The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The traditional assessment methods of large data sets in the wireless network is based on the network coverage of the geographic. However, the assessment of geographic coverage is the single repository for the Qos of the user. This paper, proposes an extraction which based on user video business. Through time delay & delimit, under three aspects, side wireless geographic coverage, Quality and...
The abundant aspects of big data and it's technology are increasing due to new methods of fetching data and diverse needs. Meteorological data is also the source of big data in terms of volume, variety, veracity and velocity, and it includes structured, unstructured and hybrid forms. This paper aims to apply Hadoop architecture and MapReduce algorithm into meteorological big data. It also describes...
The traditional text classification methods usually follow this process: first, a sentence can be considered as a bag of words (BOW), then transformed into sentence feature vector which can be classified by some methods, such as maximum entropy (ME), Naive Bayes (NB), support vector machines (SVM), and so on. However, when these methods are applied to text classification, we usually can not obtain...
Mobile Ad-hoc networks (MANETs) are self-organizing multi-hop wireless networks composed of independent mobile nodes. Due to the characteristics of dynamic topology and limited resources, MANETs are vulnerable to attacks from malicious nodes. However, traditional security policies with encryption and authentication cannot be well suited for MANETs, because of absence of trusted third party. In order...
In this paper, we investigate the energy-efficiency (EE) of a user equipment (UE) experiencing the worst channel conditions, which is named worst-EE. Due to the limitation on the capacity of the mobile equipments' battery, the worst-EE is suitable for EE fairness optimization in the uplink transmissions of orthogonal frequency division multiple access (OFDMA) networks. In order to maximize the worst-EE,...
In this paper, we propose a new chaos modulation scheme which combines differential chaos shift keying (DCSK) with code index modulation (CIM) using Walsh codes, namely CIM-DCSK. We consider two CIM-DCSK communication systems that have different executable methods. In the first system, the reference chaos signal is the same with the conventional DCSK, and the information bearing signal is simultaneously...
We propose the orthogonal complementary code (OCC) based code-selected high efficient ultra wideband (UWB) modulation scheme over multipath channel in the paper, where the OCC with perfect correlation properties is employed to spread spectrum and also to carry the information bits and the theoretical analysis is obtained based on the moment generating function (MGF). In this scheme, the information...
This paper proposes an Improved Quality-Based Channel State Feedback (IQCF) scheme in multicast systems with greedy scheduling for multiple multicast groups. The proposed scheme outperforms the Quality-Based Channel State Feedback (QCF) scheme in the literature by selecting a scheduling outage group for data transmission when scheduling outage happens. We also analyze its performance in terms of average...
Artificial fish-swarm algorithm is a novel method to search global optimum, which is typical application of behaviorism in artificial intelligence. Compared with traditional method it is more portability and stability. This paper, based on the loss function to increase the enterprise benefit, brings forward an optimized criterion of setting threshold to relieve the security officer work in the chemical...
The main function of RNA is to translate genetic information of DNA into proteins. Understanding structure of RNA helps understanding the mechanism of actions within the cell. It is widely believed that the functions of bimolecular are dictated by its structure. This paper employs a RNA primary structure as an input and predicts its secondary structure by finding all possible helices in a RNA sequence...
The SDN (Software Defined Network) characteristics of logically centralized control and programmability contribute on resolving security management and control problems of networking comprehensively and flexibly, however, there are still considerable issues presented by itself remaining to be solved. Based on the analysis of SDN architecture and security, this paper works on the security of south...
Optical Character Recognition (OCR) are widely utilized in two-dimensional (2D) image, but can not be utilized in the three-dimensional (3D) model. The direct method gets the screenshot of 3D text model and save it as a BMP image. But this way will make the image has serious distortion. In this paper, based on texture mapping principle, using geometric knowledge to convert a 3D model into 2D images...
Software Defined Networking (SDN) promises the formidable configuration, vigorous evolution, and satisfactory performance, which are helpful to network operators. Hence, researchers in the field of wireless are increasing their attentions in SDN-related orientation. SDN is still in its initial period. Some essential issues still remain not completely resolved, and the scalability of control plane...
Driven by the proliferation of data traffic and requirement of user experience improvement, mobile wireless network is evolving towards heterogeneous networks (HetNet). The telecom operator is experiencing unprecedented challenges on service maintenance and operational expenditure, which drives the demand for realizing automation in current heterogeneous networks. Cell outage detection is a functionality...
Application of latent Dirichlet allocation (LDA) in text analysis has received much attention because it is capable of characterizing the hidden topics of the documents within the Bayesian framework. In this paper, we train the LDA model with financial research reports to predict the most correlated industries of the financial news among the 24 first-level industries of Chinese market. Since the topics...
Heterogeneous deployment of macro cells and small cells is considered as a major network topology in future-generation cellular networks. Such layouts could efficiently and effectively enhance network coverage and capacity. To achieve multigiabit radio access, millimeter wave (mmWave) frequencies will be used in 5G heterogeneous networks (HetNets). A typical scenario of such HetNets is that mmWave...
This paper designs and implements a WCDMA (Wideband Code Division Multiple Access) network mobile terminal positioning system. In this system, we use a device to call the target initiatively so as to tempt it to establish a link with the base station, but every call stops before the target perception. The system captures relevant parameters in link establishment process, from which the location-related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.