120 resultados para spectrum leakage


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper considers the problem of spectrum sensing in cognitive radio networks when the primary user is using Orthogonal Frequency Division Multiplexing (OFDM). For this we develop cooperative sequential detection algorithms that use the autocorrelation property of cyclic prefix (CP) used in OFDM systems. We study the effect of timing and frequency offset, IQ-imbalance and uncertainty in noise and transmit power. We also modify the detector to mitigate the effects of these impairments. The performance of the proposed algorithms is studied via simulations. We show that sequential detection can significantly improve the performance over a fixed sample size detector.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider a framework in which several service providers offer downlink wireless data access service in a certain area. Each provider serves its end-users through opportunistic secondary spectrum access of licensed spectrum, and needs to pay primary license holders of the spectrum usage based and membership based charges for such secondary spectrum access. In these circumstances, if providers pool their resources and allow end-users to be served by any of the cooperating providers, the total user satisfaction as well as the aggregate revenue earned by providers may increase. We use coalitional game theory to investigate such cooperation among providers, and show that the optimal cooperation schemes can be obtained as solutions of convex optimizations. We next show that under usage based charging scheme, if all providers cooperate, there always exists an operating point that maximizes the aggregate revenue of providers, while presenting each provider a share of the revenue such that no subset of providers has an incentive to leave the coalition. Furthermore, such an operating point can be computed in polynomial time. Finally, we show that when the charging scheme involves membership based charges, the above result holds in important special cases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider a setting in which several operators offer downlink wireless data access services in a certain geographical region. Each operator deploys several base stations or access points, and registers some subscribers. In such a situation, if operators pool their infrastructure, and permit the possibility of subscribers being served by any of the cooperating operators, then there can be overall better user satisfaction, and increased operator revenue. We use coalitional game theory to investigate such resource pooling and cooperation between operators.We use utility functions to model user satisfaction, and show that the resulting coalitional game has the property that if all operators cooperate (i.e., form a grand coalition) then there is an operating point that maximizes the sum utility over the operators while providing the operators revenues such that no subset of operators has an incentive to break away from the coalition. We investigate whether such operating points can result in utility unfairness between users of the various operators. We also study other revenue sharing concepts, namely, the nucleolus and the Shapely value. Such investigations throw light on criteria for operators to accept or reject subscribers, based on the service level agreements proposed by them. We also investigate the situation in which only certain subsets of operators may be willing to cooperate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With extensive use of dynamic voltage scaling (DVS) there is increasing need for voltage scalable models. Similarly, leakage being very sensitive to temperature motivates the need for a temperature scalable model as well. We characterize standard cell libraries for statistical leakage analysis based on models for transistor stacks. Modeling stacks has the advantage of using a single model across many gates there by reducing the number of models that need to be characterized. Our experiments on 15 different gates show that we needed only 23 models to predict the leakage across 126 input vector combinations. We investigate the use of neural networks for the combined PVT model, for the stacks, which can capture the effect of inter die, intra gate variations, supply voltage(0.6-1.2 V) and temperature (0 - 100degC) on leakage. Results show that neural network based stack models can predict the PDF of leakage current across supply voltage and temperature accurately with the average error in mean being less than 2% and that in standard deviation being less than 5% across a range of voltage, temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Technology scaling has caused Negative Bias Temperature Instability (NBTI) to emerge as a major circuit reliability concern. Simultaneously leakage power is becoming a greater fraction of the total power dissipated by logic circuits. As both NBTI and leakage power are highly dependent on vectors applied at the circuit’s inputs, they can be minimized by applying carefully chosen input vectors during periods when the circuit is in standby or idle mode. Unfortunately input vectors that minimize leakage power are not the ones that minimize NBTI degradation, so there is a need for a methodology to generate input vectors that minimize both of these variables.This paper proposes such a systematic methodology for the generation of input vectors which minimize leakage power under the constraint that NBTI degradation does not exceed a specified limit. These input vectors can be applied at the primary inputs of a circuit when it is in standby/idle mode and are such that the gates dissipate only a small amount of leakage power and also allow a large majority of the transistors on critical paths to be in the “recovery” phase of NBTI degradation. The advantage of this methodology is that allowing circuit designers to constrain NBTI degradation to below a specified limit enables tighter guardbanding, increasing performance. Our methodology guarantees that the generated input vector dissipates the least leakage power among all the input vectors that satisfy the degradation constraint. We formulate the problem as a zero-one integer linear program and show that this formulation produces input vectors whose leakage power is within 1% of a minimum leakage vector selected by a search algorithm and simultaneously reduces NBTI by about 5.75% of maximum circuit delay as compared to the worst case NBTI degradation. Our paper also proposes two new algorithms for the identification of circuit paths that are affected the most by NBTI degradation. The number of such paths identified by our algorithms are an order of magnitude fewer than previously proposed heuristics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rotational spectra of C(6)H(5)CCH center dot center dot center dot H(2)S, C(6)H(5)CCH center dot center dot center dot H(2)(34)S, C(6)H(5)CCH center dot center dot center dot HDS, C(6)H(5)CCH center dot center dot center dot D(2)S and C(6) H(5)CCD center dot center dot center dot H(2)S complexes have been observed using a pulsed nozzle Fourier transform microwave spectrometer. The observed spectrum is consistent with a structure in which hydrogen sulfide is located over the phenyl ring pi cloud and the distance between the centers of masses of the two monomers is 3.74 +/- 0.01 angstrom. In the complex, the H(2)S unit is shifted from the phenyl ring center towards the acetylene group. The vibrationally averaged structure has an effective Cs symmetry. Ab initio calculations were performed at MP2/aug-cc-pVDZ level of theory to locate the possible geometries of the complex. The calculations reveal the experimentally observed structure to be more stable than a coplanar arrangement of the monomers, which was observed for the C(6)H(5)CCH center dot center dot center dot H(2)O complex. Atoms in molecule theoretical analysis shows the presence of S-H center dot center dot center dot pi hydrogen bond. For the parent isotopologue, each transition frequency was found to split into two resulting from an interchange of the equivalent hydrogens of H(2)S unit in the complex. (C) 2011 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a statistical methodology for leakage power estimation, due to subthreshold and gate tunneling leakage, in the presence of process variations, for 65 nm CMOS. The circuit leakage power variations is analyzed by Monte Carlo (MC) simulations, by characterizing NAND gate library. A statistical “hybrid model” is proposed, to extend this methodology to a generic library. We demonstrate that hybrid model based statistical design results in up to 95% improvement in the prediction of worst to best corner leakage spread, with an error of less than 0.5%, with respect to worst case design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Miniaturization of devices and the ensuing decrease in the threshold voltage has led to a substantial increase in the leakage component of the total processor energy consumption. Relatively simpler issue logic and the presence of a large number of function units in the VLIW and the clustered VLIW architectures attribute a large fraction of this leakage energy consumption in the functional units. However, functional units are not fully utilized in the VLIW architectures because of the inherent variations in the ILP of the programs. This underutilization is even more pronounced in the context of clustered VLIW architectures because of the contentions for the limited number of slow intercluster communication channels which lead to many short idle cycles.In the past, some architectural schemes have been proposed to obtain leakage energy bene .ts by aggressively exploiting the idleness of functional units. However, presence of many short idle cycles cause frequent transitions from the active mode to the sleep mode and vice-versa and adversely a ffects the energy benefits of a purely hardware based scheme. In this paper, we propose and evaluate a compiler instruction scheduling algorithm that assist such a hardware based scheme in the context of VLIW and clustered VLIW architectures. The proposed scheme exploits the scheduling slacks of instructions to orchestrate the functional unit mapping with the objective of reducing the number of transitions in functional units thereby keeping them off for a longer duration. The proposed compiler-assisted scheme obtains a further 12% reduction of energy consumption of functional units with negligible performance degradation over a hardware-only scheme for a VLIW architecture. The benefits are 15% and 17% in the context of a 2-clustered and a 4-clustered VLIW architecture respectively. Our test bed uses the Trimaran compiler infrastructure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pre-whitening techniques are employed in blind correlation detection of additive spread spectrum watermarks in audio signals to reduce the host signal interference. A direct deterministic whitening (DDW) scheme is derived in this paper from the frequency domain analysis of the time domain correlation process. Our experimental studies reveal that, the Savitzky-Golay Whitening (SGW), which is otherwise inferior to DDW technique, performs better when the audio signal is predominantly lowpass. The novelty of this paper lies in exploiting the complementary nature to the two whitening techniques to obtain a hybrid whitening (HbW) scheme. In the hybrid scheme the DDW and SGW techniques are selectively applied, based on short time spectral characteristics of the audio signal. The hybrid scheme extends the reliability of watermark detection to a wider range of audio signals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper considers the high-rate performance of source coding for noisy discrete symmetric channels with random index assignment (IA). Accurate analytical models are developed to characterize the expected distortion performance of vector quantization (VQ) for a large class of distortion measures. It is shown that when the point density is continuous, the distortion can be approximated as the sum of the source quantization distortion and the channel-error induced distortion. Expressions are also derived for the continuous point density that minimizes the expected distortion. Next, for the case of mean squared error distortion, a more accurate analytical model for the distortion is derived by allowing the point density to have a singular component. The extent of the singularity is also characterized. These results provide analytical models for the expected distortion performance of both conventional VQ as well as for channel-optimized VQ. As a practical example, compression of the linear predictive coding parameters in the wideband speech spectrum is considered, with the log spectral distortion as performance metric. The theory is able to correctly predict the channel error rate that is permissible for operation at a particular level of distortion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We generalize the Nozieres-Schmitt-Rink method to study the repulsive Fermi gas in the absence of molecule formation, i.e., in the so-called ``upper branch.'' We find that the system remains stable except close to resonance at sufficiently low temperatures. With increasing scattering length, the energy density of the system attains a maximum at a positive scattering length before resonance. This is shown to arise from Pauli blocking which causes the bound states of fermion pairs of different momenta to disappear at different scattering lengths. At the point of maximum energy, the compressibility of the system is substantially reduced, leading to a sizable uniform density core in a trapped gas. The change in spin susceptibility with increasing scattering length is moderate and does not indicate any magnetic instability. These features should also manifest in Fermi gases with unequal masses and/or spin populations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A large reduction in the leakage current behavior in (Ba, Sr)TiO3 (BST) thin films was observed by graded-layer donor doping. The graded doping was achieved by introducing La-doped BST layers in the grown BST films. The films showed a large decrease (about six orders of magnitude) in the leakage current in comparison to undoped films at an electric field of 100 kV/cm. The large decrease in leakage current was attributed to the formation of highly resistive layers, originating from compensating defect chemistry involved for La-doped films grown in oxidizing environment. Temperature-dependent leakage-current behavior was studied to investigate the conduction mechanism and explanations of the results were sought from Poole–Frenkel conduction mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Symmetric BiFeO3/SrTiO3 superlattices were fabricated by pulsed laser deposition on SrTiO3 (100) substrates. Frequency independent and near saturated P-E hysteresis was observed in the case of a superlattice (periodicity of ∼ 11 nm) as compared to leaky hysteresis observed in epitaxial BiFeO3. Room temperature leakage current density of the superlattice was almost two orders of magnitude lower than that of BiFeO3. Observed leakage current behavior in case of both BiFeO3 and superlattice indicates the dominance of space charge limited conduction. Improvement in ferroelectric property was discussed in connection to enhanced epitaxial strain, reduced leakage current, and electrostatic interaction between BiFeO3 and SrTiO3.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Barium zirconium titanate [Ba(Zr0.05Ti0.95)O3, BZT] thin films were prepared by pulsed laser ablation technique and dc leakage current conduction behavior was extensively studied. The dc leakage behavior study is essential, as it leads to degradation of the data storage devices. The current-voltage (I-V) of the thin films showed an Ohmic behavior for the electric field strength lower than 7.5 MV/m. Nonlinearity in the current density-voltage (J-V) behavior has been observed at an electric field above 7.5 MV/m. Different conduction mechanisms have been thought to be responsible for the overall I-V characteristics of BZT thin films. The J-V behavior of BZT thin films was found to follow Lampert’s theory of space charge limited conduction similar to what is observed in an insulator with charge trapping moiety. The Ohmic and trap filled limited regions have been explicitly observed in the J-V curves, where the saturation prevailed after a voltage of 6.5 V referring the onset of a trap-free square region. Two different activation energy values of 1.155 and 0.325 eV corresponding to two different regions have been observed in the Arrhenius plot, which was attributed to two different types of trap levels present in the film, namely, deep and shallow traps.