938 resultados para Mobile radio stations


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose and demonstrate a technique for electrical detection of polarized spins in semiconductors in zero applied magnetic fields. Spin polarization is generated by optical injection using circularly polarized light which is modulated rapidly using an electro-optic cell. The modulated spin polarization generates a weak time-varying magnetic field which is detected by a sensitive radio-frequency coil. Using a calibrated pickup coil and amplification electronics, clear signals were obtained for bulk GaAs and Ge samples from which an optical spin orientation efficiency of 4.8% could be determined for Ge at 1342 nm excitation wavelength. In the presence of a small external magnetic field, the signal decayed according to the Hanle effect, from which a spin lifetime of 4.6 +/- 1.0 ns for electrons in bulk Ge at 127 K was extracted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An experimental setup has been realized to measure weak magnetic moments which can be modulated at radio frequencies (similar to 1-5 MHz). Using an optimized radio-frequency (RF) pickup coil and lock-in amplifier, an experimental sensitivity of 10(-15) Am(2) corresponding to 10(-18) emu has been demonstrated with a 1 s time constant. The detection limit at room temperature is 9.3 x 10(-16) Am(2)/root Hz limited by Johnson noise of the coil. The setup has been used to directly measure the magnetic moment due to a small number (similar to 7 x 10(8)) of spin polarized electrons generated by polarization modulated optical radiation in GaAs and Ge. (C) 2011 American Institute of Physics. [doi: 10.1063/1.3654229]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The spectral index-luminosity relationship for steep-spectrum cores in galaxies and quasars has been investigated, and it is found that the sample of galaxies supports earlier suggestions of a strong correlation, while there is weak evidence for a similar relationship for the quasars. It is shown that a strong spectral index-luminosity correlation can be used to set an upper limit to the velocities of the radio-emitting material which is expelled from the nucleus in the form of collimated beams or jets having relativistic bulk velocities. The data on cores in galaxies indicate that the Lorentz factors of the radiating material are less than about 2.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present the radio-optical imaging of ATLBS, a sensitive radio survey (Subrahmanyan et al. 2010). The primary aim of the ATLBS survey is to image low-power radio sources which form the bulk of the radio source population to moderately high red-shifts (z similar to 1.0). The accompanying multiband optical and near infra-red observations provide information about the hosts and environments of the radio sources. We give here details of the imaging of the radio data and optical data for the ATLBS survey.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new scheme for minimizing handover failure probability in mobile cellular communication systems is presented. The scheme involves a reassignment of priorities for handover requests enqueued in adjacent cells to release a channel for a handover request which is about to fail. Performance evaluation of the new scheme carried out by computer simulation of a four-cell highway cellular system has shown a considerable reduction in handover failure probability

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report our search for and a possible detection of periodic radio pulses at 34.5 MHz from the Fermi Large Area Telescope pulsar J1732-3131. The candidate detection has been possible in only one of the many sessions of observations made with the low-frequency array at Gauribidanur, India, when the otherwise radio weak pulsar may have apparently brightened many folds. The candidate dispersion measure along the sight line, based on the broad periodic profiles from �20min of data, is estimated to be 15.44 ± 0.32 pccc -1. We present the details of our periodic and single-pulse search, and discuss the results and their implications relevant to both, the pulsar and the intervening medium. © 2012 RAS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile P2P technology provides a scalable approach for content delivery to a large number of users on their mobile devices. In this work, we study the dissemination of a single item of content (e. g., an item of news, a song or a video clip) among a population of mobile nodes. Each node in the population is either a destination (interested in the content) or a potential relay (not yet interested in the content). There is an interest evolution process by which nodes not yet interested in the content (i.e., relays) can become interested (i.e., become destinations) on learning about the popularity of the content (i.e., the number of already interested nodes). In our work, the interest in the content evolves under the linear threshold model. The content is copied between nodes when they make random contact. For this we employ a controlled epidemic spread model. We model the joint evolution of the copying process and the interest evolution process, and derive joint fluid limit ordinary differential equations. We then study the selection of parameters under the content provider's control, for the optimization of various objective functions that aim at maximizing content popularity and efficient content delivery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australia Telescope Low-brightness Survey (ATLBS) regions have been mosaic imaged at a radio frequency of 1.4 GHz with 6 `' angular resolution and 72 mu Jy beam(-1) rms noise. The images (centered at R. A. 00(h)35(m)00(s), decl. -67 degrees 00'00 `' and R. A. 00(h)59(m)17(s), decl. -67.00'00 `', J2000 epoch) cover 8.42 deg(2) sky area and have no artifacts or imaging errors above the image thermal noise. Multi-resolution radio and optical r-band images (made using the 4 m CTIO Blanco telescope) were used to recognize multi-component sources and prepare a source list; the detection threshold was 0.38 mJy in a low-resolution radio image made with beam FWHM of 50 `'. Radio source counts in the flux density range 0.4-8.7 mJy are estimated, with corrections applied for noise bias, effective area correction, and resolution bias. The resolution bias is mitigated using low-resolution radio images, while effects of source confusion are removed by using high-resolution images for identifying blended sources. Below 1 mJy the ATLBS counts are systematically lower than the previous estimates. Showing no evidence for an upturn down to 0.4 mJy, they do not require any changes in the radio source population down to the limit of the survey. The work suggests that automated image analysis for counts may be dependent on the ability of the imaging to reproduce connecting emission with low surface brightness and on the ability of the algorithm to recognize sources, which may require that source finding algorithms effectively work with multi-resolution and multi-wavelength data. The work underscores the importance of using source lists-as opposed to component lists-and correcting for the noise bias in order to precisely estimate counts close to the image noise and determine the upturn at sub-mJy flux density.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There have been several studies on the performance of TCP controlled transfers over an infrastructure IEEE 802.11 WLAN, assuming perfect channel conditions. In this paper, we develop an analytical model for the throughput of TCP controlled file transfers over the IEEE 802.11 DCF with different packet error probabilities for the stations, accounting for the effect of packet drops on the TCP window. Our analysis proceeds by combining two models: one is an extension of the usual TCP-over-DCF model for an infrastructure WLAN, where the throughput of a station depends on the probability that the head-of-the-line packet at the Access Point belongs to that station; the second is a model for the TCP window process for connections with different drop probabilities. Iterative calculations between these models yields the head-of-the-line probabilities, and then, performance measures such as the throughputs and packet failure probabilities can be derived. We find that, due to MAC layer retransmissions, packet losses are rare even with high channel error probabilities and the stations obtain fair throughputs even when some of them have packet error probabilities as high as 0.1 or 0.2. For some restricted settings we are also able to model tail-drop loss at the AP. Although involving many approximations, the model captures the system behavior quite accurately, as compared with simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider precoding strategies at the secondary base station (SBS) in a cognitive radio network with interference constraints at the primary users (PUs). Precoding strategies at the SBS which satisfy interference constraints at the PUs in cognitive radio networks have not been adequately addressed in the literature so far. In this paper, we consider two scenarios: i) when the primary base station (PBS) data is not available at SBS, and ii) when the PBS data is made available at the SBS. We derive the optimum MMSE and Tomlinson-Harashima precoding (THP) matrix Alters at the SBS which satisfy the interference constraints at the PUs for the former case. For the latter case, we propose a precoding scheme at the SBS which performs pre-cancellation of the PBS data, followed by THP on the pre-cancelled data. The optimum precoding matrix filters are computed through an iterative search. To illustrate the robustness of the proposed approach against imperfect CSI at the SBS, we then derive robust precoding filters under imperfect CSI for the latter case. Simulation results show that the proposed optimum precoders achieve good bit error performance at the secondary users while meeting the interference constraints at the PUs.