Traditional cellular network requires that a user equipment(UE) should associate to the same base station(BS) in both the downlink(DL) and the uplink(UL). Based on dual connectivity(DC) introduced in LTE-Advanced R12,...Traditional cellular network requires that a user equipment(UE) should associate to the same base station(BS) in both the downlink(DL) and the uplink(UL). Based on dual connectivity(DC) introduced in LTE-Advanced R12, DL/UL decouple access scheme has been proposed, which is especially suitable for heterogeneous networks(Het Nets). This paper is the pioneer to take the DL/UL decouple access scheme into consideration and develop a novel resource allocation algorithm in a two-tier Het Net to improve the total system throughput in the UL and ease the load imbalance between macro base stations(MBSs) and pico base stations(PBSs). A model is formulated as a nonlinear integer programming, and the proposed algorithm is a sub-optimal algorithm based on the graph theory. First, an undirected and weighted interference graph is obtained. Next, the users are grouped to let users with large mutual interferences to be assigned to different clusters. Then, the users in different clusters are allocated to different resource blocks(RBs) by using the Hungarian algorithm. Simulation results show that the proposed algorithm can provide great promotions for both the total system throughput and the average cell edge user throughput and successfully ease the load imbalance between MBSs and PBSs.展开更多
In this paper, we propose and experimentally demonstrate a bi-directional indoor communication system based on visible light RGB-LED. Spectrally efficient modulation formats (QAM-OFDM), advanced digital signal proce...In this paper, we propose and experimentally demonstrate a bi-directional indoor communication system based on visible light RGB-LED. Spectrally efficient modulation formats (QAM-OFDM), advanced digital signal processing, pre- and post- equalization are adopted to compensate the severe frequency response of indoor channel. In this system, we utilize red-green-blue Light emitting diodes (LEDs), of which each color can be used to carry different signals. For downlink, the low frequencies of each color are used while for uplink, the high frequencies are used. The overall data rate of downlink and uplink are 1.15-Gb/s and 300-Mb/s. The bit error ratios (BERs) for all channels after 0.7 m indoor delivery are below pre-forward- error-correction (pre-FEC) threshold of 3.8×10-3. To the best of our knowledge, this is the highest data rate in bi-directional visible light communication system.展开更多
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ...APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.展开更多
Considering the characteristics of highway bridges in Mountainous Areas, The design principles of bridge structure design, such as structure form, superstructure, span and substructure, are described, the optimal desi...Considering the characteristics of highway bridges in Mountainous Areas, The design principles of bridge structure design, such as structure form, superstructure, span and substructure, are described, the optimal design scheme of bridge structure is discussed from the aspects of safety, economy and so on in this paper.展开更多
Surgical accesses to lesions of the posterolateral pontomesencephalic junction(PMJ)region and the posterolateral tentorial gap remain a challenge in the field of neurosurgery.Since the first report of application of...Surgical accesses to lesions of the posterolateral pontomesencephalic junction(PMJ)region and the posterolateral tentorial gap remain a challenge in the field of neurosurgery.Since the first report of application of the extreme lateral supracerebellar infratentorial(ELSI)approach in resecting the PMJ lesions in 2000,a few articles concerning the ELSI approach have been published.The present review mainly provided an intimate introduction of the ELSI approach,and evalu- ated it in facets of patient position,skin incision,craniectomy,draining veins,retraction against the cerebellum,exposure limits,patient healing,as well as advantages and limitations compared with other approaches.The ELSI approach is proposed to be a very young and promising approach to access the lesions of posterolateral PMJ region and the posterolateral tentorial gap.Besides,it has several advantages such as having a shorter surgical pathway,causing less surgical complications,laborsaving,etc.Still,more studies are needed to improve this approach.展开更多
基金supported by the National Natural Science Foundation General Program of China under Grant No.61171110the National Basic Research Program of China under Grant No.2013CB329003
文摘Traditional cellular network requires that a user equipment(UE) should associate to the same base station(BS) in both the downlink(DL) and the uplink(UL). Based on dual connectivity(DC) introduced in LTE-Advanced R12, DL/UL decouple access scheme has been proposed, which is especially suitable for heterogeneous networks(Het Nets). This paper is the pioneer to take the DL/UL decouple access scheme into consideration and develop a novel resource allocation algorithm in a two-tier Het Net to improve the total system throughput in the UL and ease the load imbalance between macro base stations(MBSs) and pico base stations(PBSs). A model is formulated as a nonlinear integer programming, and the proposed algorithm is a sub-optimal algorithm based on the graph theory. First, an undirected and weighted interference graph is obtained. Next, the users are grouped to let users with large mutual interferences to be assigned to different clusters. Then, the users in different clusters are allocated to different resource blocks(RBs) by using the Hungarian algorithm. Simulation results show that the proposed algorithm can provide great promotions for both the total system throughput and the average cell edge user throughput and successfully ease the load imbalance between MBSs and PBSs.
基金supported by the NNSF of China(No.61177071, No.61250018)the Key Program of Shanghai Science and Technology Association (12dz1143000)
文摘In this paper, we propose and experimentally demonstrate a bi-directional indoor communication system based on visible light RGB-LED. Spectrally efficient modulation formats (QAM-OFDM), advanced digital signal processing, pre- and post- equalization are adopted to compensate the severe frequency response of indoor channel. In this system, we utilize red-green-blue Light emitting diodes (LEDs), of which each color can be used to carry different signals. For downlink, the low frequencies of each color are used while for uplink, the high frequencies are used. The overall data rate of downlink and uplink are 1.15-Gb/s and 300-Mb/s. The bit error ratios (BERs) for all channels after 0.7 m indoor delivery are below pre-forward- error-correction (pre-FEC) threshold of 3.8×10-3. To the best of our knowledge, this is the highest data rate in bi-directional visible light communication system.
基金partially supported by the NSFC-General Technology Basic Research Joint Fund (U1536204)the National Key Technologies R&D Program (2014BAH41B00)+3 种基金the National Nature Science Foundation of China (61672394 61373168 61373169)the National High-tech R&D Program of China (863 Program) (2015AA016004)
文摘APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.
文摘Considering the characteristics of highway bridges in Mountainous Areas, The design principles of bridge structure design, such as structure form, superstructure, span and substructure, are described, the optimal design scheme of bridge structure is discussed from the aspects of safety, economy and so on in this paper.
基金supported by the grants from Natural Science Foundation of Shandong Province(No.Z2008C12,Y2006C13)
文摘Surgical accesses to lesions of the posterolateral pontomesencephalic junction(PMJ)region and the posterolateral tentorial gap remain a challenge in the field of neurosurgery.Since the first report of application of the extreme lateral supracerebellar infratentorial(ELSI)approach in resecting the PMJ lesions in 2000,a few articles concerning the ELSI approach have been published.The present review mainly provided an intimate introduction of the ELSI approach,and evalu- ated it in facets of patient position,skin incision,craniectomy,draining veins,retraction against the cerebellum,exposure limits,patient healing,as well as advantages and limitations compared with other approaches.The ELSI approach is proposed to be a very young and promising approach to access the lesions of posterolateral PMJ region and the posterolateral tentorial gap.Besides,it has several advantages such as having a shorter surgical pathway,causing less surgical complications,laborsaving,etc.Still,more studies are needed to improve this approach.