期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Estimation of Probability of Unprotected Heterosexual Vaginal Transmission of HIV-1 from Clients to Female Sex Workers in Kaiyuan,Yunnan Province, China 被引量:1
1
作者 WEN-JUAN MA JUN-JIE WANG +4 位作者 KATHLEEN-H. REILLY AI-MEI BI GUO-WEI DING KUMI SMITH NING WANG 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2010年第4期287-292,共6页
Objective To estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to Female Sex Workers (FSWs) in Kaiyuan County, Yunnan province, China, and analyze factors which impact t... Objective To estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to Female Sex Workers (FSWs) in Kaiyuan County, Yunnan province, China, and analyze factors which impact the transmission probability. Methods An open cohort research of FSWs in Kaiyuan was created from surveys conducted in April 2008, October 2008, and April 2009. Two cross-sectional surveys of local clients were also carried out in May 2008 and November 2008. A model was developed to estimate the probability of unprotected heterosexual vaginal transmission of HIV-1 from clients to FSWs. Results The transmission probability from clients to FSWs was estimated as 0.0023 [95% CI 0.0014-0.0032] per unprotected heterosexual act. Conclusion The transmission probability among this group engaging in commercial sex in Yunnan province differs from that found in studies from other countries, and future studies should estimate the influence factors of HIV-1 transmission probability, such as stage of HIV infection, co-morbid sexually transmitted infections (STIs). 展开更多
关键词 transmission Probability HIV/AIDS Model FSW Clients
下载PDF
An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1
2
作者 WANG Yajun LIAO Tongqing WANG Chuanan 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim... In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. 展开更多
关键词 transmission scheduling eavesdropping secrecy outage probability secrecy rate rayleigh fading
下载PDF
A novel MAC mechanism to resolve 802.11 performance anomaly 被引量:7
3
作者 CHENG Yan-hong LI Zhi-shu +1 位作者 XING Jian-chuan ZHU Li 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第10期1573-1583,共11页
In the 802.11b networks, the guarantee of an equal long-run channel access probability causes performance anomaly in a multi-rate wireless cell. Much interest has been involved in this issue and many effective mechani... In the 802.11b networks, the guarantee of an equal long-run channel access probability causes performance anomaly in a multi-rate wireless cell. Much interest has been involved in this issue and many effective mechanisms have been proposed. The usual MAC layer solutions include the initial contention window adaptation, the maximum transfer unit size adaptation and the packet bursting. In this paper, we propose a novel approach which introduces a new parameter called the transmission prob- ability pt to the legacy protocol. By adjusting pt according to the transmission rate, the proposed scheme can solve the performance anomaly problem cleanly. Throughput analysis and performance evaluation show that our scheme achieves significant im- provement in the aggregate throughput and the fairness. 展开更多
关键词 IEEE 802.11 WLAN transmission probability Performance anomaly
下载PDF
Lifetime of resonant state in a spherical quantum dot 被引量:1
4
作者 李春雷 肖景林 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第1期67-71,共5页
This paper calculates the lifetime of resonant state and transmission probability of a single electron tunnelling in a spherical quantum dot (SQD) structure by using the transfer matrix technique. In the SQD, the el... This paper calculates the lifetime of resonant state and transmission probability of a single electron tunnelling in a spherical quantum dot (SQD) structure by using the transfer matrix technique. In the SQD, the electron is confined both transversally and longitudinally, the motion in the transverse and longitudinal directions is separated by using the adiabatic approximation theory. Meanwhile, the energy levels of the former are considered as the effective confining potential. The numerical calculations are carried out for the SQD consisting of GaAs/InAs material. The obtained results show that the bigger radius of the quantum dot not only leads significantly to the shifts of resonant peaks toward the low-energy region, but also causes the lengthening of the lifetime of resonant state. The lifetime of resonant state can be calculated from the uncertainty principle between the energy half width and lifetime. 展开更多
关键词 spherical quantum dot lifetime of resonant state transmission probability
下载PDF
Transport properties through double-magnetic-barrier structures in graphene
5
作者 王素新 李志文 +1 位作者 刘建军 李玉现 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第7期405-409,共5页
We study electrons tunneling through a double-magnetic-barrier structure on the surface of monolayer graphene. The transmission probability and the conductance are calculated by using the transfer matrix method. The r... We study electrons tunneling through a double-magnetic-barrier structure on the surface of monolayer graphene. The transmission probability and the conductance are calculated by using the transfer matrix method. The results show that the normal incident transmission probability is blocked by the magnetic vector potential and the Klein tunneling region depends strongly on the direction of the incidence electron. The transmission probability and the conductance can be modulated by changing structural parameters of the barrier, such as width and height, offering a possibility to control electron beams on graphene. 展开更多
关键词 transmission probability CONDUCTANCE double-magnetic-barrier GRAPHENE
下载PDF
Cognitive MAC Protocol with Minimum Sampling Time and Cross-Layer Cooperation for Low Signal-to-Noise Ratio Environments
6
作者 谢显中 胡小峰 +2 位作者 杨和林 马彬 雷维嘉 《China Communications》 SCIE CSCD 2013年第12期125-138,共14页
The previous Decentralised Cognitive Medium Access Control(DC-MAC) protocol allows Secondary Users(SUs) to independently search for spectrum access opportunities without the need for a central coordinator.DC-MAC assum... The previous Decentralised Cognitive Medium Access Control(DC-MAC) protocol allows Secondary Users(SUs) to independently search for spectrum access opportunities without the need for a central coordinator.DC-MAC assumes that the detection scheme is ideal at the Physical(PHY) layer.In fact,a more complex detection algorithm is impractical in distributed spectrum sharing scenarios.Energy Detection(ED) at the PHY layer has become the most common method because of its low computational and implementation complexities.Thus,it is essential to integrate the DC-MAC with ED at the PHY layer.However,ED requires the Minimum Sampling Time(MST)duration to achieve the target detection probability in low Signal-to-Noise Ratio(SNR)environments.Otherwise,it cannot achieve the expected detection performance.In this paper,we derive an accurate expression of MST for ED in low SNR environments.Then,we propose an Optimised DC-MAC(ODC-MAC) protocol which is based on MST,and which amends the aforementioned problems of DC-MAC with ED.Moreover,the closed-form expressions for the unreliable data transmission probability are derived for both DC-MAC and ODC-MAC.We show that the simulation results agree well with the theoretical analyses.The proposed ODC-MAC can improve the data transmission reliability and enhance the throughput compared to the performance of the traditional DC-MAC. 展开更多
关键词 cognitive radio energy detection MAC minimum sampling time the unreliabledata transmission probability THROUGHPUT
下载PDF
Quantum transport signatures of non-trivial topological edge states in a ring-shaped Su–Schrieffer–Heeger double-chain system
7
作者 Cheng-Zhi Ye Lan-Yun Zhang Hai-Bin Xue 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第2期558-565,共8页
In the ring-shaped Su–Schrieffer–Heeger(SSH)double-chain,the quantum interference between the two different electron tunneling paths of the upper and lower chains has an important influence on the electron transport... In the ring-shaped Su–Schrieffer–Heeger(SSH)double-chain,the quantum interference between the two different electron tunneling paths of the upper and lower chains has an important influence on the electron transport properties of non-trivial topological edge states.Here,we have studied the electron transport signatures of non-trivial topological edge states in a ring-shaped SSH double-chain system based on the wave-guide theory and transfer-matrix method.In the ringshaped SSH double-chain with the upper chain being different from the lower one,it is demonstrated that the electron transmission probability displays the four and two resonance peaks associated with the non-trivial topological edge states in the weak and strong coupling regimes,respectively.Whereas in the case of the upper chain being the same as the lower one,the two transmission resonance peaks associated with the non-trivial topological edge states in the weak coupling regime are only found,and that in the strong coupling regime disappear that originated from the destructive interference between the two different electron tunneling paths of the upper and lower chains.Consequently,the variation of the number of transmission resonance peaks associated with the non-trivial topological edge states in the weak and strong coupling regimes suggests that an alternative scheme for detecting non-trivial topological edge states in the ring-shaped SSH doublechain system. 展开更多
关键词 ring-shaped Su-Schrieffer-Heeger double-chain non-trivial topological edge states transmission probability
下载PDF
Spin-Polarized Transport through a Quantum Dot Coupled to Ferromagnetic Leads and a Mesoscopic Ring
8
作者 黄睿 吴绍全 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第2期355-360,共6页
Using an equation of motion technique, we investigate the spin-polarized transport through a quantum dot coupled to ferromagnetic leads and a mesoseopie ring by the Anderson Hamiltonian. We analyze the transmission pr... Using an equation of motion technique, we investigate the spin-polarized transport through a quantum dot coupled to ferromagnetic leads and a mesoseopie ring by the Anderson Hamiltonian. We analyze the transmission probability of this system in both the equilibrium and nonequilibrium cases, and our results reveal that the transport properties show some noticeable characteristics depending upon the spin-polarized strength p, the magnetic flux Ф and the number of lattice sites NR in the mesoseopic ring. These effects might have some potential applications in spintronics. 展开更多
关键词 Kondo effect spin-polarized transport transmission probability
下载PDF
Influence of time-periodic potentials on electronic transport in double-well structure
9
作者 李春雷 徐燕 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第5期488-493,共6页
Within the framework of the Floquet theorem, we have investigated single-electron photon-assisted tunneling in a double-well system using the transfer matrix technique. The transmission probability displays satellite ... Within the framework of the Floquet theorem, we have investigated single-electron photon-assisted tunneling in a double-well system using the transfer matrix technique. The transmission probability displays satellite peaks on both sides of the main resonance peaks and these satellite peaks originate from emission or absorption photons. The single-electron resonance tunneling can be controlled through changing the applied harmonically potential positions, such as driven potential in wells, in barriers, or in whole double-well systems. This advantage should be useful in the optimization of the parameters of a transmission device. 展开更多
关键词 photon-assisted tunneling transmission probability quantum well
下载PDF
Modeling and performance analysis of energy selective electron (ESE) engine with heat leakage and transmission probability 被引量:14
10
作者 DING ZeMin CHEN LinGen SUN FengRui 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第11期1925-1936,共12页
A model of an energy selective electron (ESE) engine with linear heat leakage and Lorentzian transmission probability is established in this paper.The expressions for the main performance parameters of the ESE engine ... A model of an energy selective electron (ESE) engine with linear heat leakage and Lorentzian transmission probability is established in this paper.The expressions for the main performance parameters of the ESE engine operating as a heat engine or a refrigerator are derived by using the theory of finite time thermodynamics.The optimum performances of the ESE engine are explored and the influences of the heat leakage,the central energy level of the resonance,and the width of the resonance on the performance of the ESE engine are analyzed by using detailed numerical examples.The optimal operation regions of power output and efficiency (or cooling load and coefficient of performance (COP)) are also discussed.Moreover,the performances of the ESE engine with Lorentzian transmission probability are compared with those with rectangular transmission probability.It is shown that the power output versus efficiency (or cooling load versus COP) characteristic curves with and without heat leakage are all closed loop-shaped ones.The efficiency (or COP) of the ESE engine decreases as the heat leakage increases.It is found that as the resonance width increases,the power output and efficiency (or cooling load and COP) increase to a maximum and then decrease due to the finite range of energies which contribute positively to the power generation or refrigeration in the electron system.Especially,when heat leakage is taken into account,the characteristic curves of maximum efficiency (or maximum COP) versus half resonance width are parabolic-like ones,which are quite different from the monotonic decreasing characteristic curves obtained in previous analyses without considering heat leakage.The results obtained in this paper can provide some theoretical guidelines for the design and operation of practical electron energy conversion devices such as solid-state thermionic refrigerators. 展开更多
关键词 energy selective electron (ESE) engine heat leakage Lorentzian transmission probability performance analysis finite time thermodynamics
原文传递
Coverage analysis of cache-enabled small cell networks with stochastic geometry methods
11
作者 Zhang Qi Teng Yinglei +1 位作者 Liu Mengting Song Mei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第6期41-46,共6页
Caching popular content in the storage of small cells is deemed as an efficient way to decrease latency, offload backhaul and satisfy user's demands. In order to investigate the performance of cache-enabled small cel... Caching popular content in the storage of small cells is deemed as an efficient way to decrease latency, offload backhaul and satisfy user's demands. In order to investigate the performance of cache-enabled small cell networks, coverage probability is studied in both single-point transmission and cooperative multipoint(Co MP) transmission scenarios. Meanwhile, the caching distribution modeled as Zipf and uniform distribution are both considered. Assuming that small base stations(SBSs) are distributed as a homogeneous Poisson point process(HPPP), the closed-form expressions of coverage probability are derived in different transmission cases. Simulation results show that Co MP transmission achieves a higher coverage probability than that of single-point transmission. Furthermore, Zipf distribution-based caching is more preferable than uniform distribution-based caching in terms of coverage probability. 展开更多
关键词 caching coverage probability single-point transmission Co MP transmission stochastic geometry
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部