Single-phase ceramics in the SrLa4?xPrxLa4Ti5O17 (0 ≤ x ≤ 4) series were processed via a solid-state sintering route. X-ray diffraction analysis revealed single-phase ceramics for all the compositions. The molar volume (Vm) decreased while the theoretical density (ρth) increased with increase in the Pr content. Substitution of Pr3+ decreased the relative permittivity (εr) and temperature coefficient of resonant frequency (τf) due to its smaller ionic polarizability (αd) and ionic radius than La3+. In the present study, εr ≈ 54.2, Quf0 ≈ 7935 GHz, and τ f ≈ ?20.3 ppm/°C were achieved for the composition with x = 2 (i.e., SrLa2Pr2Ti5O17). 相似文献
2D titanium carbides (MXene) possess significant characteristics including high conductivity and electromagnetic interference shielding efficiency (EMI SE) that are important for applications in printed and flexible electronics. However, MXene‐based ink formulations are yet to be demonstrated for proper inkjet printing of MXene patterns. Here, tandem repeat synthetic proteins based on squid ring teeth (SRT) are employed as templates of molecular self‐assembly to engineer MXene inks that can be printed as stimuli‐responsive electrodes on various substrates including cellulose paper, glass, and flexible polyethylene terephthalate (PET). MXene electrodes printed on PET substrates are able to display electrical conductivity values as high as 1080 ± 175 S cm?1, which significantly exceeds electrical conductivity values of state‐of‐the‐art inkjet‐printed electrodes composed of other 2D materials including graphene (250 S cm?1) and reduced graphene oxide (340 S cm?1). Furthermore, this high electrical conductivity is sustained under excessive bending deformation. These flexible electrodes also exhibit effective EMI SE values reaching 50 dB at films with thicknesses of 1.35 µm, which mainly originate from their high electrical conductivity and layered structure. 相似文献
LTE networks’ main challenge is to efficiently use the available spectrum, and to provide satisfying quality of service for mobile users. However, using the same bandwidth among adjacent cells leads to occurrence of Inter-cell Interference especially at the cell-edge. Basic interference mitigation approaches consider bandwidth partitioning techniques between adjacent cells, such as frequency reuse of factor m schemes, to minimize cell-edge interference. Although SINR values are improved, such techniques lead to significant reduction in the maximum achievable data rate. Several improvements have been proposed to enhance the performance of frequency reuse schemes, where restrictions are made on resource blocks usage, power allocation, or both. Nevertheless, bandwidth partitioning methods still affect the maximum achievable throughput. In this proposal, we intend to perform a comprehensive survey on Inter-Cell Interference Coordination (ICIC) techniques, and we study their performance while putting into consideration various design parameters. This study is implemented throughout intensive system level simulations under several parameters such as different network loads, radio conditions, and user distributions. Simulation results show the advantages and the limitations of each technique compared to frequency reuse-1 model. Thus, we are able to identify the most suitable ICIC technique for each network scenario. 相似文献
We introduce a new combination approach for the mixture of adaptive filters based on the set-membership filtering (SMF) framework. We perform SMF to combine the outputs of several parallel running adaptive algorithms and propose unconstrained, affinely constrained and convexly constrained combination weight configurations. Here, we achieve better trade-off in terms of the transient and steady-state convergence performance while providing significant computational reduction. Hence, through the introduced approaches, we can greatly enhance the convergence performance of the constituent filters with a slight increase in the computational load. In this sense, our approaches are suitable for big data applications where the data should be processed in streams with highly efficient algorithms. In the numerical examples, we demonstrate the superior performance of the proposed approaches over the state of the art using the well-known datasets in the machine learning literature. 相似文献
An exact theory of the inverse scattering problems related to cylindrical bodies buried in a slab is established in two-dimensional scalar case. The theory dwells on two functional equations interrelating the outgoing wave solutions of the wave equation, which can be observed physically, with incoming wave solutions that are physically meaningless and irrealizable. One of these functional equations involves the measured radiation pattern in its kernel (material relation) while the other is independent of the measured data (universal relation). To establish the material relation one has to make far-field measurements with various incidence angles at various observation points and frequencies. The universal relation which guarantees some analytical properties of the field function results in a Stieltjes type integral equation. By solving these equations one gets the location, shape and permittivity of the inaccessible body. When the material of the half-space below the slab is made identical to that of the slab, then the results are reduced to that of the bodies buried in a half-space. 相似文献
Reliability and ageing tests on power semiconductor devices require estimation of junction temperatures in order to control thermal stresses and monitor failure criteria. For this purpose, thermo-electrical parameters, such as voltage forward drop dependence with temperature are usually carried out in low injection level. Nevertheless, it is still difficult to evaluate the limits of such exploitation. An analytical model has been developed and validated by experimental measurements in order to evaluate self-heating effects and to understand high temperature effects. This model should also allow to highlight the role of some physical parameters in the voltage–temperature dependence and to clarify such thermal calibration. 相似文献
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing high handover latency and inevitable traffic loss for its communication session. This article proposes a proactive mechanism to mange the MH handover and maintain its data session continually across inter-PMIPv6-domains. The proposed mechanism introduces an intermediate global mobility anchor entity, called, which is responsible to coordinate MH handover as well as redirect its traffic across inter-PMIPv6-domains. Through various simulation evaluations, via ns-2, several experiments were conducted, revealing numerous results that verify the proposed mechanism superior performance over the conventional inter-PMIPv6-domain handover schemes in terms of handover latency, achieved throughput, protocol signalling cost and end-to-end traffic delivery latency. 相似文献
In this paper the bit error rate performance and error vector magnitude of a tunable impedance matching network is analyzed assuming QPSK, 16-QAM and 64-QAM digital modulation schemes. The characterized tunable impedance matching network is based on barium–strontium–titanate ferroelectric thick-film varactors. Inherent dispersive behavior is subsumed into the forward transmission of the passive device. Due to this nonlinear phase response, in general to maximize the overall system performance, an agile tuning of the varactor values is demonstrated, taking into account the phase and group delay of s21 parameter. Detailed signal simulation results based on measured data of a testbed are presented. The influence of varying matched impedances on the tuning behavior with different modulation bandwidths is discussed at a center frequency of 1.9 GHz. 相似文献
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method
to reduce energy consumption in dense wireless sensor networks. This paper proposes a distributed and energy efficient sleep
scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined
coverage and connectivity. The scheme can activate and deactivate the three basic units of a sensor node (sensing, processing,
and communication units) independently. The paper also provides a probabilistic method to estimate how much the sensing area
of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing
scheme to reduce the control message overhead while deciding the next modes (full-active, semi-active, inactive/sleeping)
of sensor nodes. We evaluated our estimation method and scheduling scheme via simulation experiments and compared our scheme
also with another scheme. The results validate our probabilistic method for coverage estimation and show that our sleep scheduling
and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving
both connectivity and coverage. 相似文献