Providing QoS while optimizing the LTE network in a cost efficient manner is very challenging. Thus, radio scheduling is one of the most important Functions in mobile broadband networks. The design of a mobile network radio scheduler holds several objectives that need to be satisfied, for example: the scheduler needs to maximize the radio performance by efficiently distributing the limited radio re- sources, since the operator’s revenue depends on it.
標簽: Communications Future Mobile LTE
上傳時間: 2020-05-27
上傳用戶:shancjb
Our original effort in writing this book was to create a starting point for those in the business community who did not have a high level of technical expertise but needed to have some understanding of the technical Functions of their information and communication technologies (ICT) in a corporate environment. As was true with the first edition of this book, if you are already an engineer, find some other form of pleasure reading—this text is not designed for you!
標簽: Communications Introduction Technologies to
上傳時間: 2020-05-27
上傳用戶:shancjb
This book addresses two aspects of network operation quality; namely, resource management and fault management. Network operation quality is among the Functions to be fulfilled in order to offer quality of service, QoS, to the end user. It is characterized by four parameters: – packet loss; – delay; – jitter, or the variation of delay over time; – availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.
標簽: Ethernet Networks MPLS and IP
上傳時間: 2020-05-27
上傳用戶:shancjb
There is a phenomenal burst of research activities in mobile cloud computing systems, which extends cloud computing Functions, ser- vices, and results to the world of future mobile communications applications, and the paradigm of cloud computing and virtualization to mobile networks. Mobile applications demand greater resources and improved interactivity for better user experience.
標簽: Mobile Cloud Computing Systems
上傳時間: 2020-05-30
上傳用戶:shancjb
Many good textbooks exist on probability and random processes written at the under- graduate level to the research level. However, there is no one handy and ready book that explains most of the essential topics, such as random variables and most of their frequently used discrete and continuous probability distribution Functions; moments, transformation, and convergences of random variables; characteristic and generating Functions; estimation theory and the associated orthogonality principle; vector random variables; random processes and their autocovariance and cross-covariance Functions; sta- tionarity concepts; and random processes through linear systems and the associated Wiener and Kalman filters.
標簽: Probability Processes Random and
上傳時間: 2020-05-31
上傳用戶:shancjb
Communication protocols – for short protocols – form the basis for the opera- tion of computer networks and telecommunication systems. They are behavior conventions which describe how communication systems interact with each other in computer networks. Protocols define the temporal order of the interactions and the formats of the data units exchanged. Communication protocols comprise a wide range of different Functions and mechanisms, such as the sending and receiv- ing of data units, their coding/decoding, error control mechanisms, timer control, flow control, and many others.
標簽: Engineering Protocol
上傳時間: 2020-05-31
上傳用戶:shancjb
Over the past few decades there has been an exponential growth in service robots and smart home technologies, which has led to the development of exciting new products in our daily lives. Service robots can be used to provide domestic aid for the elderly and disabled, serving various Functions ranging from cleaning to enter- tainment. Service robots are divided by Functions, such as personal robots, field robots, security robots, healthcare robots, medical robots, rehabilitation robots and entertainment robots. A smart home appears “intelligent” because its embedded computers can monitor so many aspects of the daily lives of householders. For example, the refrigerator may be able to monitor its contents, suggest healthy alter- natives and order groceries. Also, the smart home system may be able to clean the house and water the plants.
標簽: Robotics Service Digital within Home the
上傳時間: 2020-06-06
上傳用戶:shancjb
HIS IS THE THIRD —and most likely the last—book in the series on information technology for energy managers and web based energy infor- mation and control systems. This book concentrates on web based enterprise energy and building automation systems, and serves as a capstone volume in this series. The thrust here is that the highest level Functions of a building and facility automation system are provided by a web based EIS/ECS system that provides energy management, maintenance management, overall facility operational management, and ties in with the enterprise resource management system for the entire facility or the group of facilities being managed. If there were ever to be a fourth volume in this series, it would follow the logical progression of the first three volumes, and would probably be titled Web Based Enterprise Resource Management Systems.
標簽: Enterprise Energy Based Web
上傳時間: 2020-06-06
上傳用戶:shancjb
Today, electric power transmission systems should face many demanding chal- lenges, which include balancing between reliability, economics, environmental, and other social objectives to optimize the grid assets and satisfy the growing electrical demand. Moreover, the operational environment of transmission systems is becoming increasingly rigorous due to continually evolving Functions of interconnected power networks from operation jurisdiction to control responsibly – coupled with the rising demand and expectation for reliability.
標簽: Monitoring Protection Wide Area
上傳時間: 2020-06-07
上傳用戶:shancjb
軟件開發人員必備工具書,,目錄如下Welcome to Software Construction [1]1.1 What Is Software Construction?1.2 Why Is Software Construction Important?1.3 How to Read This Book......7.1 Valid Reasons to Create a Routine7.2 Design at the Routine Level7.3 Good Routine Names7.4 How Long Can a Routine Be?7.5 How to Use Routine Parameters7.6 Special Considerations in the Use of Functions7.7 Macro Routines and Inline RoutinesDefensive Programming [5.6 + new material]8.1 Protecting Your Program From Invalid Inputs8.2 Assertions8.3 Error Handling Techniques8.4 Exceptions8.5 Barricade Your Program to Contain the Damage Caused by Errors8.6 Debugging Aids8.7 Determining How Much Defensive Programming to Leave in Production Code8.8 Being Defensive About Defensive ProgrammingThe Pseudocode Programming Process [4+new material]9.1 Summary of Steps in Building Classes and Routines9.2 Pseudocode for Pros9.3 Constructing Routines Using the PPP9.4 Alternatives to the PPP......
上傳時間: 2021-12-08
上傳用戶:20125101110