This document describes the creation of an informative Web GIS aimed at mitigating the impacts of flooding in the municipality of Ouagadougou, in Burkina Faso, a region that is highly sensitive to climate change. Burk...This document describes the creation of an informative Web GIS aimed at mitigating the impacts of flooding in the municipality of Ouagadougou, in Burkina Faso, a region that is highly sensitive to climate change. Burkina Faso, which is undergoing rapid urbanization, faces major natural threats, particularly flooding, as demonstrated by the severe floods of 2009 that caused loss of life, injury, structural damage and economic losses in Ouagadougou. The aim of this research is to develop a web map highlighting the municipality’s flood-prone areas, with a view to informing and raising awareness of flood risk reduction. Using the Leaflet JavaScript mapping library, the study uses HTML, CSS and JavaScript to implement web mapping technology. Data on Ouagadougou’s flood zones is generated by a multi-criteria analysis combining Saaty’s AHP method and GIS in QGIS, integrating seven (7) parameters including hydrography, altitude, slope, rainfall, soil types, land use and soil moisture index. QGIS processes and maps the themes, PostgreSQL with PostGIS serves as the DBMS and GeoServer functions as the map server. The Web GIS platform allows users to visualize the different flood risks, from very low to very high, or the high-risk areas specific to Ouagadougou. The AHP calculations classify the municipality into five flood vulnerability zones: very low (24.48%), low (27.93%), medium (23.01%), high (17.11%) and very high (7.47%). Effective risk management requires communication and awareness-raising. This online mapping application serves as a tool for communication, management and flood prevention in Ouagadougou, helping to mitigate flood-related natural disasters.展开更多
Device-to-device(D2D) communications can be underlaid with a cellular infrastructure to increase resource utilization, improve user throughput and save battery energy. In such networks, power allocation and mode selec...Device-to-device(D2D) communications can be underlaid with a cellular infrastructure to increase resource utilization, improve user throughput and save battery energy. In such networks, power allocation and mode selection are crucial problems. To address the joint optimization of power and mode selection under imperfect CSI, we propose an optimal, energy-aware joint power allocation and mode selection(JPAMS) scheme. First, we derive the closed-form solution for the power minimization for both D2 D and cellular links while satisfying different quality of service(Qo S) constraints. Second, we address the mode selection problem in presence of imperfect CSI, based on the derived power allocation. Moreover, the theoretical analysis and simulation results are presented to evaluate the proposed scheme for the D2 D communications.展开更多
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R...The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.展开更多
This study aims at assessing the relative impacts of four major components of the tropical Pacific Ocean observing system on assimilation of temperature and salinity fields. Observations were collected over a period b...This study aims at assessing the relative impacts of four major components of the tropical Pacific Ocean observing system on assimilation of temperature and salinity fields. Observations were collected over a period between January 2001 through June 2003 including temperature data from the expendable bathythermographs (XBT), thermistor data from the Tropical Ocean Global Atmosphere Tropical Atmosphere-Ocean (TOGA-TAO) mooring array, sea level anomalies from the Topex/Poseidon and Jason-1 altimetry (T/P-J), and temperature and salinity profiles from the Array for Real-time Geostrophic Oceanography (ARGO) floats. An efficient three-dimensional variational analysis-based method was introduced to assimilate the above data into the tropical-Pacific circulation model. To evaluate the impact of the individual component of the observing system, four observation system experiments were carried out. The experiment that assimilated all four components of the observing system was taken as the reference. The other three experiments were implemented by withholding one of the four components. Results show that the spatial distribution of the data influences its relative contribution. XBT observations produce the most distinguished effects on temperature analyses in the off-equatorial region due to the large amount of measurements and high quality. Similarly, the impact of TAO is dominant in the equatorial region due to the focus of the spatial distribution. The Topex/Poseidon-Jason-1 can be highly complementary where the XBT and TAO observations are sparse. The contribution of XBT or TAO on the assimilated salinity is made by the model dynamics because no salinity observations from them are assimilated. Therefore, T/P-J, as a main source for providing salinity data, has been shown to have greater impacts than either XBT or TAO on the salinity analysis. Although ARGO includes the subsurface observations, the relatively smaller number of observation makes it have the smallest contribution to the assimilation system.展开更多
Recently dependency information has been used in different ways to improve neural machine translation.For example,add dependency labels to the hidden states of source words.Or the contiguous information of a source wo...Recently dependency information has been used in different ways to improve neural machine translation.For example,add dependency labels to the hidden states of source words.Or the contiguous information of a source word would be found according to the dependency tree and then be learned independently and be added into Neural Machine Translation(NMT)model as a unit in various ways.However,these works are all limited to the use of dependency information to enrich the hidden states of source words.Since many works in Statistical Machine Translation(SMT)and NMT have proven the validity and potential of using dependency information.We believe that there are still many ways to apply dependency information in the NMT structure.In this paper,we explore a new way to use dependency information to improve NMT.Based on the theory of local attention mechanism,we present Dependency-based Local Attention Approach(DLAA),a new attention mechanism that allowed the NMT model to trace the dependency words related to the current translating words.Our work also indicates that dependency information could help to supervise attention mechanism.Experiment results on WMT 17 Chineseto-English translation task shared training datasets show that our model is effective and perform distinctively on long sentence translation.展开更多
Orthogonal Frequency Division Multiplexing (OFDM) systems suffer from performance deterioration when the length of Cyclic Prefix (CP) is shorter than the Channel Impulse Response (CIR). The fundamental reason of this ...Orthogonal Frequency Division Multiplexing (OFDM) systems suffer from performance deterioration when the length of Cyclic Prefix (CP) is shorter than the Channel Impulse Response (CIR). The fundamental reason of this impairment is the InterCarrier Interference (ICI) and Inter- Symbol Interference (ISI) introduced by the excessive multipath delay. Specifically, Multiple Input Multiple Output (MIMO) beamforming is helpful in cancelling such interference since it can spatially suppress some of the multipath. In this paper, we propose an ICI eliminating beamforming scheme employing a per-tone processing approach, thus with moderate computational complexity. The ISI is removed by using a simple decision feedback equalizer, while the optimal steering and combining vectors are then derived to maximize the Signal to Interference plus Noise Ratio (SINR). This method not only achieves the beamforming benefit, but also significantly alleviates the ICI. Simulation results show that the proposed algorithm can effectively reduce the system Symbol Error Rate (SER), per- mitting good performance for multipath delay profiles that would break conventional links.展开更多
Joint radar and communication(JRC)technology is gradually becoming an essential approach to alleviating spectral congestion.Radar and communications systems were designed with common spectral and hardware resources to...Joint radar and communication(JRC)technology is gradually becoming an essential approach to alleviating spectral congestion.Radar and communications systems were designed with common spectral and hardware resources to reduce size,improve performance,reduce cost,and decongest the spectrum.Various approaches have been proposed to achieve the coexistence of radar and communication systems.This paper mainly focuses on the research directions of radar communication coexistence(RCC)and dual-function radar communication systems(DFRC)in JRC technology.We summarize and analyze the existing research problems in the JRC era.According to the characteristics and advantages of JRC technology,we highlight several potentials in military and commercial applications.展开更多
In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple seco...In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple secondary users.With the cooperation of Primary Base Station(PBS)and Secondary Base Station(SBS),a signal processing procedure is designed to guarantee the priority of the primary transmission.As a reward for offering help to the PBS,the SBS is granted communication opportunity.The transmission difference of various spatial channels is exploited in Secondary User(SU)scheduling.With the proposed scheme,interferencefree concurrent transmission of both PBS and SBS is implemented.Spatial channel resources can be effectively utilised compared with a traditional Interference Alignment(IA)based strategy.Simulation results show that the achievable data for primary transmission is enhanced by cooperative signal processing at the SBS.With respect to the SBS,its data rate grows with an increasing number of SUs by exploiting the multiuser diversity gain.展开更多
Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with t...Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy.展开更多
Small cells have been regarded as an appealing technique to boost resource reuse ratio. On the other hand, their large-scale and self-organised tendency would complicate the interference environment of mobile networks...Small cells have been regarded as an appealing technique to boost resource reuse ratio. On the other hand, their large-scale and self-organised tendency would complicate the interference environment of mobile networks. Meanwhile, traffic class is booming in recent years, which leads to higher demand for net- work designers on Quality of Service (QoS) provision, and therefore users' diverse re- quirements may not be guaranteed in sucff'an interference limited scenario. To maximise the number of users with QoS demands as well as resource reuse ratio, we formulate the resource allocation problem into a multi-objective l0 norm form. It is shown to be NP hard, and an iterative method is employed to approach the optimal solution. Because of its limit of being not adaptive to large-scale networks, we also design a heuristic method based on chordal graph, which, however, could result in per- formance loss when the size of networks is small. Finally, by combining these two meth- ods, we devise a hybrid algorithm such that the allocation performs both efficiently and effectively. Simulation results illustrate the performance of our proposed methods in terms of outage probability and resource reuse ratio.展开更多
This paper proposes a negotiation-based TDMA scheme for ad hoc networks, which was modeled as an asynchronous myopic repeated game. Compared to the traditional centralized TDMA schemes, our scheme operates in a decent...This paper proposes a negotiation-based TDMA scheme for ad hoc networks, which was modeled as an asynchronous myopic repeated game. Compared to the traditional centralized TDMA schemes, our scheme operates in a decentralized manner and is scalable to topology changes. Simulation results show that, with respect to the coloring quality, the performance of our scheme is close to that of the classical centralized algorithms with much lower complexity.展开更多
Binary sensor network(BSN) are becoming more attractive due to the low cost deployment,small size,low energy consumption and simple operation.There are two different ways for target tracking in BSN,the weighted algori...Binary sensor network(BSN) are becoming more attractive due to the low cost deployment,small size,low energy consumption and simple operation.There are two different ways for target tracking in BSN,the weighted algorithms and particle filtering algorithm.The weighted algorithms have good realtime property,however have poor estimation property and some of them does not suit for target’s variable velocity model.The particle filtering algorithm can estimate target's position more accurately with poor realtime property and is not suitable for target’s constant velocity model.In this paper distance weight is adopted to estimate the target’s position,which is different from the existing distance weight in other papers.On the analysis of principle of distance weight (DW),prediction-based distance weighted(PDW) algorithm for target tracking in BSN is proposed.Simulation results proved PDW fits for target's constant and variable velocity models with accurate estimation and good realtime property.展开更多
This paper addresses the problem of interference mitigation in cooperative Space Time Block Coded Orthogonal Frequency Division Multiplexing (STBC-OFDM) systems in the presence of asyn-chronism. This scheme first prep...This paper addresses the problem of interference mitigation in cooperative Space Time Block Coded Orthogonal Frequency Division Multiplexing (STBC-OFDM) systems in the presence of asyn-chronism. This scheme first preprocesses the received ST codewords to convert the equivalent fading matrix into a suboptimal ordering upper triangular form based on low complexity permutation QR decomposition, and then suppresses the InterCarrier Interference (ICI) and InterSymbol Interference (ISI) by exploiting Successive Interference Cancellation (SIC) technique. Simulation results show that the performance of the proposed algorithm slightly outmatches or asymptotically approaches to that of the existing Minimum Mean Square Error (MMSE) detector depending on the magnitude of the Carrier Frequency Offsets (CFOs) but with less complexity.展开更多
An explicit formula for the ergodic capacity of Orthogonal Frequency Division Multiplexing (OFDM)-based Multiple-Input Multiple-Output (MIMO) systems under correlated frequency selective Rayleigh channels is derived,b...An explicit formula for the ergodic capacity of Orthogonal Frequency Division Multiplexing (OFDM)-based Multiple-Input Multiple-Output (MIMO) systems under correlated frequency selective Rayleigh channels is derived,by simplifying the channel response matrix in frequency domain into the so-called Kronecker model composed of three kinds of correlations,i.e.multipath tap gain correlation and spatial fading correlations at both transmitter and receiver.The derived formula is very simple and convenient for one to estimate the effects of all three kinds of correlations on MIMO-OFDM capacity.If taps are independent,there is a very simple expression for the ergodic capacity.In case of tap correlation,the capacity formula could be further given in an integral expression.The validity of the new formula is verified and the effects of correlations,delay spread as well as the number of subcarriers on the ergodic capacity are evaluated via Monte Carlo simulations.展开更多
A new Multiple Access Control (MAC) protocol-User Adaptive Scheduling Multiple Access (UASMA) protocol is proposed in this paper. It can well schedule the packet transmission according to the exact number of active Mo...A new Multiple Access Control (MAC) protocol-User Adaptive Scheduling Multiple Access (UASMA) protocol is proposed in this paper. It can well schedule the packet transmission according to the exact number of active Mobile Terminals (MTs) determined by selforganizing algorithm and adjust the number of packets sent by one node in one frame properly.UASMA protocol employs a special frame structure, which makes it possible to allocate channel resource to uplink and downlink traffic according to their respective service requirements. The proposed concept of referenced-frame-length can ensure the frame length varies in a certain range,and consequently increase the utilization efficiency of the channel greatly. Meanwhile, UASMA protocol uses an efficient collision resolution algorithm to guarantee that active MTs can access the channel rapidly. Finally, the performance of UASMA protocol is evaluated by simulation and it is also compared with carrier sense multiple access, rounding-poll and UPMA protocols. The results show that the UASMA has better performance than others.展开更多
This paper presents a new BIST method for RTL data paths based on single-control testability, a new concept of testability. The BIST method adopts hierarchical test. Test pattern generators are placed only on primary ...This paper presents a new BIST method for RTL data paths based on single-control testability, a new concept of testability. The BIST method adopts hierarchical test. Test pattern generators are placed only on primary inputs and test patterns are propagated to and fed into each module. Test responses are similarly propagated to response analyzers placed only on primary outputs. For the propagation of test patterns and test responses paths existing in the data path are utilized. The DFT method for the single-control testability is also proposed. The advantages of the proposed method are high fault coverage (for single Stuck-at faults), low hardware overhead and capability of at-speed test. Moreover, test patterns generated by test pattern generators can be fed into each module at consecutive system clocks, and thus, the BIST can also detect some faults of other fault models (e.g., transition faults and delay faults) that require consecutive application of test patterns at speed of system clock.展开更多
The emergency relating to software-defined networking (SDN), especially in terms of the prototype associated with OpenFlow, provides new possibilities for innovating on network design. Researchers have started to ex...The emergency relating to software-defined networking (SDN), especially in terms of the prototype associated with OpenFlow, provides new possibilities for innovating on network design. Researchers have started to extend SDN to cellular networks. Such new programmable architecture is beneficial to the evolution of mobile networks and allows operators to provide better services. The typical cellular network comprises radio access network (RAN) and core network (CN); hence, the technique roadmap diverges in two ways. In this paper, we investigate SoftRAN, the latest SDN solution for RAN, and SoftCell and MobileFlow, the latest solutions for CN. We also define a series of control functions for CROWD. Unlike in the other literature, we emphasize only softwaredefined cellular network solutions and specifications in order to provide possible research directions.展开更多
In this paper, the Lotka-Volterra competition system with discrete and distributed time delays is considered. By analyzing the characteristic equation of the linearized system, the local asymptotic stability of the po...In this paper, the Lotka-Volterra competition system with discrete and distributed time delays is considered. By analyzing the characteristic equation of the linearized system, the local asymptotic stability of the positive equilibrium is investigated. Moreover, we discover the delays don't effect the stability of the equilibrium in the delay system. Finally, we can conclude that the positive equilibrium is global asymptotically stable in the delay system.展开更多
One of the principal disadvantages of Orthogonal Frequency Division Multiplexing (OFDM) is very sensitive to carrier frequency offset. The integer frequency offset has no effect on the orthogonality among the subcarri...One of the principal disadvantages of Orthogonal Frequency Division Multiplexing (OFDM) is very sensitive to carrier frequency offset. The integer frequency offset has no effect on the orthogonality among the subcarriers, but it causes a circular shift and phase rotation of the received data symbols sequence, resulting in a Bit Error Rate(BER) of 0.5. In this paper,a novel integer frequency offset estimator for OFDM is derived based on maximum likelihood estimation technique and exploration of the differential relation between two consecutive OFDM data symbol sequences in frequency domain. Its performance is compared with the conventional method by computer simulations for the additive white Gaussian noise channel and a multipath fading channel. Simulation results show that the performance of the proposed estimator is better than the conventional estimator.展开更多
We present a method of test generation for acyclic sequential circuits with hold registers. A complete (100% fault efficiency) test sequence for an acyclic sequential circuit can be obtained by applying a combinationa...We present a method of test generation for acyclic sequential circuits with hold registers. A complete (100% fault efficiency) test sequence for an acyclic sequential circuit can be obtained by applying a combinational test generator to all the maximal time-expansion models (TEMs) of the circuit. We propose a class of acyclic sequential circuits for which the number of maximal TEMs is one, i.e, the maximum TEM exists. For a circuit in the class, test generation can be performed by using only the maximum TEM. The proposed class of sequential circuits with the maximum TEM properly includes several known classes of acyclic sequential circuits such as balanced structures and acyclic sequential circuits without hold registers for which test generation can be also performed by using a combinational test generator. Therefore, in general, the hardware overhead for partial scan based on the proposed structure is smaller than that based on balanced or acyclic sequential structure without hold registers.展开更多
文摘This document describes the creation of an informative Web GIS aimed at mitigating the impacts of flooding in the municipality of Ouagadougou, in Burkina Faso, a region that is highly sensitive to climate change. Burkina Faso, which is undergoing rapid urbanization, faces major natural threats, particularly flooding, as demonstrated by the severe floods of 2009 that caused loss of life, injury, structural damage and economic losses in Ouagadougou. The aim of this research is to develop a web map highlighting the municipality’s flood-prone areas, with a view to informing and raising awareness of flood risk reduction. Using the Leaflet JavaScript mapping library, the study uses HTML, CSS and JavaScript to implement web mapping technology. Data on Ouagadougou’s flood zones is generated by a multi-criteria analysis combining Saaty’s AHP method and GIS in QGIS, integrating seven (7) parameters including hydrography, altitude, slope, rainfall, soil types, land use and soil moisture index. QGIS processes and maps the themes, PostgreSQL with PostGIS serves as the DBMS and GeoServer functions as the map server. The Web GIS platform allows users to visualize the different flood risks, from very low to very high, or the high-risk areas specific to Ouagadougou. The AHP calculations classify the municipality into five flood vulnerability zones: very low (24.48%), low (27.93%), medium (23.01%), high (17.11%) and very high (7.47%). Effective risk management requires communication and awareness-raising. This online mapping application serves as a tool for communication, management and flood prevention in Ouagadougou, helping to mitigate flood-related natural disasters.
基金supported in part by Important National Science and Technology Specific Projects (Grants Nos. 2011 ZX 0300300104, 2012ZX03003012)Fundamental Research Funds for Central Universities (Grant Nos. 72125377)
文摘Device-to-device(D2D) communications can be underlaid with a cellular infrastructure to increase resource utilization, improve user throughput and save battery energy. In such networks, power allocation and mode selection are crucial problems. To address the joint optimization of power and mode selection under imperfect CSI, we propose an optimal, energy-aware joint power allocation and mode selection(JPAMS) scheme. First, we derive the closed-form solution for the power minimization for both D2 D and cellular links while satisfying different quality of service(Qo S) constraints. Second, we address the mode selection problem in presence of imperfect CSI, based on the derived power allocation. Moreover, the theoretical analysis and simulation results are presented to evaluate the proposed scheme for the D2 D communications.
基金ACKNOWLEDGEMENT This work was supported by the National Na- tural Science Foundation of China under Gra- nts No. 61172079, 61231008, No. 61201141, No. 61301176 the National Basic Research Program of China (973 Program) under Grant No. 2009CB320404+2 种基金 the 111 Project under Gr- ant No. B08038 the National Science and Tec- hnology Major Project under Grant No. 2012- ZX03002009-003, No. 2012ZX03004002-003 and the Shaanxi Province Science and Techno- logy Research and Development Program un- der Grant No. 2011KJXX-40.
文摘The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.
基金supported by the 973 Program(Grant No.2006CB403606)the National Natural Science Foundation of China(Grant No.40606008).
文摘This study aims at assessing the relative impacts of four major components of the tropical Pacific Ocean observing system on assimilation of temperature and salinity fields. Observations were collected over a period between January 2001 through June 2003 including temperature data from the expendable bathythermographs (XBT), thermistor data from the Tropical Ocean Global Atmosphere Tropical Atmosphere-Ocean (TOGA-TAO) mooring array, sea level anomalies from the Topex/Poseidon and Jason-1 altimetry (T/P-J), and temperature and salinity profiles from the Array for Real-time Geostrophic Oceanography (ARGO) floats. An efficient three-dimensional variational analysis-based method was introduced to assimilate the above data into the tropical-Pacific circulation model. To evaluate the impact of the individual component of the observing system, four observation system experiments were carried out. The experiment that assimilated all four components of the observing system was taken as the reference. The other three experiments were implemented by withholding one of the four components. Results show that the spatial distribution of the data influences its relative contribution. XBT observations produce the most distinguished effects on temperature analyses in the off-equatorial region due to the large amount of measurements and high quality. Similarly, the impact of TAO is dominant in the equatorial region due to the focus of the spatial distribution. The Topex/Poseidon-Jason-1 can be highly complementary where the XBT and TAO observations are sparse. The contribution of XBT or TAO on the assimilated salinity is made by the model dynamics because no salinity observations from them are assimilated. Therefore, T/P-J, as a main source for providing salinity data, has been shown to have greater impacts than either XBT or TAO on the salinity analysis. Although ARGO includes the subsurface observations, the relatively smaller number of observation makes it have the smallest contribution to the assimilation system.
基金This research was funded in part by the National Natural Science Foundation of China(61871140,61872100,61572153,U1636215,61572492,61672020)the National Key research and Development Plan(Grant No.2018YFB0803504)Open Fund of Beijing Key Laboratory of IOT Information Security Technology(J6V0011104).
文摘Recently dependency information has been used in different ways to improve neural machine translation.For example,add dependency labels to the hidden states of source words.Or the contiguous information of a source word would be found according to the dependency tree and then be learned independently and be added into Neural Machine Translation(NMT)model as a unit in various ways.However,these works are all limited to the use of dependency information to enrich the hidden states of source words.Since many works in Statistical Machine Translation(SMT)and NMT have proven the validity and potential of using dependency information.We believe that there are still many ways to apply dependency information in the NMT structure.In this paper,we explore a new way to use dependency information to improve NMT.Based on the theory of local attention mechanism,we present Dependency-based Local Attention Approach(DLAA),a new attention mechanism that allowed the NMT model to trace the dependency words related to the current translating words.Our work also indicates that dependency information could help to supervise attention mechanism.Experiment results on WMT 17 Chineseto-English translation task shared training datasets show that our model is effective and perform distinctively on long sentence translation.
基金Supported by the National Science Fund for Distinguished Young Scholars (No. 60725105)the National Basic Re-search Program of China (2009CB320404)+5 种基金the Program for Changjiang Scholars and Innovative Research Team in Universitythe National High Technology Research and Development Program of China (2007AA01Z288)the 111 Project (B08038)the National Natural Science Founda-tion of China (No. 60902032, 60902033, and 60702057)the Key Project of Chinese Ministry of Education (107103) the Program for State Key Laboratory of Integrated Service Networks (ISN02080001)
文摘Orthogonal Frequency Division Multiplexing (OFDM) systems suffer from performance deterioration when the length of Cyclic Prefix (CP) is shorter than the Channel Impulse Response (CIR). The fundamental reason of this impairment is the InterCarrier Interference (ICI) and Inter- Symbol Interference (ISI) introduced by the excessive multipath delay. Specifically, Multiple Input Multiple Output (MIMO) beamforming is helpful in cancelling such interference since it can spatially suppress some of the multipath. In this paper, we propose an ICI eliminating beamforming scheme employing a per-tone processing approach, thus with moderate computational complexity. The ISI is removed by using a simple decision feedback equalizer, while the optimal steering and combining vectors are then derived to maximize the Signal to Interference plus Noise Ratio (SINR). This method not only achieves the beamforming benefit, but also significantly alleviates the ICI. Simulation results show that the proposed algorithm can effectively reduce the system Symbol Error Rate (SER), per- mitting good performance for multipath delay profiles that would break conventional links.
文摘Joint radar and communication(JRC)technology is gradually becoming an essential approach to alleviating spectral congestion.Radar and communications systems were designed with common spectral and hardware resources to reduce size,improve performance,reduce cost,and decongest the spectrum.Various approaches have been proposed to achieve the coexistence of radar and communication systems.This paper mainly focuses on the research directions of radar communication coexistence(RCC)and dual-function radar communication systems(DFRC)in JRC technology.We summarize and analyze the existing research problems in the JRC era.According to the characteristics and advantages of JRC technology,we highlight several potentials in military and commercial applications.
基金supported by the National Natural Science Foundation of China under Grants No. 61102057,No. 61231008the National Key Basic Research Program of China (973 Program) under Grant No. 2009CB320404+4 种基金the National Science and Technology Major Project under Grant No. 2012ZX-03003005-005the 111 Project under Grant No.B08038the Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT0852the ISN Project under Grant No. ISN1103005the Fundamental Research Funds for the Central Universities under Grant No. K5051301014
文摘In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple secondary users.With the cooperation of Primary Base Station(PBS)and Secondary Base Station(SBS),a signal processing procedure is designed to guarantee the priority of the primary transmission.As a reward for offering help to the PBS,the SBS is granted communication opportunity.The transmission difference of various spatial channels is exploited in Secondary User(SU)scheduling.With the proposed scheme,interferencefree concurrent transmission of both PBS and SBS is implemented.Spatial channel resources can be effectively utilised compared with a traditional Interference Alignment(IA)based strategy.Simulation results show that the achievable data for primary transmission is enhanced by cooperative signal processing at the SBS.With respect to the SBS,its data rate grows with an increasing number of SUs by exploiting the multiuser diversity gain.
文摘Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy.
基金ACKNOWLEDGEMENT First, thanks for the invitation from the organ- isers of IEEE/CIC ICCC 2013 held in Xi'an, China. This work was supported by the Na- tional Natural Science Foundation of China under Grants No. 60972047, No. 61231008 the National Science and Technology Major Project under Grams No. 2011ZX03005-004, No. 2011ZX03004-003, No. 2011ZX03005- 003-03, No. 2013ZX03004007-003+4 种基金 the Shannxi 13115 Project under Grant No. 2010ZDKG-26 the National Basic Research Program of China (973 Program) under Grant No. 2009CB320404 the Program for Changjiang Scholars and Inn- ovative Research Team in University under Gr- ant No. IRT0852 the 111 Project under Grant No. B08038 and the State Key Laboratory Fou- ndation under Grants No. ISN1002005, No. ISN090305.
文摘Small cells have been regarded as an appealing technique to boost resource reuse ratio. On the other hand, their large-scale and self-organised tendency would complicate the interference environment of mobile networks. Meanwhile, traffic class is booming in recent years, which leads to higher demand for net- work designers on Quality of Service (QoS) provision, and therefore users' diverse re- quirements may not be guaranteed in sucff'an interference limited scenario. To maximise the number of users with QoS demands as well as resource reuse ratio, we formulate the resource allocation problem into a multi-objective l0 norm form. It is shown to be NP hard, and an iterative method is employed to approach the optimal solution. Because of its limit of being not adaptive to large-scale networks, we also design a heuristic method based on chordal graph, which, however, could result in per- formance loss when the size of networks is small. Finally, by combining these two meth- ods, we devise a hybrid algorithm such that the allocation performs both efficiently and effectively. Simulation results illustrate the performance of our proposed methods in terms of outage probability and resource reuse ratio.
基金supported in part by National Science Fund for Distinguished Young Scholars under Grant No.60725105National Key Basic Research Program of China ( 973 Program ) under Grant No.2009CB320404+2 种基金Program for Changjiang Scholars and Innovative Research Team in University under Grant No.IRT0852National Natural Science Foundation of China under Grants No.60972047, 61072068111 Project under Grant No.B08038
文摘This paper proposes a negotiation-based TDMA scheme for ad hoc networks, which was modeled as an asynchronous myopic repeated game. Compared to the traditional centralized TDMA schemes, our scheme operates in a decentralized manner and is scalable to topology changes. Simulation results show that, with respect to the coloring quality, the performance of our scheme is close to that of the classical centralized algorithms with much lower complexity.
基金This work is supported by The National Science Fund for Distinguished Young Scholars (60725105) National Basic Research Program of China (973 Program) (2009CB320404)+5 种基金 Program for Changjiang Scholars and Innovative Research Team in University (IRT0852) The National Natural Science Foundation of China (60972048, 61072068) The Special Fund of State Key Laboratory (ISN01080301) The Major program of National Science and Technology (2009ZX03007- 004) Supported by the 111 Project (B08038) The Key Project of Chinese Ministry of Education (107103).
文摘Binary sensor network(BSN) are becoming more attractive due to the low cost deployment,small size,low energy consumption and simple operation.There are two different ways for target tracking in BSN,the weighted algorithms and particle filtering algorithm.The weighted algorithms have good realtime property,however have poor estimation property and some of them does not suit for target’s variable velocity model.The particle filtering algorithm can estimate target's position more accurately with poor realtime property and is not suitable for target’s constant velocity model.In this paper distance weight is adopted to estimate the target’s position,which is different from the existing distance weight in other papers.On the analysis of principle of distance weight (DW),prediction-based distance weighted(PDW) algorithm for target tracking in BSN is proposed.Simulation results proved PDW fits for target's constant and variable velocity models with accurate estimation and good realtime property.
基金Supported by the National Outstanding Youth Science Fund (No. 60725105)the Program for Changjiang Scholars and Innovative Research Team in University(IRT0852)+1 种基金the National Natural Science Foundation of China (No. 60702057)the Fundamental Research Funds for the Central Universities (JY10000901030)
文摘This paper addresses the problem of interference mitigation in cooperative Space Time Block Coded Orthogonal Frequency Division Multiplexing (STBC-OFDM) systems in the presence of asyn-chronism. This scheme first preprocesses the received ST codewords to convert the equivalent fading matrix into a suboptimal ordering upper triangular form based on low complexity permutation QR decomposition, and then suppresses the InterCarrier Interference (ICI) and InterSymbol Interference (ISI) by exploiting Successive Interference Cancellation (SIC) technique. Simulation results show that the performance of the proposed algorithm slightly outmatches or asymptotically approaches to that of the existing Minimum Mean Square Error (MMSE) detector depending on the magnitude of the Carrier Frequency Offsets (CFOs) but with less complexity.
基金Supported by the National Natural Science Foundation of China (No.60372048)Microsoft Research Asia,the sixth project of the Key Project of National Natural Science Foundation of China (No.60496316)+2 种基金National"863"Program of China (No.2005AA123910)Research Fund for the Doctoral Program of Higher Education (No.20050701007)Teaching and Research Award Program for Outstanding Young Teachers in Higher Education Institutions of MOE,P.R.China,and the Key Project of Chinese Ministry of Education (No.104171).
文摘An explicit formula for the ergodic capacity of Orthogonal Frequency Division Multiplexing (OFDM)-based Multiple-Input Multiple-Output (MIMO) systems under correlated frequency selective Rayleigh channels is derived,by simplifying the channel response matrix in frequency domain into the so-called Kronecker model composed of three kinds of correlations,i.e.multipath tap gain correlation and spatial fading correlations at both transmitter and receiver.The derived formula is very simple and convenient for one to estimate the effects of all three kinds of correlations on MIMO-OFDM capacity.If taps are independent,there is a very simple expression for the ergodic capacity.In case of tap correlation,the capacity formula could be further given in an integral expression.The validity of the new formula is verified and the effects of correlations,delay spread as well as the number of subcarriers on the ergodic capacity are evaluated via Monte Carlo simulations.
基金Partly supported by the National Natural Science Foundation of China (No.60372048,No.60390540) Microsoft Research Asia, National "863" Program of China (No.2001AA123031)the Key Project of Chinese Ministry of Education (01162)Teaching Research Award Program for Outstanding Young Teachers in Higher Education Institutions of Ministry of Education, P.R.C.
文摘A new Multiple Access Control (MAC) protocol-User Adaptive Scheduling Multiple Access (UASMA) protocol is proposed in this paper. It can well schedule the packet transmission according to the exact number of active Mobile Terminals (MTs) determined by selforganizing algorithm and adjust the number of packets sent by one node in one frame properly.UASMA protocol employs a special frame structure, which makes it possible to allocate channel resource to uplink and downlink traffic according to their respective service requirements. The proposed concept of referenced-frame-length can ensure the frame length varies in a certain range,and consequently increase the utilization efficiency of the channel greatly. Meanwhile, UASMA protocol uses an efficient collision resolution algorithm to guarantee that active MTs can access the channel rapidly. Finally, the performance of UASMA protocol is evaluated by simulation and it is also compared with carrier sense multiple access, rounding-poll and UPMA protocols. The results show that the UASMA has better performance than others.
文摘This paper presents a new BIST method for RTL data paths based on single-control testability, a new concept of testability. The BIST method adopts hierarchical test. Test pattern generators are placed only on primary inputs and test patterns are propagated to and fed into each module. Test responses are similarly propagated to response analyzers placed only on primary outputs. For the propagation of test patterns and test responses paths existing in the data path are utilized. The DFT method for the single-control testability is also proposed. The advantages of the proposed method are high fault coverage (for single Stuck-at faults), low hardware overhead and capability of at-speed test. Moreover, test patterns generated by test pattern generators can be fed into each module at consecutive system clocks, and thus, the BIST can also detect some faults of other fault models (e.g., transition faults and delay faults) that require consecutive application of test patterns at speed of system clock.
文摘The emergency relating to software-defined networking (SDN), especially in terms of the prototype associated with OpenFlow, provides new possibilities for innovating on network design. Researchers have started to extend SDN to cellular networks. Such new programmable architecture is beneficial to the evolution of mobile networks and allows operators to provide better services. The typical cellular network comprises radio access network (RAN) and core network (CN); hence, the technique roadmap diverges in two ways. In this paper, we investigate SoftRAN, the latest SDN solution for RAN, and SoftCell and MobileFlow, the latest solutions for CN. We also define a series of control functions for CROWD. Unlike in the other literature, we emphasize only softwaredefined cellular network solutions and specifications in order to provide possible research directions.
基金the Education Foundation of Henan Province(07110005)
文摘In this paper, the Lotka-Volterra competition system with discrete and distributed time delays is considered. By analyzing the characteristic equation of the linearized system, the local asymptotic stability of the positive equilibrium is investigated. Moreover, we discover the delays don't effect the stability of the equilibrium in the delay system. Finally, we can conclude that the positive equilibrium is global asymptotically stable in the delay system.
基金Supported by the National Natural Science Foundation of China (No.60372048) Mi-crosoft Research Asia, Key Project of National Natural Science Foundation of China (No.60496316)National "863" Program of China (No.2005AA123910)Teaching Research Award Program for Outstanding Young Teachers in Higher Education Institutions of MOE, P.R.C.Key Project of Chinese Ministry of Education (No.104171).
文摘One of the principal disadvantages of Orthogonal Frequency Division Multiplexing (OFDM) is very sensitive to carrier frequency offset. The integer frequency offset has no effect on the orthogonality among the subcarriers, but it causes a circular shift and phase rotation of the received data symbols sequence, resulting in a Bit Error Rate(BER) of 0.5. In this paper,a novel integer frequency offset estimator for OFDM is derived based on maximum likelihood estimation technique and exploration of the differential relation between two consecutive OFDM data symbol sequences in frequency domain. Its performance is compared with the conventional method by computer simulations for the additive white Gaussian noise channel and a multipath fading channel. Simulation results show that the performance of the proposed estimator is better than the conventional estimator.
文摘We present a method of test generation for acyclic sequential circuits with hold registers. A complete (100% fault efficiency) test sequence for an acyclic sequential circuit can be obtained by applying a combinational test generator to all the maximal time-expansion models (TEMs) of the circuit. We propose a class of acyclic sequential circuits for which the number of maximal TEMs is one, i.e, the maximum TEM exists. For a circuit in the class, test generation can be performed by using only the maximum TEM. The proposed class of sequential circuits with the maximum TEM properly includes several known classes of acyclic sequential circuits such as balanced structures and acyclic sequential circuits without hold registers for which test generation can be also performed by using a combinational test generator. Therefore, in general, the hardware overhead for partial scan based on the proposed structure is smaller than that based on balanced or acyclic sequential structure without hold registers.