Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified mult...Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified multi-service bearing in the IP network, the largescale access convergence network architecture is proposed. This flat access convergence structure with ultra-small hops, which shortens the service transmission path, reduces the complexity of the edge of the network, and achieves IP strong waist model with the integration of computation, storage and transmission. The key technologies are also introduced in this paper, including endto-end performance guarantee for real time interactive services, fog storing mechanism, and built-in safety transmission with integration of aggregation and control.展开更多
The objective of this study is to identify the requirements of access to space for the future, the required methodology, key technologies and international cooperation mode. Firstly, the mission requirements and the c...The objective of this study is to identify the requirements of access to space for the future, the required methodology, key technologies and international cooperation mode. Firstly, the mission requirements and the challenges of current technologies to access to space are analyzed and summarized. The solutions and related key technologies to realize large-scale and low-cost access to space(L2 AS) are presented here, including the low-cost design of expendable launch vehicles and a reusable space transportation system, interface standardization, and new conceptual launchers. The mission modes based on launch vehicles to realize L2 AS and three future international collaboration modes are presented. Lastly, the relevant conclusions and suggestions are given.展开更多
Out-of-step oscillation is a very destructive physical phenomenon in power system, which could directly cause big blackout accompanied by serious sociology-economic impacts. Out-of-step splitting control is an indispe...Out-of-step oscillation is a very destructive physical phenomenon in power system, which could directly cause big blackout accompanied by serious sociology-economic impacts. Out-of-step splitting control is an indispensable means, which could protect the system from major shocks of out-of-step oscillation. After years of development, it has achieved certain amount of research results. Have the existing methods been able to meet the requirements of out-of-step splitting? What improvements are needed? Under this background, this review is written. It combs the development of out-of-step splitting control technologies and analyzes the technical routes and characteristics of different methods. It points out the contradiction between rapidity and optimality is the biggest technical problem, existing in both the traditional local measurement based out-of-step splitting protection and the wide-area information based out-of-step splitting protection. It further points out that the advantages of the two types of protections can be combined with the unique physical characteristics of the out-of-step center to form a more advantageous splitting strategy. Besides, facing the fact of large-scale renewable energy access to power grid in recent years, this review also analyzes the challenges brought by it and provides some corresponding suggestions. It is hoped to provide some guidance for the subsequent research work.展开更多
An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell ...An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell and the blade heater contactor structure by three-dimensional finite element modeling are compared with each other during RESET operation. The simulation results show that the programming region of the phase change layer in the BTL cell is much smaller, and thermal electrical distributions of the BTL cell are more concentrated on the TiN/GST interface. The results indicate that the BTL cell has the superiorities of increasing the heating efficiency, decreasing the power consumption and reducing the RESET current from 0.67mA to 0.32mA. Therefore, the BTL cell will be appropriate for high performance PCRAM device with lower power consumption and lower RESET current.展开更多
Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access atte...Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T applications.In this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control overhead.In the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in active.The crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA algorithm.Simulation results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity.展开更多
As an industry accepted storage scheme, hafnium oxide(HfO_x) based resistive random access memory(RRAM)should further improve its thermal stability and data retention for practical applications. We therefore fabri...As an industry accepted storage scheme, hafnium oxide(HfO_x) based resistive random access memory(RRAM)should further improve its thermal stability and data retention for practical applications. We therefore fabricated RRAMs with HfO_x/ZnO double-layer as the storage medium to study their thermal stability as well as data retention. The HfO_x/ZnO double-layer is capable of reversible bipolar switching under ultralow switching current(〈 3 μA) with a Schottky emission dominant conduction for the high resistance state and a Poole–Frenkel emission governed conduction for the low resistance state. Compared with a drastically increased switching current at 120℃ for the single HfO_x layer RRAM, the HfO_x/ZnO double-layer exhibits excellent thermal stability and maintains neglectful fluctuations in switching current at high temperatures(up to 180℃), which might be attributed to the increased Schottky barrier height to suppress current at high temperatures. Additionally, the HfO_x/ZnO double-layer exhibits 10-year data retention @85℃ that is helpful for the practical applications in RRAMs.展开更多
A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution util...A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively.展开更多
Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such a...Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts.The development of machine and deep learning algorithms has reduced the burden of achieving reli-able and good communication schemes in the underwater acoustic environment.This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA),Time Divi-sion Multiple Access(TDMA),and Orthogonal Frequency Division Multiplexing(OFDM)techniques using the hybrid combination of the convolutional neural net-works(CNN)and ensemble single feedforward layers(SFL).The convolutional neural networks are used for channel feature extraction,and boosted ensembled feedforward layers are used for modulation selection based on the CNN outputs.The extensive experimentation is carried out and compared with other hybrid learning models and conventional methods.Simulation results demonstrate that the performance of the proposed hybrid learning model has achieved nearly 98%accuracy and a 30%increase in BER performance which outperformed the other learning models in achieving the communication schemes under dynamic underwater environments.展开更多
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst...With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme.展开更多
研究了非正交多址(Non‑orthogonal‑multiple‑access,NOMA)接入通信系统的物理层安全性能。当基站采用下行NOMA方案发送信息时,由于信道的开放性,信息容易被窃听,而当存在多个随机分布的窃听者时,安全性能会进一步降低。为了增强存在硬...研究了非正交多址(Non‑orthogonal‑multiple‑access,NOMA)接入通信系统的物理层安全性能。当基站采用下行NOMA方案发送信息时,由于信道的开放性,信息容易被窃听,而当存在多个随机分布的窃听者时,安全性能会进一步降低。为了增强存在硬件损伤系统的物理层安全性能,本文考虑保护区的方法,针对地面用户与基站之间存在直连链路的情况,采用莱斯衰落来建模小尺度衰落。本文还假设多个窃听者的位置遵循齐次泊松点过程(Homogeneous Poisson point process,HPPP),借助高斯切比雪夫积分公式,推导了平均保密容量的闭式表达式,并给出了在高信噪比情况下的渐近表达式来获得进一步见解。仿真结果验证了保护区方法在增强安全性能方面的有效性,并说明了不同参数对系统保密性能的影响。展开更多
为了探求影响电力通信系统数据安全传输的关键因素,构建基于解码转发(decode-and-forward,DF)中继和非正交多址接入(non-orthogonal multiple access,NOMA)技术辅助的电力线通信(power line communication,PLC)系统,并研究其安全传输性...为了探求影响电力通信系统数据安全传输的关键因素,构建基于解码转发(decode-and-forward,DF)中继和非正交多址接入(non-orthogonal multiple access,NOMA)技术辅助的电力线通信(power line communication,PLC)系统,并研究其安全传输性能.针对外部窃听和内部窃听两种情况,联合考虑背景噪声和脉冲噪声的影响,分析系统的可达速率、遍历安全速率和安全中断概率等性能,并利用高斯-切比雪夫求积方法获得其相应的闭合表达式.结果表明:较高的脉冲噪声会降低系统的频谱效率和安全传输性能;功率分配系数以及源用户到中继用户的距离均对系统安全传输产生显著影响.进一步地,通过蒙特卡罗仿真实验验证了理论分析的正确性.展开更多
基金supported by The National Key Technology R&D Program (Grant No. 2011BAH19B00)The National Basic Research Program of China (973) (Grant No. 2012CB315900)The National High Technology Research and Development Program of China (863) (Grant No. 2015AA016102)
文摘Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified multi-service bearing in the IP network, the largescale access convergence network architecture is proposed. This flat access convergence structure with ultra-small hops, which shortens the service transmission path, reduces the complexity of the edge of the network, and achieves IP strong waist model with the integration of computation, storage and transmission. The key technologies are also introduced in this paper, including endto-end performance guarantee for real time interactive services, fog storing mechanism, and built-in safety transmission with integration of aggregation and control.
文摘The objective of this study is to identify the requirements of access to space for the future, the required methodology, key technologies and international cooperation mode. Firstly, the mission requirements and the challenges of current technologies to access to space are analyzed and summarized. The solutions and related key technologies to realize large-scale and low-cost access to space(L2 AS) are presented here, including the low-cost design of expendable launch vehicles and a reusable space transportation system, interface standardization, and new conceptual launchers. The mission modes based on launch vehicles to realize L2 AS and three future international collaboration modes are presented. Lastly, the relevant conclusions and suggestions are given.
基金supported by the National Natural Science Foundation of China(Grant No.62273207,61821004,62350083,62192755)the Future Young Scholars Program of Shandong University,China.
文摘Out-of-step oscillation is a very destructive physical phenomenon in power system, which could directly cause big blackout accompanied by serious sociology-economic impacts. Out-of-step splitting control is an indispensable means, which could protect the system from major shocks of out-of-step oscillation. After years of development, it has achieved certain amount of research results. Have the existing methods been able to meet the requirements of out-of-step splitting? What improvements are needed? Under this background, this review is written. It combs the development of out-of-step splitting control technologies and analyzes the technical routes and characteristics of different methods. It points out the contradiction between rapidity and optimality is the biggest technical problem, existing in both the traditional local measurement based out-of-step splitting protection and the wide-area information based out-of-step splitting protection. It further points out that the advantages of the two types of protections can be combined with the unique physical characteristics of the out-of-step center to form a more advantageous splitting strategy. Besides, facing the fact of large-scale renewable energy access to power grid in recent years, this review also analyzes the challenges brought by it and provides some corresponding suggestions. It is hoped to provide some guidance for the subsequent research work.
基金Supported by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No XDA09020402the National Integrate Circuit Research Program of China under Grant No 2009ZX02023-003+1 种基金the National Natural Science Foundation of China under Grant Nos 61261160500,61376006,61401444 and 61504157the Science and Technology Council of Shanghai under Grant Nos 14DZ2294900,15DZ2270900 and 14ZR1447500
文摘An optimized device structure for reducing the RESET current of phase-change random access memory (PCRAM) with blade-type like (BTL) phase change layer is proposed. The electrical thermal analysis of the BTL cell and the blade heater contactor structure by three-dimensional finite element modeling are compared with each other during RESET operation. The simulation results show that the programming region of the phase change layer in the BTL cell is much smaller, and thermal electrical distributions of the BTL cell are more concentrated on the TiN/GST interface. The results indicate that the BTL cell has the superiorities of increasing the heating efficiency, decreasing the power consumption and reducing the RESET current from 0.67mA to 0.32mA. Therefore, the BTL cell will be appropriate for high performance PCRAM device with lower power consumption and lower RESET current.
基金supported in part by Natural Science Foundation of Heilongjiang Province of China under Grant YQ2021F003in part by the National Natural Science Foundation of China under Grant 61901140+1 种基金in part by China Postdoctoral Science Foundation Funded Project under Grant 2019M650067in part by Science and Technology on Communication Networks Laboratory under Grant SCX21641X003。
文摘Exploiting random access for the underlying connectivity provisioning has great potential to incorporate massive machine-type communication(MTC)devices in an Internet of Things(Io T)network.However,massive access attempts from versatile MTC devices may bring congestion to the IIo T network,thereby hindering service increasing of IIo T applications.In this paper,an intelligence enabled physical(PHY-)layer user signature code acquisition(USCA)algorithm is proposed to overcome the random access congestion problem with reduced signaling and control overhead.In the proposed scheme,the detector aims at approximating the optimal observation on both active user detection and user data reception by iteratively learning and predicting the convergence of the user signature codes that are in active.The crossentropy based low-complexity iterative updating rule is present to guarantee that the proposed USCA algorithm is computational feasible.A closed-form bit error rate(BER)performance analysis is carried out to show the efficiency of the proposed intelligence USCA algorithm.Simulation results confirm that the proposed USCA algorithm provides an inherent tradeoff between performance and complexity and allows the detector achieves an approximate optimal performance with a reasonable computational complexity.
基金supported by the National Natural Science Foundation of China(Grant Nos.61006003 and 61674038)the Natural Science Foundation of Fujian Province,China(Grant Nos.2015J01249 and 2010J05134)+1 种基金the Science Foundation of Fujian Education Department of China(Grant No.JAT160073)the Science Foundation of Fujian Provincial Economic and Information Technology Commission of China(Grant No.83016006)
文摘As an industry accepted storage scheme, hafnium oxide(HfO_x) based resistive random access memory(RRAM)should further improve its thermal stability and data retention for practical applications. We therefore fabricated RRAMs with HfO_x/ZnO double-layer as the storage medium to study their thermal stability as well as data retention. The HfO_x/ZnO double-layer is capable of reversible bipolar switching under ultralow switching current(〈 3 μA) with a Schottky emission dominant conduction for the high resistance state and a Poole–Frenkel emission governed conduction for the low resistance state. Compared with a drastically increased switching current at 120℃ for the single HfO_x layer RRAM, the HfO_x/ZnO double-layer exhibits excellent thermal stability and maintains neglectful fluctuations in switching current at high temperatures(up to 180℃), which might be attributed to the increased Schottky barrier height to suppress current at high temperatures. Additionally, the HfO_x/ZnO double-layer exhibits 10-year data retention @85℃ that is helpful for the practical applications in RRAMs.
基金the Foundation for Key Teachers of Chongqing University (200209055).
文摘A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively.
文摘Achieving sound communication systems in Under Water Acoustic(UWA)environment remains challenging for researchers.The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts.The development of machine and deep learning algorithms has reduced the burden of achieving reli-able and good communication schemes in the underwater acoustic environment.This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA),Time Divi-sion Multiple Access(TDMA),and Orthogonal Frequency Division Multiplexing(OFDM)techniques using the hybrid combination of the convolutional neural net-works(CNN)and ensemble single feedforward layers(SFL).The convolutional neural networks are used for channel feature extraction,and boosted ensembled feedforward layers are used for modulation selection based on the CNN outputs.The extensive experimentation is carried out and compared with other hybrid learning models and conventional methods.Simulation results demonstrate that the performance of the proposed hybrid learning model has achieved nearly 98%accuracy and a 30%increase in BER performance which outperformed the other learning models in achieving the communication schemes under dynamic underwater environments.
文摘With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme.
基金supported in part by the National Natrual Science Foundation of China(Nos.61971220,61971221)the Open Research Fund Key Laboratory of Wireless Sensor Network and Communication of Chinese Academy of Science(No.2017006).
文摘研究了非正交多址(Non‑orthogonal‑multiple‑access,NOMA)接入通信系统的物理层安全性能。当基站采用下行NOMA方案发送信息时,由于信道的开放性,信息容易被窃听,而当存在多个随机分布的窃听者时,安全性能会进一步降低。为了增强存在硬件损伤系统的物理层安全性能,本文考虑保护区的方法,针对地面用户与基站之间存在直连链路的情况,采用莱斯衰落来建模小尺度衰落。本文还假设多个窃听者的位置遵循齐次泊松点过程(Homogeneous Poisson point process,HPPP),借助高斯切比雪夫积分公式,推导了平均保密容量的闭式表达式,并给出了在高信噪比情况下的渐近表达式来获得进一步见解。仿真结果验证了保护区方法在增强安全性能方面的有效性,并说明了不同参数对系统保密性能的影响。
文摘为了探求影响电力通信系统数据安全传输的关键因素,构建基于解码转发(decode-and-forward,DF)中继和非正交多址接入(non-orthogonal multiple access,NOMA)技术辅助的电力线通信(power line communication,PLC)系统,并研究其安全传输性能.针对外部窃听和内部窃听两种情况,联合考虑背景噪声和脉冲噪声的影响,分析系统的可达速率、遍历安全速率和安全中断概率等性能,并利用高斯-切比雪夫求积方法获得其相应的闭合表达式.结果表明:较高的脉冲噪声会降低系统的频谱效率和安全传输性能;功率分配系数以及源用户到中继用户的距离均对系统安全传输产生显著影响.进一步地,通过蒙特卡罗仿真实验验证了理论分析的正确性.