In Heterogeneous Networks (HetNets), User Equipments(UEs) in pico cells may suffer from significant co-channel interference from macro stations. The 3rd Generation Partnership Project (3GPP) organization has proposed ...
详细信息
ISBN:
(纸本)9781728152103
In Heterogeneous Networks (HetNets), User Equipments(UEs) in pico cells may suffer from significant co-channel interference from macro stations. The 3rd Generation Partnership Project (3GPP) organization has proposed the concept of Almost Blank Subframe (ABS) so as to reduce the interference of macro stations to pico UEs. Addressing the problem that the introduction of ABS makes it impossible for pico UEs to correctly obtain channel conditions on different subframes, this paper proposes an efficient scheme based on a variable parameter Lambda report and Lambda estimation to derive Channel Quality Indicator (CQI). The method is applicable to the ABS and non-Almost Blank Subframe (non-ABS). It compensates the non-restricted measured CQI with different offsets, based on ABS density and ratio of interference levels from macro cells and pico cells to obtain CQI on different subframes. Simulation and analytical results show that our proposed scheme can achieve approximately 59% gain over the 3GPP system and reduce report overhead significantly without inducing penalties on throughput.
The proceedings contain 41 papers. The special focus in this conference is on Signal Processing and Intelligent Recognition systems. The topics include: Removal of BW and respiration noise in abdECG for f ECG extracti...
ISBN:
(纸本)9783319679334
The proceedings contain 41 papers. The special focus in this conference is on Signal Processing and Intelligent Recognition systems. The topics include: Removal of BW and respiration noise in abdECG for f ECG extraction;early stage detection of diabetic retinopathy using an optimal feature set;exploring cepstral coefficient based sleep stage scoring method for single-channel EEG signal using machine learning technique;non linear tracking using unscented kalman filter;an analysis on the influence that the position and number of control points have on MLS registration of medical images;component characterization of western and indian classical music;an experimental setup of DSA algorithm suitable for high bandwidth data transfer using USRP and GNU radio companion;influence of filter bank structure on the statistical significance of coefficients in cepstral analysis for acoustic signals;particle filtering technique for fast fading shadow power estimation in wireless communication;object detection and localization using compressed sensing;an improved approach for securing document images using dual cover;dependency of various color and intensity planes on CNN based image classification;epigraphic document image enhancement using retinex method;improved microaneurysm detection in fundus images for diagnosis of diabetic retinopathy;swarm robots in a closed loop visual odometry system by using visible light communication;an adaptive neuro-fuzzy inference system based situation awareness assessment in VLC enabled connected cars;identifying issues in estimating parameters from speech under lombard effect and a model for an emotional respondent robot.
An objective of neural language modelling is to take in the joint probability function of sequence of words in a language. This is characteristically dif• cult due to the huge computation requirement and curse of dime...
详细信息
The proceedings contain 19 papers. The special focus in this conference is on Formal Methods for Industrial Critical systems. The topics include: Adaptive Learning for Learn-Based Regression Testing;predicate Abstract...
ISBN:
(纸本)9783030002435
The proceedings contain 19 papers. The special focus in this conference is on Formal Methods for Industrial Critical systems. The topics include: Adaptive Learning for Learn-Based Regression Testing;predicate Abstraction and Such..;compositional Verification in Action;a Note on Refinement in Hierarchical Transition systems.m3C: Modal Meta Model Checking;wholly!: A Build System For The Modern Software Stack;a Modeling Language for Security Threats of IoT systems.Revisiting Bounded Reachability Analysis of Timed Automata Based on MILP;evaluation and Comparison of Real-Time systems.Analysis Methods and Tools;building Correct Cyber-Physical systems. Why We Need a Multiview Contract Theory;automated Functional Safety Analysis of Automated Driving systems.safety Interlocking as a distributed Mutual Exclusion Problem;Checking Consistency of Real-Time Requirements on distributed Automotive Control Software Early in the Development Process Using UPPAAL;formal Verification of a Programmable Hypersurface;Modelling and Analysing ERTMS Hybrid Level 3 with the mCRL2 Toolset;progress Checking for Dummies;virtual Integration for Pattern-Based Contracts with the Kind2 Model Checker.
A fibre optic linked distributed control cum monitor system and various field interface circuits have been designed and developed in-house to facilitate control and monitoring an RF ion source and its subsystems.of a ...
详细信息
The proceedings contain 68 papers. The special focus in this conference is on Human Centered computing. The topics include: Blind image quality assessment via analysis of GLCM;an improved ranked K-medoids clustering a...
ISBN:
(纸本)9783319745206
The proceedings contain 68 papers. The special focus in this conference is on Human Centered computing. The topics include: Blind image quality assessment via analysis of GLCM;an improved ranked K-medoids clustering algorithm based on a P system;A novel inverse-operation based group undo/redo algorithm for feature-based 3D collaborative CAD systems.two steps method using polarization to resist phase noise for self-interference cancelation in full-duplex;sparse linear method based top-N course recommendation system with expert knowledge and L0Regularization;the research on the container truck scheduling based on fuzzy control and ant colony algorithm;Researches on the analysis framework of application layer communication protocol based on SQLite;the implementation of growth guidance factor diffusion via octree spatial structures for neuronal systems.simulation;intelligent perceptive QoS based centralized admission control for route computing;A method for correcting the leaning of AR two-dimensional codes based on LSM;research on the shortest path problem based on improved genetic algorithm;semantic web languages for policy enforcement in the internet of things;network traffic prediction based on wavelet transform and genetic algorithm;research and optimization of the cluster server load balancing technology based on centos 7;Base station location optimization based on genetic algorithm in CAD system;a study of optimal multi-server system configuration with variate deadlines and rental prices in cloud computing;a composite anomaly detection method for identifying network element hitches;D-SVM fusion clustering algorithm based on indoor location;research on evaluation of sensor deviations during flight;research on meteorological data simulation.
Object recognition is one of the inherent characteristics which humans own since adolescence. In reality, it is astonishing to see that humans can recognize any object at a single glance. Machines however, find it dif...
详细信息
Management of flows over today39;s power grid is becoming increasingly complex owing to the volatility introduced due to non-dispatchable sources like PV and wind. The need for autonomous and precise control over po...
详细信息
ISBN:
(纸本)9781538676653
Management of flows over today's power grid is becoming increasingly complex owing to the volatility introduced due to non-dispatchable sources like PV and wind. The need for autonomous and precise control over power flows in the transmission system is felt. This paper proposes a hybrid transformer-based solution to add dynamic control over voltages, power flows and impedances on transmission systems. The proposed technology involves augmenting a conventional transformer with a fractionally rated converter. The approach shows numerous improvements as well as cheaper cost points over traditional FACTS-based approaches. Further, a modular approach towards using this technology is presented to enable high reliability, redundancy and resiliency for the transmission grid. System level simulations are presented here to showcase the approach's feasibility.
The proceedings contain 36 papers. The topics discussed include: bring your own security risks with BYOD;understanding current research on the use and impact of big data analytics: a systematic literature review;analy...
ISBN:
(纸本)9789898533807
The proceedings contain 36 papers. The topics discussed include: bring your own security risks with BYOD;understanding current research on the use and impact of big data analytics: a systematic literature review;analysis of spatial accessibility to public libraries considering determinant of user's visit;dynamic data assigning clustering for school grouping;extraction of classification models using a bee swarm approach;visual analytics in the public sector: an analysis on diversities and similarities of London's wards;a methodology to identify extremist discourse on social media;the method for detecting the dependencies between technical functions and physical effects;identifying the distribution of the floating population in Seoul;cities information and communication technologies (ICT) bridge toward villages for women empowerment;is market efficiency enhanced in sub-second trading market;an incremental learning system for online KNN classification: application to network intrusion detection;stock prediction using randomness level of price fluctuation measured by the RMT-test;2CNN - modular image recognizer with convolutional neural networks;and full model selection in huge datasets through a meta-learning approach.
The proceedings contain 17 papers. The special focus in this conference is on Security of Industrial Control systems.and Cyber-Physical systems. The topics include: CRBP-OpType: A constrained approximate search algori...
ISBN:
(纸本)9783319728162
The proceedings contain 17 papers. The special focus in this conference is on Security of Industrial Control systems.and Cyber-Physical systems. The topics include: CRBP-OpType: A constrained approximate search algorithm for detecting similar attack patterns;multistage downstream attack detection in a cyber physical system;A UML profile for privacy-aware data lifecycle models;evaluation of a security and privacy requirements methodology using the physics of notation;what users want: Adapting qualitative research methods to security policy elicitation;an anti-pattern for misuse cases;decision-making in security requirements engineering with constrained goal models;Development of an embedded platform for secure CPS services;Introducing usage control in MQTT;towards security threats that matter;a methodology to assess vulnerabilities and countermeasures impact on the missions of a naval system;STRIDE to a secure smart grid in a hybrid cloud;Stealthy deception attacks against SCADA systems.on ladder logic bombs in industrial control systems.enforcing memory safety in cyber-physical systems.
暂无评论