In web service, the server is normally responsible for the connection termination. That would produce useless connections. In this paper, to improve quality of web service, we propose two methods in which a client ter...
详细信息
In a wireless LAN, since two or more terminals in a service area do the random access in a signal channel, it is necessary to achieve an efficient access that reduces the frame collision. Under the standard IEEE 802.1...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high rel...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected *** the reduction in physical(PHY)layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability,the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper *** mcMTC has a significant technical impact on the design of all layers of the communication protocol *** this paper,an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a standard bearing in mind short packet transmission *** achieve this aim,we analyzed and compared the channel coding performance of convolutional codes(CCs),low-density parity-check(LDPC)codes,and polar codes in wireless network on the condition of short data packet *** Viterbi decoding algorithm(VA),logarithmic belief propagation(Log-BP)algorithm,and cyclic redundancy check(CRC)successive cancellation list(SCL)(CRC-SCL)decoding algorithm were adopted to CC,LDPC codes,and polar codes,***,a new PHY layer for mcMTC has been *** reliability of the proposed approach has been validated by simulation in terms of Bit error rate(BER)and packet error rate(PER)***-to-noise ratio(SNR).The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER=10−5 or even better with the implementation of polar *** results also show that the general-purpose wireless net
In contrast to fault diagnosis relying solely on a single sensor, the method of multi-sensor information fusion for fault diagnosis (MSIFFD) broadens the spectrum of available information sources. It is renowned for i...
详细信息
Due to environmental mismatch, speech recognition systems often exhibit drastic performance degradation in noisy conditions. This paper presents a model-based technique termed Adaptive Parallel Model Combination (APMC...
详细信息
ISBN:
(纸本)9781424423149
Due to environmental mismatch, speech recognition systems often exhibit drastic performance degradation in noisy conditions. This paper presents a model-based technique termed Adaptive Parallel Model Combination (APMC) which compensates the initial acoustic models to reduce the discrepancy. APMC used the well-known PMC technique to composite a set of corrupted speech models, while fine tuning the mean parameter of the models using a transformation-based adaptation technique called Maximum Likelihood Spectral Transformation (MLST). Evaluated on a context-independent phone recognition task, APMC was found to be superior to both PMC and MLST, especially in non-stationary noisy conditions. On average, APMC has achieved 48.81% improvement over the initial models, whereas PMC and MLST have improved the accuracy by 34.12% and 35.23% respectively.
It is shown that five optimal and one quasi-optimal binary codes with respect to the Griesmer bound can be obtained from cyclic codes over GF(2(m)). An [m(2(em)-1), em, 2(em-1)m] code, a [3(2(2e)-1), 2e, 3 . 2(2e-1)] ...
详细信息
It is shown that five optimal and one quasi-optimal binary codes with respect to the Griesmer bound can be obtained from cyclic codes over GF(2(m)). An [m(2(em)-1), em, 2(em-1)m] code, a [3(2(2e)-1), 2e, 3 . 2(2e-1)] code, a [2(2(2e)-1), 2, (2(2e+2)-4)/3] code, a [3(2(2e)-1), 2, 2(2e+1)-2] code, and a [3(2(2e)-1), 2(e+1), 3 . 2(2e-1)-2] code are optimal and a [2(2(2e)-1)2(e+1), 2(2e)-2] code is quasi-optimal.
Transformation in procurement technique aims to create a sustainability development and innovative outsourcing strategy. It can increase the probability of project success with quality and give an added value in money...
详细信息
Transformation in procurement technique aims to create a sustainability development and innovative outsourcing strategy. It can increase the probability of project success with quality and give an added value in money and contract times. Wide range of issues should be considered in producing a sincere and trusted decision within respective agencies. Our research proposed a procurement transformation model for selecting the optimal result of contractor selection under multi criteria environments. The corresponding data are centralizing, easy to manage and can be updated accordingly. Fuzzy comparing judgment is used as the method to overcome the ambiguity aspects in selecting significant preferences by decision maker regarding to the subjective opinion. Decision making process is represented by the integration of evaluation model to produce a final result. Finally, the model was tested in tender evaluation processes to determine the most beneficial contractor to perform the construction project.
Decision trees are one of the most transparent methods probably most often used for solving classification, tasks. In the process of decision tree induction a lot of input parameters have to be fine-tuned in order to ...
详细信息
Decision trees are one of the most transparent methods probably most often used for solving classification, tasks. In the process of decision tree induction a lot of input parameters have to be fine-tuned in order to obtain good results. However the most important and probably most influential parameter in top-down induction method is a splitting criterion, which can vary from one classification task to another. In this paper we empirically tested four of them, based on well known purity measures, on 54 UCI databases. Although none of the proposed splitting criterion in the literature has proved to be universally better than the rest, they are not always suitable for solving any classification task. Therefore we propose two new splitting criteria: hybrid linear combination of purity measures and voting of purity measures, which obtain at least comparable results to other well-known criteria used in greedy decision tree induction method, while their structure makes them ideal for non-expert users. Boosting was also applied as one of the most successful ensemble methods, which once again proved the ability to significantly improve the classification accuracy on many databases.
Airplanes are a social necessity for movement of humans,goods,and *** are generally safe modes of transportation;however,incidents and accidents occasionally *** prevent aviation accidents,it is necessary to develop a...
详细信息
Airplanes are a social necessity for movement of humans,goods,and *** are generally safe modes of transportation;however,incidents and accidents occasionally *** prevent aviation accidents,it is necessary to develop a machine-learning model to detect and predict commercial flights using automatic dependent surveillance–broadcast *** study combined data-quality detection,anomaly detection,and abnormality-classification-model *** research methodology involved the following stages:problem statement,data selection and labeling,prediction-model development,deployment,and *** data labeling process was based on the rules framed by the international civil aviation organization for commercial,jet-engine flights and validated by expert commercial *** results showed that the best prediction model,the quadratic-discriminant-analysis,was 93%accurate,indicating a“good fit”.Moreover,the model’s area-under-the-curve results for abnormal and normal detection were 0.97 and 0.96,respectively,thus confirming its“good fit”.
One of the biggest problems for establishing semantic interoperability is semantic conflicts, which prevent seamless message exchange between heterogeneous Web services. Consequently, numerous work has been done to es...
详细信息
暂无评论