Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.展开更多
To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlin...To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness.We first model the MSMURA problem as a dual-sequence decision-making process,and then solve it by a novel Transformerbased deep reinforcement learning(TDRL)approach.Specifically,the proposed TDRL approach can be achieved based on two aspects:1)To adapt to the dynamic wireless environment,the proximal policy optimization(PPO)algorithm is used to optimize the multi-slot RA strategy.2)To avoid co-channel interference,the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence.Experimental results show that:i)the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness,ii)the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance.展开更多
UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power...UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.展开更多
Deep learning models demonstrate impressive performance in rapidly predicting urban floods,but there are still limitations in enhancing physical connectivity and interpretability.This study proposed an innovative mode...Deep learning models demonstrate impressive performance in rapidly predicting urban floods,but there are still limitations in enhancing physical connectivity and interpretability.This study proposed an innovative modeling approach that integrates convolutional neural networks with weighted cellular automaton(CNN-WCA)to achieve the precise and rapid prediction of urban pluvial flooding processes and enhance the physical connectivity and reliability of modeling results.The study began by generating a rainfall-inundation dataset using WCA and LISFLOOD-FP,and the CNN-WCA model was trained using outputs from LISFLOOD-FP and WCA.Subsequently,the pre-trained model was applied to simulate the flood caused by the 20 July 2021 rainstorm in Zhengzhou City.The predicted inundation spatial distribution and depth by CNN-WCA closely aligned with those of LISFLOOD-FP,with the mean absolute error concentrated within 5 mm,and the prediction time of CNN-WCA was only 0.8%that of LISFLOOD-FP.The CNN-WCA model displays a strong capacity for accurately predicting changes in inundation depths within the study area and at susceptible points for urban flooding,with the Nash-Sutcliffe e fficiency values of most flood-prone points exceeding 0.97.Furthermore,the physical connectivity of the inundation distribution predicted by CNN-WCA is better than that of the distribution obtained with a CNN.The CNN-WCA model with additional physical constraints exhibits a reduction of around 34%in instances of physical discontinuity compared to CNN.Our results prove that the CNN model with multiple physical constraints has signifi cant potential to rapidly and accurately simulate urban flooding processes and improve the reliability of prediction.展开更多
Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices...Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular spectrum.To alleviate the interference,an efficient interference management way is to set exclusion zones around the cellular receivers.In this paper,we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled HetCNets.The main difficulties contain three aspects:1)how to model the location randomness of base stations,cellular and D2D users in practical networks;2)how to capture the randomness and interrelation of cellular and D2D transmissions due to the existence of random exclusion zones;3)how to characterize the different types of interference and their impacts on the outage probabilities of cellular and D2D users.We then run extensive Monte-Carlo simulations which manifest that our theoretical model is very accurate.展开更多
The advanced design of a 10 × 1 linear antenna array system with the capa-bility of frequency tunability using GT3-23001 liquid crystal (LC) is pro-posed. The design for this reconfigurable wideband antenna array...The advanced design of a 10 × 1 linear antenna array system with the capa-bility of frequency tunability using GT3-23001 liquid crystal (LC) is pro-posed. The design for this reconfigurable wideband antenna array for 5G ap-plications at Ka-band millimeter-wave (mmw) consists of a double layer of stacked patch antenna with aperture coupled feeding. The bias voltage over LC varies from 0 V to 10.6 V to achieve a frequency tunability of 1.18 GHz. The array operates from 25.3 GHz to 33.8 GHz with a peak gain of 19.2 dB and a beamwidth of 5.2<span style="white-space:nowrap;">°</span> at 30 GHz. The proposed reconfigurable antenna ar-ray represents a real and efficient solution for the recent and future mmw 5G networks. The proposed antenna is suitable for 5G base stations in stadiums, malls and convention centers. It is proper for satellite communications and radars at mmw.展开更多
Millimeter-wave(mmWave) communications are highly focused as a powerful mean enabling to perform very high data transmission. However it has several inherent shortcomings like directional transmission and serious atte...Millimeter-wave(mmWave) communications are highly focused as a powerful mean enabling to perform very high data transmission. However it has several inherent shortcomings like directional transmission and serious attenuation in atmosphere. So it is difficult to implement random access in mm Wave WLANs. In this paper, a heterogeneous control and data sub-network architecture is presented, which decouples the traditional WLAN into 2.4 or 5GHz control sub-network and mm Wave data sub-network in both PHY and MAC layers. In control sub-network, DCF is adopted to transmit control information and in data sub-network, PCF is adopted to ensure the Qo S. Moreover, an omnidirectional transmission is employed in the control sub-network to support users' random access. The data sub-network only covers the required serving area by using directional antennas for specific users and can be adjusted dynamically based on control information. Simulations indicate that compared with the conventional WLANs, heterogeneous mm Wave WLANs can provide both random access and high throughput.展开更多
The ergodic capacity of device-to-device (D2D) communication underlaying cellular networks is analyzed. First,the D2D communication model is introduced and the interference during uplink period and downlink period i...The ergodic capacity of device-to-device (D2D) communication underlaying cellular networks is analyzed. First,the D2D communication model is introduced and the interference during uplink period and downlink period is analyzed.In a D2D communication system,since it is very difficult to obtain the instantaneous channel state information (CSI),assume that only the transmitters know the statistical CSI and the channel coefficient follows an independent complex Gaussian distribution.Based on the assumptions,for the uplink period,the signal to interference plus noise ratio (SINR)of the D2D user equipments(DUEs)is expressed. Then the cumulative distribution function (CDF ) and probability distribution function (PDF)formulae of the SINR of the DUEs are presented.Based on the SINR formulae during the uplink period,the ergodic capacity formula of the uplink period is derived. Subsequently, using the same methods,the ergodic capacity formula of the downlink period is derived.The simulation results show that the DUEs can still obtain a high ergodic capacity even in the case of a large number of DUEs.This result can be applied to the design and optimization of D2D communications.展开更多
For the integration network of a cellular network and a wireless local area network (WLAN), a priority-based dynamic load transfer (PDLT) algorithm is proposed. The dynamic vertical handoffs by call admission cont...For the integration network of a cellular network and a wireless local area network (WLAN), a priority-based dynamic load transfer (PDLT) algorithm is proposed. The dynamic vertical handoffs by call admission control are jointly determined by the network conditions and the traffic characteristics in combination with the location-condition of mobile terminals. When there is no bandwidth resource available in the cellular network or WLAN, the proposed PDLT algorithm allows an incoming voice call or data call within the overlapping area of the cellular network and the WLAN to be directed to the spare network; meanwhile, by dynamically computing the occupancy of the bandwidth resource, the proposed PDLT algorithm also allows an ongoing voice call or data communication to be transferred to the network with a sufficient bandwidth resource according to the given threshold to balance the number of voice/data calls in the two networks. The analysis results of a two-dimensional Markov model and the simulation results show that the PDLT algorithm can effectively enhance the whole integrated network' s traffic, reduce the blocking probability of new calls and increase the data throughput, and thus decrease the response time for various services.展开更多
Following the principle of reuse partitioning, two new frequency planning schemes are proposed, the coverage-oriented scheme and the efficiency-oriented scheme, for the cellular system with two-hop fixed relay nodes ...Following the principle of reuse partitioning, two new frequency planning schemes are proposed, the coverage-oriented scheme and the efficiency-oriented scheme, for the cellular system with two-hop fixed relay nodes (FRNs). Compared with the effficiency-oriented scheme, the coverage-oriented scheme has higher reuse distances and is developed with emphasis on the coverage, while compared with the coverage-oriented scheme, the efficiency-oriented scheme has smaller reuse distances and is developed with emphasis on the spectral efficiency. Taking uplink as an example, both simplified analysis and intensive computer simulations are presented to offer comparisons among FRN enhanced systems with the proposed schemes, with a known channel-borrowing based frequency planning scheme and the conventional cellular system without relaying. Studies show that the FRN enhanced system with the coverage-oriented scheme provides the best coverage, while that with the efficiency-oriented scheme offers the highest area spectral efficiency.展开更多
This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational comple...This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes.展开更多
Tissue homeostasis requires a carefully-orchestrated balance between cell proliferation, cellular senescence and cell death. Cells proliferate through a cell cycle that is tightly regulated by cyclin-dependent kinase ...Tissue homeostasis requires a carefully-orchestrated balance between cell proliferation, cellular senescence and cell death. Cells proliferate through a cell cycle that is tightly regulated by cyclin-dependent kinase activities. Cellular senescence is a safeguard program limiting the proliferative competence of cells in living organisms. Apoptosis eliminates unwanted cells by the coordinated activity of gene products that regulate and effect cell death. The intimate link between the cell cycle, cellular senes- cence, apoptosis regulation, cancer development and tumor responses to cancer treatment has become eminently apparent. Extensive research on tumor suppressor genes, oncogenes, the cell cycle and apoptosis regulatory genes has revealed how the DNA damage-sensing and -signaling pathways, referred to as the DNA-damage response network, are tied to cell proliferation, cell-cycle arrest, cellular senescence and apoptosis. DNA-damage responses are complex, involving “sensor” proteins that sense the damage, and transmit signals to “transducer” proteins, which, in turn, convey the signals to numerous “effector” proteins implicated in specific cellular pathways, including DNA repair mechanisms, cell-cycle checkpoints, cellular senescence and apoptosis. The Bcl-2 family of proteins stands among the most crucial regulators of apoptosis and performs vital functions in deciding whether a cell will live or die after cancer chemotherapy and irradiation. In addition, several studies have now revealed that members of the Bcl-2 family also interface with the cell cycle, DNA repair/recombination and cellular senescence, effects that are generally distinct from their function in apoptosis. In this review, we report progress in understanding the molecular networks that regulate cell-cycle checkpoints, cellular senescence and apoptosis after DNA damage, and discuss the influence of some Bcl-2 family members on cell-cycle checkpoint regulation.展开更多
A K-tier uplink heterogeneous cellular network is modelled and analysed by accounting for both truncated channel inversion power control and biased user association. Each user has a maximum transmit power constraint a...A K-tier uplink heterogeneous cellular network is modelled and analysed by accounting for both truncated channel inversion power control and biased user association. Each user has a maximum transmit power constraint and transmits data when it has sufficient transmit power to perform channel inversion. With biased user association, each user is associated with a base station(BS) that provides the maximum received power weighted by a bias factor, but not their nearest BS. Stochastic geometry is used to evaluate the performances of the proposed system model in terms of the outage probability and ergodic rate for each tier as functions of the biased and power control parameters. Simulations validate our analytical derivations. Numerical results show that there exists a trade-off introduced by the power cut-off threshold and the maximum user transmit power constraint. When the maximum user transmit power becomes a binding constraint, the overall performance is independent of BS densities. In addition, we have shown that it is beneficial for the outage and rate performances by optimizing different network parameters such as the power cut-off threshold as well as the biased factors.展开更多
In this paper the nonlinear dynamical behaviour of a quantum cellular neural network (QCNN) by coupling Josephson circuits was investigated and it was shown that the QCNN using only two of them can cause the onset o...In this paper the nonlinear dynamical behaviour of a quantum cellular neural network (QCNN) by coupling Josephson circuits was investigated and it was shown that the QCNN using only two of them can cause the onset of chaotic oscillation. The theoretical analysis and simulation for the two Josephson-circuits-coupled QCNN have been done by using the amplitude and phase as state variables. The complex chaotic behaviours can be observed and then proved by calculating Lyapunov exponents. The study provides valuable information about QCNNs for future application in high-parallel signal processing and novel chaotic generators.展开更多
This paper presents an overview of a new very high throughput millimeterwave WLAN system operating at 45 GHz band. We begin by reviewing standards process of IEEE 802.11aj(45GHz). Then the frequency spectrum allocatio...This paper presents an overview of a new very high throughput millimeterwave WLAN system operating at 45 GHz band. We begin by reviewing standards process of IEEE 802.11aj(45GHz). Then the frequency spectrum allocation at 45 GHz band is introduced. Next, the channel measurement and mod-eling is given. Specifically, the millimeter-wave MIMO for physical layer enhancement is given in detail.展开更多
In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided ...In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided cellular networks. Moreover, systematic performance analysis and extensive simulations are performed for the proposed NC2R and traditional relaying and non-relaying schemes. The results show that NCR outperforms conventional relaying and non-relaying schemes in terms of blocking probability and spectral efficiency, especially for cell-edge users. Additionally, the location selections for relays with NCR are also discussed. These results will provide some insights for incorporating network coding into next-generation broadband cellular relay mobile systems.展开更多
This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is es...This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is established by a single or multiple hops,to address the problem of insufficient security performance of MIMO heterogeneous cellular networks.First,two-dimensional homogeneous Poisson point processes(HPPPs) are utilized to model the locations of K-tier BSs in MIMO MHCNs and receivers,including those of legitimate users and eavesdroppers.Second,based on the channel gain distribution and the statistics property of HPPP,the achievable ergodic rates of the main and eavesdropper channels in direct and ad hoc links are derived,respectively.Third,the secrecy coverage probability and the achievable ergodic secrecy throughput of downlink MIMO MHCNs are explored,and their expressions are derived.Lastly,the correctness of the theoretical derivation is verified through Monte Carlo simulations.展开更多
As device-to-device(D2D) communications usually reuses the resource of cellular networks, call admission control(CAC) and power control are crucial problems. However in most power control schemes, total data rates or ...As device-to-device(D2D) communications usually reuses the resource of cellular networks, call admission control(CAC) and power control are crucial problems. However in most power control schemes, total data rates or throughput are regarded as optimization criterion. In this paper, a combining call admission control(CAC) and power control scheme under guaranteeing QoS of every user equipment(UE) is proposed. First, a simple CAC scheme is introduced. Then based on the CAC scheme, a combining call admission control and power control scheme is proposed. Next, the performance of the proposed scheme is evaluated. Finally, maximum DUE pair number and average transmitting power is calculated. Simulation results show that D2 D communications with the proposed combining call admission control and power control scheme can effectively improve the maximum DUE pair number under the premise of meeting necessary QoS.展开更多
In this paper, we propose a novel speed and service-sensitive handoff algorithm and analytical model for hierarchical cellular networks.First, we use the Gauss-Markov mobility model to predict the speeds of mobile sta...In this paper, we propose a novel speed and service-sensitive handoff algorithm and analytical model for hierarchical cellular networks.First, we use the Gauss-Markov mobility model to predict the speeds of mobile stations, and divide mobile stations into three classes based on the predicted speeds: fast, medium-speed, and slow.Then, according to the mobility classification,network conditions, and service types, mobile stations will be handoff to the proper target networks prior to the deterioration of the currently operating channel. We further develop an analytical model to evaluate the performance of such a hierarchical system with different speed classes and service types. Simulations and analytical results show that the proposed handoff algorithm can significantly improve the network performance in terms of the handoff failure probability, unnecessary handoff probability, and network throughput, comparing with the traditional algorithms.展开更多
Millimeter-wave cloud radar(MMCR)provides the capability of detecting the features of micro particles inside clouds and describing the internal microphysical structure of the clouds.Therefore,MMCR has been widely appl...Millimeter-wave cloud radar(MMCR)provides the capability of detecting the features of micro particles inside clouds and describing the internal microphysical structure of the clouds.Therefore,MMCR has been widely applied in cloud observations.However,due to the influence of non-meteorological factors such as insects,the cloud observations are often contaminated by non-meteorological echoes in the clear air,known as clear-air echoes.It is of great significance to automatically identify the clear-air echoes in order to extract effective meteorological information from the complex weather background.The characteristics of clear-air echoes are studied here by combining data from four devices:an MMCR,a laser-ceilometer,an L-band radiosonde,and an all-sky camera.In addition,a new algorithm,which includes feature extraction,feature selection,and classification,is proposed to achieve the automatic identification of clear-air echoes.The results show that the recognition algorithm is fairly satisfied in both simple and complex weather conditions.The recognition accuracy can reach up to 95.86%for the simple cases when cloud echoes and clear-air echoes are separate,and 88.38%for the complicated cases when low cloud echoes and clear-air echoes are mixed.展开更多
文摘Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
基金supported by the National Natural Science Foundation of China(No.62071354)the Key Research and Development Program of Shaanxi(No.2022ZDLGY05-08)supported by the ISN State Key Laboratory。
文摘To meet the communication services with diverse requirements,dynamic resource allocation has shown increasing importance.In this paper,we consider the multi-slot and multi-user resource allocation(MSMU-RA)in a downlink cellular scenario with the aim of maximizing system spectral efficiency while guaranteeing user fairness.We first model the MSMURA problem as a dual-sequence decision-making process,and then solve it by a novel Transformerbased deep reinforcement learning(TDRL)approach.Specifically,the proposed TDRL approach can be achieved based on two aspects:1)To adapt to the dynamic wireless environment,the proximal policy optimization(PPO)algorithm is used to optimize the multi-slot RA strategy.2)To avoid co-channel interference,the Transformer-based PPO algorithm is presented to obtain the optimal multi-user RA scheme by exploring the mapping between user sequence and resource sequence.Experimental results show that:i)the proposed approach outperforms both the traditional and DRL methods in spectral efficiency and user fairness,ii)the proposed algorithm is superior to DRL approaches in terms of convergence speed and generalization performance.
基金supported by National Natural Science Foundation of China (No.62001135)the Joint funds for Regional Innovation and Development of the National Natural Science Foundation of China(No.U21A20449)the Beijing Natural Science Foundation Haidian Original Innovation Joint Fund (No.L232002)
文摘UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.
基金supported by the General Program of National Natural Science Foundation of China(Grant No.42377467)。
文摘Deep learning models demonstrate impressive performance in rapidly predicting urban floods,but there are still limitations in enhancing physical connectivity and interpretability.This study proposed an innovative modeling approach that integrates convolutional neural networks with weighted cellular automaton(CNN-WCA)to achieve the precise and rapid prediction of urban pluvial flooding processes and enhance the physical connectivity and reliability of modeling results.The study began by generating a rainfall-inundation dataset using WCA and LISFLOOD-FP,and the CNN-WCA model was trained using outputs from LISFLOOD-FP and WCA.Subsequently,the pre-trained model was applied to simulate the flood caused by the 20 July 2021 rainstorm in Zhengzhou City.The predicted inundation spatial distribution and depth by CNN-WCA closely aligned with those of LISFLOOD-FP,with the mean absolute error concentrated within 5 mm,and the prediction time of CNN-WCA was only 0.8%that of LISFLOOD-FP.The CNN-WCA model displays a strong capacity for accurately predicting changes in inundation depths within the study area and at susceptible points for urban flooding,with the Nash-Sutcliffe e fficiency values of most flood-prone points exceeding 0.97.Furthermore,the physical connectivity of the inundation distribution predicted by CNN-WCA is better than that of the distribution obtained with a CNN.The CNN-WCA model with additional physical constraints exhibits a reduction of around 34%in instances of physical discontinuity compared to CNN.Our results prove that the CNN model with multiple physical constraints has signifi cant potential to rapidly and accurately simulate urban flooding processes and improve the reliability of prediction.
基金This work is funded in part by the Science and Technology Development Fund,Macao SAR(Grant Nos.0093/2022/A2,0076/2022/A2 and 0008/2022/AGJ)in part by the National Nature Science Foundation of China(Grant No.61872452)+3 种基金in part by Special fund for Dongguan’s Rural Revitalization Strategy in 2021(Grant No.20211800400102)in part by Dongguan Special Commissioner Project(Grant No.20211800500182)in part by Guangdong-Dongguan Joint Fund for Basic and Applied Research of Guangdong Province(Grant No.2020A1515110162)in part by University Special Fund of Guangdong Provincial Department of Education(Grant No.2022ZDZX1073).
文摘Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular spectrum.To alleviate the interference,an efficient interference management way is to set exclusion zones around the cellular receivers.In this paper,we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled HetCNets.The main difficulties contain three aspects:1)how to model the location randomness of base stations,cellular and D2D users in practical networks;2)how to capture the randomness and interrelation of cellular and D2D transmissions due to the existence of random exclusion zones;3)how to characterize the different types of interference and their impacts on the outage probabilities of cellular and D2D users.We then run extensive Monte-Carlo simulations which manifest that our theoretical model is very accurate.
文摘The advanced design of a 10 × 1 linear antenna array system with the capa-bility of frequency tunability using GT3-23001 liquid crystal (LC) is pro-posed. The design for this reconfigurable wideband antenna array for 5G ap-plications at Ka-band millimeter-wave (mmw) consists of a double layer of stacked patch antenna with aperture coupled feeding. The bias voltage over LC varies from 0 V to 10.6 V to achieve a frequency tunability of 1.18 GHz. The array operates from 25.3 GHz to 33.8 GHz with a peak gain of 19.2 dB and a beamwidth of 5.2<span style="white-space:nowrap;">°</span> at 30 GHz. The proposed reconfigurable antenna ar-ray represents a real and efficient solution for the recent and future mmw 5G networks. The proposed antenna is suitable for 5G base stations in stadiums, malls and convention centers. It is proper for satellite communications and radars at mmw.
基金supported in part by National Natural Science Foundation of China(No.61372070)Natural Science Basic Research Plan in Shaanxi Province of China(2015JM6324)+2 种基金Hong Kong,Macao and Taiwan Science & Technology Cooperation Program of China(2014DFT10320)EU FP7 Project MONICA(PIRSES-GA-2011-295222)the 111 Project(B08038)
文摘Millimeter-wave(mmWave) communications are highly focused as a powerful mean enabling to perform very high data transmission. However it has several inherent shortcomings like directional transmission and serious attenuation in atmosphere. So it is difficult to implement random access in mm Wave WLANs. In this paper, a heterogeneous control and data sub-network architecture is presented, which decouples the traditional WLAN into 2.4 or 5GHz control sub-network and mm Wave data sub-network in both PHY and MAC layers. In control sub-network, DCF is adopted to transmit control information and in data sub-network, PCF is adopted to ensure the Qo S. Moreover, an omnidirectional transmission is employed in the control sub-network to support users' random access. The data sub-network only covers the required serving area by using directional antennas for specific users and can be adjusted dynamically based on control information. Simulations indicate that compared with the conventional WLANs, heterogeneous mm Wave WLANs can provide both random access and high throughput.
基金The National Natural Science Foundation of China(No.61301110)Foundation of Shanghai Key Laboratory of Intelligent Information Processing of China(No.IIPL-2014-005)
文摘The ergodic capacity of device-to-device (D2D) communication underlaying cellular networks is analyzed. First,the D2D communication model is introduced and the interference during uplink period and downlink period is analyzed.In a D2D communication system,since it is very difficult to obtain the instantaneous channel state information (CSI),assume that only the transmitters know the statistical CSI and the channel coefficient follows an independent complex Gaussian distribution.Based on the assumptions,for the uplink period,the signal to interference plus noise ratio (SINR)of the D2D user equipments(DUEs)is expressed. Then the cumulative distribution function (CDF ) and probability distribution function (PDF)formulae of the SINR of the DUEs are presented.Based on the SINR formulae during the uplink period,the ergodic capacity formula of the uplink period is derived. Subsequently, using the same methods,the ergodic capacity formula of the downlink period is derived.The simulation results show that the DUEs can still obtain a high ergodic capacity even in the case of a large number of DUEs.This result can be applied to the design and optimization of D2D communications.
基金The National Science and Technology Major Project(No. 2011ZX03005-004-03 )the National Natural Science Foundation of China (No. 61171081 )the Research Fund of the National Mobile Communications Research Laboratory of Southeast University (No.2011A08)
文摘For the integration network of a cellular network and a wireless local area network (WLAN), a priority-based dynamic load transfer (PDLT) algorithm is proposed. The dynamic vertical handoffs by call admission control are jointly determined by the network conditions and the traffic characteristics in combination with the location-condition of mobile terminals. When there is no bandwidth resource available in the cellular network or WLAN, the proposed PDLT algorithm allows an incoming voice call or data call within the overlapping area of the cellular network and the WLAN to be directed to the spare network; meanwhile, by dynamically computing the occupancy of the bandwidth resource, the proposed PDLT algorithm also allows an ongoing voice call or data communication to be transferred to the network with a sufficient bandwidth resource according to the given threshold to balance the number of voice/data calls in the two networks. The analysis results of a two-dimensional Markov model and the simulation results show that the PDLT algorithm can effectively enhance the whole integrated network' s traffic, reduce the blocking probability of new calls and increase the data throughput, and thus decrease the response time for various services.
文摘Following the principle of reuse partitioning, two new frequency planning schemes are proposed, the coverage-oriented scheme and the efficiency-oriented scheme, for the cellular system with two-hop fixed relay nodes (FRNs). Compared with the effficiency-oriented scheme, the coverage-oriented scheme has higher reuse distances and is developed with emphasis on the coverage, while compared with the coverage-oriented scheme, the efficiency-oriented scheme has smaller reuse distances and is developed with emphasis on the spectral efficiency. Taking uplink as an example, both simplified analysis and intensive computer simulations are presented to offer comparisons among FRN enhanced systems with the proposed schemes, with a known channel-borrowing based frequency planning scheme and the conventional cellular system without relaying. Studies show that the FRN enhanced system with the coverage-oriented scheme provides the best coverage, while that with the efficiency-oriented scheme offers the highest area spectral efficiency.
基金supported in part by National Natural Science Foundation of China under Grant No.61401510,61521003National High-tech R&D Program(863 Program)under Grant No.2015AA01A708
文摘This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes.
基金the Canadian Institutes of Health Research and the Cancer Research Society, and fellowships by the Health Research Funds of Quebec, Canada
文摘Tissue homeostasis requires a carefully-orchestrated balance between cell proliferation, cellular senescence and cell death. Cells proliferate through a cell cycle that is tightly regulated by cyclin-dependent kinase activities. Cellular senescence is a safeguard program limiting the proliferative competence of cells in living organisms. Apoptosis eliminates unwanted cells by the coordinated activity of gene products that regulate and effect cell death. The intimate link between the cell cycle, cellular senes- cence, apoptosis regulation, cancer development and tumor responses to cancer treatment has become eminently apparent. Extensive research on tumor suppressor genes, oncogenes, the cell cycle and apoptosis regulatory genes has revealed how the DNA damage-sensing and -signaling pathways, referred to as the DNA-damage response network, are tied to cell proliferation, cell-cycle arrest, cellular senescence and apoptosis. DNA-damage responses are complex, involving “sensor” proteins that sense the damage, and transmit signals to “transducer” proteins, which, in turn, convey the signals to numerous “effector” proteins implicated in specific cellular pathways, including DNA repair mechanisms, cell-cycle checkpoints, cellular senescence and apoptosis. The Bcl-2 family of proteins stands among the most crucial regulators of apoptosis and performs vital functions in deciding whether a cell will live or die after cancer chemotherapy and irradiation. In addition, several studies have now revealed that members of the Bcl-2 family also interface with the cell cycle, DNA repair/recombination and cellular senescence, effects that are generally distinct from their function in apoptosis. In this review, we report progress in understanding the molecular networks that regulate cell-cycle checkpoints, cellular senescence and apoptosis after DNA damage, and discuss the influence of some Bcl-2 family members on cell-cycle checkpoint regulation.
基金supported by the National Natural Science Foundation of China (61401225, 61571234)the National Science Foundation of Jiangsu Province (BK20140894, BK20140883, BK20160899)+4 种基金the Six Talented Eminence Foundation of Jiangsu Province (XYDXXJS-044)the National Science Foundation of the Higher Education Institutions of Jiangsu Province (14KJD510007, 16KJB510035)the Jiangsu Planned Projects for Postdoctoral Research Funds (1501125B)China Postdoctoral Science Foundation funded project (2015M581844)the Introduction of Talent Scientific Research Fund of Nanjing University of Posts Telecommunications project (NY213104, NY214190)
文摘A K-tier uplink heterogeneous cellular network is modelled and analysed by accounting for both truncated channel inversion power control and biased user association. Each user has a maximum transmit power constraint and transmits data when it has sufficient transmit power to perform channel inversion. With biased user association, each user is associated with a base station(BS) that provides the maximum received power weighted by a bias factor, but not their nearest BS. Stochastic geometry is used to evaluate the performances of the proposed system model in terms of the outage probability and ergodic rate for each tier as functions of the biased and power control parameters. Simulations validate our analytical derivations. Numerical results show that there exists a trade-off introduced by the power cut-off threshold and the maximum user transmit power constraint. When the maximum user transmit power becomes a binding constraint, the overall performance is independent of BS densities. In addition, we have shown that it is beneficial for the outage and rate performances by optimizing different network parameters such as the power cut-off threshold as well as the biased factors.
基金Project supported by the Natural Science Foundation of Shaanxi Province, China (Grant No 2005F20) and the Innovation Funds of the College of Science, Air Force University of Engineering, China (Grant No 2007B003).
文摘In this paper the nonlinear dynamical behaviour of a quantum cellular neural network (QCNN) by coupling Josephson circuits was investigated and it was shown that the QCNN using only two of them can cause the onset of chaotic oscillation. The theoretical analysis and simulation for the two Josephson-circuits-coupled QCNN have been done by using the amplitude and phase as state variables. The complex chaotic behaviours can be observed and then proved by calculating Lyapunov exponents. The study provides valuable information about QCNNs for future application in high-parallel signal processing and novel chaotic generators.
基金supported in part by National Key Basic Research Program of China (973 Program) under Grant No. 2013CB329002National Natural Science Foundation of China under Grant No. 61132003the Natural Science Foundation of Jiangsu Province of China under Grants BK2011019 and BK20130631
文摘This paper presents an overview of a new very high throughput millimeterwave WLAN system operating at 45 GHz band. We begin by reviewing standards process of IEEE 802.11aj(45GHz). Then the frequency spectrum allocation at 45 GHz band is introduced. Next, the channel measurement and mod-eling is given. Specifically, the millimeter-wave MIMO for physical layer enhancement is given in detail.
基金supported by the State Key Laboratory of Rail Traffic Control and Safety,Beijing Jiaotong University under Grant No.RCS2012ZT008the National Key Basic Research Program of China(973Program)under Grant No.2012CB316100(2)+1 种基金the National Natural Science Foundation of China under Grants No.61201203,No.61171064the Fundamental Research Funds for the Central Universities under Grant No.2012JBM030
文摘In this paper, we first overview some traditional relaying technologies, and then present a Network Coding-Aware Cooperative Relaying (NC2R) scheme to improve the performance of downlink transmission for relayaided cellular networks. Moreover, systematic performance analysis and extensive simulations are performed for the proposed NC2R and traditional relaying and non-relaying schemes. The results show that NCR outperforms conventional relaying and non-relaying schemes in terms of blocking probability and spectral efficiency, especially for cell-edge users. Additionally, the location selections for relays with NCR are also discussed. These results will provide some insights for incorporating network coding into next-generation broadband cellular relay mobile systems.
基金supported in part by National High-tech R&D Program(863 Program) under Grant No.2014AA01A701National Natural Science Foundation of China under Grant No.61379006,61401510,61521003Project funded by China Postdoctoral Science Foundation under Grant No.2016M592990
文摘This study investigates physical layer security in downlink multipleinput multiple-output(MIMO) multi-hop heterogeneous cellular networks(MHCNs),in which communication between mobile users and base stations(BSs) is established by a single or multiple hops,to address the problem of insufficient security performance of MIMO heterogeneous cellular networks.First,two-dimensional homogeneous Poisson point processes(HPPPs) are utilized to model the locations of K-tier BSs in MIMO MHCNs and receivers,including those of legitimate users and eavesdroppers.Second,based on the channel gain distribution and the statistics property of HPPP,the achievable ergodic rates of the main and eavesdropper channels in direct and ad hoc links are derived,respectively.Third,the secrecy coverage probability and the achievable ergodic secrecy throughput of downlink MIMO MHCNs are explored,and their expressions are derived.Lastly,the correctness of the theoretical derivation is verified through Monte Carlo simulations.
基金supported in part by the Project of National Natural Science Foundation of China (61301110)Project of Shanghai Key Laboratory of Intelligent Information Processing, China [grant number IIPL-2014-005]+1 种基金the Project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe Project of Jiangsu Overseas Research & Training Program for University Prominent Young & Middle-Aged Teachers and Presidents
文摘As device-to-device(D2D) communications usually reuses the resource of cellular networks, call admission control(CAC) and power control are crucial problems. However in most power control schemes, total data rates or throughput are regarded as optimization criterion. In this paper, a combining call admission control(CAC) and power control scheme under guaranteeing QoS of every user equipment(UE) is proposed. First, a simple CAC scheme is introduced. Then based on the CAC scheme, a combining call admission control and power control scheme is proposed. Next, the performance of the proposed scheme is evaluated. Finally, maximum DUE pair number and average transmitting power is calculated. Simulation results show that D2 D communications with the proposed combining call admission control and power control scheme can effectively improve the maximum DUE pair number under the premise of meeting necessary QoS.
基金supported by Natural Science Foundation of China(61372125)973 project(2013CB329104)+1 种基金the National High-Tech R&D Program(863 Program 2015AA01A705)the open research fund of National Mobile Communications Research Laboratory,Southeast University(2013D01)
文摘In this paper, we propose a novel speed and service-sensitive handoff algorithm and analytical model for hierarchical cellular networks.First, we use the Gauss-Markov mobility model to predict the speeds of mobile stations, and divide mobile stations into three classes based on the predicted speeds: fast, medium-speed, and slow.Then, according to the mobility classification,network conditions, and service types, mobile stations will be handoff to the proper target networks prior to the deterioration of the currently operating channel. We further develop an analytical model to evaluate the performance of such a hierarchical system with different speed classes and service types. Simulations and analytical results show that the proposed handoff algorithm can significantly improve the network performance in terms of the handoff failure probability, unnecessary handoff probability, and network throughput, comparing with the traditional algorithms.
基金supported by the National Key R&D Program of China(Grant No.2018YFC1506605)Sichuan Provincial Department of Education Scientific research projects(Grant No.16ZB0211)Chengdu University of Information Technology research and development projects(Grant No.CRF201705)。
文摘Millimeter-wave cloud radar(MMCR)provides the capability of detecting the features of micro particles inside clouds and describing the internal microphysical structure of the clouds.Therefore,MMCR has been widely applied in cloud observations.However,due to the influence of non-meteorological factors such as insects,the cloud observations are often contaminated by non-meteorological echoes in the clear air,known as clear-air echoes.It is of great significance to automatically identify the clear-air echoes in order to extract effective meteorological information from the complex weather background.The characteristics of clear-air echoes are studied here by combining data from four devices:an MMCR,a laser-ceilometer,an L-band radiosonde,and an all-sky camera.In addition,a new algorithm,which includes feature extraction,feature selection,and classification,is proposed to achieve the automatic identification of clear-air echoes.The results show that the recognition algorithm is fairly satisfied in both simple and complex weather conditions.The recognition accuracy can reach up to 95.86%for the simple cases when cloud echoes and clear-air echoes are separate,and 88.38%for the complicated cases when low cloud echoes and clear-air echoes are mixed.