Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,espe...Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,especially when there is an nonnegligible start-up energy cost.To this end,by observing the variety of user number,we focus on the design of a switch policy which minimize the cumulative energy consumption.A given user transmission rate is guaranteed and the capability of SBSs are limited as well.According to the knowledge on user number variety,we classify the energy consumption problem into two cases.In complete information case,to minimize the cumulative energy consumption,an offline solution is proposed according to critical segments.A heuristic algorithm for incomplete information case(HAIIC) is proposed by tracking the difference of cumulative energy consumption.The upper bound of the Energy Consumption Ratio(ECR) for HAIIC is derived as well.In addition,a practical Q-learning based probabilistic policy is proposed.Simulation results show that the proposed HAIIC algorithm is able to save energy efficiently.展开更多
The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data....The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.展开更多
According to the Collins’ formula and its inverse diffraction computation,this paper presents an algorithm for reconstructing the object wavefront of a numerical holograph.To improve the quality of wavefront reconstr...According to the Collins’ formula and its inverse diffraction computation,this paper presents an algorithm for reconstructing the object wavefront of a numerical holograph.To improve the quality of wavefront reconstruction,a technique of eliminating the zero-order diffraction light is introduced,which is achieved by subtraction of two intensities of the interference patterns.The computer simulation and image processing show that the method of eliminating the zero-order diffraction beam can be applied to the wavefront reconstruction of inverse diffraction computation.展开更多
Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm m...Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm may not detect these attacks because it will assume that they are normal. In reality, it is very hard to guarantee that there are no attack items in the collected training data. Focusing on this problem, in this paper, firstly a new anomaly detection measurement is proposed according to the probability characteristics of intrusion instances and normal instances. Secondly, on the basis of anomaly detection measure, we present a clustering-based unsupervised anomaly detection patterns learning algorithm, which can overcome the shortage above. Finally, some experiments are conducted to verify the proposed algorithm is valid.展开更多
The multiverse is a hypothesis created to solve certain problems in cosmology. Currently, this scheme is still largely ad hoc, rather than derived from fundamental laws and principles. Because of this, the predictive ...The multiverse is a hypothesis created to solve certain problems in cosmology. Currently, this scheme is still largely ad hoc, rather than derived from fundamental laws and principles. Because of this, the predictive power of this theory is rather limited. Furthermore, there are concerns that this theory will make it impossible to calculate some measured quantities, such as the masses of quarks and the electron. In this paper, we will show that a new development in string theory, the universal wave function interpretation of string theory, provides a way to derive the mathematical expression of the multiverse. We will demonstrate that the Weyl invariance existing in string theory indicates that our observed universe is a projection from a hologram. We will present how the laws of physics can be derived from this fact. Furthermore, we suggest it may also provide a way to calculate the masses of fundamental particles such as quarks and the electron.展开更多
Globalization and information technologies are new realities that have brought profound changes in lifestyles worldwide. This is reshaping the overall pattern of life custom, cultural production, consumption and trade...Globalization and information technologies are new realities that have brought profound changes in lifestyles worldwide. This is reshaping the overall pattern of life custom, cultural production, consumption and trade in a world increasingly filled with changes and economic diversity. In an age of globalization, often ask questions and discussions concerning about successes and vitalities of nations. Globalization and technological revolutions race ahead and transform the world, and how to traces the real business to success. There are thousands of good examples where any nations have shown entrepreneurial talents and have succeeded. It is culture that principally explains, in many cases, or geographical pattern where some countries are developing more rapidly and more successfully than others. How to explain economic success of this nation's miracles or simple the secret is creative entrepreneurships? This paper explores the complex interactions between the geographic pattern from one side and cultural, technological and social aspects of entrepreneurship from other side which generates the dynamic processes of the world economy. In this era of transformation, creativity and knowledge entrepreneurship are powerful tools of fostering economic progress and development.展开更多
We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired...We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols.展开更多
The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show...The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show that any hypergame can naturally be reformulated in terms of Bayesian games in an unified way. The transformation procedure is called Bayesian representation of hypergame. The authors then prove that some equilibrium concepts defined for hypergames are in a sense equivalent to those for Bayesian games. Furthermore, the authors discuss carefully based on the proposed analysis how each model should be used according to the analyzer's purpose.展开更多
Wind and solar energy are projected to be major sources of the world's power in the coming decades.In this study,we first introduce satellite observations for surface solar irradiance and wind,and then discuss usi...Wind and solar energy are projected to be major sources of the world's power in the coming decades.In this study,we first introduce satellite observations for surface solar irradiance and wind,and then discuss using the data for prediction and assessment of energy distribution.Using the current NCEP global forecast model (GFS),the global mean and standard deviation of solar power at the surface for the 5-d forecast are about 212 and 124 W/m2,respectively.For a 24-h forecast of a 3-h mean,the relative error is about 30%,and for a prediction of the daily mean,it is about 15%.The relative error of wind power forecasts for a 24-h forecast of a 3-h mean and a daily mean is 70% and 35%,respectively.The reanalysis results based on satellite observations and numerical weather prediction model are also used to study the distribution of solar and wind energy and the variation of the distribution related to climate change.No significant trend in downward solar radiation is found at the surface in the reanalysis data sets.Surface wind power however exhibits a significant positive trend as the global temperature is warming up.A comparison of a decadal mean wind energy between two decades (from 1949 to 1958 vs.from 1999 to 2008) shows that most of Asia had experienced a decrease in surface wind energy.Therefore,decisions about renewable energy developments need to consider such climate change scenarios.展开更多
基金partially supported by National Key Project of China under Grants No. 2013ZX03001007-004National Natural Science Foundation of China under Grants No. 61102052,61325012,61271219,91438115 and 61221001
文摘Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,especially when there is an nonnegligible start-up energy cost.To this end,by observing the variety of user number,we focus on the design of a switch policy which minimize the cumulative energy consumption.A given user transmission rate is guaranteed and the capability of SBSs are limited as well.According to the knowledge on user number variety,we classify the energy consumption problem into two cases.In complete information case,to minimize the cumulative energy consumption,an offline solution is proposed according to critical segments.A heuristic algorithm for incomplete information case(HAIIC) is proposed by tracking the difference of cumulative energy consumption.The upper bound of the Energy Consumption Ratio(ECR) for HAIIC is derived as well.In addition,a practical Q-learning based probabilistic policy is proposed.Simulation results show that the proposed HAIIC algorithm is able to save energy efficiently.
基金supported by the National High-tech R&D Program("863"Program)of China(No.2013AA013505)the National Science Foundation of China(No.61472213)State Scholarship Fund from China Scholarship Council(No.201406210270)
文摘The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.
基金Supported bythe Natural Science Foundation of Yunnan Province(2004F0025 M)
文摘According to the Collins’ formula and its inverse diffraction computation,this paper presents an algorithm for reconstructing the object wavefront of a numerical holograph.To improve the quality of wavefront reconstruction,a technique of eliminating the zero-order diffraction light is introduced,which is achieved by subtraction of two intensities of the interference patterns.The computer simulation and image processing show that the method of eliminating the zero-order diffraction beam can be applied to the wavefront reconstruction of inverse diffraction computation.
文摘Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm may not detect these attacks because it will assume that they are normal. In reality, it is very hard to guarantee that there are no attack items in the collected training data. Focusing on this problem, in this paper, firstly a new anomaly detection measurement is proposed according to the probability characteristics of intrusion instances and normal instances. Secondly, on the basis of anomaly detection measure, we present a clustering-based unsupervised anomaly detection patterns learning algorithm, which can overcome the shortage above. Finally, some experiments are conducted to verify the proposed algorithm is valid.
文摘The multiverse is a hypothesis created to solve certain problems in cosmology. Currently, this scheme is still largely ad hoc, rather than derived from fundamental laws and principles. Because of this, the predictive power of this theory is rather limited. Furthermore, there are concerns that this theory will make it impossible to calculate some measured quantities, such as the masses of quarks and the electron. In this paper, we will show that a new development in string theory, the universal wave function interpretation of string theory, provides a way to derive the mathematical expression of the multiverse. We will demonstrate that the Weyl invariance existing in string theory indicates that our observed universe is a projection from a hologram. We will present how the laws of physics can be derived from this fact. Furthermore, we suggest it may also provide a way to calculate the masses of fundamental particles such as quarks and the electron.
文摘Globalization and information technologies are new realities that have brought profound changes in lifestyles worldwide. This is reshaping the overall pattern of life custom, cultural production, consumption and trade in a world increasingly filled with changes and economic diversity. In an age of globalization, often ask questions and discussions concerning about successes and vitalities of nations. Globalization and technological revolutions race ahead and transform the world, and how to traces the real business to success. There are thousands of good examples where any nations have shown entrepreneurial talents and have succeeded. It is culture that principally explains, in many cases, or geographical pattern where some countries are developing more rapidly and more successfully than others. How to explain economic success of this nation's miracles or simple the secret is creative entrepreneurships? This paper explores the complex interactions between the geographic pattern from one side and cultural, technological and social aspects of entrepreneurship from other side which generates the dynamic processes of the world economy. In this era of transformation, creativity and knowledge entrepreneurship are powerful tools of fostering economic progress and development.
基金supported by the National Natural Science Foundation of China (Grant Nos. 11474168, and 11747161)the Natural Science Foundation of Jiangsu (Grant No. BK20151502)the Priority Academic Development Program of Jiangsu Higher Education Institutions, China
文摘We propose a three-party quantum secure direct communication(QSDC) protocol with hyperentanglement in both spatial-mode and polarization degrees of freedom. The secret message can be encoded independently with desired unitary operations in two degrees of freedom. In this protocol, a party can synchronously obtain the other two parties' messages. Compared with previous three-party QSDC protocols, our protocol has several advantages. First, the single photons in our protocol are only required to transmit for three times. This advantage makes this protocol simple and useful. Second, Alice and Bob can send different secret messages to Charlie, respectively. Finally, with hyperentanglement, this protocol has a higher information capacity than other protocols.
基金supported by Grant-in-Aid for Japan Society for the Promotion of Science(JSPS) Fellows, No.21-9482
文摘The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show that any hypergame can naturally be reformulated in terms of Bayesian games in an unified way. The transformation procedure is called Bayesian representation of hypergame. The authors then prove that some equilibrium concepts defined for hypergames are in a sense equivalent to those for Bayesian games. Furthermore, the authors discuss carefully based on the proposed analysis how each model should be used according to the analyzer's purpose.
基金supported by National Basic Research Program of China (Grant No. 2010CB951600)NOAA Center for Satellite Applications and Research
文摘Wind and solar energy are projected to be major sources of the world's power in the coming decades.In this study,we first introduce satellite observations for surface solar irradiance and wind,and then discuss using the data for prediction and assessment of energy distribution.Using the current NCEP global forecast model (GFS),the global mean and standard deviation of solar power at the surface for the 5-d forecast are about 212 and 124 W/m2,respectively.For a 24-h forecast of a 3-h mean,the relative error is about 30%,and for a prediction of the daily mean,it is about 15%.The relative error of wind power forecasts for a 24-h forecast of a 3-h mean and a daily mean is 70% and 35%,respectively.The reanalysis results based on satellite observations and numerical weather prediction model are also used to study the distribution of solar and wind energy and the variation of the distribution related to climate change.No significant trend in downward solar radiation is found at the surface in the reanalysis data sets.Surface wind power however exhibits a significant positive trend as the global temperature is warming up.A comparison of a decadal mean wind energy between two decades (from 1949 to 1958 vs.from 1999 to 2008) shows that most of Asia had experienced a decrease in surface wind energy.Therefore,decisions about renewable energy developments need to consider such climate change scenarios.