Classical linear dimensional reduction algorithms, such as Linear Discriminant Analysis (LDA) and Locality Preserving Projections (LPP) have been widely used in computer vision and pattern recognition. However, when d...
详细信息
Manufacturing system now reached a point where it can accommodate various kinds of production models. However, its management and control sub-system, i.e. the manufacturing execution system (MES), is still constructed...
详细信息
this paper addresses the problem of resource management in the presence of inter-carrier interference (ICI) and multipath fading channel for orthogonal frequency division multiplexing (OFDM) systems. OFDM is a promisi...
详细信息
ISBN:
(纸本)9788988678251
this paper addresses the problem of resource management in the presence of inter-carrier interference (ICI) and multipath fading channel for orthogonal frequency division multiplexing (OFDM) systems. OFDM is a promising technique for the broadband wireless communication systems. However, the OFDM communication system is sensitivity to the ICI which arises because of Doppler spread and carrier frequency offset (CFO). To solve these problems, an optimization method is exploited, and a computationally efficient method using stochastic optimization techniques is proposed. the simulation results show that these derived optimal solutions and proposed suboptimal algorithms as compared withthe uniform power allocation algorithm or conventional water-filling algorithm can significantly improve the performance of the OFDM systems.
An improved minimum mean square error (MMSE) estimate method based on the diversity of correlation characteristic between the additive white noise and the signal is proposed in this presentation. the new estimator is ...
详细信息
An improved minimum mean square error (MMSE) estimate method based on the diversity of correlation characteristic between the additive white noise and the signal is proposed in this presentation. the new estimator is constructed as a linear combination of the covariance matrices of the observed signal and its delay. the proofing and simulation indicate that the new estimator can achieve a better estimate than the traditional MMSE estimator.
Approximately 1% of people in the world have epilepsy and 25% of epilepsy patients cannot be treated sufficiently by any available therapy. An automatic seizure detection system can reduce the time taken to review the...
详细信息
OFDM applied systems are the candidates for the future wireless communications. However, high peak-to-average ratio (PAPR) degrades the system performance. Applying the signal space expansion into the signal selection...
详细信息
ISBN:
(纸本)9788988678251
OFDM applied systems are the candidates for the future wireless communications. However, high peak-to-average ratio (PAPR) degrades the system performance. Applying the signal space expansion into the signal selection scheme, PAPR reduction could be implemented in OFDM systems. In this paper, a selected mapping (SLM) applied scheme using signal space expansion is proposed. In the scheme, a specific rule is designed to scramble the data sequence for PAPR reduction. the data sequence can be completely extracted at the receiver without any side information. Hence, the scheme can be implemented to reduce PAPR and to avoid bit error rate (BER) degradation in the OFDM system. then, the numerical results are given to evaluate the performance on PAPR reduction and BER in the OFDM system. the result shows BER performance withthe proposed SLM applied scheme is better than that withthe ordinary SLM scheme.
WIA-PA is a standard of wireless networks for industrial-process automation, which is proposed by Industrial Wireless Alliance of China. Network manager is an integral role of the WIA-PA network. In this paper, we fir...
详细信息
WIA-PA is a standard of wireless networks for industrial-process automation, which is proposed by Industrial Wireless Alliance of China. Network manager is an integral role of the WIA-PA network. In this paper, we first look closely into the architecture of WIA-PA and the responsibility of network manager. More specifically, we set our focus on the schemes and algorithms involved in the process of topology maintenance, routing configuration and communication resources allocation, which are the core responsibilities of the network manager. Finally, with Visual Studio .NET the paper has implemented the network manager of WIA-PA which has been running for a long time in the laboratory. the results show the network manager can effectively utilize channels and timeslots resources, optimize resource allocation and improve the overall WIA-PA performance.
this paper focuses on communication security of e-commerce. A secure electronic transaction model was designed, withthe designs of security protocols of transactions for each process in detail, and the advantages was...
详细信息
this paper focuses on communication security of e-commerce. A secure electronic transaction model was designed, withthe designs of security protocols of transactions for each process in detail, and the advantages was pointed out. In the design process, the security protocol proposed in this paper is not confined to a particular electronic trading system itself. this model has a wide range of practical significance and reference value.
SLOGS is an implementation of mandatory access control mechanism in SSH protocol. It takes an input from the user about his location and session priority and then implements some predicates and facts which are divided...
详细信息
SLOGS is an implementation of mandatory access control mechanism in SSH protocol. It takes an input from the user about his location and session priority and then implements some predicates and facts which are divided into three sets namely Security influential predicates (set 1), normal security predicates (set 2) and backup system predicates (set 3). the implementation of one or all sets is on the discretion of the administrator of the system. there is a tradeoff between security and performance; when all sets are applied the security is increased but the performance will be decreased. the performance and security were decided by the location and requirement of the *** system is implemented using type-1 fuzzy logic to take care of the imprecision in input to the systems.
In this paper, we propose a neighbor-aware dynamic backoff scheme and evaluate the performance of the proposed scheme for ad hoc networks. the backoff scheme that we devised grants node access to the channel, accordin...
详细信息
ISBN:
(纸本)9781424476718
In this paper, we propose a neighbor-aware dynamic backoff scheme and evaluate the performance of the proposed scheme for ad hoc networks. the backoff scheme that we devised grants node access to the channel, according to the competing number of nodes for a transmitted frame. We use both an analytical model and simulation experiments to evaluate the dynamic performance of our backoff mechanism in an ad hoc network.
暂无评论