Search results for "GSM"
showing 10 items of 154 documents
Leksiskie stilistiskie izteiksmes līdzekļi Eiropas Savienības darbības programmā „Izaugsme un nodarbinātība”
2018
Šī bakalaura darba mērķis ir veikt diskursa analīzi un noteikt leksiski stilistiskos izteiksmes līdzekļus un to lomu ES institucionālajā diskursā, ES Darbības programmā “Izaugsme un nodarbinātība”. Šajā pētījumā uzsvars likts uz ES institucionālo diskursu, izmantojot diskursa analīzi kā pētniecības metodi un analizējot leksiski stilistisko izteiksmes līdzekļu komunikatīvo nolūku. Balstoties uz pētījuma rezultātiem, var secināt, ka leksiski stilistiskie izteiksmes līdzekļi tiek plaši lietoti ES Darbības programmā “Izaugsme un nodarbinātība”, un padara ES institucionālo diskursu daudz pievilcīgāku lasītājiem. Veiktā pētījuma rezultāti atklāja, ka visbiežāk lietotie leksiski stilistiskie iztei…
Mutual entity authentication for LTE
2011
In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.
Enabling Soft Frequency Reuse and Stienen's Cell Partition in Two-Tier Heterogeneous Networks: Cell Deployment and Coverage Analysis
2021
Heterogeneous cellular networks (HetNets) are one of the key enabling technologies for fifth generation (5 G) networks. In HetNets, the use of small base stations (SBSs) inside the coverage area of a macro base station (MBS) offers higher throughput and improved coverage. However, such multi-tier base station deployment introduces new challenges, e.g., (i) All users experience significant inter-cell interference (ICI) due to frequency reuse, (ii) SBS associated users experience severe MBS-interference due to higher MBS transmit power, and (iii) MBS coverage edge users receive lower signal-to-interference ratio (SIR) due to longer distances. To address the aforementioned challenges, this wor…
Automatic Calibration of an Industrial RGB-D Camera Network Using Retroreflective Fiducial Markers
2019
This paper describes a non-invasive, automatic, and robust method for calibrating a scalable RGB-D sensor network based on retroreflective ArUco markers and the iterative closest point (ICP) scheme. We demonstrate the system by calibrating a sensor network comprised of six sensor nodes positioned in a relatively large industrial robot cell with an approximate size of 10 m × 10 m × 4 m . Here, the automatic calibration achieved an average Euclidean error of 3 c m at distances up to 9.45 m . To achieve robustness, we apply several innovative techniques: Firstly, we mitigate the ambiguity problem that occurs when detecting a marker at long range or low resolution by comparing the…
Computational Offloading in Mobile Edge with Comprehensive and Energy Efficient Cost Function: A Deep Learning Approach
2021
In mobile edge computing (MEC), partial computational offloading can be intelligently investigated to reduce the energy consumption and service delay of user equipment (UE) by dividing a single task into different components. Some of the components execute locally on the UE while the remaining are offloaded to a mobile edge server (MES). In this paper, we investigate the partial offloading technique in MEC using a supervised deep learning approach. The proposed technique, comprehensive and energy efficient deep learning-based offloading technique (CEDOT), intelligently selects the partial offloading policy and also the size of each component of a task to reduce the service delay and energy …
Energy-Efficient Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT
2020
Edge computing provides a promising paradigm to support the implementation of industrial Internet of Things (IIoT) by offloading computational-intensive tasks from resource-limited machine-type devices (MTDs) to powerful edge servers. However, the performance gain of edge computing may be severely compromised due to limited spectrum resources, capacity-constrained batteries, and context unawareness. In this chapter, we consider the optimization of channel selection which is critical for efficient and reliable task delivery. We aim at maximizing the long-term throughput subject to long-term constraints of energy budget and service reliability. We propose a learning-based channel selection fr…
The think aloud method in studying the translation process
2019
This paper presents a theoretical description of the process-oriented research method in translation studies known as the think aloud method and a case study of an experimental application of think-aloud protocols (TAP). The article begins with a brief description of the relevance of its topic, taking into account the state of current researches in the field of translation studies. A literature review of recent publications where the think aloud method and think-aloud protocols as the principal introspective and retrospective method in different translation studies is given. The shortcomings and advantages of applying the think aloud method are discussed and the ways to optimise the use of …
Topic 5: Parallel and Distributed Data Management
2013
Nowadays we are facing an exponential growth of new data that is overwhelming the capabilities of companies, institutions and the society in general to manage and use it in a proper way. Ever-increasing investments in Big Data, cutting edge technologies and the latest advances in both application development and underlying storage systems can help dealing with data of such magnitude. Especially parallel and distributed approaches will enable new data management solutions that operate effectively at large scale.
More firms, more competition? The case of the fourth operator in France's mobile phone market
2010
Accepted, Forthcoming; International audience; To foster competition the French government authorized a fourth operator, ‘Free', to enter the country's mobile phone market at the end of 2009 alongside Orange, SFR and Bouygues Telecom (BT), who held respectively one-half, one-third and one-sixth of the market. By using a stylized model of France's phone market, we have examined what we call the regulator's nightmares and dreams. If Cournot competition is in place before Free's entry, minimizing the total profit fails to maximize the consumer surplus and the total surplus; the maximum most realistic price fall is 6.7% compared to three-way competition and could be 1.7% only; if Orange, SFR an…
Dynamic Asset Allocation Strategies Basedon Unexpected Volatility
2014
The author documents that at the aggregate stock market level, unexpected volatility is negatively related to expected future returns, and positively related to future volatility. The author demonstrates how the predictive ability of unexpected volatility can be utilized in dynamic asset allocation strategies that deliver a substantial improvement in terms of risk-adjusted performance as compared to traditional buy-and-hold strategies. In addition, the author shows that active strategies based on unexpected volatility outperform the popular active strategy with a volatility target mechanism, and have some edge over the popular market timing strategy with a 10-month simple moving average rul…