Capcity both in uplink and downlink of TD-SCDMA (time division-synchronous code division multiple access) system is studied in a multi-cell environment. The theoretical expressions of the mean of intercell interferenc...Capcity both in uplink and downlink of TD-SCDMA (time division-synchronous code division multiple access) system is studied in a multi-cell environment. The theoretical expressions of the mean of intercell interference in uplink and the mean of sum of power allocation in downlink are given, by which uplink and downlink capacity is analyzed. Furthermore, we give the simulation models for both uplink and downlink capacity. The results from theoretical analysis and simulation fit very well. In the end, the maximum number of users that TD-SCDMA system can serve for 12.2 k speech service is given.展开更多
DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. I...DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC T Linux is carried out. It is proved that the DAC T Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.展开更多
This paper presents a 65-nm 1-Gb NOR-type floating-gate flash memory,in which the cell device and chip circuit are developed and optimized.In order to solve the speed problem of giga-level NOR flash in the deep submic...This paper presents a 65-nm 1-Gb NOR-type floating-gate flash memory,in which the cell device and chip circuit are developed and optimized.In order to solve the speed problem of giga-level NOR flash in the deep submicron process,the models of long bit-line and word-line are first given,by which the capacitive and resistive loads could be estimated.Based on that,the read path and key modules are optimized to enhance the chip access property and reliability.With the measurement results,the flash memory cell presents good endurance and retention properties,and the macro is operated with 1-ls/byte program speed and less than 50-ns read time under 3.3 V supply.展开更多
A study of the accessibility of a city’s scenic spots via different travel modes can contribute to optimization of tourism-related transportation while improving tourists’ travel-related satisfaction levels and adva...A study of the accessibility of a city’s scenic spots via different travel modes can contribute to optimization of tourism-related transportation while improving tourists’ travel-related satisfaction levels and advancing tourism. We systematically analyzed the accessibility of 56 scenic spots in Xi’an City, China, via car and public transport travel modes using the real-time travel function of the Baidu Maps API(Application Programming Interface) along with spatial analysis methods and the modal accessibility gap index of scenic spots. We obtained the following results. First, maximum and minimum travel times using public transport exceeded those using cars. Moreover, the accessibility of scenic spots via cars and public transport presented a circular spatial pattern of increasing travel time from the center to the periphery. Contrasting with travel by public transport, car travel showed a clear time-space compression effect. Second, accessibility of the scenic spots via cars and public transport showed some spatial heterogeneity, with no clear advantages of car accessibility in the central urban area. However, advantages of car accessibility were increasingly evident moving from the center to the periphery. Third, whereas the correlation of the modal accessibility gap index of scenic spots in Xi’an with global space was significantly positive, local spatial interdependence was only evident in some inner city areas and in marginal areas. Moreover, spatial heterogeneity was evident in two regions but was insignificant in other areas, indicating that the spatial interdependence of the modal accessibility gap index in most scenic spots was not apparent in terms of the overall effect of public transport routes, road networks, and the distribution of scenic spots. The improvement of public transport coverage in marginal areas and the optimization of public transport routes in central urban areas are essential tasks for improving travel using public transport in the future.展开更多
In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be abl...In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be able to use the channel immediately since the channel usage state is random. This will impose additional time delay for the cognitive users. Excessive waiting delay can make cognitive users miss the spectrum access chances. In this paper, a discrete-time Markov queuing model from a macro point of view is provided. Through the matrix-geometric solution theory, the average sojourn time for cognitive users in the steady state before accessing the spectrum is obtained. Given the tolerant delay of cognitive users, the macro-based throughput is derived and an access control mechanism is proposed. The numerical results show the effects of service completion probability on average sojourn time and throughput. It is confirmed that the throughput can be obviously improved by using the proposed access control mechanism. Finally, the performance evaluations based on users are compared to that based on data packets.展开更多
A passive optical network (PON) scheme based on optical code division multiplexing (OCDM) for the downstream traffics is proposed and analyzed in detail. In the PON, the downstream traffics are broadcasted by OCDM...A passive optical network (PON) scheme based on optical code division multiplexing (OCDM) for the downstream traffics is proposed and analyzed in detail. In the PON, the downstream traffics are broadcasted by OCDM technology to guarantee the security, while the upstream traffics pass through the same optical fiber by the common time division multiple access (TDMA) technology to decrease the cost. This schemes are denoted as OCDM/TDMA-PON, which can be applied to an optical access network (OAN) with full services on demand, such as Internet protocol, video on demand, tele-presence and high quality audio. The proposed OCDM/TDMA-PON scheme combines advantages of PON, TDMA, and OCDM technology. Simulation results indicate that the designed scheme improves the OAN performance, and enhances flexibility and scalability of the system.展开更多
While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control rol...While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control roles. The basic idea of T-RBAC is introduced and described formally, and the safely of this model is analyzed. The research shows that T-RBAC fulfills both rules of information security, which are principle of least privilege and separation of duties. With practical application of T-RBCA, it can handle most of the time-related or authority-related problems. What’s more, it also increases the security level, flexibility and dynamic adaptation of the system and has lower complexity than system only handled by authority. This model also can solve conflicts caused by authority.展开更多
Beamforming in stand-alone Millimeter-Wave(mmWave)communications results in prolonged access times and latencies due to the increased number of measurements required to determine the optimal beam directions at the Mob...Beamforming in stand-alone Millimeter-Wave(mmWave)communications results in prolonged access times and latencies due to the increased number of measurements required to determine the optimal beam directions at the Mobile Station(MS)and Base Station(BS),returning the highest received signal level.Therefore,dynamic and fast access schemes that meet the Third-Generation Partnership Project(3GPP)specifications are required here.Therefore,in this paper,a novel initial access scheme is proposed for multiple MS users by leveraging for the first time a digital compass in the access procedure.Namely,when a new MS joins the footprint of a BS,it probes the channel for beacon signaling about the BS direction,i.e.,broadcasted by a neighboring MS that completed beam association at previous time steps.Then,a digital compass is utilized to adjust the coordinates of the BS according to the location of the new MS.The proposed scheme is applied for a single and multi-user settings at various broadcasting approaches.This includes a single associated MS user that broadcasts information to a single incoming MS user,a single user that broadcasts signals to multiple incoming users,or all multiple associated users broadcast to multiple incoming users.Overall,the proposed schemes yield in notable efficiency in terms of the computational complexity,access times,power and energy consumption as compared to existing access schemes.Further,high success rates are achieved at the detriment of relatively higher cost.展开更多
A fiber-based,multiple access timing signal synchronization scheme is demonstrated.By coupling out the bidirectional transmission signals,a highly stable timing signal can be recovered at arbitrary points along the fi...A fiber-based,multiple access timing signal synchronization scheme is demonstrated.By coupling out the bidirectional transmission signals,a highly stable timing signal can be recovered at arbitrary points along the fiber with the help of the loop delay message broadcasted via ethernet from the local module.The experiment is carried out on a 30-km fiber placed in a temperature-controlled box.In one-day period,when the round trip fiber transfer delay fluctuation is60 ns,the fluctuations of the stabilized timing signal from the download and the remote modules were only ±125 ps and±100 ps,respectively.Also,the system error caused by transmission path asymmetry and thermal drift is calibrated,and a100-ps magnitude synchronization accuracy is realized.This method could provide new insights into the construction of a fiber-based time transfer network.展开更多
Many efforts have been made to develop time division multiple access (TDMA) slots allocation in a multi-hop converge-cast wireless sensor network (WSN), however, most of them either use complex algorithm or concer...Many efforts have been made to develop time division multiple access (TDMA) slots allocation in a multi-hop converge-cast wireless sensor network (WSN), however, most of them either use complex algorithm or concern frames only without simultaneous transmission in a single slot. In this paper, we present a timeslot assignment scheme for cluster-tree-based TDMA WSN, co:'ering three frequently used working modes in practical applications. The shortest frame formed can guarantee real-time conununication and is also facilitated for message and slot integration, since timeslots allocated to a single node are continuous. During allocation processes, the algorithms are distributed and light-weighted. The experiment resulted from a WSN prototype system shows that our scheme can achieve a good reliability.展开更多
This paper describes a multi-threat real-time separating system for broadband anti-radiation missile seeker. It presents a method, with a dual-port memory as comparer, to perform PF and PW hardware real-time separatio...This paper describes a multi-threat real-time separating system for broadband anti-radiation missile seeker. It presents a method, with a dual-port memory as comparer, to perform PF and PW hardware real-time separation and to determine the time-of-arrival (TOA) by use of sequential difference histogram (SDIF). The method has been applied to practice, which has achieved good results.展开更多
Objective: Effective confirmation of pregnancy is a basic component of reproductive health services. It is a determinant for accessing antenatal care (ANC) if the pregnancy is wanted and abortion services if the pregn...Objective: Effective confirmation of pregnancy is a basic component of reproductive health services. It is a determinant for accessing antenatal care (ANC) if the pregnancy is wanted and abortion services if the pregnancy is unwanted. This study examined the effect of urine pregnancy testing in the timing of presentation for pregnancy care. Method: A cross-sectional study was conducted among 320 women presenting for antenatal care and 300 women presenting for abortion at private sector clinics in Western Nigeria. Results: The median age at first presentation was 20 weeks for ANC clients and 8 weeks for abortion clients. Obtaining urine pregnancy test of one’s accord was associated with a decrease in the gestational age at presentation of 3.7 weeks and 1.5 weeks for antenatal and abortion clients, respectively, independent of all other factors. Conclusion: Bearing in mind that the clinical benefit and public health impact of early presentation for antenatal and abortion services are unequivocal, strategies aimed at decreasing gestational age at presentation for pregnancy care should be given priority. “Fast-track” urine pregnancy testing services should be promoted in the private and public clinics in Nigeria.展开更多
Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such a...Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts.The development of machine and deep learning algorithms has reduced the burden of achieving reli-able and good communication schemes in the underwater acoustic environment.This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA),Time Divi-sion Multiple Access(TDMA),and Orthogonal Frequency Division Multiplexing(OFDM)techniques using the hybrid combination of the convolutional neural net-works(CNN)and ensemble single feedforward layers(SFL).The convolutional neural networks are used for channel feature extraction,and boosted ensembled feedforward layers are used for modulation selection based on the CNN outputs.The extensive experimentation is carried out and compared with other hybrid learning models and conventional methods.Simulation results demonstrate that the performance of the proposed hybrid learning model has achieved nearly 98%accuracy and a 30%increase in BER performance which outperformed the other learning models in achieving the communication schemes under dynamic underwater environments.展开更多
An important feature of the traffic in mobile networks is burstiness. Drawbacks of conventional power control algorithms for time division duplex (TDD)-code division multiple access (CDMA) systems are analyzed. A ...An important feature of the traffic in mobile networks is burstiness. Drawbacks of conventional power control algorithms for time division duplex (TDD)-code division multiple access (CDMA) systems are analyzed. A joint power control algorithm based on service factor is presented to address the TDD-CDMA mobile services in the burst mode according to the Markov modulated Bernoulli process. The joint power control equation is derived. A function model is developed to verify the new algorithm and evaluate its performance. Simulation results show that the new power control algorithm can estimate interference strength more precisely, speed up convergence of power control, and enhance power efficiency and system capacity. It is shown that the proposed algorithm is more robust against link gain changes, and outperforms the reference algorithms.展开更多
Time reversal mirror (TRM) can use the physical characteristics of the underwater acoustic (UWA) channel to focus on the desired user in multi-user UWA communication. The active average sound intensity (AASI) de...Time reversal mirror (TRM) can use the physical characteristics of the underwater acoustic (UWA) channel to focus on the desired user in multi-user UWA communication. The active average sound intensity (AASI) detector can estimate all azimuths of users with the same frequency band at the same time in order to achieve directional communication by vector combination. Space-division multiple access (SDMA) based on TRM combined with the AASI detector is proposed in this paper, which can make the capacity of the code division multiple access (CDMA) UWA system significantly increase. The simulation and lake test results show that the 7-user UWA multi-user system can achieve low bit error communication.展开更多
The main challenge for container ports is the planning required for berthing container ships while docked in port.Growth of containerization is creating problems for ports and container terminals as they reach their c...The main challenge for container ports is the planning required for berthing container ships while docked in port.Growth of containerization is creating problems for ports and container terminals as they reach their capacity limits of various resources which increasingly leads to traffic and port congestion.Good planning and management of container terminal operations reduces waiting time for liner ships.Reducing the waiting time improves the terminal’s productivity and decreases the port difficulties.Two important keys to reducing waiting time with berth allocation are determining suitable access channel depths and increasing the number of berths which in this paper are studied and analyzed as practical solutions.Simulation based analysis is the only way to understand how various resources interact with each other and how they are affected in the berthing time of ships.We used the Enterprise Dynamics software to produce simulation models due to the complexity and nature of the problems.We further present case study for berth allocation simulation of the biggest container terminal in Iran and the optimum access channel depth and the number of berths are obtained from simulation results.The results show a significant reduction in the waiting time for container ships and can be useful for major functions in operations and development of container ship terminals.展开更多
文摘Capcity both in uplink and downlink of TD-SCDMA (time division-synchronous code division multiple access) system is studied in a multi-cell environment. The theoretical expressions of the mean of intercell interference in uplink and the mean of sum of power allocation in downlink are given, by which uplink and downlink capacity is analyzed. Furthermore, we give the simulation models for both uplink and downlink capacity. The results from theoretical analysis and simulation fit very well. In the end, the maximum number of users that TD-SCDMA system can serve for 12.2 k speech service is given.
基金Supported by the National 863 Broad Band VPN Project (No.863-104-03-01)
文摘DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC T Linux is carried out. It is proved that the DAC T Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.
基金supported in part by the Ministry of Science and Technology of China (2010CB934200,2011CBA00600)the National Natural Science Foundation of China (61176073)+1 种基金the National Science and Technology Major Project of China (2009ZX02023-005)the Director’s Fund of Institute of Microelectronics,Chinese Academy of Science
文摘This paper presents a 65-nm 1-Gb NOR-type floating-gate flash memory,in which the cell device and chip circuit are developed and optimized.In order to solve the speed problem of giga-level NOR flash in the deep submicron process,the models of long bit-line and word-line are first given,by which the capacitive and resistive loads could be estimated.Based on that,the read path and key modules are optimized to enhance the chip access property and reliability.With the measurement results,the flash memory cell presents good endurance and retention properties,and the macro is operated with 1-ls/byte program speed and less than 50-ns read time under 3.3 V supply.
基金Under the auspices of National Natural Science Foundation of China(No.41831284,41501120)Special Scientific Research Project of Education Department of Shaanxi Provincial Government(No.18JK0649)Scientific Research Project of Xi’an International Studies University(No.18XWC24)
文摘A study of the accessibility of a city’s scenic spots via different travel modes can contribute to optimization of tourism-related transportation while improving tourists’ travel-related satisfaction levels and advancing tourism. We systematically analyzed the accessibility of 56 scenic spots in Xi’an City, China, via car and public transport travel modes using the real-time travel function of the Baidu Maps API(Application Programming Interface) along with spatial analysis methods and the modal accessibility gap index of scenic spots. We obtained the following results. First, maximum and minimum travel times using public transport exceeded those using cars. Moreover, the accessibility of scenic spots via cars and public transport presented a circular spatial pattern of increasing travel time from the center to the periphery. Contrasting with travel by public transport, car travel showed a clear time-space compression effect. Second, accessibility of the scenic spots via cars and public transport showed some spatial heterogeneity, with no clear advantages of car accessibility in the central urban area. However, advantages of car accessibility were increasingly evident moving from the center to the periphery. Third, whereas the correlation of the modal accessibility gap index of scenic spots in Xi’an with global space was significantly positive, local spatial interdependence was only evident in some inner city areas and in marginal areas. Moreover, spatial heterogeneity was evident in two regions but was insignificant in other areas, indicating that the spatial interdependence of the modal accessibility gap index in most scenic spots was not apparent in terms of the overall effect of public transport routes, road networks, and the distribution of scenic spots. The improvement of public transport coverage in marginal areas and the optimization of public transport routes in central urban areas are essential tasks for improving travel using public transport in the future.
文摘In cognitive radio networks, the spectrum utilization can be improved by cognitive users opportunistically using the idle channels licensed to the primary users. However, the new arrived cognitive users may not be able to use the channel immediately since the channel usage state is random. This will impose additional time delay for the cognitive users. Excessive waiting delay can make cognitive users miss the spectrum access chances. In this paper, a discrete-time Markov queuing model from a macro point of view is provided. Through the matrix-geometric solution theory, the average sojourn time for cognitive users in the steady state before accessing the spectrum is obtained. Given the tolerant delay of cognitive users, the macro-based throughput is derived and an access control mechanism is proposed. The numerical results show the effects of service completion probability on average sojourn time and throughput. It is confirmed that the throughput can be obviously improved by using the proposed access control mechanism. Finally, the performance evaluations based on users are compared to that based on data packets.
文摘A passive optical network (PON) scheme based on optical code division multiplexing (OCDM) for the downstream traffics is proposed and analyzed in detail. In the PON, the downstream traffics are broadcasted by OCDM technology to guarantee the security, while the upstream traffics pass through the same optical fiber by the common time division multiple access (TDMA) technology to decrease the cost. This schemes are denoted as OCDM/TDMA-PON, which can be applied to an optical access network (OAN) with full services on demand, such as Internet protocol, video on demand, tele-presence and high quality audio. The proposed OCDM/TDMA-PON scheme combines advantages of PON, TDMA, and OCDM technology. Simulation results indicate that the designed scheme improves the OAN performance, and enhances flexibility and scalability of the system.
文摘While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control roles. The basic idea of T-RBAC is introduced and described formally, and the safely of this model is analyzed. The research shows that T-RBAC fulfills both rules of information security, which are principle of least privilege and separation of duties. With practical application of T-RBCA, it can handle most of the time-related or authority-related problems. What’s more, it also increases the security level, flexibility and dynamic adaptation of the system and has lower complexity than system only handled by authority. This model also can solve conflicts caused by authority.
基金funded by the Deanship of Scientific Research at King Faisal University,grant number 1811025.
文摘Beamforming in stand-alone Millimeter-Wave(mmWave)communications results in prolonged access times and latencies due to the increased number of measurements required to determine the optimal beam directions at the Mobile Station(MS)and Base Station(BS),returning the highest received signal level.Therefore,dynamic and fast access schemes that meet the Third-Generation Partnership Project(3GPP)specifications are required here.Therefore,in this paper,a novel initial access scheme is proposed for multiple MS users by leveraging for the first time a digital compass in the access procedure.Namely,when a new MS joins the footprint of a BS,it probes the channel for beacon signaling about the BS direction,i.e.,broadcasted by a neighboring MS that completed beam association at previous time steps.Then,a digital compass is utilized to adjust the coordinates of the BS according to the location of the new MS.The proposed scheme is applied for a single and multi-user settings at various broadcasting approaches.This includes a single associated MS user that broadcasts information to a single incoming MS user,a single user that broadcasts signals to multiple incoming users,or all multiple associated users broadcast to multiple incoming users.Overall,the proposed schemes yield in notable efficiency in terms of the computational complexity,access times,power and energy consumption as compared to existing access schemes.Further,high success rates are achieved at the detriment of relatively higher cost.
基金Project supported by the National Key Scientific Instrument and Equipment Development Project of China(Grant No.2013YQ09094303)the Program of International Science and Technology Cooperation(Grant No.2016YFE0100200)
文摘A fiber-based,multiple access timing signal synchronization scheme is demonstrated.By coupling out the bidirectional transmission signals,a highly stable timing signal can be recovered at arbitrary points along the fiber with the help of the loop delay message broadcasted via ethernet from the local module.The experiment is carried out on a 30-km fiber placed in a temperature-controlled box.In one-day period,when the round trip fiber transfer delay fluctuation is60 ns,the fluctuations of the stabilized timing signal from the download and the remote modules were only ±125 ps and±100 ps,respectively.Also,the system error caused by transmission path asymmetry and thermal drift is calibrated,and a100-ps magnitude synchronization accuracy is realized.This method could provide new insights into the construction of a fiber-based time transfer network.
基金Supported by the National High Technology Research and Development Programme of China ( No. 2006AA040302 2007AA041201 +1 种基金 2007AA041301 )the National Creative Research Groups Science Foundation of China (No. 60721062)
文摘Many efforts have been made to develop time division multiple access (TDMA) slots allocation in a multi-hop converge-cast wireless sensor network (WSN), however, most of them either use complex algorithm or concern frames only without simultaneous transmission in a single slot. In this paper, we present a timeslot assignment scheme for cluster-tree-based TDMA WSN, co:'ering three frequently used working modes in practical applications. The shortest frame formed can guarantee real-time conununication and is also facilitated for message and slot integration, since timeslots allocated to a single node are continuous. During allocation processes, the algorithms are distributed and light-weighted. The experiment resulted from a WSN prototype system shows that our scheme can achieve a good reliability.
文摘This paper describes a multi-threat real-time separating system for broadband anti-radiation missile seeker. It presents a method, with a dual-port memory as comparer, to perform PF and PW hardware real-time separation and to determine the time-of-arrival (TOA) by use of sequential difference histogram (SDIF). The method has been applied to practice, which has achieved good results.
文摘Objective: Effective confirmation of pregnancy is a basic component of reproductive health services. It is a determinant for accessing antenatal care (ANC) if the pregnancy is wanted and abortion services if the pregnancy is unwanted. This study examined the effect of urine pregnancy testing in the timing of presentation for pregnancy care. Method: A cross-sectional study was conducted among 320 women presenting for antenatal care and 300 women presenting for abortion at private sector clinics in Western Nigeria. Results: The median age at first presentation was 20 weeks for ANC clients and 8 weeks for abortion clients. Obtaining urine pregnancy test of one’s accord was associated with a decrease in the gestational age at presentation of 3.7 weeks and 1.5 weeks for antenatal and abortion clients, respectively, independent of all other factors. Conclusion: Bearing in mind that the clinical benefit and public health impact of early presentation for antenatal and abortion services are unequivocal, strategies aimed at decreasing gestational age at presentation for pregnancy care should be given priority. “Fast-track” urine pregnancy testing services should be promoted in the private and public clinics in Nigeria.
文摘Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts.The development of machine and deep learning algorithms has reduced the burden of achieving reli-able and good communication schemes in the underwater acoustic environment.This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA),Time Divi-sion Multiple Access(TDMA),and Orthogonal Frequency Division Multiplexing(OFDM)techniques using the hybrid combination of the convolutional neural net-works(CNN)and ensemble single feedforward layers(SFL).The convolutional neural networks are used for channel feature extraction,and boosted ensembled feedforward layers are used for modulation selection based on the CNN outputs.The extensive experimentation is carried out and compared with other hybrid learning models and conventional methods.Simulation results demonstrate that the performance of the proposed hybrid learning model has achieved nearly 98%accuracy and a 30%increase in BER performance which outperformed the other learning models in achieving the communication schemes under dynamic underwater environments.
基金Project supported by the National Science Foundation for Creative Research Groups (Grant No.60521002), and the National Key Technologies R&D Program (Grant No.2005BA908B02)
文摘An important feature of the traffic in mobile networks is burstiness. Drawbacks of conventional power control algorithms for time division duplex (TDD)-code division multiple access (CDMA) systems are analyzed. A joint power control algorithm based on service factor is presented to address the TDD-CDMA mobile services in the burst mode according to the Markov modulated Bernoulli process. The joint power control equation is derived. A function model is developed to verify the new algorithm and evaluate its performance. Simulation results show that the new power control algorithm can estimate interference strength more precisely, speed up convergence of power control, and enhance power efficiency and system capacity. It is shown that the proposed algorithm is more robust against link gain changes, and outperforms the reference algorithms.
基金supported by the National Natural Science Foundation of China(6147113751179034)+3 种基金the Ships Pre-research Support Technology Fund(13J3.1.5)the Natural Science Foundation of Heilongjiang Province(F201109)the Innovation Talents of Science and the Technology Research Projects of Harbin(2013RFQXJ101)the National Defense Basic Technology Research(JSJC2013604C012)
文摘Time reversal mirror (TRM) can use the physical characteristics of the underwater acoustic (UWA) channel to focus on the desired user in multi-user UWA communication. The active average sound intensity (AASI) detector can estimate all azimuths of users with the same frequency band at the same time in order to achieve directional communication by vector combination. Space-division multiple access (SDMA) based on TRM combined with the AASI detector is proposed in this paper, which can make the capacity of the code division multiple access (CDMA) UWA system significantly increase. The simulation and lake test results show that the 7-user UWA multi-user system can achieve low bit error communication.
文摘The main challenge for container ports is the planning required for berthing container ships while docked in port.Growth of containerization is creating problems for ports and container terminals as they reach their capacity limits of various resources which increasingly leads to traffic and port congestion.Good planning and management of container terminal operations reduces waiting time for liner ships.Reducing the waiting time improves the terminal’s productivity and decreases the port difficulties.Two important keys to reducing waiting time with berth allocation are determining suitable access channel depths and increasing the number of berths which in this paper are studied and analyzed as practical solutions.Simulation based analysis is the only way to understand how various resources interact with each other and how they are affected in the berthing time of ships.We used the Enterprise Dynamics software to produce simulation models due to the complexity and nature of the problems.We further present case study for berth allocation simulation of the biggest container terminal in Iran and the optimum access channel depth and the number of berths are obtained from simulation results.The results show a significant reduction in the waiting time for container ships and can be useful for major functions in operations and development of container ship terminals.