902 resultados para POWER SPECTRUM ANALYSIS
Resumo:
A theoretical analysis is reported in this paper to investigate the effect that a second harmonic signal which might be present at an amplifier’s input has on generating additional intermodulation products, particularly the third-order intermodulation (IM3) products. The analysis shows that the amplitude of an extra generated IM3 component is equal to the product of the fundamental amplitude, the second harmonic amplitude, and the second order Taylor series coefficient. The effect of the second order harmonic on the IM3 is examined through a simulated example of a 2.22-GHz 10-W Class-EF amplifier whereby the IM3 levels have been reduced by 2-3 dB after employing a second harmonic termination stub at the input.
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
Resumo:
One of the most important factors that affects the performance of energy detection (ED) is the fading channel between the wireless nodes. This article investigates the performance of ED-based spectrum sensing, for cognitive radio (CR), over two-wave with diffuse power (TWDP) fading channels. The TWDP fading model characterizes a variety of fading channels, including well-known canonical fading distributions, such as Rayleigh and Rician, as well as worse than Rayleigh fading conditions modeled by the two-ray fading model. Novel analytic expressions for the average probability of detection over TWDP fading that account for single-user and cooperative spectrum sensing as well as square law selection diversity reception are derived. These expressions are used to analyze the behavior of ED-based spectrum sensing over moderate, severe and extreme fading conditions, and to investigate the use of cooperation and diversity as a means of mitigating the fading effects. Our results indicate that TWDP fading conditions can significantly degrade the sensing performance; however, it is shown that detection performance can be improved when cooperation and diversity are employed. The presented outcomes enable us to identify the limits of ED-based spectrum sensing and quantify the trade-offs between detection performance and energy efficiency for cognitive radio systems deployed within confined environments such as in-vehicular wireless networks.
Resumo:
With rising numbers of school-aged children with autism educated in mainstream classrooms and applied behaviour analysis (ABA) considered the basis of best practice, teachers’ knowledge in this field has become a key concern for inclusion. Self-reported knowledge of ABA of special needs teachers (n=165) was measured and compared to their actual knowledge of ABA demonstrated in accurate responses to a multiple-choice test. Findings reported here show that teachers’ self-perceived knowledge exceeded actual knowledge and that actual knowledge of ABA was not related to training received by government agency. Implications for teacher training are discussed.
Resumo:
As wind power generation undergoes rapid growth, lightning and overvoltage incidents involving wind power plants have come to be regarded as a serious problem. Firstly, lightning location systems are discussed, as well as important parameters regarding lightning protection. Also, this paper presents a case study, based on a wind turbine with an interconnecting transformer, for the study of adequate lightning and overvoltage protection measures. The electromagnetic transients circuit under study is described, and computational results are presented.
Resumo:
Catastrophic events, such as wars and terrorist attacks, tornadoes and hurricanes, earthquakes, tsunamis, floods and landslides, are always accompanied by a large number of casualties. The size distribution of these casualties has separately been shown to follow approximate power law (PL) distributions. In this paper, we analyze the statistical distributions of the number of victims of catastrophic phenomena, in particular, terrorism, and find double PL behavior. This means that the data sets are better approximated by two PLs instead of a single one. We plot the PL parameters, corresponding to several events, and observe an interesting pattern in the charts, where the lines that connect each pair of points defining the double PLs are almost parallel to each other. A complementary data analysis is performed by means of the computation of the entropy. The results reveal relationships hidden in the data that may trigger a future comprehensive explanation of this type of phenomena.
Resumo:
This thesis takes some steps in examining the child protection system from a position that is rarely discussed. Specifically, I explore how Foucault's concept of disciplinary power can be used to demonstrate how power operates within the client/worker relationship. This relationship is shown to be quite complex with power flowing bidirectionally, rather than hierarchically. Instead of viewing power imbalances as a function of state control, I show how the client/worker relationship is constituted by the worker, the client, the organization and the social body. A postmodern auto ethnography is used to document my journey as I expose the disciplinary practices and instruments that I was subject to and used with my clients. 2 Given that the child protection system is constantly shifting and changing in order to improve its ability to safeguard children a greater emphasis is required to examine how workers operate within this complex, overwhelming and multi-dimensional world. This thesis has shown that by engaging in a reflexive examination of my position of power different approaches to making intervention beneficial to all involved become available. This is important if child protection work aims to work with clients rather than on clients.
Resumo:
This project evolved out of a search for ways to conduct research on “others” in a way that does not exploit, stigmatize or misrepresent their experience. This thesis is an ethnographic study in leisure research and youth work and an experiment in running a photovoice project. Photovoice is a participatory visual method that embodies the emancipatory ideal of empowering others through self-representation. The literature on photovoice lacks a comprehensive discussion on the complexity of power and representation. Postmodern theorists have proposed that participatory methods are not benign and that initiatives are acts of power in themselves that produce effects (Cook & Kothari, 2001). A Foucauldian analysis of power is used to deconstruct the researcher’s practice and reflect on why and how youth are “engaged”. This project seeks to embrace the principle of working “with” others, but also work from a postmodern perspective that acknowledges power and representation as ongoing problems.
Resumo:
Research indicates that Obsessive-Compulsive Disorder (OCD; DSM-IV-TR, American Psychiatric Association, 2000) is the second most frequent disorder to coincide with Autism Spectrum Disorder (ASD; Leyfer et aI., 2006). Excessive collecting and hoarding are also frequently reported in children with ASD (Berjerot, 2007). Although functional analysis (Iwata, Dorsey, Slifer, Bauman, & Richman, 1982/1994) has successfully identified maintaining variables for repetitive behaviours such as of bizarre vocalizations (e.g., Wilder, Masuda, O'Connor, & Baham, 2001), tics (e.g., Scotti, Schulman, & Hojnacki, 1994), and habit disorders (e.g., Woods & Miltenberger, 1996), extant literature ofOCD and functional analysis methodology is scarce (May et aI., 2008). The current studies utilized functional analysis methodology to identify the types of operant functions associated with the OCD-related hoarding behaviour of a child with ASD and examined the efficacy of function-based intervention. Results supported hypotheses of automatic and socially mediated positive reinforcement. A corresponding function-based treatment plan incorporated antecedent strategies and differential reinforcement (Deitz, 1977; Lindberg, Iwata, Kahng, and DeLeon, 1999; Reynolds, 1961). Reductions in problem behaviour were evidenced through use of a multiple baseline across behaviours design and maintained during two-month follow-up. Decreases in symptom severity were also discerned through subjective measures of treatment effectiveness.
Resumo:
Behavioral researchers commonly use single subject designs to evaluate the effects of a given treatment. Several different methods of data analysis are used, each with their own set of methodological strengths and limitations. Visual inspection is commonly used as a method of analyzing data which assesses the variability, level, and trend both within and between conditions (Cooper, Heron, & Heward, 2007). In an attempt to quantify treatment outcomes, researchers developed two methods for analysing data called Percentage of Non-overlapping Data Points (PND) and Percentage of Data Points Exceeding the Median (PEM). The purpose of the present study is to compare and contrast the use of Hierarchical Linear Modelling (HLM), PND and PEM in single subject research. The present study used 39 behaviours, across 17 participants to compare treatment outcomes of a group cognitive behavioural therapy program, using PND, PEM, and HLM on three response classes of Obsessive Compulsive Behaviour in children with Autism Spectrum Disorder. Findings suggest that PEM and HLM complement each other and both add invaluable information to the overall treatment results. Future research should consider using both PEM and HLM when analysing single subject designs, specifically grouped data with variability.
Resumo:
Each person with Autism Spectrum Disorder (ASD) comes with unique characteristics (idiosyncratic) that give clues to the world they know (Connolly, 2008). It is through their body that they (a) know the world they are experiencing, (b) make meaning, and (c) express certain behaviours. I used Laban’s Movement Analysis (LMA) to practice an attuned and appreciative approach to describing and understanding the body movement in one severe manifestation of autism in an adolescent male. LMA observes human movement across many disciplines and can be applied in many contexts providing a body honoring discourse for description (Connolly, 2008). The framework examines movement in body, space, quality, and relation. Each theme provides a detailed description of the individual’s movement, thus, giving us a richer understanding of patterns and possible triggers to self-injurious behaviours (SIB). During the summer of August 2013, I participated in Brock University’s annual Autism Camp and worked with a 15 year old male named “Aaron” who manifests with low functioning autism. The purpose of my research project was to code and analyze a series of photos taken to help gain insight into movement patterns associated with stressed embodiment and self-injury in “Aaron”. As I understood more about these embodied expressions, I uncovered valuable information on how to read patterns and discover what triggers these events, thus providing strategies on how to help people do more refined observations and make meaning of the behaviour. Laban’s movement analysis provided a sensitized discourse appropriate to the embodied expressions depicted in the photos.