Pattern division multiple access(PDMA),which is a novel non-orthogonal multiple access(NOMA),has been proposed to address the challenges of massive connectivity and higher spectral efficiency for fifth generation(5G) ...Pattern division multiple access(PDMA),which is a novel non-orthogonal multiple access(NOMA),has been proposed to address the challenges of massive connectivity and higher spectral efficiency for fifth generation(5G) mobile network.The performance of PDMA mainly depends on the design of PDMA pattern matrix.In this paper,pattern matrix design of PDMA for 5G uplink(UL) applications in massive machine type communication(mMTC) and enhanced mobile broadband(eMBB) deployment scenarios are studied.The design criteria and examples for application in UL mMTC and UL eMBB are investigated.The performance of the PDMA pattern matrix is analyzed with the discrete constellation constrained capacity(CC-Capacity),and verified by Monte Carlo simulation.The simulation results show that the preferred PDMA pattern matrix can achieve good performance with different overloading factors(OF).展开更多
In order to expand the cell coverage of wireless cellular systems, the number of passive components in wireless systems has been substantially increased. There can be many passive intermodulation(PIM) pointsources eve...In order to expand the cell coverage of wireless cellular systems, the number of passive components in wireless systems has been substantially increased. There can be many passive intermodulation(PIM) pointsources even in a device or a radio link, which may add up constructively or destructively. A modified point-source model with lossy components is proposed to evaluate the superposition effect of the forward and refl ected PIM in case of series connection. The index of the series connection factor(SCF) is employed for systems that incorporate multiple PIM sources to predict the important characteristics of the cumulative PIM, such as the maximum and minimum values and the limit form. Furthermore, some initial experimental results are given out and the deviation in the above-mentioned prediction is also analyzed.展开更多
In this paper,a new result,new formulas of transfer function and input impedancefor 2-D dissipative reactance network cascade synthesis is given in terms of simplified formulas torealize doubly terminated resistively ...In this paper,a new result,new formulas of transfer function and input impedancefor 2-D dissipative reactance network cascade synthesis is given in terms of simplified formulas torealize doubly terminated resistively 1-D dissipative reactance networks.The new result includesthe more general cases,e.g.the both can be dissipative or one is dissipative and the anotheris a lossless reactance subnetwork and so on.Two calculation examples are given in the paperto illustrate the above realizations.Besides,considering some problems of the direct connectionbetween two subnetworks,we also introduce one-way lines to discuss the cascade synthesis ofnonreciprocal 2-D dissipative reactance networks.展开更多
A method has been devised to analyze multilayer electrically thick circular mi-crostrip antenna excited by a probe.The current on the probe is taken to be uniform.Thismethod was verified by analysis and experiment of ...A method has been devised to analyze multilayer electrically thick circular mi-crostrip antenna excited by a probe.The current on the probe is taken to be uniform.Thismethod was verified by analysis and experiment of an electrically thick circular microstrip an-tenna with an air gap.Based on the free space electric dyadic Green’s function,the field expressionof an horizontal electric dipole(HED),which is located at any point of the multilayer media andpoints in any direction,has been derived.By using this field expression and the Richmond re-action equation,an integral equation in terms of electric current on the patch is formulated.Byproperly choosing current expansion modes,this method can be used for an electrically thick mi-crostrip antenna.The theoretical results agree very well with experimental data for an electricallythick circular microstrip antenna with an air gap.展开更多
In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimatio...In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimation utilizes the unknown data symbols in addition to the known pilot symbols to estimate the channel. An initial channel state information (CSI) obtained by least-squared (LS) estimation is needed in semi-blind estimation. BFGS (Brayben, Fletcher, Goldfarb and Shanno) algorithm, which employs data as well as pilot symbols, estimates the CSI though solving the problem provided by maximum-likelihood (ML) principle. In addition, mean-square-error (MSE) used to evaluate the estimation performance can be further minimized with an optimal pilot design. Simulation results show that the semi-blind estimation achieves a significant improvement in terms of MSE performance over the conventional LS estimation by utilizing data symbols instead of increasing the number of pilot symbols, which demonstrates the estimation accuracy and spectral efficiency are both improved by semiblind estimation for C-RANs.展开更多
In this paper,we propose an equal interval range approximation and expandinglearning rule for multi-layer perceptrons applied in pattern recognitions.Compared with tra-ditional BP algorithm,this learning rule requires...In this paper,we propose an equal interval range approximation and expandinglearning rule for multi-layer perceptrons applied in pattern recognitions.Compared with tra-ditional BP algorithm,this learning rule requires the output activations interval between themaximum target output node and other nodes to exceed a given equal interval range for eachtraining input pattern,thus it can train networks faster in much lower calculation cost andmay avoid the occurrences ot reversed target output and overlearning,hence it can improve thenetwork’s generalization abilities in pattern recognitions.Through gradually expanding of theinterval range,this learning rule can also enable the network to learn its targets more accuratelyin less additional training iterations.Finally,we apply this algorithm in network training inEEG detection,and the experimental results have shown the above advantages of the proposedalgorithm.展开更多
Starting from an index mapping for one to multi-dimensions, a general in-placeand in-order prime factor FFT algorithm is proposed in this paper. In comparing with existingprime factor FFT algorithms, this algorithm sa...Starting from an index mapping for one to multi-dimensions, a general in-placeand in-order prime factor FFT algorithm is proposed in this paper. In comparing with existingprime factor FFT algorithms, this algorithm saves about half of the required storage capacityand possesses a higher efficiency. In addition, this algorithm can easily implement the DFT andIDFT in a single subroutine,展开更多
With the development of medical sensors and IoT, personalized service assisted elder and patient living is a critical service in IoT-based healthcare application. However, the scale and complexity of personalized serv...With the development of medical sensors and IoT, personalized service assisted elder and patient living is a critical service in IoT-based healthcare application. However, the scale and complexity of personalized service is increasing because of ubiquitous deployment of various kinds of medical sensors, which cause response time increase and resource waste. Therefore, leveraging the advantage of complex event processing(CEP) in data stream processing, we propose a hierarchical fog-cloud computing CEP architecture for personalized service to accelerate response time and reduce resource waste. Firstly, we introduce the proposed architecture, which includes sensor layer, fog layer and cloud layer. Secondly, we propose a series of optimizations for the architecture, there are a partitioning and clustering approach and a communication and parallel processing policy to optimize the fog and cloud computing. Finally, we implement a prototype system based on the architecture named Fog Cep Care. Experimental result shows that Fog Cep Care is superior to the traditional IoT-based healthcare application.展开更多
In this paper,a new reinforcement learning algorithm suitable for the continuous on-linelearning control in a large state space and a large action space are proposed.By a geneticlearning method of state-dependent acti...In this paper,a new reinforcement learning algorithm suitable for the continuous on-linelearning control in a large state space and a large action space are proposed.By a geneticlearning method of state-dependent action selecting,the stochastic competition learning isimplemented in a very small dynamic action population,and the computational complexityand the structural complexity caused by a large action space are reduced greatly.With an ex-ample of the optimization and control of computer networks,the application prospect of ourmethod is illustrated.Its effectiveness is confirmed by computer simulations.展开更多
Current mobility management solutions based on ID/Locator separation are not easily deployed and cannot solve routing scalability and mobility problems. This paper proposes a novel network architecture based on ID/Loc...Current mobility management solutions based on ID/Locator separation are not easily deployed and cannot solve routing scalability and mobility problems. This paper proposes a novel network architecture based on ID/Locator separation and suggests a new mobility management solution. This solution solves the problem of scalability in the network and also provides better support for mobility. It can be easily deployed because no modification of the mobile host’s protocol stack is required. The identifier contains some routing information; so the solution provides intrinsic interworking with traditional mobile hosts. Because the mapping systems are distributed to the edge networks, robustness of the whole system is enhanced and handover delay is decreased.展开更多
Efficient Cherenkov radiation (CR) is experimentally generated by a soliton self-frequency shift (SSFS) in a knot of hollow-core photonic crystal fiber (HC-PCF). When the angle of the half-wave plate is rotated ...Efficient Cherenkov radiation (CR) is experimentally generated by a soliton self-frequency shift (SSFS) in a knot of hollow-core photonic crystal fiber (HC-PCF). When the angle of the half-wave plate is rotated from 0° to 45°, the Raman soliton shifts from 2227 to 2300 nm, the output power of the CR increases 8.15 times, and the maximum output power ratio of the CR at 556 nm to the residual pump is estimated to be 20:1. The width of the output optical spectrum at visible wavelengths broadens from 25 to 45 nm, and the conversion efficiency of the CR can be above 28%. Moreover, the influences of the pump polarization and wavelength on the CR are studied, and the corresponding nonlinear processes are discussed.展开更多
A personalized recommendation for cloud services, which is based on usage history and the cooperative relationship of cloud services, is presented. According to service groups, a service group could be defined as seve...A personalized recommendation for cloud services, which is based on usage history and the cooperative relationship of cloud services, is presented. According to service groups, a service group could be defined as several services that were used together by one user at a time, and cooperative relationship between each two services can be calculated. In the process of recommendation, the services which are highly related to the service that the user has selected would be obtained firstly, the result should then take the QoS (Quality of Service) similarity between service’s QoS and user’s preference into account, so the final result combining the cooperative relationship and similarity will meet the functional needs of users and also meet the user’s personalized non-functional requirements. The simulation proves that the algorithm works effectively.展开更多
Due to its opportunistic spectrum sharing capability, cognitive radio (CR) has been proposed as a fundamental solution to alleviate the contradiction between spectrum scarcity and inefficient utilization of licensed...Due to its opportunistic spectrum sharing capability, cognitive radio (CR) has been proposed as a fundamental solution to alleviate the contradiction between spectrum scarcity and inefficient utilization of licensed spectrum. In CR system (CRS), to efficiently utilize the spectrum resource, one important issue is to allocate the sensing and transmission duration reasonably. In this paper, the evaluation metric of energy efficiency, which represented the total number of bits that were delivered with per joule of energy consumed, is adopted to evaluate the proposed scheme. We study a joint design of energy efficient sensing and transmission durations to maximize energy efficiency capacity (EEC) of CRS. The tradeoff between EEC and sensing and transmission durations are formulized as an optimization problem under constraints on target detection probability of secondary users (SUs) and toleration interference threshold of primary users (PUs). To obtain the optimal solution, optimizing sensing duration and transmission duration will be first performed separately. Then, a joint optimization iterative algorithm is proposed to search the optimal pair of sensing and transmission durations. Analytical and simulation results show that there exists a unique duration pair where the EEC is maximized, and that the EEC of the proposed joint optimization algorithm outperforms that of existed algorithms. Furthermore, the simulation results also reveal that the performance of the proposed low complexity iterative algorithm is comparable with that of the exhaustive search scheme.展开更多
There is a tradeoff between the quantum efficiency and the spectral response linewidth in resonant-cavity enhanced (RCE) photodetectors. Recently a new type of photodetector structure has been proposed, which utilizes...There is a tradeoff between the quantum efficiency and the spectral response linewidth in resonant-cavity enhanced (RCE) photodetectors. Recently a new type of photodetector structure has been proposed, which utilizes an inclined mirror in a three-mirror cavity. It decouples the quantum efficiency and the spectral response linewidth and has high response speed, high quantum efficiency, and narrow linewidth simultaneously. The analysis result indicates that the linewidth of 0.8 nm and quantum efficiency higher than 70% can be achieved on this device. For a 30×30 μm2 device, the maximum bandwidth approaches 23 GHz.展开更多
Nowadays, more carriers and components are used in cellular networks to satisfy the requirement of high-speed data service. The increase of carriers and components may result in serious problem of passive inter-modula...Nowadays, more carriers and components are used in cellular networks to satisfy the requirement of high-speed data service. The increase of carriers and components may result in serious problem of passive inter-modulation (PIM). This paper investigates the superposition effect of 3rd-order and 5th-order PIM under multicarrier scenarios with the channelized scheme (CS) and the multiplexed scheme (MS). We use the concept of 'effective hit' and the cumulative inter-modulation factors (CIFs) to evaluate the cumulative PIM product strength on each individual carrier within the receive signal band. Furthermore, with the simulator based on Monte-Carlo method, the group inter-modulation factor (GIF) is calculated to measure the average superposition effect for multiple carriers compared with the benchmark case. The simulation results show that, compared with the CS, the strength of PIM product with the MS does not increases so greatly with the growth of the total number of the carriers. The results are useful for the component designers and the cellular network planners.展开更多
Hybrid QoS model which consists of certain and uncertain expressions has strong power of semantic QoS description. For solving the hybrid QoS-aware semantic web service composition problem, this paper presents an Unce...Hybrid QoS model which consists of certain and uncertain expressions has strong power of semantic QoS description. For solving the hybrid QoS-aware semantic web service composition problem, this paper presents an Uncertain Multi-attribute decision making based Composition algorithm (UMC). The UMC includes two parts. First, UMC-Core can be used to synthetically evaluate the hybrid service quality information. Second, UMC-DH (Distributed and Heuristic framework for UMC) aims at enhancing the run-time performance of UMC when the problem space increases. The simulation results show that the UMC has lower execution cost, higher approximation ratio and success ratio than other similar approaches.展开更多
Let (?)=(S,S,…)be a binary random sequence with period N=2<sup>n</sup>,where S=(S<sub>0</sub>,…,S<sub>N-1</sub>)is its one period with N independent and uniformly distributed ...Let (?)=(S,S,…)be a binary random sequence with period N=2<sup>n</sup>,where S=(S<sub>0</sub>,…,S<sub>N-1</sub>)is its one period with N independent and uniformly distributed binary random variables.The main results of this paper are as follows.1)Var c(?)=2-(2N+1)2<sup>-N</sup>-2<sup>-2N</sup>;2)E|c(?)-c(?)|=[2<sup>c(?)+1</sup>-2]2<sup>-N</sup>for any sequence (?) with period 2<sup>n</sup>;3)N-1+2<sup>-N</sup>-(n/2+1-2<sup>-(N-n)</sup>)≤E[(?)c(?)]≤N-1+2<sup>-N</sup>4)2-2<sup>-(N-1)</sup>≤E[(?)|c(?)-c(?)|]≤2-2<sup>-N</sup>+n/2-2<sup>-(N-n)</sup>,where E and Var stand for taking expectation and variance respectively,c(?) is the linearcomplexity of the sequence (?) and W(b) the Hamming weight of one period of the seqnence (?).展开更多
基金supported by the National High Technology Research and Development Program of China (863 Program, No. 2015AA01A709)
文摘The major challenge faced by the fifth generation(5G) mobile network is higher spectral efficiency and massive connectivity,i.e.,the target spectrum efficiency is 3 times over 4G,and the target connection density is one million devices per square kilometer.These requirements are difficult to be satisfied with orthogonal multiple access(OMA) schemes.Non-orthogonal multiple access(NOMA) has thus been proposed as a promising candidate to address some of the challenges for 5G.In this paper,a comprehensive survey of different candidate NOMA schemes for 5G is presented,where the usage scenarios of5 G and the application requirements for NOMA are firstly discussed.A general framework of NOMA scheme is established and the features of typical NOMA schemes are analyzed and compared.We focus on the recent progress and challenge of NOMA in standardization of international telecommunication union(ITU),and 3rd generation partnership project(3GPP).In addition,prototype development and future research directions are also provided respectively.
文摘Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of loT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT.
基金supported by the National High Technology Research and Development Program of China(863 Program,No. 2015AA01A709)
文摘Pattern division multiple access(PDMA),which is a novel non-orthogonal multiple access(NOMA),has been proposed to address the challenges of massive connectivity and higher spectral efficiency for fifth generation(5G) mobile network.The performance of PDMA mainly depends on the design of PDMA pattern matrix.In this paper,pattern matrix design of PDMA for 5G uplink(UL) applications in massive machine type communication(mMTC) and enhanced mobile broadband(eMBB) deployment scenarios are studied.The design criteria and examples for application in UL mMTC and UL eMBB are investigated.The performance of the PDMA pattern matrix is analyzed with the discrete constellation constrained capacity(CC-Capacity),and verified by Monte Carlo simulation.The simulation results show that the preferred PDMA pattern matrix can achieve good performance with different overloading factors(OF).
文摘In order to expand the cell coverage of wireless cellular systems, the number of passive components in wireless systems has been substantially increased. There can be many passive intermodulation(PIM) pointsources even in a device or a radio link, which may add up constructively or destructively. A modified point-source model with lossy components is proposed to evaluate the superposition effect of the forward and refl ected PIM in case of series connection. The index of the series connection factor(SCF) is employed for systems that incorporate multiple PIM sources to predict the important characteristics of the cumulative PIM, such as the maximum and minimum values and the limit form. Furthermore, some initial experimental results are given out and the deviation in the above-mentioned prediction is also analyzed.
文摘In this paper,a new result,new formulas of transfer function and input impedancefor 2-D dissipative reactance network cascade synthesis is given in terms of simplified formulas torealize doubly terminated resistively 1-D dissipative reactance networks.The new result includesthe more general cases,e.g.the both can be dissipative or one is dissipative and the anotheris a lossless reactance subnetwork and so on.Two calculation examples are given in the paperto illustrate the above realizations.Besides,considering some problems of the direct connectionbetween two subnetworks,we also introduce one-way lines to discuss the cascade synthesis ofnonreciprocal 2-D dissipative reactance networks.
文摘A method has been devised to analyze multilayer electrically thick circular mi-crostrip antenna excited by a probe.The current on the probe is taken to be uniform.Thismethod was verified by analysis and experiment of an electrically thick circular microstrip an-tenna with an air gap.Based on the free space electric dyadic Green’s function,the field expressionof an horizontal electric dipole(HED),which is located at any point of the multilayer media andpoints in any direction,has been derived.By using this field expression and the Richmond re-action equation,an integral equation in terms of electric current on the patch is formulated.Byproperly choosing current expansion modes,this method can be used for an electrically thick mi-crostrip antenna.The theoretical results agree very well with experimental data for an electricallythick circular microstrip antenna with an air gap.
基金supported in part by the the National High Technology Research and Devel-opment Program of China(Grant No.2014AA01A701)National Natural Science Foundation of China(Grant No.61361166005)+2 种基金the State Major Science and Technology Special Projects(Grant No.2016ZX03001020006)the National Program for Support of Top-notch Young Pro-fessionalsthe Science and Technology Development Project of Beijing Municipal Education Commission of China(Grant No.KZ201511232036)
文摘In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimation utilizes the unknown data symbols in addition to the known pilot symbols to estimate the channel. An initial channel state information (CSI) obtained by least-squared (LS) estimation is needed in semi-blind estimation. BFGS (Brayben, Fletcher, Goldfarb and Shanno) algorithm, which employs data as well as pilot symbols, estimates the CSI though solving the problem provided by maximum-likelihood (ML) principle. In addition, mean-square-error (MSE) used to evaluate the estimation performance can be further minimized with an optimal pilot design. Simulation results show that the semi-blind estimation achieves a significant improvement in terms of MSE performance over the conventional LS estimation by utilizing data symbols instead of increasing the number of pilot symbols, which demonstrates the estimation accuracy and spectral efficiency are both improved by semiblind estimation for C-RANs.
基金supported by the National Natural Science Foundation of China(61471343)the National Key Technology Research and Development Program of the Ministry of Science and Technology of China(2014BAK14B03)
文摘In this paper,we propose an equal interval range approximation and expandinglearning rule for multi-layer perceptrons applied in pattern recognitions.Compared with tra-ditional BP algorithm,this learning rule requires the output activations interval between themaximum target output node and other nodes to exceed a given equal interval range for eachtraining input pattern,thus it can train networks faster in much lower calculation cost andmay avoid the occurrences ot reversed target output and overlearning,hence it can improve thenetwork’s generalization abilities in pattern recognitions.Through gradually expanding of theinterval range,this learning rule can also enable the network to learn its targets more accuratelyin less additional training iterations.Finally,we apply this algorithm in network training inEEG detection,and the experimental results have shown the above advantages of the proposedalgorithm.
基金Supported by the National Natural Science Foundation of China
文摘Starting from an index mapping for one to multi-dimensions, a general in-placeand in-order prime factor FFT algorithm is proposed in this paper. In comparing with existingprime factor FFT algorithms, this algorithm saves about half of the required storage capacityand possesses a higher efficiency. In addition, this algorithm can easily implement the DFT andIDFT in a single subroutine,
基金supported in part by the National High-tech R&D Program of China(863 Program) under Grant No. 2013AA102301Shandong Provincial Natural Science Foundation(No. ZR2017MF050)
文摘With the development of medical sensors and IoT, personalized service assisted elder and patient living is a critical service in IoT-based healthcare application. However, the scale and complexity of personalized service is increasing because of ubiquitous deployment of various kinds of medical sensors, which cause response time increase and resource waste. Therefore, leveraging the advantage of complex event processing(CEP) in data stream processing, we propose a hierarchical fog-cloud computing CEP architecture for personalized service to accelerate response time and reduce resource waste. Firstly, we introduce the proposed architecture, which includes sensor layer, fog layer and cloud layer. Secondly, we propose a series of optimizations for the architecture, there are a partitioning and clustering approach and a communication and parallel processing policy to optimize the fog and cloud computing. Finally, we implement a prototype system based on the architecture named Fog Cep Care. Experimental result shows that Fog Cep Care is superior to the traditional IoT-based healthcare application.
基金the High Technology Research and DeVelopment Programme of china
文摘In this paper,a new reinforcement learning algorithm suitable for the continuous on-linelearning control in a large state space and a large action space are proposed.By a geneticlearning method of state-dependent action selecting,the stochastic competition learning isimplemented in a very small dynamic action population,and the computational complexityand the structural complexity caused by a large action space are reduced greatly.With an ex-ample of the optimization and control of computer networks,the application prospect of ourmethod is illustrated.Its effectiveness is confirmed by computer simulations.
基金funded by the European Commission funded ICT-FP7 IP Project EFIPSANS under Grant No. INFSO-ICT-215549the National Basic Research Program of China ("973"Program) under Grant No. 2009CB320504
文摘Current mobility management solutions based on ID/Locator separation are not easily deployed and cannot solve routing scalability and mobility problems. This paper proposes a novel network architecture based on ID/Locator separation and suggests a new mobility management solution. This solution solves the problem of scalability in the network and also provides better support for mobility. It can be easily deployed because no modification of the mobile host’s protocol stack is required. The identifier contains some routing information; so the solution provides intrinsic interworking with traditional mobile hosts. Because the mapping systems are distributed to the edge networks, robustness of the whole system is enhanced and handover delay is decreased.
基金Project supported by the National Basic Research Program of China (Grant Nos. 2010CB327605 and 2010CB328300)the Fundamental Research Funds for the Central Universities of Ministry of Education of China (Grant Nos. 2011RC0309 and 2011RC008)the Specialized Research Fund for the Doctoral Program of Beijing University of Posts and Telecommunications, China (Grant No. CX201023)
文摘Efficient Cherenkov radiation (CR) is experimentally generated by a soliton self-frequency shift (SSFS) in a knot of hollow-core photonic crystal fiber (HC-PCF). When the angle of the half-wave plate is rotated from 0° to 45°, the Raman soliton shifts from 2227 to 2300 nm, the output power of the CR increases 8.15 times, and the maximum output power ratio of the CR at 556 nm to the residual pump is estimated to be 20:1. The width of the output optical spectrum at visible wavelengths broadens from 25 to 45 nm, and the conversion efficiency of the CR can be above 28%. Moreover, the influences of the pump polarization and wavelength on the CR are studied, and the corresponding nonlinear processes are discussed.
文摘A personalized recommendation for cloud services, which is based on usage history and the cooperative relationship of cloud services, is presented. According to service groups, a service group could be defined as several services that were used together by one user at a time, and cooperative relationship between each two services can be calculated. In the process of recommendation, the services which are highly related to the service that the user has selected would be obtained firstly, the result should then take the QoS (Quality of Service) similarity between service’s QoS and user’s preference into account, so the final result combining the cooperative relationship and similarity will meet the functional needs of users and also meet the user’s personalized non-functional requirements. The simulation proves that the algorithm works effectively.
基金supported by the National Natural Science Foundation of China (61001116)the National Science and Technology Major Project (2012ZX03003006)
文摘Due to its opportunistic spectrum sharing capability, cognitive radio (CR) has been proposed as a fundamental solution to alleviate the contradiction between spectrum scarcity and inefficient utilization of licensed spectrum. In CR system (CRS), to efficiently utilize the spectrum resource, one important issue is to allocate the sensing and transmission duration reasonably. In this paper, the evaluation metric of energy efficiency, which represented the total number of bits that were delivered with per joule of energy consumed, is adopted to evaluate the proposed scheme. We study a joint design of energy efficient sensing and transmission durations to maximize energy efficiency capacity (EEC) of CRS. The tradeoff between EEC and sensing and transmission durations are formulized as an optimization problem under constraints on target detection probability of secondary users (SUs) and toleration interference threshold of primary users (PUs). To obtain the optimal solution, optimizing sensing duration and transmission duration will be first performed separately. Then, a joint optimization iterative algorithm is proposed to search the optimal pair of sensing and transmission durations. Analytical and simulation results show that there exists a unique duration pair where the EEC is maximized, and that the EEC of the proposed joint optimization algorithm outperforms that of existed algorithms. Furthermore, the simulation results also reveal that the performance of the proposed low complexity iterative algorithm is comparable with that of the exhaustive search scheme.
文摘There is a tradeoff between the quantum efficiency and the spectral response linewidth in resonant-cavity enhanced (RCE) photodetectors. Recently a new type of photodetector structure has been proposed, which utilizes an inclined mirror in a three-mirror cavity. It decouples the quantum efficiency and the spectral response linewidth and has high response speed, high quantum efficiency, and narrow linewidth simultaneously. The analysis result indicates that the linewidth of 0.8 nm and quantum efficiency higher than 70% can be achieved on this device. For a 30×30 μm2 device, the maximum bandwidth approaches 23 GHz.
文摘Nowadays, more carriers and components are used in cellular networks to satisfy the requirement of high-speed data service. The increase of carriers and components may result in serious problem of passive inter-modulation (PIM). This paper investigates the superposition effect of 3rd-order and 5th-order PIM under multicarrier scenarios with the channelized scheme (CS) and the multiplexed scheme (MS). We use the concept of 'effective hit' and the cumulative inter-modulation factors (CIFs) to evaluate the cumulative PIM product strength on each individual carrier within the receive signal band. Furthermore, with the simulator based on Monte-Carlo method, the group inter-modulation factor (GIF) is calculated to measure the average superposition effect for multiple carriers compared with the benchmark case. The simulation results show that, compared with the CS, the strength of PIM product with the MS does not increases so greatly with the growth of the total number of the carriers. The results are useful for the component designers and the cellular network planners.
基金the National Basic Research Program of China (973 Program) (Grant No. 2003CB314806)the National High-Tech Research and Development Program of China (863 Program) (Grant No. 2006AA01Z164)+1 种基金the Program for New Century Excellent Talents in University (Grant No. NCET-05-0114)the National Natural Science Foundation of China (Grant No. 60672121)
文摘Hybrid QoS model which consists of certain and uncertain expressions has strong power of semantic QoS description. For solving the hybrid QoS-aware semantic web service composition problem, this paper presents an Uncertain Multi-attribute decision making based Composition algorithm (UMC). The UMC includes two parts. First, UMC-Core can be used to synthetically evaluate the hybrid service quality information. Second, UMC-DH (Distributed and Heuristic framework for UMC) aims at enhancing the run-time performance of UMC when the problem space increases. The simulation results show that the UMC has lower execution cost, higher approximation ratio and success ratio than other similar approaches.
基金This project was supported by National Natural Science Foundation of China
文摘Let (?)=(S,S,…)be a binary random sequence with period N=2<sup>n</sup>,where S=(S<sub>0</sub>,…,S<sub>N-1</sub>)is its one period with N independent and uniformly distributed binary random variables.The main results of this paper are as follows.1)Var c(?)=2-(2N+1)2<sup>-N</sup>-2<sup>-2N</sup>;2)E|c(?)-c(?)|=[2<sup>c(?)+1</sup>-2]2<sup>-N</sup>for any sequence (?) with period 2<sup>n</sup>;3)N-1+2<sup>-N</sup>-(n/2+1-2<sup>-(N-n)</sup>)≤E[(?)c(?)]≤N-1+2<sup>-N</sup>4)2-2<sup>-(N-1)</sup>≤E[(?)|c(?)-c(?)|]≤2-2<sup>-N</sup>+n/2-2<sup>-(N-n)</sup>,where E and Var stand for taking expectation and variance respectively,c(?) is the linearcomplexity of the sequence (?) and W(b) the Hamming weight of one period of the seqnence (?).