• No results found

[PDF] Top 20 The random access NUM with multiclass traffic

Has 10000 "The random access NUM with multiclass traffic" found on our website. Below are the top 20 most common "The random access NUM with multiclass traffic".

The random access NUM with multiclass traffic

The random access NUM with multiclass traffic

... basic NUM is using the sum- of-square method in [7]. The nonconvex NUM is relaxed and solved by semidefinite ...the random access WLANs, the authors of [9] design a dual-based algorithm to ... See full document

12

Downlink Scheduling for Multiclass Traffic in LTE

Downlink Scheduling for Multiclass Traffic in LTE

... Scheduling policies specifically for voice over internet protocol (VoIP) have been studied in, for example, [36– 38]. Policies for full bu ff er tra ffi c have been studied in, for example, [2, 39–44]; many of these papers ... See full document

18

Non-Orthogonal Random Access scheme in Spatial Group Based Random Access for 5G Networks

Non-Orthogonal Random Access scheme in Spatial Group Based Random Access for 5G Networks

... as access class barring (ACB) [9–13], extended access barring (EAB) [14], dynamic allocation [15], specific back off scheme [16], and pull-based scheme ...separate access class, ACB allows the eNodeB ... See full document

5

MethPed: a DNA methylation classifier tool for the identification of pediatric brain tumor subtypes

MethPed: a DNA methylation classifier tool for the identification of pediatric brain tumor subtypes

... a Random Forest (RF) algorithm was fit to the data [18, 19]. Random Forest pools together many noisy but approximatively unbiased models, hence, redu- cing the predictions ...the Random Forest ... See full document

9

Enhancing the Performance of Random Access Networks with Random Packet CDMA and Joint Detection

Enhancing the Performance of Random Access Networks with Random Packet CDMA and Joint Detection

... multiple access (RP- CDMA) [6] is a recently proposed random transmission scheme which has been designed to ease the performance penalties associated with fully random network ... See full document

16

Quantum Key Distribution Random Access Network

Quantum Key Distribution Random Access Network

... Quantum key distribution (QKD) is a method of key distribution that is able to provide the absolute security in communications, and it has already been developed for decades of years. Since the first quantum key ... See full document

5

Traffic behaviour of VoIP in a simulated access network

Traffic behaviour of VoIP in a simulated access network

... To investigate possible solutions for improving QoS, a number of simulations were undertaken using Transmission Control Protocol (TCP) flows as well as User Datagram Protocol (UDP) flows. TCP flows were used mostly for ... See full document

7

Overview of emerging nonvolatile memory technologies

Overview of emerging nonvolatile memory technologies

... magnetic random-access memory (MRAM), spin-transfer torque random-access memory (STT-RAM), ferroelectric random-access memory (FeRAM), phase-change memory (PCM), and resistive ... See full document

33

Bandwidth Allocation with Fairness in Multipath Networks

Bandwidth Allocation with Fairness in Multipath Networks

... We simulated TRUMP and the proposed model in MATLAB. The path prices are up to date with γ = 0.1 in order to ensure the convergence. Most of the experiments are done by ω = 1, in which there may be no packet loss. Our ... See full document

10

Conductance Quantization in Resistive Random Access Memory

Conductance Quantization in Resistive Random Access Memory

... magnetic random access memory (MRAM) based on the giant or tunneling magnetoresist- ance effect [75–79] and phase change random access memory (PRAM) based on the reversible phase transitions ... See full document

30

The role of lagos traffic radio in educating road users on traffic management in lagos state, nigeria

The role of lagos traffic radio in educating road users on traffic management in lagos state, nigeria

... experience traffic that last for several hours at a ...limited access while a breakdown on this route, affects some other ...to traffic rules by road ... See full document

7

Performance analyses and design for cognitive radios

Performance analyses and design for cognitive radios

... Media Access Layer (MAC) functionalities ...broadband access to the rural areas in the USA where are normally hard to reach and the population density is typically very ...broadband access service is ... See full document

235

Exploring Numeracy in Word Embeddings

Exploring Numeracy in Word Embeddings

... a random embedding baseline on magnitude and numeration ...between Num and All variants, suggesting that seeing more nu- merals during training does not necessarily result in better ... See full document

7

Spintronics based random access memory: a review

Spintronics based random access memory: a review

... magnetic random access memories such as Spin Torque Transfer MRAM (STT-MRAM).. [1-5] have already found their place in niche products as embedded memory..[r] ... See full document

102

Predicting Human Assessment of Machine Translation Quality by Combining Automatic Evaluation Metrics using Binary Classifiers

Predicting Human Assessment of Machine Translation Quality by Combining Automatic Evaluation Metrics using Binary Classifiers

... The multiclass categorization problem is reduced to a set of binary problems that are solved us- ing standard classification learning algorithms trained on the results of multiple automatic evaluation ...the ... See full document

7

Integration of SDN and 5G and Its Related Challenges and Security Issues

Integration of SDN and 5G and Its Related Challenges and Security Issues

... heterogenous access, which only allow use of different access technologies such as Wi-Fi or LTE, but also support multi-network ...the access network architecture of different networks are different, ... See full document

7

Design and Simulation of Random Access Procedure in LTE

Design and Simulation of Random Access Procedure in LTE

... returning to Idle state, Wait_msg3_Reply: after receiving the random access response, “in case of contention based process” Random_access_control process will send request t[r] ... See full document

7

Adaptive Traffic Control System: The Smart and Imperative Traffic Monitoring System for India

Adaptive Traffic Control System: The Smart and Imperative Traffic Monitoring System for India

... Existing traffic patterns can be analyzed and predictive modeling can be used to estimate footfall in similar ...Smart Traffic Light System to train them for such specific ...deploy traffic police ... See full document

9

A Framework for Intelligent Decision Support System for Traffic Congestion Management System

A Framework for Intelligent Decision Support System for Traffic Congestion Management System

... Based on this analysis (see Sandra Rosenbloom [46]), the study team evaluated 17 of these techniques as both effective and feasible in a U.S. institutional context. However, none of these 17 offered more than marginal ... See full document

20

Predicting Primary Tumors using Multiclass Classifier Approach of Data Mining

Predicting Primary Tumors using Multiclass Classifier Approach of Data Mining

... then multiclass classifier with Random forest algorithm can provide better results with accuracy ...as Random Forest with accuracy 84.5%. As the Random Forest algorithm works best among all ... See full document

5

Show all 10000 documents...