Suggested Topics within your search.
Suggested Topics within your search.
-
1381
5G mobile/multi-access edge computing integrated architecture and deployment strategy
Published 2018-04-01“…Mobile/multi-access edge computing (MEC) technology migrates computing storage capabilities and service service capabilities to the edge of the network,enabling applications,services and content to be localized,close-range and distributed.Therefore,to a certain extent,the business requirements of 5G enhanced mobile broadband,low latency and high reliability and large-scale machine communication terminal connection are solved.At the same time,the MEC fully exploits mobile network data and information to implement the awareness and analysis of context information of the mobile network and open it to third-party service applications.This effectively enhances the level of intelligence in mobile networks and promotes the deep integration of networks and services.Therefore,the value and significance of the MEC was firstly analyzed according to the typical 5G service scenario.Secondly,based on the research progress of ETSI and 3GPP,a MEC fusion architecture oriented to 5G was proposed,and the overall deployment strategy of MEC was discussed and analyzed.Furthermore,the possible problems and challenges in the future application of MEC technology in 5G networks were discussed to provide reference for subsequent research and development.…”
Get full text
Article -
1382
Comparison of Different Confidence Intervals under Type-I Censoring Scheme
Published 2022-01-01“…In a life testing experiment, the successive failure times at putting n units under test are recorded under consideration that the advance fixed experiment is terminated at time T. This type of censoring scheme, called conventional Type-I censoring scheme, is used widely. …”
Get full text
Article -
1383
Macroanatomic investigations on the innervation of the eye in holstein cattle
“…The trochlear nerve left the cranial cavity via the foramen orbitorotundum after originating from the caudal coliculus and terminated in the caudal third of the dorsal obliquus muscle. …”
Get full text
Article -
1384
Pouvoir et prière dans les images byzantines de don
Published 2008-08-01“…Nous analyserons les occurrences textuelles et figuratives du don impérial/princier et/ou du don surnaturel destiné au souverain dans quatre manuscrits de la même famille : le ms. gr. 74 (Paris, Bibliothèque nationale de France), le add. ms. 39627 (Londres, British Library), le suc. 23 et le suc. 24 (Sucevita, Roumanie), pour terminer par une interrogation plus globale sur le sens du don.…”
Get full text
Article -
1385
Energy Saving Optimization for Mobile Relays in Multicast Transmission Underlying Cellular Network
Published 2015-04-01“…Device-to-device(D2D)communication enables direct data transmission between mobile terminals(MT)in proximity by reusing the frequency of traditional cellular network.It is capable to improve individual quality of service(QoS),reduce MT's energy consumption and expand cell coverage.Particularly,when multiple MT request the same content of service at cell edge,some MT in their vicinity could relay the data to them by means of D2D multicast transmission.However,due to the limited battery lifetime of MT and spectral reusing between D2D and cellular communications,relay node selection and power control are two key techniques needed to be addressed.A particle swarm optimization based scheme to minimize the sum power consumption of mobile relays while guarantee the individual QoS requirement by incorporating both relay node selection and power control was proposed.The efficacy of our scheme was extensively verified through numerical results.…”
Get full text
Article -
1386
Rozmyślając w chaosie — mapowanie sygnałów niepewności zorganizowanej
Published 2024-10-01“…W kontekście złożonego i płynnego krajobrazu współczesności wykorzystano termin VUCA (Volatility, Uncertainty, Complexity, Ambiguity) jako narzędzie opisu współczesnego świata, gdzie zmienność, niepewność, złożoność i niejednoznaczność są dominującymi cechami. …”
Get full text
Article -
1387
Migrasjon ved mayaenes Mensabak? Radiokarbondateringer i befolkningsendringsmodeller
Published 2024-12-01“…Based on other studies, I discuss scenarios related to socio-political discontentment and conflict, a general restructure of settlements in the region and local problems with the water supply as a possible backdrop for the migration from Mensabak in the late and terminal Preclassic Period. This introduces some new perspectives and puts Noh K'uh in a greater context. …”
Get full text
Article -
1388
Abelia x grandiflora 'Sherwoodii'
Published 2004-10-01“…Reaching a height of 3 to 6 feet with a spread of 6 to 10 feet, the mounded form of 'Sherwoodii' glossy abelia is clothed from spring through fall with terminal clusters of delicate pink and white, small, tubular flowers. …”
Get full text
Article -
1389
Comparison of MIMO based on high capacity LPWAN technology TurMass<sup>TM</sup> and LoRa
Published 2021-12-01“…With the rapid development of low power wide area network (LPWAN) technologies, more and more IoT terminals need to access the network.In order to deal with the challenge of massive random access, grant-free random access with massive MIMO (MGFRA) was proposed for LPWAN scenarios.The MGFRA was introduced and the performance of MGFRA to validate its performance advantage of greatly improving the channel access capacity with extreme low signaling overhead was theoretically analyzed.Further, TurMass<sup>TM</sup>was introduced, which is a high-capacity LPWAN technology based on MGFRA.To demonstrate the advantages of TurMass<sup>TM</sup>in practical applications, TurMass<sup>TM</sup>and LoRa in signal coverage, communication rate, network capacity, low power consumption and low cost in typical LPWAN communication scenarios were compared.The comparison results show that TurMass<sup>TM</sup>has outstanding advantages in signal coverage, communication rate, network capacity, low power consumption and low cost compared with LoRa.…”
Get full text
Article -
1390
Propagation and Production of Atlantic St. Johnswort
Published 2004-07-01“…Flowers occur from June to September, are terminal and axillary, and may be solitary or in small clusters called cymules or dichasia. …”
Get full text
Article -
1391
Policy dismantling by capacity manipulation in a context of democratic backsliding: The bureaucracy in disarray in Bolsonaro’s Brazil
Published 2022-12-01“…The policy dismantling framework was developed to account for processes involving the reduction or termination of existing policies, especially in the so-called advanced democracies. …”
Get full text
Article -
1392
Electrical transport of SiNWs array after covalent attachment of new organic functionalities
Published 2012-05-01“…Electrical properties stability in time of junctions embedding propenyl terminated silicon nanowires network and transport modification after secondary functionalization is also shown. …”
Get full text
Article -
1393
Research on geomagnetic indoor high-precision positioning algorithm based on generative model
Published 2023-06-01“…Aiming at the current bottleneck of constructing a fine geomagnetic fingerprint library that required a lot of labor costs, two generative models called the conditional variational autoencoder and the conditional confrontational generative network were proposed, which could collect a small number of data samples for a given location, and generate pseudo-label fingerprints.At the same time, in order to solve the problem of low positioning accuracy of single-point geomagnetic fingerprints, a geomagnetic sequence positioning algorithm based on attention mechanism of convolutional neural network-gated recurrent unit was designed, which could effectively use the spatial and temporal characteristics of fingerprints to achieve precise positioning.In addition, a real-time, portable mobile terminal data collection and positioning system was also designed and built.The actual test shows that the proposed model can effectively construct the available geomagnetic fingerprint database, and the average error of the proposed algorithm can reach 0.16 m.…”
Get full text
Article -
1394
Investigation of traffic adaptation based interference alignment for cognitive radio networks
Published 2014-04-01“…Moreover, due to its simplicity, the scheme is highly desirable to implement in low cost terminals.…”
Get full text
Article -
1395
Resource allocation algorithm for intelligent reflecting surface-aided SWIPT networks
Published 2022-02-01“…In order to achieve the efficient interconnection of everything, under the limitations of terminal devices’ batteries and network coverage, the intelligent reflecting surface (IRS) technology was introduced to build a new IRS-aided simultaneous wireless information and power transfer (SWIPT) network.To further improve the total throughput of the network, a resource allocation (RA) scheme aiming at sum-rate maximization was proposed.Considering that the constraints of the maximum transmit power of a base station, the minimum energy requirement of each device and the phase shifts on an IRS, a joint transmit beamforming, power splitting (PS) ratio and phase shift optimization problem was formulated.Due to the non-convex problem and coupled variables, a block coordinate descent (BCD)-based algorithm was proposed.Then, the joint transmit beam forming design, PS ratio optimization and phase shift design were solved by using the successive convex approximation (SCA) and Riemannian manifold methods, respectively.Simulation results show that the proposed RA scheme performs better than the existing RA schemes in terms of sum-rate.…”
Get full text
Article -
1396
Massive Fluctuations in Deconfining SU(2) Yang-Mills Thermodynamics
Published 2017-01-01“…In spite of the observed increasingly suppressing effect when increasing 2-particle-irreducible (2PI) loop order, a quantitative analysis enables us to disprove the conjecture voiced in hep-th/0609033 that the loop expansion would terminate at a finite order. This reveals the necessity to investigate exact expressions of (at least some) higher-loop order diagrams. …”
Get full text
Article -
1397
Marketing strategies of economic entities (on the example of persons carrying out activities in the field of customs business)
Published 2022-11-01“…Based on the material presented in the article, it was concluded that the inactive marketing activities of the majority of customs representatives may lead to the termination of their activities in the face of growing competition in the market.…”
Get full text
Article -
1398
Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation
Published 2023-11-01“…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
Get full text
Article -
1399
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01“…The prevalence of mobile intelligent terminals gives the location-based service (LBS) more opportunities to enrich mobile users’ lives.However,mobile users enjoy the convenience with the cost of personal privacy.The side information and mobile user’s recent requirement records were considered,which were obtained or stored by the service provider.Based on the existence of recent requirement records,adversary can employ the inference attack to analysis mobile user’s personal information.Therefore,two schemes were proposed,including of basic privacy self-correlation privacy-preserving scheme (Ba-2PS) and enhanced privacy self-correlation privacy-preserving scheme(En-2PS).In En-2PS,the privacy-preserving scheme was designed from two dimensions of aspects of time factor and query region,which increased the uncertainty inferring out the real information.Finally,the privacy analysis was illustrated to proof En-2PS’s privacy degree,then the performance and privacy evaluation results indicate that En-2PS is effective and efficient.…”
Get full text
Article -
1400
„Prosta metoda jak skutecznie rzucić rosyjski”. Metalingwizm i autobiografizm we wschodnioeuropejskim stand-upie podczas wojny
Published 2024-12-01“…Artykuł wprowadza pojęcie comedy of emergency jako typ komedii kryzysowej, który stanowi odpowiedź na katastrofy społeczne. Termin ten opisuje nowe funkcje wschodnioeuropejskiego stand-upu w latach 2022–2023. …”
Get full text
Article