A model of an energy selective electron (ESE) engine with linear heat leakage and Lorentzian transmission probability is established in this paper.The expressions for the main performance parameters of the ESE engine ...A model of an energy selective electron (ESE) engine with linear heat leakage and Lorentzian transmission probability is established in this paper.The expressions for the main performance parameters of the ESE engine operating as a heat engine or a refrigerator are derived by using the theory of finite time thermodynamics.The optimum performances of the ESE engine are explored and the influences of the heat leakage,the central energy level of the resonance,and the width of the resonance on the performance of the ESE engine are analyzed by using detailed numerical examples.The optimal operation regions of power output and efficiency (or cooling load and coefficient of performance (COP)) are also discussed.Moreover,the performances of the ESE engine with Lorentzian transmission probability are compared with those with rectangular transmission probability.It is shown that the power output versus efficiency (or cooling load versus COP) characteristic curves with and without heat leakage are all closed loop-shaped ones.The efficiency (or COP) of the ESE engine decreases as the heat leakage increases.It is found that as the resonance width increases,the power output and efficiency (or cooling load and COP) increase to a maximum and then decrease due to the finite range of energies which contribute positively to the power generation or refrigeration in the electron system.Especially,when heat leakage is taken into account,the characteristic curves of maximum efficiency (or maximum COP) versus half resonance width are parabolic-like ones,which are quite different from the monotonic decreasing characteristic curves obtained in previous analyses without considering heat leakage.The results obtained in this paper can provide some theoretical guidelines for the design and operation of practical electron energy conversion devices such as solid-state thermionic refrigerators.展开更多
Objective To estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to Female Sex Workers (FSWs) in Kaiyuan County, Yunnan province, China, and analyze factors which impact t...Objective To estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to Female Sex Workers (FSWs) in Kaiyuan County, Yunnan province, China, and analyze factors which impact the transmission probability. Methods An open cohort research of FSWs in Kaiyuan was created from surveys conducted in April 2008, October 2008, and April 2009. Two cross-sectional surveys of local clients were also carried out in May 2008 and November 2008. A model was developed to estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to FSWs. Results The transmission probability from clients to FSWs was estimated as 0.0023 [95% CI 0.0014-0.0032] per unprotected heterosexual act. Conclusion The transmission probability among this group engaging in commercial sex in Yunnan province differs from that found in studies from other countries, and future studies should estimate the influence factors of HIV-1 transmission probability, such as stage of HIV infection, co-morbid sexually transmitted infections (STIs).展开更多
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim...In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.展开更多
In the 802.11b networks, the guarantee of an equal long-run channel access probability causes performance anomaly in a multi-rate wireless cell. Much interest has been involved in this issue and many effective mechani...In the 802.11b networks, the guarantee of an equal long-run channel access probability causes performance anomaly in a multi-rate wireless cell. Much interest has been involved in this issue and many effective mechanisms have been proposed. The usual MAC layer solutions include the initial contention window adaptation, the maximum transfer unit size adaptation and the packet bursting. In this paper, we propose a novel approach which introduces a new parameter called the transmission prob- ability pt to the legacy protocol. By adjusting pt according to the transmission rate, the proposed scheme can solve the performance anomaly problem cleanly. Throughput analysis and performance evaluation show that our scheme achieves significant im- provement in the aggregate throughput and the fairness.展开更多
This paper calculates the lifetime of resonant state and transmission probability of a single electron tunnelling in a spherical quantum dot (SQD) structure by using the transfer matrix technique. In the SQD, the el...This paper calculates the lifetime of resonant state and transmission probability of a single electron tunnelling in a spherical quantum dot (SQD) structure by using the transfer matrix technique. In the SQD, the electron is confined both transversally and longitudinally, the motion in the transverse and longitudinal directions is separated by using the adiabatic approximation theory. Meanwhile, the energy levels of the former are considered as the effective confining potential. The numerical calculations are carried out for the SQD consisting of GaAs/InAs material. The obtained results show that the bigger radius of the quantum dot not only leads significantly to the shifts of resonant peaks toward the low-energy region, but also causes the lengthening of the lifetime of resonant state. The lifetime of resonant state can be calculated from the uncertainty principle between the energy half width and lifetime.展开更多
We study electrons tunneling through a double-magnetic-barrier structure on the surface of monolayer graphene. The transmission probability and the conductance are calculated by using the transfer matrix method. The r...We study electrons tunneling through a double-magnetic-barrier structure on the surface of monolayer graphene. The transmission probability and the conductance are calculated by using the transfer matrix method. The results show that the normal incident transmission probability is blocked by the magnetic vector potential and the Klein tunneling region depends strongly on the direction of the incidence electron. The transmission probability and the conductance can be modulated by changing structural parameters of the barrier, such as width and height, offering a possibility to control electron beams on graphene.展开更多
The previous Decentralised Cognitive Medium Access Control(DC-MAC) protocol allows Secondary Users(SUs) to independently search for spectrum access opportunities without the need for a central coordinator.DC-MAC assum...The previous Decentralised Cognitive Medium Access Control(DC-MAC) protocol allows Secondary Users(SUs) to independently search for spectrum access opportunities without the need for a central coordinator.DC-MAC assumes that the detection scheme is ideal at the Physical(PHY) layer.In fact,a more complex detection algorithm is impractical in distributed spectrum sharing scenarios.Energy Detection(ED) at the PHY layer has become the most common method because of its low computational and implementation complexities.Thus,it is essential to integrate the DC-MAC with ED at the PHY layer.However,ED requires the Minimum Sampling Time(MST)duration to achieve the target detection probability in low Signal-to-Noise Ratio(SNR)environments.Otherwise,it cannot achieve the expected detection performance.In this paper,we derive an accurate expression of MST for ED in low SNR environments.Then,we propose an Optimised DC-MAC(ODC-MAC) protocol which is based on MST,and which amends the aforementioned problems of DC-MAC with ED.Moreover,the closed-form expressions for the unreliable data transmission probability are derived for both DC-MAC and ODC-MAC.We show that the simulation results agree well with the theoretical analyses.The proposed ODC-MAC can improve the data transmission reliability and enhance the throughput compared to the performance of the traditional DC-MAC.展开更多
Using an equation of motion technique, we investigate the spin-polarized transport through a quantum dot coupled to ferromagnetic leads and a mesoseopie ring by the Anderson Hamiltonian. We analyze the transmission pr...Using an equation of motion technique, we investigate the spin-polarized transport through a quantum dot coupled to ferromagnetic leads and a mesoseopie ring by the Anderson Hamiltonian. We analyze the transmission probability of this system in both the equilibrium and nonequilibrium cases, and our results reveal that the transport properties show some noticeable characteristics depending upon the spin-polarized strength p, the magnetic flux Ф and the number of lattice sites NR in the mesoseopic ring. These effects might have some potential applications in spintronics.展开更多
Within the framework of the Floquet theorem, we have investigated single-electron photon-assisted tunneling in a double-well system using the transfer matrix technique. The transmission probability displays satellite ...Within the framework of the Floquet theorem, we have investigated single-electron photon-assisted tunneling in a double-well system using the transfer matrix technique. The transmission probability displays satellite peaks on both sides of the main resonance peaks and these satellite peaks originate from emission or absorption photons. The single-electron resonance tunneling can be controlled through changing the applied harmonically potential positions, such as driven potential in wells, in barriers, or in whole double-well systems. This advantage should be useful in the optimization of the parameters of a transmission device.展开更多
In the ring-shaped Su–Schrieffer–Heeger(SSH)double-chain,the quantum interference between the two different electron tunneling paths of the upper and lower chains has an important influence on the electron transport...In the ring-shaped Su–Schrieffer–Heeger(SSH)double-chain,the quantum interference between the two different electron tunneling paths of the upper and lower chains has an important influence on the electron transport properties of non-trivial topological edge states.Here,we have studied the electron transport signatures of non-trivial topological edge states in a ring-shaped SSH double-chain system based on the wave-guide theory and transfer-matrix method.In the ringshaped SSH double-chain with the upper chain being different from the lower one,it is demonstrated that the electron transmission probability displays the four and two resonance peaks associated with the non-trivial topological edge states in the weak and strong coupling regimes,respectively.Whereas in the case of the upper chain being the same as the lower one,the two transmission resonance peaks associated with the non-trivial topological edge states in the weak coupling regime are only found,and that in the strong coupling regime disappear that originated from the destructive interference between the two different electron tunneling paths of the upper and lower chains.Consequently,the variation of the number of transmission resonance peaks associated with the non-trivial topological edge states in the weak and strong coupling regimes suggests that an alternative scheme for detecting non-trivial topological edge states in the ring-shaped SSH doublechain system.展开更多
Caching popular content in the storage of small cells is deemed as an efficient way to decrease latency, offload backhaul and satisfy user's demands. In order to investigate the performance of cache-enabled small cel...Caching popular content in the storage of small cells is deemed as an efficient way to decrease latency, offload backhaul and satisfy user's demands. In order to investigate the performance of cache-enabled small cell networks, coverage probability is studied in both single-point transmission and cooperative multipoint(Co MP) transmission scenarios. Meanwhile, the caching distribution modeled as Zipf and uniform distribution are both considered. Assuming that small base stations(SBSs) are distributed as a homogeneous Poisson point process(HPPP), the closed-form expressions of coverage probability are derived in different transmission cases. Simulation results show that Co MP transmission achieves a higher coverage probability than that of single-point transmission. Furthermore, Zipf distribution-based caching is more preferable than uniform distribution-based caching in terms of coverage probability.展开更多
基金supported by the National Natural Science Foundation of China (Grant No. 10905093)the Program for New Century Excellent Talents in Universities of China (Grant No. NCET-04-1006)the Foundation for the Author of National Excellent Doctoral Dissertation ofChina (Grant No. 200136)
文摘A model of an energy selective electron (ESE) engine with linear heat leakage and Lorentzian transmission probability is established in this paper.The expressions for the main performance parameters of the ESE engine operating as a heat engine or a refrigerator are derived by using the theory of finite time thermodynamics.The optimum performances of the ESE engine are explored and the influences of the heat leakage,the central energy level of the resonance,and the width of the resonance on the performance of the ESE engine are analyzed by using detailed numerical examples.The optimal operation regions of power output and efficiency (or cooling load and coefficient of performance (COP)) are also discussed.Moreover,the performances of the ESE engine with Lorentzian transmission probability are compared with those with rectangular transmission probability.It is shown that the power output versus efficiency (or cooling load versus COP) characteristic curves with and without heat leakage are all closed loop-shaped ones.The efficiency (or COP) of the ESE engine decreases as the heat leakage increases.It is found that as the resonance width increases,the power output and efficiency (or cooling load and COP) increase to a maximum and then decrease due to the finite range of energies which contribute positively to the power generation or refrigeration in the electron system.Especially,when heat leakage is taken into account,the characteristic curves of maximum efficiency (or maximum COP) versus half resonance width are parabolic-like ones,which are quite different from the monotonic decreasing characteristic curves obtained in previous analyses without considering heat leakage.The results obtained in this paper can provide some theoretical guidelines for the design and operation of practical electron energy conversion devices such as solid-state thermionic refrigerators.
基金supported by the mega-projects of national science research for the 11th Five-Year Plan of China (2008ZX10001-003)
文摘Objective To estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to Female Sex Workers (FSWs) in Kaiyuan County, Yunnan province, China, and analyze factors which impact the transmission probability. Methods An open cohort research of FSWs in Kaiyuan was created from surveys conducted in April 2008, October 2008, and April 2009. Two cross-sectional surveys of local clients were also carried out in May 2008 and November 2008. A model was developed to estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to FSWs. Results The transmission probability from clients to FSWs was estimated as 0.0023 [95% CI 0.0014-0.0032] per unprotected heterosexual act. Conclusion The transmission probability among this group engaging in commercial sex in Yunnan province differs from that found in studies from other countries, and future studies should estimate the influence factors of HIV-1 transmission probability, such as stage of HIV infection, co-morbid sexually transmitted infections (STIs).
基金supported by the Natural Science Foundation of Anhui Provincial Education Department under Grant No.KJ2013Z048the Natural Science Foundation of Anhui Provincial Colleges and Universities under Grant No.KJ2014A234
文摘In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.
基金Project supported by the National Mid- and Small-Scale EnterpriseTechnical Innovation Fund of China (No. 06C26225101730)the Sichuan Provincial Key Science and Technology Program, China (No. 05GG021-003-2)
文摘In the 802.11b networks, the guarantee of an equal long-run channel access probability causes performance anomaly in a multi-rate wireless cell. Much interest has been involved in this issue and many effective mechanisms have been proposed. The usual MAC layer solutions include the initial contention window adaptation, the maximum transfer unit size adaptation and the packet bursting. In this paper, we propose a novel approach which introduces a new parameter called the transmission prob- ability pt to the legacy protocol. By adjusting pt according to the transmission rate, the proposed scheme can solve the performance anomaly problem cleanly. Throughput analysis and performance evaluation show that our scheme achieves significant im- provement in the aggregate throughput and the fairness.
基金Project supported by the National Nature Science Foundation of China (Grant No 10347004).
文摘This paper calculates the lifetime of resonant state and transmission probability of a single electron tunnelling in a spherical quantum dot (SQD) structure by using the transfer matrix technique. In the SQD, the electron is confined both transversally and longitudinally, the motion in the transverse and longitudinal directions is separated by using the adiabatic approximation theory. Meanwhile, the energy levels of the former are considered as the effective confining potential. The numerical calculations are carried out for the SQD consisting of GaAs/InAs material. The obtained results show that the bigger radius of the quantum dot not only leads significantly to the shifts of resonant peaks toward the low-energy region, but also causes the lengthening of the lifetime of resonant state. The lifetime of resonant state can be calculated from the uncertainty principle between the energy half width and lifetime.
基金Project supported by the National Natural Science Foundation of China (Grant No.10974043)the Natural Science Foundation of Hebei Province of China (Grant No.A2009000240)
文摘We study electrons tunneling through a double-magnetic-barrier structure on the surface of monolayer graphene. The transmission probability and the conductance are calculated by using the transfer matrix method. The results show that the normal incident transmission probability is blocked by the magnetic vector potential and the Klein tunneling region depends strongly on the direction of the incidence electron. The transmission probability and the conductance can be modulated by changing structural parameters of the barrier, such as width and height, offering a possibility to control electron beams on graphene.
基金supported by the National Natural Science Foundation of China under Grants No.61271259,No.61301123the Chongqing Natural Science Foundation under Grant No.CTSC2011jjA40006+2 种基金the Research Project of Chongqing Education Commission under Grants No.KJ120501,No.KJ120502,No.KJ130536the Special Fund of Chongqing Key Laboratory(CSTC)the Project of Chongqing Municipal Education Commission under Grant No.Kjzh11206
文摘The previous Decentralised Cognitive Medium Access Control(DC-MAC) protocol allows Secondary Users(SUs) to independently search for spectrum access opportunities without the need for a central coordinator.DC-MAC assumes that the detection scheme is ideal at the Physical(PHY) layer.In fact,a more complex detection algorithm is impractical in distributed spectrum sharing scenarios.Energy Detection(ED) at the PHY layer has become the most common method because of its low computational and implementation complexities.Thus,it is essential to integrate the DC-MAC with ED at the PHY layer.However,ED requires the Minimum Sampling Time(MST)duration to achieve the target detection probability in low Signal-to-Noise Ratio(SNR)environments.Otherwise,it cannot achieve the expected detection performance.In this paper,we derive an accurate expression of MST for ED in low SNR environments.Then,we propose an Optimised DC-MAC(ODC-MAC) protocol which is based on MST,and which amends the aforementioned problems of DC-MAC with ED.Moreover,the closed-form expressions for the unreliable data transmission probability are derived for both DC-MAC and ODC-MAC.We show that the simulation results agree well with the theoretical analyses.The proposed ODC-MAC can improve the data transmission reliability and enhance the throughput compared to the performance of the traditional DC-MAC.
基金Supported by the Scientific Research Funds of Education Department of Sichuan Province under Grant No. 2006A069the Major Basic Research Project of Sichuan Province under Grant No. 2006J13-155
文摘Using an equation of motion technique, we investigate the spin-polarized transport through a quantum dot coupled to ferromagnetic leads and a mesoseopie ring by the Anderson Hamiltonian. We analyze the transmission probability of this system in both the equilibrium and nonequilibrium cases, and our results reveal that the transport properties show some noticeable characteristics depending upon the spin-polarized strength p, the magnetic flux Ф and the number of lattice sites NR in the mesoseopic ring. These effects might have some potential applications in spintronics.
文摘Within the framework of the Floquet theorem, we have investigated single-electron photon-assisted tunneling in a double-well system using the transfer matrix technique. The transmission probability displays satellite peaks on both sides of the main resonance peaks and these satellite peaks originate from emission or absorption photons. The single-electron resonance tunneling can be controlled through changing the applied harmonically potential positions, such as driven potential in wells, in barriers, or in whole double-well systems. This advantage should be useful in the optimization of the parameters of a transmission device.
基金supported by the National Natural Science Foundation of China(Grant No.11974153)the Natural Science Foundation of Shanxi Province,China(Grant No.20210302123184)+1 种基金the Program for the Outstanding Innovative Teams of Higher Learning Institutions of Shanxi Province,China(Grant No.163220120-S)the Natural Science Foundation of Shandong Province,China(Grant No.ZR2020MA091)。
文摘In the ring-shaped Su–Schrieffer–Heeger(SSH)double-chain,the quantum interference between the two different electron tunneling paths of the upper and lower chains has an important influence on the electron transport properties of non-trivial topological edge states.Here,we have studied the electron transport signatures of non-trivial topological edge states in a ring-shaped SSH double-chain system based on the wave-guide theory and transfer-matrix method.In the ringshaped SSH double-chain with the upper chain being different from the lower one,it is demonstrated that the electron transmission probability displays the four and two resonance peaks associated with the non-trivial topological edge states in the weak and strong coupling regimes,respectively.Whereas in the case of the upper chain being the same as the lower one,the two transmission resonance peaks associated with the non-trivial topological edge states in the weak coupling regime are only found,and that in the strong coupling regime disappear that originated from the destructive interference between the two different electron tunneling paths of the upper and lower chains.Consequently,the variation of the number of transmission resonance peaks associated with the non-trivial topological edge states in the weak and strong coupling regimes suggests that an alternative scheme for detecting non-trivial topological edge states in the ring-shaped SSH doublechain system.
基金supported by National Natural Science Foundation of China (61302081)the National Hi-Tech Research and Development Program of China (2014AA01A701)
文摘Caching popular content in the storage of small cells is deemed as an efficient way to decrease latency, offload backhaul and satisfy user's demands. In order to investigate the performance of cache-enabled small cell networks, coverage probability is studied in both single-point transmission and cooperative multipoint(Co MP) transmission scenarios. Meanwhile, the caching distribution modeled as Zipf and uniform distribution are both considered. Assuming that small base stations(SBSs) are distributed as a homogeneous Poisson point process(HPPP), the closed-form expressions of coverage probability are derived in different transmission cases. Simulation results show that Co MP transmission achieves a higher coverage probability than that of single-point transmission. Furthermore, Zipf distribution-based caching is more preferable than uniform distribution-based caching in terms of coverage probability.