首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   1篇
无线电   14篇
  2019年   2篇
  2018年   1篇
  2017年   2篇
  2016年   1篇
  2013年   2篇
  2008年   1篇
  2007年   1篇
  2006年   1篇
  2004年   1篇
  2003年   1篇
  2001年   1篇
排序方式: 共有14条查询结果,搜索用时 15 毫秒
1.
In this article we consider the performance of the 3.84 Mcpstime-division duplex (TDD) mode of UTRA (Universal TerrestrialRadio Access) network. We emphasize two of the radio resourcemanagement algorithms, handover and uplink power control, whoserole in the overall system performance is studied extensively.First, a handover algorithm used in WCDMA (Wideband Code DivisionMultiple Access) standard is considered in a TDD-mode operation.This gives rise to a careful setting of different handoverparameters, and the evaluation of the effects to the systemperformance. Secondly, the specified uplink power controlalgorithm is considered. Since it is based on several user-mademeasurements which may involve both random and systematic errors acareful study about the suitability of the power control scheme iscarried out.  相似文献   
2.
Nowadays, although the data processing capabilities of the modern mobile devices are developed in a fast speed, the resources are still limited in terms of processing capacity and battery lifetime. Some applications, in particular the computationally intensive ones, such as multimedia and gaming, often require more computational resources than a mobile device can afford. One way to address such a problem is that the mobile device can offload those tasks to the centralized cloud with data centers, the nearby cloudlet or ad hoc mobile cloud. In this paper, we propose a data offloading and task allocation scheme for a cloudlet-assisted ad hoc mobile cloud in which the master device (MD) who has computational tasks can access resources from nearby slave devices (SDs) or the cloudlet, instead of the centralized cloud, to share the workload, in order to reduce the energy consumption and computational cost. A two-stage Stackelberg game is then formulated where the SDs determine the amount of data execution units that they are willing to provide, while the MD who has the data and tasks to offload sets the price strategies for different SDs accordingly. By using the backward induction method, the Stackelberg equilibrium is derived. Extensive simulations are conducted to demonstrate the effectiveness of the proposed scheme.  相似文献   
3.
Wireless Local Area Network (WLAN) positioning has become a popular localization system due to its low-cost installation and widespread availability of WLAN access points. Traditional grid-based radio frequency (RF) fingerprinting (GRFF) suffers from two drawbacks. First it requires costly and non-efficient data collection and updating procedure; secondly the method goes through time-consuming data pre-processing before it outputs user position. This paper proposes Cluster-based RF Fingerprinting (CRFF) to overcome these limitations by using modified Minimization of Drive Tests data which can be autonomously collected by cellular operators from their subscribers. The effect of environmental changes and device variation on positioning accuracy has been carried out. Experimental results show that even under these variations CRFF can improve positioning accuracy by 15.46 and 22.30% in 95 percentile of positioning error as compared to that of GRFF and K-nearest neighbour methods respectively.  相似文献   
4.
The cognitive processing mechanism of humor refers to how the system of neural circuitry and pathways in the brain deals with the incongruity in a humorous manner. The past research has revealed different stages and corresponding functional brain activities involved in humor-processing in terms of time and space dimensions, highlighting the effects of the time windows of about 400 ms, 600 ms, and 900 ms. However, much less is known about humor processing in light of the frequency dimension. A total of 36 Chinese participants were recruited in this experiment, with Chinese jokes, nonjokes, and nonsensical sentences used as the stimuli. The experimental results showed that there were significant differences among conditions in the P200 effect, which signified that the incongruity detection had already been integrated and perceived at about 200 ms, prior to the semantic integration at about 400 ms. This pre-processing is specific to Chinese verbal jokes due to the simultaneous involvement of both orthographic and phonologic parts in processing Chinese characters. The analysis on the frequency dimension indicated that beta’s power particularly reflected the characteristics of different stages in Chinese verbal humor processing. Jokes’ and nonsensical sentences’ relative power changes on the beta band ranked significantly higher than that of nonjokes at about 200 ms, which suggested the existence of more difficulties in meaning construction in pre-processing the incongruities. This indicated a continuity between the analysis of event related potential (ERP) components and neural oscillations and revealed the key role of the beta frequency band in Chinese verbal joke processing.  相似文献   
5.
This paper discusses downlink inner loop power control of dedicated channels in UTRA TDD. The current UTRA TDD downlink power control is similar to one in UTRA FDD mode, that comprises of closed inner loop and quality based outer loop. However, due to the time division feature and associated fexibility with asymmetry of TDD, the inner loop can not react as fast as in FDD and it is affected by rapid changes in environment. Therefore, the effect of the inner loop algorithm to the performance of UTRA TDD network is studied in this paper. Especially, the use of asymmetric step sizes for power up and power down commands is evaluated in contrast to the conventional symmetric power adjustment. Since it would be beneficial for the downlink inner loop power control to reach the target SIR as fast as possible, the power control step size based on the difference between the UE measured SIR and target SIR would be the most desirable power adjustment. Since the effectiveness of this type of an algorithm depends on available signaling bandwidth that is used, a study is carried out to find the tradeoff between the signaling bandwidth and related network performance.Janne Kurjenniemi was born in Jyväskylä, Finland, in March 1974. He received the M.Sc. in telecommunications in 2001 from the University of Jyväskylä, Jyväskyl, Finland. He is working as a Researcher at the Department of Mathematical Information Technology, University of Jyväskylä. His research interests include radio resource management for wireless communication systems.Otto-Aleksanteri Lehtinen was born in Tampere, Finland, in September 1971. He received the Master of Science in Technology in 1999 from the Helsinki University of Technology, Department of Electrical engineering (major in radio technology, minor signal processing and computer devices). His research interests include radio resource management for wireless communication systems.Tapani Ristaniemi was born in Kauhava, Finland, in 1971. He received the M.Sc. in mathematics in 1995, Ph.Lic. in applied mathematics in 1997, and Ph.D. in telecommunications in 2000 from the University of Jyväskylä, Jyväskylä, Finland. During 2001–2003 he was a professor of telecommunications at the Department of Mathematical Information Technology, University of Jyväskylä. In 2003 he joined the Institute of Communications Engineering in the Tampere University of Technology, Finland, where he has been a professor of wireless data communications. His research interests include signal processing for communications and radio resource management for wireless networks.  相似文献   
6.
This article presents an automatic malfunction detection framework based on data mining approach to analysis of network event sequences. The considered environment is long term evolution (LTE) of Universal Mobile Telecommunications System with sleeping cell caused by random access channel failure. Sleeping cell problem means unavailability of network service without triggered alarm. The proposed detection framework uses N-gram analysis for identification of abnormal behavior in sequences of network events. These events are collected with minimization of drive tests functionality standardized in LTE. Further processing applies dimensionality reduction, anomaly detection with K-Nearest Neighbors, cross-validation, postprocessing techniques and efficiency evaluation. Different anomaly detection approaches proposed in this paper are compared against each other with both classic data mining metrics, such as F-score and receiver operating characteristic curves, and a newly proposed heuristic approach. Achieved results demonstrate that the suggested method can be used in modern performance monitoring systems for reliable, timely and automatic detection of random access channel sleeping cells.  相似文献   
7.
Multimedia Broadcast Multicast Service (MBMS) in Wideband Code Division Multiple Access (WCDMA) networks is used to transmit information from one source to vast amount of recipients. The MBMS technique eases the load of the network and therefore allows network to serve more subscribers. The very aim of this study is to evaluate the performance of Release 6 MBMS and its performance enhancements in WCDMA networks. Special attention will be focused on macro and receive diversity which are considered in addition to time diversity provided by long interleaving as enhancements on MBMS performance. 3GPP Release 6 specifications for MBMS introduce two macro diversity schemes: soft and selective combining. The effect of those combining scheme concepts together with and without receive diversity provided by multiple receive antennas are examined. Also, a concept closely related to the receive diversity called Rx-switching i.e., turning the another receive antenna off in good channel situations for power saving purposes is studied. The system level performance of MBMS point-to-multipoint (p-t-m) mode is evaluated with dynamic system level tool in which e.g., mobility of users and interactions of the radio resource management functionalities are explicitly taken into account. Our studies indicate that macro diversity brings significant gains to the MBMS performance. Receive diversity together with macro diversity schemes improves the performance even more and therefore enhances the cell throughput that MBMS can offer. Furthermore, based on the findings of this study it seems that 2Rx Rake receiver can operate with a single antenna significant amount of time without sacrificing desired coverage and thus provide clear power saving opportunities.
Tapani RistaniemiEmail:
  相似文献   
8.
Liu  Liqing  Guo  Xijuan  Chang  Zheng  Ristaniemi  Tapani 《Wireless Networks》2019,25(4):2027-2040
Wireless Networks - In the mobile cloud computing (MCC), although offloading requests to the distant central cloud or nearby cloudlet can reduce energy consumption at the mobile devices (MDs), it...  相似文献   
9.
We propose simple and efficient algorithms for the code timing acquisition in the direct-sequence code-division multiple-access communication system. The essential assumption is that a preamble or an unmodulated pilot channel is available for the desired user. Then the correlation matrix R(τ) of the sampled data, where τ is suitably chosen time lag, contains the timing information only of desired user, while the contributions of uncorrelated interferers and noise are suppressed out. Hence, compared to the conventional approach, more interference suppression is achieved. Coarse delay estimates are then obtained by a matched filter (MF) or multiple signal classification-type approaches. In the latter case, only L eigenvectors are computed, where L is the number of resolvable paths. If only one path exists, an additional procedure is proposed to both approaches, by which the estimation accuracy is greatly improved with negligible increase in computation. More precisely, the chip timing offset due to chip-asynchronous sampling can be determined by solving a system of two second-order polynomials for each chip interval. Therefore, only at most 2C hypotheses are needed, where C is the processing gain. All the proposed methods are computationally quite simple, containing mainly MF-operations, or at most computation of only few eigenvectors. Mean acquisition time analysis is carried out semi-analytically. Numerical experiments speaks for the possibility of achieving significant performance gains compared to conventional acquisition, especially in the presence of strong multiple-access interference, making them attractive options to be attached for the next generation mobile receivers  相似文献   
10.
We propose using Independent Component Analysis (ICA) as an advanced pre-processing tool for blind suppression of interfering jammer signals in direct sequence spread spectrum communication systems utilizing antenna arrays. The role of ICA is to provide a jammer-mitigated signal to the conventional detection. If the jammer signal is weak or absent, preprocessing by ICA is not advisable. Therefore we also consider two possible switching schemes, called pre-switching and post-switching, which activate the ICA-based jammer canceller only when it is expected to improve conventional detection. ICA-RAKE pre-switching is less complex, while post-switching performs better, especially when the jammer is pulsed in nature. Simulations are given to illustrate the achieved performance gains for single- and multi-path channels.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号