Along with the surge of unearthed medical literature and cultural relics in recent years,a network of channels in the system of medical conduit vessels(meridians) during the early Western Han dynasty has become much c...Along with the surge of unearthed medical literature and cultural relics in recent years,a network of channels in the system of medical conduit vessels(meridians) during the early Western Han dynasty has become much clearer gradually.In it,the increasing number of channel branches,network vessels and needle insertion holes(acupoints) is an important feature of the development of channel medicine during the Western Han dynasty.This is not only a reflection of the expanding requirements of the theoretical system of the main trunk channels and other vessels,but also an inevitable result of the continuous enrichment and accumulation of clinical experience.This article integrates the information about channel branches,network vessels,inscriptions,dots and further relics on the Tianhui(天回) Lacquered Meridian Figurine to compare the unearthed literature of the channel genre with the transmitted classical literature about acupuncture.The “Heart-Regulated Channel” in Medical Manuscripts on Bamboo Slips from Tianhui(《天回医简》) serves as an example to explain the occurrence,development and changes of the channel branches and network vessels in the early system of medical channels.展开更多
This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited commu...This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited communication channels). By taking the derivative character of network-induced delay into full consideration and defining new Lyapunov functions, linear matrix inequalities (LMIs)-based H-infinity performance optimization and controller design are presented for NCSs with limited communication channels. If there do not exist any constraints on the communication channels, the proposed design methods are also applicable. The merit of the proposed methods lies in their Jess conservativeness, which is achieved by avoiding the utilization of bounding inequalities for cross products of vectors. The simulation results illustrate the merit and effectiveness of the proposed H-infinity controller design for NCSs with limited communication channels.展开更多
Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performanc...Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%.展开更多
Simulations of water flow in channel networks require estimated values of roughness for all the individual channel segments that make up a network. When the number of individual channel segments is large, the paramete...Simulations of water flow in channel networks require estimated values of roughness for all the individual channel segments that make up a network. When the number of individual channel segments is large, the parameter calibration workload is substantial and a high level of uncertainty in estimated roughness cannot be avoided. In this study, all the individual channel segments are graded according to the factors determining the value of roughness. It is assumed that channel segments with the same grade have the same value of roughness. Based on observed hydrological data, an optimal model for roughness estimation is built. The procedure of solving the optimal problem using the optimal model is described. In a test of its efficacy, this estimation method was applied successfully in the simulation of tidal water flow in a large complicated channel network in the lower reach of the Yangtze River in China.展开更多
The recent development of channel technology has promised to reduce the transaction verification time in blockchain operations.When transactions are transmitted through the channels created by nodes,the nodes need to ...The recent development of channel technology has promised to reduce the transaction verification time in blockchain operations.When transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each other.If one party refuses to do so,the channel is unstable.A stable channel is thus required.Because nodes may show uncooperative behavior,they may have a negative impact on the stability of such channels.In order to address this issue,this work proposes a dynamic evolutionary game model based on node behavior.This model considers various defense strategies'cost and attack success ratio under them.Nodes can dynamically adjust their strategies according to the behavior of attackers to achieve their effective defense.The equilibrium stability of the proposed model can be achieved.The proposed model can be applied to general channel networks.It is compared with two state-of-the-art blockchain channels:Lightning network and Spirit channels.The experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable state.Thus its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.展开更多
Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years...Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years by combining the received packet randomly before forwarding them, resulting in a complex Jordan Gaussian Elimination (JGE) decoding process. The effectiveness of random NC is through cooperation among nodes. In this paper, we propose a simple, low-complexity cooperative protocol that exploits NC in a deterministic manner resulting in improved diversity, data rate, and less complex JGE decoding process. The proposed system is applied over a lossy wireless network. The scenario under investigation is as follows: M users must send their information to a common destination D and to exchange the information between each others, over erasure channels;typically the channels between the users and the destination are worse than the channels between users. It is possible to significantly reduce the traffic among users and destination, achieving significant bandwidth savings, by combining packets from different users in simple, deterministic ways without resorting to extensive header information before being forwarded to the destination and the M users. The key problem we try to address is how to efficiently combine the packets at each user while exploiting user cooperation and the probability of successfully recovering information from all users at D with k < 2M unique linear equations, accounting for the fact that the remaining packets will be lost in the network and there are two transmission stages. Simulation results show the behaviour for two and three transmission stages. Our results show that applying NC protocols in two or three stages decreases the traffic significantly, beside the fact that the proposed protocols enable the system to retrieve the lost packets rather than asking for ARQ, resulting in improved data flow, and less power consumption. In fact, in some protocols the ARQ dropped from the rate 10ˉ<sup>1</sup> to 10ˉ<sup>4</sup>, because of the proposed combining algorithm that enables the nodes to generate additional unique linear equations to broadcast rather than repeating the same ones via ARQ. Moreover, the number of the transmitted packets in each cooperative stage dropped from M (M - 1) to just M packets, resulting to 2 M packets instead 2 (M<sup>2</sup> - 1) when three stages of transmission system are used instead of one stage (two cooperative stages).展开更多
Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive area...Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility.展开更多
Payment Channel Networks(PCNs)are a promising alternative to improve the scalability of a blockchain network.A PCN employs off-chain micropayment channels that do not need a global block confirmation procedure,thereby...Payment Channel Networks(PCNs)are a promising alternative to improve the scalability of a blockchain network.A PCN employs off-chain micropayment channels that do not need a global block confirmation procedure,thereby sacrificing the ability to confirm transactions instantaneously.PCN uses a routing algorithm to identify a path between two users who do not have a direct channel between them to settle a transaction.The performance of most of the existing centralized path-finding algorithms does not scale with network size.The rapid growth of Bitcoin PCN necessitates considering distributed algorithms.However,the existing decentralized algorithms suffer from resource underutilization.We present a decentralized routing algorithm,Swift,focusing on fee optimization.The concept of a secret path is used to reduce the path length between a sender and a receiver to optimize the fees.Furthermore,we reduce a network structure into combinations of cycles to theoretically study fee optimization with changes in cloud size.The secret path also helps in edge load sharing,which results in an improvement of throughput.Swift routing achieves up to 21%and 63%in fee and throughput optimization,respectively.The results from the simulations follow the trends identified in the theoretical analysis.展开更多
通信网络是输电线路在线监测系统的重要组成部分,关系到监测数据的完整性和安全性。由于现行通信网络在实际监测中的数据通信效果并不理想,吞吐量较低且丢包率较高,通信网络性能存在一定缺陷。为解决这一问题,文章提出基于5G的输电线路...通信网络是输电线路在线监测系统的重要组成部分,关系到监测数据的完整性和安全性。由于现行通信网络在实际监测中的数据通信效果并不理想,吞吐量较低且丢包率较高,通信网络性能存在一定缺陷。为解决这一问题,文章提出基于5G的输电线路在线监测通信网络设计。利用5G技术来设计输电线路在线监测的通信网络模型和信道,同时基于开放式系统互连(Open System Interconnect,OSI)参考模型来设计通信网络协议,从而完成基于5G的输电线路在线监测通信网络的整体设计。经实验验证,所设计的通信网络吞吐性能良好,丢包率在1%以下,输电线路在线监测通信效果良好。展开更多
在正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)系统中由于快衰落导致信道特征不连续,常规的信道插值方法无法准确反应导频与整个信道之间的关联性。针对这一问题,提出了一种基于宽深超分辨率(Wide Deep Super-resol...在正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)系统中由于快衰落导致信道特征不连续,常规的信道插值方法无法准确反应导频与整个信道之间的关联性。针对这一问题,提出了一种基于宽深超分辨率(Wide Deep Super-resolution,WDSR)网络的信道估计方法,把导频值通过最小二乘估计(Least Squares,LS)初步插值,再通过WDSR网络再次放大重构整个信道的响应。将信道估计插值上采样替换成初步插值和图像超分辨率上采样两步。仿真结果表明,与超分辨率卷积神经网络(Super-resolution Convolutional Neural Network,SRCNN)信道估计算法相比,在不同种类的信道以及导频数下WDSR信道估计方法均方误差性能提升约4.6 dB。展开更多
通过对中波频段的特性分析,提出一种创新的中波应急广播覆盖网构建方案。基于信号传播理论和通信工程原理,结合地理信息系统(Geographic Information System,GIS)技术,优化中波发射台布局,提高应急广播信号的覆盖范围和稳定性。采用先...通过对中波频段的特性分析,提出一种创新的中波应急广播覆盖网构建方案。基于信号传播理论和通信工程原理,结合地理信息系统(Geographic Information System,GIS)技术,优化中波发射台布局,提高应急广播信号的覆盖范围和稳定性。采用先进的调制解调技术和功率控制策略,有效克服信道传播中的多径效应和信号衰减,提升应急广播系统的抗干扰性。通过在不同地理环境下的仿真实验,验证所提出构建方案的可行性和效果,为中波应急广播系统的建设提供有力的技术支持,为应对突发事件提供可靠的通信保障。展开更多
In this paper, based on the characteristics of polar codes, a new decode-and-forward strategy called generalized partial information relaying protocol is proposed for degraded multiple-relay networks with orthogonal r...In this paper, based on the characteristics of polar codes, a new decode-and-forward strategy called generalized partial information relaying protocol is proposed for degraded multiple-relay networks with orthogonal receiver components(MRNORCs). In such a protocol, with the help of partial information from previous nodes, each relay node tries to recover the received source message and re-encodes part of the decoded message for transmission to satisfy the decoding requirements for the following relay node or the destination node. In order to construct practical polar codes, the nested structures are developed based on this protocol and the information sets corresponding to the partial messages forwarded are also calculated. The proposed scheme is proved to be capable of achieving the theoretical capacity of the degraded MRN-ORCs while still retains the low-complexity feature of polar codes. We perform simulations to testify the practicability of the proposed scheme and compare polar codes by using successive-cancellation list decoder(SCLD) with traditional low-density parity-check(LDPC) codes. The results show that the obtained polar codes provide significant gain.展开更多
In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devic...In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully.展开更多
Complex water movement and insufficient observation stations are the unfavorable factors in improving the accuracy of flow calculation of river networks. A water level updating model for river networks was set up base...Complex water movement and insufficient observation stations are the unfavorable factors in improving the accuracy of flow calculation of river networks. A water level updating model for river networks was set up based on a three-step method at key nodes, and model correction values were collected from gauge stations. To improve the accuracy of water level and discharge forecasts for the entire network, the discrete coefficients of the Saint-Venant equations for river sections were regarded as the media carrying the correction values from observation locations to other cross-sections of the river network system. To examine the applicability, the updating model was applied to flow calculation of an ideal river network and the Chengtong section of the Yangtze River. Comparison of the forecast results with the observed data demonstrates that this updating model can improve the forecast accuracy in both ideal and real river networks.展开更多
基金one of the stage results of the Science and Technology Innovation Project (CI2021A00413) of the China Academy of Traditional Chinese Medicine。
文摘Along with the surge of unearthed medical literature and cultural relics in recent years,a network of channels in the system of medical conduit vessels(meridians) during the early Western Han dynasty has become much clearer gradually.In it,the increasing number of channel branches,network vessels and needle insertion holes(acupoints) is an important feature of the development of channel medicine during the Western Han dynasty.This is not only a reflection of the expanding requirements of the theoretical system of the main trunk channels and other vessels,but also an inevitable result of the continuous enrichment and accumulation of clinical experience.This article integrates the information about channel branches,network vessels,inscriptions,dots and further relics on the Tianhui(天回) Lacquered Meridian Figurine to compare the unearthed literature of the channel genre with the transmitted classical literature about acupuncture.The “Heart-Regulated Channel” in Medical Manuscripts on Bamboo Slips from Tianhui(《天回医简》) serves as an example to explain the occurrence,development and changes of the channel branches and network vessels in the early system of medical channels.
基金supported by the Funds for Creative Research Groups of China(No.60821063)the State Key Program of National Natural Science of China(No.60534010)+3 种基金the National 973 Program of China(No.2009CB320604)the Funds of National Science of China(No.60674021,60804024)the 111 Project(No.B08015)the Funds of PhD program of MOE,China(No.20060145019)
文摘This paper studies the problems of H-infinity performance optimization and controller design for continuous-time NCSs with both sensor-to-controller and controller-to-actuator communication constraints (limited communication channels). By taking the derivative character of network-induced delay into full consideration and defining new Lyapunov functions, linear matrix inequalities (LMIs)-based H-infinity performance optimization and controller design are presented for NCSs with limited communication channels. If there do not exist any constraints on the communication channels, the proposed design methods are also applicable. The merit of the proposed methods lies in their Jess conservativeness, which is achieved by avoiding the utilization of bounding inequalities for cross products of vectors. The simulation results illustrate the merit and effectiveness of the proposed H-infinity controller design for NCSs with limited communication channels.
文摘Two significant issues in Internet-based networked control systems ( INCSs), transport performance of different protocols and security breach from Internet side, are investigated. First, for improving the performance of data transmission, user datagram protocol (UDP) is adopted as the main stand for controllers and plants using INCSs. Second, a dual-channel secure transmission scheme (DCSTS)based on data transmission characteristics of INCSs is proposed, in which a raw UDP channel and a secure TCP (transmission control protocol) connection making use of SSL/TLS (secure sockets layer/transport layer security) are included. Further, a networked control protocol (NCP) at application layer for supporting DCSTS between the controllers and plants in INCSs is designed, and it also aims at providing a universal communication mechanism for interoperability of devices among the networked control laboratories in Beijing Institute of Technology of China, Central South University of China and Tokyo University of Technology of Japan. By means of a networked single-degree-of-free- dom robot arm, an INCS under the new protocol and security environment is created. Compared with systems such as IPSec or SSL/TLS, which may cause more than 91% network throughput deduction, the new DCSTS protocol may yield results ten times better, being just 5.67%.
基金supported by the Chinese Jiangsu Provincial Natural Science Foundation (Grant No. BK2001017)
文摘Simulations of water flow in channel networks require estimated values of roughness for all the individual channel segments that make up a network. When the number of individual channel segments is large, the parameter calibration workload is substantial and a high level of uncertainty in estimated roughness cannot be avoided. In this study, all the individual channel segments are graded according to the factors determining the value of roughness. It is assumed that channel segments with the same grade have the same value of roughness. Based on observed hydrological data, an optimal model for roughness estimation is built. The procedure of solving the optimal problem using the optimal model is described. In a test of its efficacy, this estimation method was applied successfully in the simulation of tidal water flow in a large complicated channel network in the lower reach of the Yangtze River in China.
基金supported by the National Natural Science Foundation of China(61872006)Scientific Research Activities Foundation of Academic and Technical Leaders and Reserve Candidates in Anhui Province(2020H233)+2 种基金Top-notch Discipline(specialty)Talents Foundation in Colleges and Universities of Anhui Province(gxbj2020057)the Startup Foundation for Introducing Talent of NUISTby Institutional Fund Projects from Ministry of Education and Deanship of Scientific Research(DSR),King Abdulaziz University(KAU),Jeddah,Saudi Arabia(IFPDP-216-22)。
文摘The recent development of channel technology has promised to reduce the transaction verification time in blockchain operations.When transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each other.If one party refuses to do so,the channel is unstable.A stable channel is thus required.Because nodes may show uncooperative behavior,they may have a negative impact on the stability of such channels.In order to address this issue,this work proposes a dynamic evolutionary game model based on node behavior.This model considers various defense strategies'cost and attack success ratio under them.Nodes can dynamically adjust their strategies according to the behavior of attackers to achieve their effective defense.The equilibrium stability of the proposed model can be achieved.The proposed model can be applied to general channel networks.It is compared with two state-of-the-art blockchain channels:Lightning network and Spirit channels.The experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable state.Thus its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
文摘Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years by combining the received packet randomly before forwarding them, resulting in a complex Jordan Gaussian Elimination (JGE) decoding process. The effectiveness of random NC is through cooperation among nodes. In this paper, we propose a simple, low-complexity cooperative protocol that exploits NC in a deterministic manner resulting in improved diversity, data rate, and less complex JGE decoding process. The proposed system is applied over a lossy wireless network. The scenario under investigation is as follows: M users must send their information to a common destination D and to exchange the information between each others, over erasure channels;typically the channels between the users and the destination are worse than the channels between users. It is possible to significantly reduce the traffic among users and destination, achieving significant bandwidth savings, by combining packets from different users in simple, deterministic ways without resorting to extensive header information before being forwarded to the destination and the M users. The key problem we try to address is how to efficiently combine the packets at each user while exploiting user cooperation and the probability of successfully recovering information from all users at D with k < 2M unique linear equations, accounting for the fact that the remaining packets will be lost in the network and there are two transmission stages. Simulation results show the behaviour for two and three transmission stages. Our results show that applying NC protocols in two or three stages decreases the traffic significantly, beside the fact that the proposed protocols enable the system to retrieve the lost packets rather than asking for ARQ, resulting in improved data flow, and less power consumption. In fact, in some protocols the ARQ dropped from the rate 10ˉ<sup>1</sup> to 10ˉ<sup>4</sup>, because of the proposed combining algorithm that enables the nodes to generate additional unique linear equations to broadcast rather than repeating the same ones via ARQ. Moreover, the number of the transmitted packets in each cooperative stage dropped from M (M - 1) to just M packets, resulting to 2 M packets instead 2 (M<sup>2</sup> - 1) when three stages of transmission system are used instead of one stage (two cooperative stages).
文摘Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility.
文摘Payment Channel Networks(PCNs)are a promising alternative to improve the scalability of a blockchain network.A PCN employs off-chain micropayment channels that do not need a global block confirmation procedure,thereby sacrificing the ability to confirm transactions instantaneously.PCN uses a routing algorithm to identify a path between two users who do not have a direct channel between them to settle a transaction.The performance of most of the existing centralized path-finding algorithms does not scale with network size.The rapid growth of Bitcoin PCN necessitates considering distributed algorithms.However,the existing decentralized algorithms suffer from resource underutilization.We present a decentralized routing algorithm,Swift,focusing on fee optimization.The concept of a secret path is used to reduce the path length between a sender and a receiver to optimize the fees.Furthermore,we reduce a network structure into combinations of cycles to theoretically study fee optimization with changes in cloud size.The secret path also helps in edge load sharing,which results in an improvement of throughput.Swift routing achieves up to 21%and 63%in fee and throughput optimization,respectively.The results from the simulations follow the trends identified in the theoretical analysis.
文摘通信网络是输电线路在线监测系统的重要组成部分,关系到监测数据的完整性和安全性。由于现行通信网络在实际监测中的数据通信效果并不理想,吞吐量较低且丢包率较高,通信网络性能存在一定缺陷。为解决这一问题,文章提出基于5G的输电线路在线监测通信网络设计。利用5G技术来设计输电线路在线监测的通信网络模型和信道,同时基于开放式系统互连(Open System Interconnect,OSI)参考模型来设计通信网络协议,从而完成基于5G的输电线路在线监测通信网络的整体设计。经实验验证,所设计的通信网络吞吐性能良好,丢包率在1%以下,输电线路在线监测通信效果良好。
文摘通过对中波频段的特性分析,提出一种创新的中波应急广播覆盖网构建方案。基于信号传播理论和通信工程原理,结合地理信息系统(Geographic Information System,GIS)技术,优化中波发射台布局,提高应急广播信号的覆盖范围和稳定性。采用先进的调制解调技术和功率控制策略,有效克服信道传播中的多径效应和信号衰减,提升应急广播系统的抗干扰性。通过在不同地理环境下的仿真实验,验证所提出构建方案的可行性和效果,为中波应急广播系统的建设提供有力的技术支持,为应对突发事件提供可靠的通信保障。
基金supported by the National Natural Science Foundation of China (No.41574137, 41304117)
文摘In this paper, based on the characteristics of polar codes, a new decode-and-forward strategy called generalized partial information relaying protocol is proposed for degraded multiple-relay networks with orthogonal receiver components(MRNORCs). In such a protocol, with the help of partial information from previous nodes, each relay node tries to recover the received source message and re-encodes part of the decoded message for transmission to satisfy the decoding requirements for the following relay node or the destination node. In order to construct practical polar codes, the nested structures are developed based on this protocol and the information sets corresponding to the partial messages forwarded are also calculated. The proposed scheme is proved to be capable of achieving the theoretical capacity of the degraded MRN-ORCs while still retains the low-complexity feature of polar codes. We perform simulations to testify the practicability of the proposed scheme and compare polar codes by using successive-cancellation list decoder(SCLD) with traditional low-density parity-check(LDPC) codes. The results show that the obtained polar codes provide significant gain.
文摘In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully.
基金supported by the Major Program of the National Natural Science Foundation of China(Grant No.51190091)the National Natural Science Foundation of China(Grant No.51009045)the Open Research Fund Program of the State Key Laboratory of Water Resources and Hydropower Engineering Science of Wuhan University(Grant No.2012B094)
文摘Complex water movement and insufficient observation stations are the unfavorable factors in improving the accuracy of flow calculation of river networks. A water level updating model for river networks was set up based on a three-step method at key nodes, and model correction values were collected from gauge stations. To improve the accuracy of water level and discharge forecasts for the entire network, the discrete coefficients of the Saint-Venant equations for river sections were regarded as the media carrying the correction values from observation locations to other cross-sections of the river network system. To examine the applicability, the updating model was applied to flow calculation of an ideal river network and the Chengtong section of the Yangtze River. Comparison of the forecast results with the observed data demonstrates that this updating model can improve the forecast accuracy in both ideal and real river networks.