-
7T MRI Synthesization from 3T Acquisitions
Authors:
Qiming Cui,
Duygu Tosun,
Reza Abbasi-Asl
Abstract:
Supervised deep learning techniques can be used to generate synthetic 7T MRIs from 3T MRI inputs. This image enhancement process leverages the advantages of ultra-high-field MRI to improve the signal-to-noise and contrast-to-noise ratios of 3T acquisitions. In this paper, we introduce multiple novel 7T synthesization algorithms based on custom-designed variants of the V-Net convolutional neural ne…
▽ More
Supervised deep learning techniques can be used to generate synthetic 7T MRIs from 3T MRI inputs. This image enhancement process leverages the advantages of ultra-high-field MRI to improve the signal-to-noise and contrast-to-noise ratios of 3T acquisitions. In this paper, we introduce multiple novel 7T synthesization algorithms based on custom-designed variants of the V-Net convolutional neural network. We demonstrate that the V-Net based model has superior performance in enhancing both single-site and multi-site MRI datasets compared to the existing benchmark model. When trained on 3T-7T MRI pairs from 8 subjects with mild Traumatic Brain Injury (TBI), our model achieves state-of-the-art 7T synthesization performance. Compared to previous works, synthetic 7T images generated from our pipeline also display superior enhancement of pathological tissue. Additionally, we implement and test a data augmentation scheme for training models that are robust to variations in the input distribution. This allows synthetic 7T models to accommodate intra-scanner and inter-scanner variability in multisite datasets. On a harmonized dataset consisting of 18 3T-7T MRI pairs from two institutions, including both healthy subjects and those with mild TBI, our model maintains its performance and can generalize to 3T MRI inputs with lower resolution. Our findings demonstrate the promise of V-Net based models for MRI enhancement and offer a preliminary probe into improving the generalizability of synthetic 7T models with data augmentation.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications
Authors:
Yankai Rong,
Guoshun Nan,
Minwei Zhang,
Sihan Chen,
Songtao Wang,
Xuefei Zhang,
Nan Ma,
Shixun Gong,
Zhaohui Yang,
Qimei Cui,
Xiaofeng Tao,
Tony Q. S. Quek
Abstract:
Recently proliferated deep learning-based semantic communications (DLSC) focus on how transmitted symbols efficiently convey a desired meaning to the destination. However, the sensitivity of neural models and the openness of wireless channels cause the DLSC system to be extremely fragile to various malicious attacks. This inspires us to ask a question: "Can we further exploit the advantages of tra…
▽ More
Recently proliferated deep learning-based semantic communications (DLSC) focus on how transmitted symbols efficiently convey a desired meaning to the destination. However, the sensitivity of neural models and the openness of wireless channels cause the DLSC system to be extremely fragile to various malicious attacks. This inspires us to ask a question: "Can we further exploit the advantages of transmission efficiency in wireless semantic communications while also alleviating its security disadvantages?". Kee** this in mind, we propose SemEntropy, a novel method that answers the above question by exploring the semantics of data for both adaptive transmission and physical layer encryption. Specifically, we first introduce semantic entropy, which indicates the expectation of various semantic scores regarding the transmission goal of the DLSC. Equipped with such semantic entropy, we can dynamically assign informative semantics to Orthogonal Frequency Division Multiplexing (OFDM) subcarriers with better channel conditions in a fine-grained manner. We also use the entropy to guide semantic key generation to safeguard communications over open wireless channels. By doing so, both transmission efficiency and channel security can be simultaneously improved. Extensive experiments over various benchmarks show the effectiveness of the proposed SemEntropy. We discuss the reason why our proposed method benefits secure transmission of DLSC, and also give some interesting findings, e.g., SemEntropy can keep the semantic accuracy remain 95% with 60% less transmission.
△ Less
Submitted 6 February, 2024; v1 submitted 5 February, 2024;
originally announced February 2024.
-
UAV-Aided Lifelong Learning for AoI and Energy Optimization in Non-Stationary IoT Networks
Authors:
Zhenzhen Gong,
Omar Hashash,
Yingze Wang,
Qimei Cui,
Wei Ni,
Walid Saad,
Kei Sakaguchi
Abstract:
In this paper, a novel joint energy and age of information (AoI) optimization framework for IoT devices in a non-stationary environment is presented. In particular, IoT devices that are distributed in the real-world are required to efficiently utilize their computing resources so as to balance the freshness of their data and their energy consumption. To optimize the performance of IoT devices in s…
▽ More
In this paper, a novel joint energy and age of information (AoI) optimization framework for IoT devices in a non-stationary environment is presented. In particular, IoT devices that are distributed in the real-world are required to efficiently utilize their computing resources so as to balance the freshness of their data and their energy consumption. To optimize the performance of IoT devices in such a dynamic setting, a novel lifelong reinforcement learning (RL) solution that enables IoT devices to continuously adapt their policies to each newly encountered environment is proposed. Given that IoT devices have limited energy and computing resources, an unmanned aerial vehicle (UAV) is leveraged to visit the IoT devices and update the policy of each device sequentially. As such, the UAV is exploited as a mobile learning agent that can learn a shared knowledge base with a feature base in its training phase, and feature sets of a zero-shot learning method in its testing phase, to generalize between the environments. To optimize the trajectory and flying velocity of the UAV, an actor-critic network is leveraged so as to minimize the UAV energy consumption. Simulation results show that the proposed lifelong RL solution can outperform the state-of-art benchmarks by enhancing the balanced cost of IoT devices by $8.3\%$ when incorporating warm-start policies for unseen environments. In addition, our solution achieves up to $49.38\%$ reduction in terms of energy consumption by the UAV in comparison to the random flying strategy.
△ Less
Submitted 30 November, 2023;
originally announced December 2023.
-
Cross-Entropy-Based Approach to Multi-Objective Electric Vehicle Charging Infrastructure Planning
Authors:
**hao Li,
Yu Hui Yuan,
Qiushi Cui,
Hao Wang
Abstract:
Pure electric vehicles (PEVs) are increasingly adopted to decarbonize the transport sector and mitigate global warming. However, the inadequate PEV charging infrastructure may hinder the further adoption of PEVs in the large-scale traffic network, which calls for effective planning solutions for the charging station (CS) placement. The deployment of charging infrastructure inevitably increases the…
▽ More
Pure electric vehicles (PEVs) are increasingly adopted to decarbonize the transport sector and mitigate global warming. However, the inadequate PEV charging infrastructure may hinder the further adoption of PEVs in the large-scale traffic network, which calls for effective planning solutions for the charging station (CS) placement. The deployment of charging infrastructure inevitably increases the load on the associated power distribution network. Therefore, we are motivated to develop a comprehensive multi-objective framework for optimal CS placement in a traffic network overlaid by a distribution network, considering multiple stakeholders' interested factors, such as traffic flow, PEV charging time cost, PEV travel distance, and the reliability of the distribution network. We leverage a cross-entropy-based method to solve the optimal CS placement and evaluate our method in a real-world 183-node traffic network in Chengdu, China, overlaid by a 26-region distribution network. It is demonstrated that our work provides various viable planning options favoring different objectives for the stakeholders' decision-making in practice.
△ Less
Submitted 27 August, 2023;
originally announced August 2023.
-
Physical-layer Adversarial Robustness for Deep Learning-based Semantic Communications
Authors:
Guoshun Nan,
Zhichun Li,
**li Zhai,
Qimei Cui,
Gong Chen,
Xin Du,
Xuefei Zhang,
Xiaofeng Tao,
Zhu Han,
Tony Q. S. Quek
Abstract:
End-to-end semantic communications (ESC) rely on deep neural networks (DNN) to boost communication efficiency by only transmitting the semantics of data, showing great potential for high-demand mobile applications. We argue that central to the success of ESC is the robust interpretation of conveyed semantics at the receiver side, especially for security-critical applications such as automatic driv…
▽ More
End-to-end semantic communications (ESC) rely on deep neural networks (DNN) to boost communication efficiency by only transmitting the semantics of data, showing great potential for high-demand mobile applications. We argue that central to the success of ESC is the robust interpretation of conveyed semantics at the receiver side, especially for security-critical applications such as automatic driving and smart healthcare. However, robustifying semantic interpretation is challenging as ESC is extremely vulnerable to physical-layer adversarial attacks due to the openness of wireless channels and the fragileness of neural models. Toward ESC robustness in practice, we ask the following two questions: Q1: For attacks, is it possible to generate semantic-oriented physical-layer adversarial attacks that are imperceptible, input-agnostic and controllable? Q2: Can we develop a defense strategy against such semantic distortions and previously proposed adversaries? To this end, we first present MobileSC, a novel semantic communication framework that considers the computation and memory efficiency in wireless environments. Equipped with this framework, we propose SemAdv, a physical-layer adversarial perturbation generator that aims to craft semantic adversaries over the air with the abovementioned criteria, thus answering the Q1. To better characterize the realworld effects for robust training and evaluation, we further introduce a novel adversarial training method SemMixed to harden the ESC against SemAdv attacks and existing strong threats, thus answering the Q2. Extensive experiments on three public benchmarks verify the effectiveness of our proposed methods against various physical adversarial attacks. We also show some interesting findings, e.g., our MobileSC can even be more robust than classical block-wise communication systems in the low SNR regime.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications
Authors:
Zeju Li,
Xinghan Liu,
Guoshun Nan,
**fei Zhou,
Xinchen Lyu,
Qimei Cui,
Xiaofeng Tao
Abstract:
End-to-end semantic communication (ESC) system is able to improve communication efficiency by only transmitting the semantics of the input rather than raw bits. Although promising, ESC has also been shown susceptible to the crafted physical layer adversarial perturbations due to the openness of wireless channels and the sensitivity of neural models. Previous works focus more on the physical layer…
▽ More
End-to-end semantic communication (ESC) system is able to improve communication efficiency by only transmitting the semantics of the input rather than raw bits. Although promising, ESC has also been shown susceptible to the crafted physical layer adversarial perturbations due to the openness of wireless channels and the sensitivity of neural models. Previous works focus more on the physical layer white-box attacks, while the challenging black-box ones, as more practical adversaries in real-world cases, are still largely under-explored. To this end, we present SemBLK, a novel method that can learn to generate destructive physical layer semantic attacks for an ESC system under the black-box setting, where the adversaries are imperceptible to humans. Specifically, 1) we first introduce a surrogate semantic encoder and train its parameters by exploring a limited number of queries to an existing ESC system. 2) Equipped with such a surrogate encoder, we then propose a novel semantic perturbation generation method to learn to boost the physical layer attacks with semantic adversaries. Experiments on two public datasets show the effectiveness of our proposed SemBLK in attacking the ESC system under the black-box setting. Finally, we provide case studies to visually justify the superiority of our physical layer semantic perturbations.
△ Less
Submitted 30 March, 2023; v1 submitted 29 March, 2023;
originally announced March 2023.
-
Design of the PID temperature controller for an alkaline electrolysis system with time delays
Authors:
Ruomei Qi,
Jiarong Li,
** Lin,
Yonghua Song,
Jiepeng Wang,
Qiangqiang Cui,
Yiwei Qiu,
Ming Tang,
Jian Wang
Abstract:
Electrolysis systems use proportional-integral-derivative (PID) temperature controllers to maintain stack temperatures around set points. However, heat transfer delays in electrolysis systems cause manual tuning of PID temperature controllers to be time-consuming, and temperature oscillations often occur. This paper focuses on the design of the PID temperature controller for an alkaline electrolys…
▽ More
Electrolysis systems use proportional-integral-derivative (PID) temperature controllers to maintain stack temperatures around set points. However, heat transfer delays in electrolysis systems cause manual tuning of PID temperature controllers to be time-consuming, and temperature oscillations often occur. This paper focuses on the design of the PID temperature controller for an alkaline electrolysis system to achieve fast and stable temperature control. A thermal dynamic model of an electrolysis system is established in the frequency-domain for controller designs. Based on this model, the temperature stability is analysed by the root distribution, and the PID parameters are optimized considering both the temperature overshoot and the settling time. The performance of the optimal PID controllers is verified through experiments. Furthermore, the simulation results show that the before-stack temperature should be used as the feedback variable for small lab-scale systems to suppress stack temperature fluctuations, and the after-stack temperature should be used for larger systems to improve the economy. This study is helpful in ensuring the temperature stability and control of electrolysis systems.
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
Thermal Modelling and Controller Design of an Alkaline Electrolysis System under Dynamic Operating Conditions
Authors:
Ruomei Qi,
Jiarong Li,
** Lin,
Yonghua Song,
Jiepeng Wang,
Qiangqiang Cui,
Yiwei Qiu,
Ming Tang,
Jian Wang
Abstract:
Thermal management is vital for the efficient and safe operation of alkaline electrolysis systems. Traditional alkaline electrolysis systems use simple proportional-integral-differentiation (PID) controllers to maintain the stack temperature near the rated value. However, in renewable-to-hydrogen scenarios, the stack temperature is disturbed by load fluctuations, and the temperature overshoot phen…
▽ More
Thermal management is vital for the efficient and safe operation of alkaline electrolysis systems. Traditional alkaline electrolysis systems use simple proportional-integral-differentiation (PID) controllers to maintain the stack temperature near the rated value. However, in renewable-to-hydrogen scenarios, the stack temperature is disturbed by load fluctuations, and the temperature overshoot phenomenon occurs which can exceed the upper limit and harm the stack. This paper focuses on the thermal modelling and controller design of an alkaline electrolysis system under dynamic operating conditions. A control-oriented thermal model is established in the form of a third-order time-delay process, which is used for simulation and controller design. Based on this model, we propose two novel controllers to reduce temperature overshoot: one is a current feed-forward PID controller (PID-I), the other is a model predictive controller (MPC). Their performances are tested on a lab-scale system and the experimental results are satisfying: the temperature overshoot is reduced by 2.2 degree with the PID-I controller, and no obvious overshoot is observed with the MPC controller. Furthermore, the thermal dynamic performance of an MW-scale alkaline electrolysis system is analyzed by simulation, which shows that the temperature overshoot phenomenon is more general in large systems. The proposed method allows for higher temperature set points which can improve system efficiency by 1%.
△ Less
Submitted 27 February, 2022;
originally announced February 2022.
-
A layer-stress learning framework universally augments deep neural network tasks
Authors:
Shihao Shao,
Yong Liu,
Qinghua Cui
Abstract:
Deep neural networks (DNN) such as Multi-Layer Perception (MLP) and Convolutional Neural Networks (CNN) represent one of the most established deep learning algorithms. Given the tremendous effects of the number of hidden layers on network architecture and performance, it is very important to choose the number of hidden layers but still a serious challenge. More importantly, the current network arc…
▽ More
Deep neural networks (DNN) such as Multi-Layer Perception (MLP) and Convolutional Neural Networks (CNN) represent one of the most established deep learning algorithms. Given the tremendous effects of the number of hidden layers on network architecture and performance, it is very important to choose the number of hidden layers but still a serious challenge. More importantly, the current network architectures can only process the information from the last layer of the feature extractor, which greatly limited us to further improve its performance. Here we presented a layer-stress deep learning framework (x-NN) which implemented automatic and wise depth decision on shallow or deep feature map in a deep network through firstly designing enough number of layers and then trading off them by Multi-Head Attention Block. The x-NN can make use of features from various depth layers through attention allocation and then help to make final decision as well. As a result, x-NN showed outstanding prediction ability in the Alzheimer's Disease Classification Technique Challenge PRCV 2021, in which it won the top laurel and outperformed all other AI models. Moreover, the performance of x-NN was verified by one more AD neuroimaging dataset and other AI tasks.
△ Less
Submitted 14 November, 2021;
originally announced November 2021.
-
Generalizing Fault Detection Against Domain Shifts Using Stratification-Aware Cross-Validation
Authors:
Yingshui Tan,
Baihong **,
Qiushi Cui,
Xiangyu Yue,
Alberto Sangiovanni Vincentelli
Abstract:
Incipient anomalies present milder symptoms compared to severe ones, and are more difficult to detect and diagnose due to their close resemblance to normal operating conditions. The lack of incipient anomaly examples in the training data can pose severe risks to anomaly detection methods that are built upon Machine Learning (ML) techniques, because these anomalies can be easily mistaken as normal…
▽ More
Incipient anomalies present milder symptoms compared to severe ones, and are more difficult to detect and diagnose due to their close resemblance to normal operating conditions. The lack of incipient anomaly examples in the training data can pose severe risks to anomaly detection methods that are built upon Machine Learning (ML) techniques, because these anomalies can be easily mistaken as normal operating conditions. To address this challenge, we propose to utilize the uncertainty information available from ensemble learning to identify potential misclassified incipient anomalies. We show in this paper that ensemble learning methods can give improved performance on incipient anomalies and identify common pitfalls in these models through extensive experiments on two real-world datasets. Then, we discuss how to design more effective ensemble models for detecting incipient anomalies.
△ Less
Submitted 19 August, 2020;
originally announced August 2020.
-
Synchronous locating and imaging behind scattering medium in a large depth based on deep learning
Authors:
Shuo Zhu,
Enlai Guo,
Qianying Cui,
Dongliang Zheng,
Lianfa Bai,
**g Han
Abstract:
Scattering medium brings great difficulties to locate and image planar objects especially when the object has a large depth. In this letter, a novel learning-based method is presented to locate and image the object hidden behind a thin scattering diffuser. A multi-task network, named DINet, is constructed to predict the depth and the image of the hidden object from the captured speckle patterns. T…
▽ More
Scattering medium brings great difficulties to locate and image planar objects especially when the object has a large depth. In this letter, a novel learning-based method is presented to locate and image the object hidden behind a thin scattering diffuser. A multi-task network, named DINet, is constructed to predict the depth and the image of the hidden object from the captured speckle patterns. The provided experiments verify that the proposed method enables to locate the object with a depth mean error less than 0.05 mm, and image the object with an average PSNR above 24 dB, in a large depth ranging from 350 mm to 1150 mm. The constructed DINet can obtain multiple physical information via a single speckle pattern, including both the depth and image. Comparing with the traditional methods, it paves the way to the practical applications requiring large imaging depth of field behind scattering media.
△ Less
Submitted 29 May, 2020; v1 submitted 25 October, 2019;
originally announced October 2019.
-
Electric Vehicle Charging Station Placement Method for Urban Areas
Authors:
Qiushi Cui,
Yang Weng,
Chin-Woo Tan
Abstract:
For accommodating more electric vehicles (EVs) to battle against fossil fuel emission, the problem of charging station placement is inevitable and could be costly if done improperly. Some researches consider a general setup, using conditions such as driving ranges for planning. However, most of the EV growths in the next decades will happen in the urban area, where driving ranges is not the bigges…
▽ More
For accommodating more electric vehicles (EVs) to battle against fossil fuel emission, the problem of charging station placement is inevitable and could be costly if done improperly. Some researches consider a general setup, using conditions such as driving ranges for planning. However, most of the EV growths in the next decades will happen in the urban area, where driving ranges is not the biggest concern. For such a need, we consider several practical aspects of urban systems, such as voltage regulation cost and protection device upgrade resulting from the large integration of EVs. Notably, our diversified objective can reveal the trade-off between different factors in different cities worldwide. To understand the global optimum of large-scale analysis, we add constraint one-by-one to see how to preserve the problem convexity. Our sensitivity analysis before and after convexification shows that our approach is not only universally applicable but also has a small approximation error for prioritizing the most urgent constraint in a specific setup. Finally, numerical results demonstrate the trade-off, the relationship between different factors and the global objective, and the small approximation error. A unique observation in this study shows the importance of incorporating the protection device upgrade in urban system planning on charging stations.
△ Less
Submitted 29 August, 2018;
originally announced August 2018.
-
A Feature Selection Method for High Impedance Fault Detection
Authors:
Qiushi Cui,
Khalil El-Arroudi,
Yang Weng
Abstract:
High impedance fault (HIF) has been a challenging task to detect in distribution networks. On one hand, although several types of HIF models are available for HIF study, they are still not exhibiting satisfactory fault waveforms. On the other hand, utilizing historical data has been a trend recently for using machine learning methods to improve HIF detection. Nonetheless, most proposed methodologi…
▽ More
High impedance fault (HIF) has been a challenging task to detect in distribution networks. On one hand, although several types of HIF models are available for HIF study, they are still not exhibiting satisfactory fault waveforms. On the other hand, utilizing historical data has been a trend recently for using machine learning methods to improve HIF detection. Nonetheless, most proposed methodologies address the HIF issue starting with investigating a limited group of features and can hardly provide a practical and implementable solution. This paper, however, proposes a systematic design of feature extraction, based on an HIF detection and classification method. For example, features are extracted according to when, how long, and what magnitude the fault events create. Complementary power expert information is also integrated into the feature pools. Subsequently, we propose a ranking procedure in the feature pool for balancing the information gain and the complexity to avoid over-fitting. For implementing the framework, we create an HIF detection logic from a practical perspective. Numerical methods show the proposed HIF detector has very high dependability and security performance under multiple fault scenarios comparing with other traditional methods.
△ Less
Submitted 13 August, 2018;
originally announced August 2018.
-
Electronics of Time-of-flight Measurement for Back-n at CSNS
Authors:
T. Yu,
P. Cao,
X. Y. Ji,
L. K. Xie,
X. R. Huang,
Q. An,
H. Y. Bai,
J. Bao,
Y. H. Chen,
P. J. Cheng,
Z. Q. Cui,
R. R. Fan,
C. Q. Feng,
M. H. Gu,
Z. J. Han,
G. Z. He,
Y. C. He,
Y. F. He,
H. X. Huang,
W. L. Huang,
X. L. Ji,
H. Y. Jiang,
W. Jiang,
H. Y. **g,
L. Kang
, et al. (46 additional authors not shown)
Abstract:
Back-n is a white neutron experimental facility at China Spallation Neutron Source (CSNS). The time structure of the primary proton beam make it fully applicable to use TOF (time-of-flight) method for neutron energy measuring. We implement the electronics of TOF measurement on the general-purpose readout electronics designed for all of the seven detectors in Back-n. The electronics is based on PXI…
▽ More
Back-n is a white neutron experimental facility at China Spallation Neutron Source (CSNS). The time structure of the primary proton beam make it fully applicable to use TOF (time-of-flight) method for neutron energy measuring. We implement the electronics of TOF measurement on the general-purpose readout electronics designed for all of the seven detectors in Back-n. The electronics is based on PXIe (Peripheral Component Interconnect Express eXtensions for Instrumentation) platform, which is composed of FDM (Field Digitizer Modules), TCM (Trigger and Clock Module), and SCM (Signal Conditioning Module). T0 signal synchronous to the CSNS accelerator represents the neutron emission from the target. It is the start of time stamp. The trigger and clock module (TCM) receives, synchronizes and distributes the T0 signal to each FDM based on the PXIe backplane bus. Meantime, detector signals after being conditioned are fed into FDMs for waveform digitizing. First sample point of the signal is the stop of time stamp. According to the start, stop time stamp and the time of signal over threshold, the total TOF can be obtained. FPGA-based (Field Programmable Gate Array) TDC is implemented on TCM to accurately acquire the time interval between the asynchronous T0 signal and the global synchronous clock phase. There is also an FPGA-based TDC on FDM to accurately acquire the time interval between T0 arriving at FDM and the first sample point of the detector signal, the over threshold time of signal is obtained offline. This method for TOF measurement is efficient and not needed for additional modules. Test result shows the accuracy of TOF is sub-nanosecond and can meet the requirement for Back-n at CSNS.
△ Less
Submitted 24 June, 2018;
originally announced June 2018.
-
T0 Fan-out for Back-n White Neutron Facility at CSNS
Authors:
X. Y. Ji,
P. Cao,
T. Yu,
L. K. Xie,
X. R. Huang,
Q. An,
H. Y. Bai,
J. Bao,
Y. H. Chen,
P. J. Cheng,
Z. Q. Cui,
R. R. Fan,
C. Q. Feng,
M. H. Gu,
Z. J. Han,
G. Z. He,
Y. C. He,
Y. F. He,
H. X. Huang,
W. L. Huang,
X. L. Ji,
H. Y. Jiang,
W. Jiang,
H. Y. **g,
L. Kang
, et al. (46 additional authors not shown)
Abstract:
the main physics goal for Back-n white neutron facility at China Spallation Neutron Source (CSNS) is to measure nuclear data. The energy of neutrons is one of the most important parameters for measuring nuclear data. Method of time of flight (TOF) is used to obtain the energy of neutrons. The time when proton bunches hit the thick tungsten target is considered as the start point of TOF. T0 signal,…
▽ More
the main physics goal for Back-n white neutron facility at China Spallation Neutron Source (CSNS) is to measure nuclear data. The energy of neutrons is one of the most important parameters for measuring nuclear data. Method of time of flight (TOF) is used to obtain the energy of neutrons. The time when proton bunches hit the thick tungsten target is considered as the start point of TOF. T0 signal, generated from the CSNS accelerator, represents this start time. Besides, the T0 signal is also used as the gate control signal that triggers the readout electronics. Obviously, the timing precision of T0 directly affects the measurement precision of TOF and controls the running or readout electronics. In this paper, the T0 fan-out for Back-n white neutron facility at CSNS is proposed. The T0 signal travelling from the CSNS accelerator is fanned out to the two underground experiment stations respectively over long cables. To guarantee the timing precision, T0 signal is conditioned with good signal edge. Furthermore, techniques of signal pre-emphasizing and equalizing are used to improve signal quality after T0 being transmitted over long cables with about 100 m length. Experiments show that the T0 fan-out works well, the T0 signal transmitted over 100 m remains a good time resolution with a standard deviation of 25 ps. It absolutely meets the required accuracy of the measurement of TOF.
△ Less
Submitted 24 June, 2018;
originally announced June 2018.
-
Energy-Efficient Transmission of Hybrid Array with Non-Ideal Power Amplifiers and Circuitry
Authors:
Yuhao Zhang,
Qimei Cui,
Wei Ni,
** Zhang
Abstract:
This paper presents a new approach to efficiently maximizing the energy efficiency (EE) of hybrid arrays under a practical setting of non-ideal power amplifiers (PAs) and non-negligible circuit power, where coherent and non-coherent beamforming are considered. As a key contribution, we reveal that a bursty transmission mode can be energy-efficient to achieve steady transmissions of a data stream u…
▽ More
This paper presents a new approach to efficiently maximizing the energy efficiency (EE) of hybrid arrays under a practical setting of non-ideal power amplifiers (PAs) and non-negligible circuit power, where coherent and non-coherent beamforming are considered. As a key contribution, we reveal that a bursty transmission mode can be energy-efficient to achieve steady transmissions of a data stream under the practical setting. This is distinctively different from existing studies under ideal circuits and PAs, where continuous transmissions are the most energy-efficient. Another important contribution is that the optimal transmit duration and powers are identified to balance energy consumptions in the non-ideal circuits and PAs, and maximize the EE. This is achieved by establishing the most energy-efficient structure of transmit powers, given a transmit duration, and correspondingly partitioning the non-convex feasible region of the transmit duration into segments with self-contained convexity or concavity. Evident from simulations, significant EE gains of the proposed approach are demonstrated through comparisons with the state of the art, and the superiority of the bursty transmission mode is confirmed especially under low data rate demands.
△ Less
Submitted 29 March, 2018;
originally announced March 2018.
-
Use of Two-Mode Circuitry and Optimal Energy-Efficient Power Control Under Target Delay-Outage Constraints
Authors:
**kun Xu,
Yu Chen,
Hao Chen,
Qimei Cui,
Xiaofeng Tao
Abstract:
An accurate energy efficiency analytical model based on a two-mode circuitry was recently proposed; and the model showed that the use of this circuitry can significantly improve a system's energy efficiency. In this paper, we use this analytical model to develop a new power control scheme, a scheme that is capable of allocating a minimum transmission power precisely within the delay-outage probabi…
▽ More
An accurate energy efficiency analytical model based on a two-mode circuitry was recently proposed; and the model showed that the use of this circuitry can significantly improve a system's energy efficiency. In this paper, we use this analytical model to develop a new power control scheme, a scheme that is capable of allocating a minimum transmission power precisely within the delay-outage probability constraint. Precision brings substantial benefits as numerical results show that the energy efficiency using our scheme is much higher than other schemes. Results further suggest that data rate values affect energy efficiency non-uniformly, i.e., there exists a specific data rate value that achieves maximum energy efficiency.
△ Less
Submitted 27 February, 2018;
originally announced February 2018.
-
User Association for Offloading in Heterogeneous Network Based on Matern Cluster Process
Authors:
Yuxuan Xie,
Xuefei Zhang,
Qimei Cui,
Yanyan Lu
Abstract:
Future mobile networks are converging toward heterogeneous multi-tier networks, where various classes of base stations (BS) are deployed based on user demand. So it is quite necessary to utilize the BSs resources rationally when BSs are sufficient. In this paper, we develop a more realistic model that fully considering the inter-tier dependence and the dependence between users and BSs, where the m…
▽ More
Future mobile networks are converging toward heterogeneous multi-tier networks, where various classes of base stations (BS) are deployed based on user demand. So it is quite necessary to utilize the BSs resources rationally when BSs are sufficient. In this paper, we develop a more realistic model that fully considering the inter-tier dependence and the dependence between users and BSs, where the macro base stations (MBSs) are distributed according to a homogeneous Poisson point process (PPP) and the small base stations (SBSs) follows a Matern cluster process (MCP) whose parent points are located in the positions of the MBSs in order to offload the users from the over-loaded MBSs. We also assume the users are just randomly located in the circles centered at the MBSs. Under this model, we derive the association probability and the average ergodic rate by stochastic geometry. An interesting result that the density of MBS and the radius of the clusters jointly affect the association probabilities in a joint form is obtained. We also observe that using the clustered SBSs results in aggressive offloading compared with previous cellular networks.
△ Less
Submitted 26 February, 2018;
originally announced February 2018.
-
Energy-aware Adaptive Spectrum Access and Power Allocation in LAA Networks via Lyapunov Optimization
Authors:
Yu Gu,
Qimei Cui,
Yue Wang,
Somayeh Soleimani
Abstract:
To relieve the traffic burden and improve the system capacity, licensed-assisted access (LAA) has been becoming a promising technology to the supplementary utilization of the unlicensed spectrum. However, due to the densification of small base stations (SBSs) and the dynamic variety of the number of Wi-Fi nodes in the overlap** areas, the licensed channel interference and the unlicensed channel…
▽ More
To relieve the traffic burden and improve the system capacity, licensed-assisted access (LAA) has been becoming a promising technology to the supplementary utilization of the unlicensed spectrum. However, due to the densification of small base stations (SBSs) and the dynamic variety of the number of Wi-Fi nodes in the overlap** areas, the licensed channel interference and the unlicensed channel collision could seriously influence the Quality of Service (QoS) and the energy consumption. In this paper, jointly considering time-variant wireless channel conditions, dynamic traffic loads, and random numbers of Wi-Fi nodes, we address an adaptive spectrum access and power allocation problem that enables minimizing the system power consumption under a certain queue stability constraint in the LAA-enabled SBSs and Wi-Fi networks. The complex stochastic optimization problem is rewritten as the difference of two convex (D.C.) program in the framework of Lyapunov optimization, thus develo** an online energy-aware optimal algorithm. We also characterize the performance bounds of the proposed algorithm with a tradeoff of [O(1=V ); O(V )] between power consumption and delay theoretically. The numerical results verify the tradeoff and show that our scheme can reduce the power consumption over the existing scheme by up to 72.1% under the same traffic delay.
△ Less
Submitted 6 February, 2018;
originally announced February 2018.
-
Optimal Pilot Symbols Ratio in terms of Spectrum and Energy Efficiency in Uplink CoMP Networks
Authors:
Yuhao Zhang,
Qimei Cui,
Ning Wang
Abstract:
In wireless networks, Spectrum Efficiency (SE) and Energy Efficiency (EE) can be affected by the channel estimation that needs to be well designed in practice. In this paper, considering channel estimation error and non-ideal backhaul links, we optimize the pilot symbols ratio in terms of SE and EE in uplink Coordinated Multi-point (CoMP) networks. Modeling the channel estimation error, we formula…
▽ More
In wireless networks, Spectrum Efficiency (SE) and Energy Efficiency (EE) can be affected by the channel estimation that needs to be well designed in practice. In this paper, considering channel estimation error and non-ideal backhaul links, we optimize the pilot symbols ratio in terms of SE and EE in uplink Coordinated Multi-point (CoMP) networks. Modeling the channel estimation error, we formulate the SE and EE maximization problems by analyzing the system capacity with imperfect channel estimation. The maximal system capacity in SE optimization and the minimal transmit power in EE optimization, which both have the closed-form expressions, are derived by some reasonable approximations to reduce the complexity of solving complicated equations. Simulations are carried out to validate the superiority of our scheme, verify the accuracy of our approximation, and show the effect of pilot symbols ratio.
△ Less
Submitted 4 January, 2018;
originally announced January 2018.