In this paper the impact of user's hand holding a multiple-input-multiple-output (MIMO) terminal on the system performance is investigated. A 4times4 MIMO system is considered with a personal digital assistant (PD...
详细信息
In this paper the impact of user's hand holding a multiple-input-multiple-output (MIMO) terminal on the system performance is investigated. A 4times4 MIMO system is considered with a personal digital assistant (PDA) terminal equipped with a compact array of 4 patch elements. The radiation patterns of the antenna elements are simulated in the presence of the other elements and in the presence of a user's hand. The obtained patterns are used to evaluate the covariance matrix of the receive antenna which is incorporated in a correlation-based MIMO channel model. MIMO channel capacity is calculated to demonstrate the capacity degradation caused by the user's hand.
In this paper is presented a new efficient Channel Assignment technique. The philosophy of this technique is that provides priority to Emergency Calls in Wireless Cellular Security Networks. The new technique is based...
详细信息
In this paper is presented a new efficient Channel Assignment technique. The philosophy of this technique is that provides priority to Emergency Calls in Wireless Cellular Security Networks. The new technique is based on a two-layer cellular architecture The lower layer of the proposed architecture is based on a microcellular solution, for absorbing the traffic loads of both the handoff and new calls of Emergency Calls (EC). The higher layer is based on a macro-cell umbrella solution, for absorbing the traffic load of the handoff and new calls of the Non Emergency Calls (NEC). The simulation results show that using the optimum number of channels in each layer, the QoS of EC and the Handoff Blocking Probability of NEC in a congested area where an extreme event was happened is optimized, having the minimum negative effect on the New Call Blocking Probability of the NEC.
This paper provides a new analytical robust stability checking method of fractional-order linear time invariant interval uncertain system. This paper continues the authors’ previous work (Chen et al., 2005a) where ma...
详细信息
This paper provides a new analytical robust stability checking method of fractional-order linear time invariant interval uncertain system. This paper continues the authors’ previous work (Chen et al., 2005a) where matrix perturbation theory was used. For the new robust stability checking, Lyapunov inequality is utilized for finding the maximum eigenvalue of a Hermitian matrix. Through numerical examples, the usefulness and the effectiveness of the newly proposed method are verified.
The method of microtubule tracking and dynamics analysis, presented here, improves upon the current means of manual and automated quantification of microtubule behavior. Key contributions are increasing accuracy and d...
详细信息
The method of microtubule tracking and dynamics analysis, presented here, improves upon the current means of manual and automated quantification of microtubule behavior. Key contributions are increasing accuracy and data volume, eliminating user bias and providing advanced analysis tools for the discovery of temporal patterns in cellular processes. By tracking the entire length of each resolvable microtubule, as opposed to only the tip, it is possible to boost dynamics studies with positional information that is virtually impossible to collect manually. We demonstrate the method on the analysis of a microtubule dataset, which was manually tracked and analyzed in the study of betaIII-tubulin isoform. Our results show that automated recognition of temporal patterns in cellular processes offers a highly promising potential
Two novel threshold techniques are proposed for image segmentation which is a very critical task in any image processing. The two methods are based in scanning each image row by row and to find the proper threshold va...
详细信息
Two novel threshold techniques are proposed for image segmentation which is a very critical task in any image processing. The two methods are based in scanning each image row by row and to find the proper threshold value. A modification of this method is developed to find the threshold value by average. The two methods are implemented on a mammogram and accordingly, a comparison between the two methods is carried out
This paper presents the nonresonant ultrasonic motor (SPIDER)-driven precision stage control based on an adaptive identification method with a variable forgetting factor (VFF). SPIDER-driven stage has a strong non-lin...
详细信息
This paper presents the nonresonant ultrasonic motor (SPIDER)-driven precision stage control based on an adaptive identification method with a variable forgetting factor (VFF). SPIDER-driven stage has a strong non-linearity due to the frictional drive mechanism. Focusing on the VFF, dynamical change of frictional property is detected. Therefore, fast and precise friction compensation can be performed based on the VFF. The validity of both the identification and compensation methods is verified through experiments
Microcellular solutions in wireless networks increase the network traffic control as a result of frequent handover behavior. This paper proposes a two layer wireless call admission control to optimize the forced termi...
详细信息
Microcellular solutions in wireless networks increase the network traffic control as a result of frequent handover behavior. This paper proposes a two layer wireless call admission control to optimize the forced termination probability of frequent handovers.
Crosstalk is an important factor that needs to be considered and study its effects in copper wires, especially when voice communication takes place. Its presence has proven to be an impaired factor in the performance ...
详细信息
Crosstalk is an important factor that needs to be considered and study its effects in copper wires, especially when voice communication takes place. Its presence has proven to be an impaired factor in the performance of communication services. This paper measures the isolation losses and the crosstalk losses as a function of the frequency and the length of the copper wires. It also presents throughput results from modems designed in the context of an EU financed project that can provide a symmetric 100 Mbps over two pairs for reach up to 500m (5 times the existing reach of 100-BASE-T systems).
The increasing demand for wireless broadband service offering in long distances is the major drive behind the emergence of the WiMAX technology. WiMAX is targeted to providing high bit data rates to the end users in a...
详细信息
The increasing demand for wireless broadband service offering in long distances is the major drive behind the emergence of the WiMAX technology. WiMAX is targeted to providing high bit data rates to the end users in a wireless manner, any time, in any location, even in harsh environmental conditions and at an acceptable quality. This paper presents the experimental results of a WiMAX system that follows the specifications of IEEE 802.16-2004 standard. Throughput and Bit Error Rate (BER) measurements, as well as voice and video service experiments are carried out, leading to useful conclusions for the performance evaluation of the WiMAX system under test and the WiMAX technology in general.
The use of local search in evolutionary techniques is believed to enhance the performance of the algorithms, giving rise to memetic or hybrid algorithms. However, in many continuous optimization problems the additiona...
详细信息
The use of local search in evolutionary techniques is believed to enhance the performance of the algorithms, giving rise to memetic or hybrid algorithms. However, in many continuous optimization problems the additional cost required by local search may be prohibitive. Thus we propose the local learning of the objective and constraint functions prior to the local search phase of memetic algorithms, based on the samples gathered by the population through the evolutionary process. The local search operator is then applied over this approximated model. We perform some experiments by combining our approach with a real-coded genetic algorithm. The results demonstrate the benefit of the proposed methodology for costly black-box functions.
暂无评论