Search results for "GSM"

showing 10 items of 154 documents

Leksiskie stilistiskie izteiksmes līdzekļi Eiropas Savienības darbības programmā „Izaugsme un nodarbinātība”

2018

Šī bakalaura darba mērķis ir veikt diskursa analīzi un noteikt leksiski stilistiskos izteiksmes līdzekļus un to lomu ES institucionālajā diskursā, ES Darbības programmā “Izaugsme un nodarbinātība”. Šajā pētījumā uzsvars likts uz ES institucionālo diskursu, izmantojot diskursa analīzi kā pētniecības metodi un analizējot leksiski stilistisko izteiksmes līdzekļu komunikatīvo nolūku. Balstoties uz pētījuma rezultātiem, var secināt, ka leksiski stilistiskie izteiksmes līdzekļi tiek plaši lietoti ES Darbības programmā “Izaugsme un nodarbinātība”, un padara ES institucionālo diskursu daudz pievilcīgāku lasītājiem. Veiktā pētījuma rezultāti atklāja, ka visbiežāk lietotie leksiski stilistiskie iztei…

Biežuma analīzeValodniecībaLeksiskie stilistiskie izteiksmes līdzekļiKomunikatīvais mērķisES Darbības programma “Izaugsme un nodarbinātība”Diskursa analīze
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

Enabling Soft Frequency Reuse and Stienen's Cell Partition in Two-Tier Heterogeneous Networks: Cell Deployment and Coverage Analysis

2021

Heterogeneous cellular networks (HetNets) are one of the key enabling technologies for fifth generation (5 G) networks. In HetNets, the use of small base stations (SBSs) inside the coverage area of a macro base station (MBS) offers higher throughput and improved coverage. However, such multi-tier base station deployment introduces new challenges, e.g., (i) All users experience significant inter-cell interference (ICI) due to frequency reuse, (ii) SBS associated users experience severe MBS-interference due to higher MBS transmit power, and (iii) MBS coverage edge users receive lower signal-to-interference ratio (SIR) due to longer distances. To address the aforementioned challenges, this wor…

Computer Networks and CommunicationsComputer sciencebusiness.industryAerospace Engineering020302 automobile design & engineeringThroughput02 engineering and technologyTransmitter power outputFrequency reuseBase station0203 mechanical engineeringSoftware deploymentAutomotive EngineeringTelecommunications linkCellular networkNetwork performanceEnhanced Data Rates for GSM EvolutionElectrical and Electronic EngineeringbusinessHeterogeneous networkComputer networkIEEE Transactions on Vehicular Technology
researchProduct

Automatic Calibration of an Industrial RGB-D Camera Network Using Retroreflective Fiducial Markers

2019

This paper describes a non-invasive, automatic, and robust method for calibrating a scalable RGB-D sensor network based on retroreflective ArUco markers and the iterative closest point (ICP) scheme. We demonstrate the system by calibrating a sensor network comprised of six sensor nodes positioned in a relatively large industrial robot cell with an approximate size of 10 m × 10 m × 4 m . Here, the automatic calibration achieved an average Euclidean error of 3 c m at distances up to 9.45 m . To achieve robustness, we apply several innovative techniques: Firstly, we mitigate the ambiguity problem that occurs when detecting a marker at long range or low resolution by comparing the…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologylcsh:Chemical technologytime-of-flightBiochemistryArticleVDP::Food science and technology: 600Analytical Chemistrylaw.inventionIndustrial robotlawRegion of interestRobustness (computer science)automatic calibration0202 electrical engineering electronic engineering information engineeringCalibrationVDP::Næringsmiddelteknologi: 600lcsh:TP1-1185Computer visionElectrical and Electronic EngineeringInstrumentationbusiness.industryambiguity problemIterative closest point3D sensors020207 software engineeringretroreflective markersAtomic and Molecular Physics and OpticsTime of flightTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESRGB color model020201 artificial intelligence & image processingArtificial intelligencebusinessFiducial markerWireless sensor networkSensors
researchProduct

Computational Offloading in Mobile Edge with Comprehensive and Energy Efficient Cost Function: A Deep Learning Approach

2021

In mobile edge computing (MEC), partial computational offloading can be intelligently investigated to reduce the energy consumption and service delay of user equipment (UE) by dividing a single task into different components. Some of the components execute locally on the UE while the remaining are offloaded to a mobile edge server (MES). In this paper, we investigate the partial offloading technique in MEC using a supervised deep learning approach. The proposed technique, comprehensive and energy efficient deep learning-based offloading technique (CEDOT), intelligently selects the partial offloading policy and also the size of each component of a task to reduce the service delay and energy …

Computer scienceReal-time computingTP1-118502 engineering and technologyBiochemistryVDP::Teknologi: 500::Elektrotekniske fag: 540ArticleAnalytical Chemistry0202 electrical engineering electronic engineering information engineeringcomputational offloadingElectrical and Electronic EngineeringInstrumentationenergy efficiencyMobile edge computingArtificial neural networkbusiness.industryChemical technologyDeep learningdeep learning020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsTask (computing)cost functionUser equipment020201 artificial intelligence & image processingmobile edge computingArtificial intelligenceEnhanced Data Rates for GSM Evolutionremote executionbusinessEfficient energy useSensors
researchProduct

Energy-Efficient Context-Aware Resource Allocation for Edge-Computing-Empowered Industrial IoT

2020

Edge computing provides a promising paradigm to support the implementation of industrial Internet of Things (IIoT) by offloading computational-intensive tasks from resource-limited machine-type devices (MTDs) to powerful edge servers. However, the performance gain of edge computing may be severely compromised due to limited spectrum resources, capacity-constrained batteries, and context unawareness. In this chapter, we consider the optimization of channel selection which is critical for efficient and reliable task delivery. We aim at maximizing the long-term throughput subject to long-term constraints of energy budget and service reliability. We propose a learning-based channel selection fr…

Computer scienceServerReliability (computer networking)Distributed computingResource allocationContext (language use)Lyapunov optimizationEnhanced Data Rates for GSM EvolutionEdge computingEfficient energy use
researchProduct

The think aloud method in studying the translation process

2019

This paper presents a theoretical description of the process-oriented research method in translation studies known as the think aloud method and a case study of an experimental application of think-aloud protocols (TAP). The article begins with a brief description of the relevance of its topic, taking into account the state of current researches in the field of translation studies. A literature review of recent publications where the think aloud method and think-aloud protocols as the principal introspective and retrospective method in different translation studies is given. The shortcomings and advantages of applying the think aloud method are discussed and the ways to optimise the use of …

Data collectionProcess (engineering)media_common.quotation_subjectlcsh:PG1-9665Principal (computer security)Lautes DenkenField (computer science)verbale Daten.lcsh:Slavic languages. Baltic languages. Albanian languagesMathematics educationTranslation studiesIntrospectionRelevance (information retrieval)prozessorientierte ForschungsmethodenProtokolle des Lauten DenkensThink aloud protocolPsychologyTAPmedia_commonІноземні мови
researchProduct

Topic 5: Parallel and Distributed Data Management

2013

Nowadays we are facing an exponential growth of new data that is overwhelming the capabilities of companies, institutions and the society in general to manage and use it in a proper way. Ever-increasing investments in Big Data, cutting edge technologies and the latest advances in both application development and underlying storage systems can help dealing with data of such magnitude. Especially parallel and distributed approaches will enable new data management solutions that operate effectively at large scale.

Distributed design patternsbusiness.industryDistributed algorithmComputer scienceScale (chemistry)Data managementBig dataEnhanced Data Rates for GSM EvolutionbusinessData science
researchProduct

More firms, more competition? The case of the fourth operator in France's mobile phone market

2010

Accepted, Forthcoming; International audience; To foster competition the French government authorized a fourth operator, ‘Free', to enter the country's mobile phone market at the end of 2009 alongside Orange, SFR and Bouygues Telecom (BT), who held respectively one-half, one-third and one-sixth of the market. By using a stylized model of France's phone market, we have examined what we call the regulator's nightmares and dreams. If Cournot competition is in place before Free's entry, minimizing the total profit fails to maximize the consumer surplus and the total surplus; the maximum most realistic price fall is 6.7% compared to three-way competition and could be 1.7% only; if Orange, SFR an…

Economics and EconometricsJEL: L - Industrial Organization/L.L1 - Market Structure Firm Strategy and Market Performance/L.L1.L13 - Oligopoly and Other Imperfect MarketsNew operatorEntryCartelManagement Science and Operations ResearchCournot competitionIndustrial and Manufacturing EngineeringProfit (economics)Competition (economics)nouvel operateurMonopolistic competitionMarket economyJEL : L - Industrial Organization/L.L1 - Market Structure Firm Strategy and Market Performance/L.L1.L13 - Oligopoly and Other Imperfect MarketsPhone[ SHS.ECO ] Humanities and Social Sciences/Economies and finances[SHS.ECO] Humanities and Social Sciences/Economics and FinanceGSMStylized factJEL : D - Microeconomics/D.D4 - Market Structure Pricing and Design/D.D4.D43 - Oligopoly and Other Forms of Market ImperfectionCartelCartel.Economic surplus[SHS.ECO]Humanities and Social Sciences/Economics and FinanceGeneral Business Management and AccountingTéléphone mobileJEL: D - Microeconomics/D.D4 - Market Structure Pricing and Design/D.D4.D43 - Oligopoly and Other Forms of Market ImperfectionJEL : L - Industrial Organization/L.L9 - Industry Studies: Transportation and Utilities/L.L9.L96 - TelecommunicationsJEL: L - Industrial Organization/L.L9 - Industry Studies: Transportation and Utilities/L.L9.L96 - TelecommunicationsJEL : L - Industrial Organization/L.L4 - Antitrust Issues and Policies/L.L4.L41 - Monopolization • Horizontal Anticompetitive Practices3GentréeBusinessJEL: L - Industrial Organization/L.L4 - Antitrust Issues and Policies/L.L4.L41 - Monopolization • Horizontal Anticompetitive PracticesMobile phone
researchProduct

Dynamic Asset Allocation Strategies Basedon Unexpected Volatility

2014

The author documents that at the aggregate stock market level, unexpected volatility is negatively related to expected future returns, and positively related to future volatility. The author demonstrates how the predictive ability of unexpected volatility can be utilized in dynamic asset allocation strategies that deliver a substantial improvement in terms of risk-adjusted performance as compared to traditional buy-and-hold strategies. In addition, the author shows that active strategies based on unexpected volatility outperform the popular active strategy with a volatility target mechanism, and have some edge over the popular market timing strategy with a 10-month simple moving average rul…

Economics and EconometricsMoving averageAggregate (data warehouse)EconometricsEconomicsStock marketDynamic asset allocationEnhanced Data Rates for GSM EvolutionVolatility (finance)Market timingFinanceThe Journal of Alternative Investments
researchProduct