1,687 research outputs found
A novel scheduling algorithm to maximize the D2D spatial reuse in LTE networks
In order to offload base station (BS) traffic and to enhance efficiency of spectrum, operators can activate many Device-to-Device (D2D) pairs or links in LTE networks. This increases the overall spectral efficiency because the same Resource Blocks (RBs) are used across cellular UEs (CUEs) (i.e., all UEs connected to BS for both C-Plane and D-plane communication) and D2D links (i.e., where the UEs are connected to BS only for C-plane communication). However, significant interference problems can be caused by D2D communications as the same RBs are being shared. In our work, we address this problem by proposing a novel scheduling algorithm, Efficient Scheduling and Power control Algorithm for D2Ds (ESPAD), which reuses the same RBs and tries to maximize the overall network throughput without affecting the CUEs throughput. ESPAD algorithm also ensures that Signal to Noise plus Interference Ratio (SINR) for each of the D2D links is maintained above a certain predefined threshold. The aforementioned properties of ESPAD algorithm makes sure that the CUEs do not experience very high interference from the D2Ds. It is observed that even when the SINRdrop (i.e., maximum permissible drop in SINR of CUEs) is as high as 10 dB, there is no drastic decrease in CUEs throughput (only 3.78%). We also compare our algorithm against other algorithms and show that D2D throughput improves drastically without undermining CUEs throughput
Temperature induced shell effects in deformed nuclei
The thermal evolution of the shell correction energy is investigated for
deformed nuclei using Strutinsky prescription in a self-consistent relativistic
mean-field framework. For temperature independent single-particle states
corresponding to either spherical or deformed nuclear shapes, the shell
correction energy steadily washes out with temperature. However,
for states pertaining to the self-consistent thermally evolving shapes of
deformed nuclei, the dual role played by the single-particle occupancies in
diluting the fluctuation effects from the single-particle spectra and in
driving the system towards a smaller deformation is crucial in determining
at moderate temperatures. In rare earth nuclei, it is found that
builds up strongly around the shape transition temperature; for
lighter deformed nuclei like and , this is relatively less
prominent.Comment: 6 pages revtex file + 4 ps files for figures, Phys. Rev. C (in press
Light-particle emission from the fissioning nuclei 126Ba, 188Pt and (266,272,278)/110: theoretical predictions and experimental results
We present a comparison of our model treating fission dynamics in conjunction
with light-particle (n, p, alpha) evaporation with the available experimental
data for the nuclei 126Ba, 188Pt and three isotopes of the element Z=110. The
dynamics of the symmetric fission process is described through the solution of
a classical Langevin equation for a single collective variable characterizing
the nuclear deformation along the fission path. A microscopic approach is used
to evaluate the emission rates for pre-fission light particles.
Entrance-channel effects are taken into account by generating an initial spin
distribution of the compound nucleus formed by the fusion of two deformed
nuclei with different relative orientations
Systematics of Inclusive Photon Production in 158 AGeV Pb Induced Reactions on Ni, Nb, and Pb Targets
The multiplicity of inclusive photons has been measured on an event-by-event
basis for 158 AGeV Pb induced reactions on Ni, Nb, and Pb targets. The
systematics of the pseudorapidity densities at midrapidity (rho_max) and the
width of the pseudorapidity distributions have been studied for varying
centralities for these collisions. A power law fit to the photon yield as a
function of the number of participating nucleons gives a value of 1.13+-0.03
for the exponent. The mean transverse momentum, , of photons determined
from the ratio of the measured electromagnetic transverse energy and photon
multiplicity, remains almost constant with increasing rho_max. Results are
compared with model predictions.Comment: 16 pages including 4 figure
How deliberate, spontaneous and unwanted memories emerge in a computational model of consciousness
“And as soon as I had recognized the taste of the piece of madeleine soaked in her decoction of lime-blossom which my aunt used to give me ... immediately the old grey house upon the street, where her room was, rose up like a stage set to attach itself to the little pavilion opening on to the garden which had been built out behind it for my parents ...; and with the house the town, from morning to night and in all weathers, the Square where I used to be sent before lunch, the streets along which I used to run errands, the country roads we took when it was fine ...”\ud
\ud
---Marcel Proust, Remembrance of Times Past ()\ud
\ud
In these words the novelist Marcel Proust described a flood of unbidden memories evoked by the taste of what must be the most famous cookie in the world, Proust’s madeleine soaked in lime-blossom tea. It is of course an experience of spontaneous recall. Judging by numerous thought-monitoring studies, spontaneous recall is the norm in everyday thought. But because it is more difficult to study experimentally than deliberate recall, we know much less about it.\ud
\ud
\ud
In this chapter we describe how a current theory of conscious cognition, global workspace theory, leads naturally to a model of both deliberate and spontaneous recall. Deliberate recall is intended; spontaneous memories are not. They can be divided into two categories:\ud
\ud
1. acceptable spontaneous recall (ASR), like Proust’s famous rush of memories evoked by the taste of the madeleine. Such memories are interesting or pleasant or at least tolerable;\ud
2. unwanted spontaneous recall (USR), such as painful traumatic events, an annoying recurrent melody, or a the memory of an unresolved argument with a loved one.\ud
\ud
We therefore have three categories altogether, deliberate recall (DR), spontaneous recall that is acceptable (ASR) and unwanted spontaneous recall (USR).\ud
\ud
A large-scale computational model of global workspace theory called IDA has been developed by Franklin and co-authors (Franklin et al, 2005). IDA allows the detailed modeling of GW theory, together with other well-studied cognitive mechanisms, in challenging real-world tasks (Franklin et al, 1998; Franklin and Grasser 2001; Franklin 2001a; Ramamurthy et al, 2003, 2004; Franklin et al, 2005). This chapter will only focus on the question of consciousness and voluntary control as they apply to recall. Because IDA is able to simulate human functioning in at least one type of highly trained expertise, our approach here is to furnish a working proof of principle, showing that the basic computational mechanisms are adequate to generate human-like cognitive functioning in a real-world task. No added theoretical constructs are needed to show three kinds of recall we discuss here: deliberate, spontaneous and unwanted. They emerge directly from the original model.\ud
\ud
Unwanted memories are important in post-traumatic “flashbacks,” as reported in the clinical literature. While there is controversy about the accuracy of claimed memories, for example, there is little debate that repetitive thoughts and fragments of memories can occur. Wegner has been able to evoke unwanted words in an “ironic recall” paradigm, that is, an experimental method in which subjects are asked not to think of some category of ideas, such as white bears or pink elephants (1994). Unwanted memories can be annoying, or in the case of obsessional thinking, they may become disabling. In everyday life, one can simply ask people to bring to mind an intensely embarrassing personal memory, which can be quite uncomfortable. A number of clinical categories (the Axis I disorders) involve unwanted thoughts, feelings, actions, or memories. These conditions are at the more dysfunctional pole of unwanted mental events, and the study of unwanted memories may help provide some insight into them
Mining the Web Data for Classifying and Predicting Users’ Requests
Consumers are the most important asset of any organization. The commercial activity of an organization booms with the presence of a loyal customer who is visibly content with the product and services being offered. In a dynamic market, understanding variations in client’s behavior can help executives establish operative promotional campaigns. A good number of new consumers are frequently picked up by traders during promotions. Though, several of these engrossed consumers are one-time deal seekers, the promotions undeniably leave a positive impact on sales. It is crucial for traders to identify who can be converted to loyal consumer and then have them patronize products and services to reduce the promotion cost and increase the return on investments. This study integrates a classifier that allows prediction of the type of purchase that a customer would make, as well as the number of visits that he/she would make during a year. The proposed model also creates outlines of users and brands or items used by them. These outlines may not be useful only for this particular prediction task, but could also be used for other important tasks in e-commerce, such as client segmentation, product recommendation and client base growth for brands
Multiplicity Distributions and Charged-neutral Fluctuations
Results from the multiplicity distributions of inclusive photons and charged
particles, scaling of particle multiplicities, event-by-event multiplicity
fluctuations, and charged-neutral fluctuations in 158 GeV Pb+Pb
collisions are presented and discussed. A scaling of charged particle
multiplicity as and photons as have been observed, indicating violation of naive wounded nucleon model.
The analysis of localized charged-neutral fluctuation indicates a
model-independent demonstration of non-statistical fluctuations in both charged
particles and photons in limited azimuthal regions. However, no correlated
charged-neutral fluctuations are observed.Comment: Talk given at the International Symposium on Nuclear Physics
(ISNP-2000), Mumbai, India, 18-22 Dec 2000, Proceedings to be published in
Pramana, Journal of Physic
Central Pb+Pb Collisions at 158 A GeV/c Studied by Pion-Pion Interferometry
Two-particle correlations have been measured for identified negative pions
from central 158 AGeV Pb+Pb collisions and fitted radii of about 7 fm in all
dimensions have been obtained. A multi-dimensional study of the radii as a
function of kT is presented, including a full correction for the resolution
effects of the apparatus. The cross term Rout-long of the standard fit in the
Longitudinally CoMoving System (LCMS) and the vl parameter of the generalised
Yano-Koonin fit are compatible with 0, suggesting that the source undergoes a
boost invariant expansion. The shapes of the correlation functions in Qinv and
Qspace have been analyzed in detail. They are not Gaussian but better
represented by exponentials. As a consequence, fitting Gaussians to these
correlation functions may produce different radii depending on the acceptance
of the experimental setup used for the measurement.Comment: 13 pages including 10 figure
Methods and Costs to Achieve Ultra Reliable Life Support
A published Mars mission is used to explore the methods and costs to achieve ultra reliable life support. The Mars mission and its recycling life support design are described. The life support systems were made triply redundant, implying that each individual system will have fairly good reliability. Ultra reliable life support is needed for Mars and other long, distant missions. Current systems apparently have insufficient reliability. The life cycle cost of the Mars life support system is estimated. Reliability can be increased by improving the intrinsic system reliability, adding spare parts, or by providing technically diverse redundant systems. The costs of these approaches are estimated. Adding spares is least costly but may be defeated by common cause failures. Using two technically diverse systems is effective but doubles the life cycle cost. Achieving ultra reliability is worth its high cost because the penalty for failure is very high
- …
