In order to improve coverage and load balancing in cellular networks,CRE(Cell Range Expansion)which is introduced in LTE-Advanced has drawn significant ***,the ping-pong effect resulting from cell handover is still ...
详细信息
In order to improve coverage and load balancing in cellular networks,CRE(Cell Range Expansion)which is introduced in LTE-Advanced has drawn significant ***,the ping-pong effect resulting from cell handover is still a *** this paper,we propose a new dynamic smooth handover method based on transition zones for the celledge users to deal with the ping-pong *** cells’boundaries extend to transition zones within which the users do not switch serving *** the other hand,the range of the transition zones can be adjusted depending on performance *** results show that our proposed method is near optimum throughput and traffic load performance without the ping-pong effect.
The definitions of the Lee complete ρ weight enumerator and the exact complete ρ weight enumerator over Mn×s (F2[u, v]{uk, v2, uv-vu}) are introduced, and the MacWilliams identities with respect to the RT metri...
详细信息
A whole-process WiFi security perception software system is designed in this paper based on the analysis of client's wireless access process, it consists of three modules to protect user from security threats duri...
详细信息
ISBN:
(纸本)9781538603932
A whole-process WiFi security perception software system is designed in this paper based on the analysis of client's wireless access process, it consists of three modules to protect user from security threats during the pre-connection, connection and after-connection. The system could detects WiFi environment and shows with 3D effect, marking the Rogue AP, which is found out by multi-factors analysis techniques. During the connection, it inspired by the idea of Fog computing, sending fake traffic to protect PSK from sniffing. After connection, the system detects Deauth attack in time, and traces the attacker. Finally, The software functionalities is realized, all the suspicious points are displayed on the User Interface (UI). The corresponding experimental testing shows that it could protect the surf in the WiFi environment effectively.
—This paper studies the problem of how to choose good viewpoints for taking photographs of architectures. We achieve this by learning from professional photographs of world famous landmarks that are available on the ...
详细信息
With the expansion of the scale of wireless sensor network (WSN), the network node number is increasing. Because of the huge network overhead and low precision, the reference broadcast time synchronization algorithm c...
详细信息
ISBN:
(纸本)9781538629024
With the expansion of the scale of wireless sensor network (WSN), the network node number is increasing. Because of the huge network overhead and low precision, the reference broadcast time synchronization algorithm can not meet the actual demand. In this paper, a novel time synchronization algorithm for high precision energy efficient wireless sensor networks is proposed. Through a Markov random field-based maximum a posteriori estimation method of wireless sensor network in two nonadjacent nodes in receiving multiple reference broadcast messages, the algorithm estimated the clock drift under the condition of phase error estimation, tracked in real time by the Gardner loop, and then realized the time synchronization process. Finally, the MATLAB simulation showed the proposed algorithm not only has a further improvement in the time synchronization accuracy, but also effectively reduces the overall energy consumption level of the whole WSN.
Double circulant codes of length 2n over the semilocal ring R = Fq + uFq, u2 = u, are studied when q is an odd prime power, and-1 is a square in Fq. Double negacirculant codes of length 2n are studied over R when n is...
This paper deals with the finite-time H,controller problem for a class of time-delay and with uncertain parameters continuous positive *** the systems with unknown disturbances,our aim is to design a suitable control ...
详细信息
This paper deals with the finite-time H,controller problem for a class of time-delay and with uncertain parameters continuous positive *** the systems with unknown disturbances,our aim is to design a suitable control law which makes the closed-loop system be finite-time bounded and satisfies the given H *** using the constructed Lyapunov function and linear matrix inequalities(LMIs) technique,sufficient conditions that the solution of the finite-time H∞controller existed are given and ***,a simulation example is presented to show the feasibility and validity of the present methods.
We study the combinatorial function L(k, q), the maximum number of nonzero weights a linear code of dimension k over Fq can have. We determine it completely for q = 2, and for k = 2, and provide upper and lower bounds...
详细信息
This paper investigates the existence, enumeration and asymptotic performance of self-dual and LCD double circulant codes over Galois rings of characteristic p2 and order p4 with p and odd prime. When p ≡ 3 (mod 4), ...
详细信息
This paper studies the problem of how to choose the viewpoint for taking good photographs for architecture. We achieve this by learning from professional photographs of world famous landmarks that are available in the...
详细信息
暂无评论