Showing 41 - 60 results of 10,796 for search 'NRMA~', query time: 4.08s Refine Results
  1. 41
  2. 42
  3. 43

    GA-ARMA Model for Predicting IGS RTS Corrections by Mingyu Kim, Jeongrae Kim

    Published 2017-01-01
    “…The orbit prediction performance of the GA-ARMA is nearly equivalent to that of ARMA, but GA-ARMA’s clock prediction performance is clearly better than that of ARMA, achieving a 32% error reduction. …”
    Get full text
    Article
  4. 44

    Delay Minimization for BAC-NOMA Offloading in UAV Networks by Haodong Li, Zhengkai Yin, Changsheng Chen

    Published 2024-12-01
    “…This paper investigates the improvement of MEC-based task offloading services in energy-constrained UAV networks using backscatter communication (BackCom) with non-orthogonal multiple access (BAC-NOMA). The proposed BAC-NOMA protocol allows uplink UAVs to utilize downlink signals for backscattering tasks instead of transmitting through uplink NOMA. …”
    Get full text
    Article
  5. 45

    NATURALEZA JURÍDICA DE LAS NORMAS COMUNITARIAS ANDINAS by Luis Carlos Plata López, Donna Yepes Ceballos

    Published 2009-01-01
    “…Existe una ordenación jerarquizada de normas donde las superiores son la Constitución comunitaria y las que ocupan un rango inferior, las derivadas o secundarias, que emanan de los órganos comunitarios. …”
    Get full text
    Article
  6. 46

    Mahdi Akhavān-Sāles and the issue in the language of Nimā's poetry by Mehrdad Zarei, Mohammad Shadrooymanesh

    Published 2024-07-01
    Subjects: “…atā va laqāye nimā yushij…”
    Get full text
    Article
  7. 47
  8. 48

    Sum-rate maximization in MIMO NOMA system with imperfect CSI by Yanjing SUN, Yang LIU, Jiasi ZHOU, Qi CAO, Song LI

    Published 2019-11-01
    “…In order to solve the problem of maximizing the sum rate under the constraints of transmission power limitation and users’ rates requirements,precoder and receiver were devised by combining multiple-input multiple-output (MIMO) and non-orthogonal multiple access (NOMA) based on imperfect channel state information (CSI).To take advantage of successive interference cancellation (SIC) techniques to eliminate interference from weak user’s signal,each data stream of the strong user needed to decode the corresponding weak user’s signal.Since the problem formed was non-convex,it was converted into the problem with the difference of two convex functions (D.C.) by using semi-positive definite programming and first-order Taylor expansion,and a penalty function was used to solve the constraint of the rank of the precoding covariance matrix.The simulation results show that compared with the orthogonal multiple access technology,the proposed D.C.algorithm can improve system sum rate.…”
    Get full text
    Article
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54

    Power Allocation Intelligent Optimization for Mobile NOMA Communication System by Xiaobin Fu, Zhen Tang, Pingping Xiao

    Published 2022-01-01
    “…Non-orthogonal multiple access (NOMA) technology can greatly improve user access and spectral efficiency. …”
    Get full text
    Article
  15. 55

    Physical layer security of relay selection NOMA wireless systems by LUO Yancui, LI Guangqiu, YE Mingzhu, GAO Hui, ZHANG Yajuan

    Published 2024-03-01
    “…Aiming at poor performance of physical layer security (PLS) of decode-and-forward cooperative non-orthogonal multiple access (NOMA) systems and its performance deterioration in the presence of multi-eavesdropper, the PLS model of multi-relay selection NOMA wireless systems using modify-and-forward (MF) protocol was proposed. …”
    Get full text
    Article
  16. 56
  17. 57
  18. 58

    Secure transmission for NOMA downlink based on short packet communication by Gangcan SUN, Shaoke ZHAO, Wanming HAO, Zhengyu ZHU

    Published 2021-02-01
    “…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
    Get full text
    Article
  19. 59
  20. 60

    Empirical Likelihood for Partial Parameters in ARMA Models with Infinite Variance by Jinyu Li, Wei Liang, Shuyuan He

    Published 2014-01-01
    “…This paper proposes a profile empirical likelihood for the partial parameters in ARMA(p,q) models with infinite variance. We introduce a smoothed empirical log-likelihood ratio statistic. …”
    Get full text
    Article