Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
Energy Efficiency Issues in Information-Centric Networking
In this paper, the authors address energy efficiency issues of Information Centric Networking (ICN) architectures. In the proposed framework, they investigate the impact of ICN architectures on energy consumption of networking hardware devices and compare them with the energy consumption of other content dissemination methods. In particular, they investigate the...
Provided By University of Bergen
-
Precoding-Based Network Alignment for Three Unicast Sessions
The authors consider the problem of network coding across three unicast sessions over a directed acyclic graph. They consider a SISO scenario, in the sense that each source and receiver is connected to the network through a single edge. They adapt a pre-coding-based interference alignment technique, originally developed for the...
Provided By Institute of Electrical & Electronic Engineers
-
Network as Platform for Business Transformation
OMV Petrom is the largest oil and gas group in south east Europe. Their challenge is to accelerate business evolution support for OMV Petrom and parent company, OMV Group. They chose Cisco to overcome this challenge. They deployed to Unified access with one policy (Cisco ISE), one management (Cisco Prime),...
Provided By Cisco
-
Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks
In this paper, the authors explore the physical-layer security in cooperative wireless networks with multiple relays where both Amplify-and-Forward (AF) and Decode-and-Forward (DF) protocols are considered. They propose the AF and DF based optimal relay selection (i.e., AFbORS and DFbORS) schemes to improve the wireless security against eavesdropping attack. For...
Provided By Institute of Electrical & Electronic Engineers
-
Performance Comparison in Terms of Communication Overhead for Wireless Sensor Network Based on Clustering Technique
Wireless sensor network refers to a group of spatially distributed and dedicated sensors for monitoring and recording the physical conditions of environment like temperature, sound, pollution levels, humidity, wind speed with direction and pressure. Sensors are self powered nodes which also possess limited processing capabilities and the nodes communicate wirelessly...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Square Shaped Ultra Wide Band Antenna For Wireless Application
A new planer Ultra Wide Band (UWB) antenna fed by a 50-Ohm micro-strip line for wireless application is presented. Ground plane of the antenna is designed such that it increases the directionality of the radiator so that antenna can also be successfully used for radar application. From the simulated and...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Multipath Routing Protocol for Reliable Data Transmission Over Infrastructure-Less Mobile Network
Providing requisite QoS guarantees in wireless multi-hop networks is much more challenging than in wired networks. This is mainly due to its dynamic topology, multi-hop communication and contention for channel access. In particular, it is important for routing protocols to provide QoS guarantees by incorporating metrics like achievable throughput, delay,...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Node Scheduling in Wireless Sensor Network to Remove Data Conflict
Recently, the idea of wireless sensor networks has attracted a great deal of research attention due to wide ranged potential applications that will be enabled by wireless sensor networks, such as battlefield surveillance, machine failure diagnosis, biological detection, home security, smart spaces, inventory tracking, etc. A wireless sensor network consists...
Provided By International Journal of Electronics Communication and Computer Engineering
-
UDP-Based Multi-Stream Communication Protocol
A network of the system is build with the help of all hardware and software. These all software and hardware components connected together. But the question is how used these devices or components together? The answer is, to share the resources of these device and component together! These resources could...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Design and Fabrication of Meander Line Antennas for WLAN and Dual Band Applications
In recent years, the wireless communication business has expanded greatly. Wireless systems such as WLAN have been popular .With development of communication equipment, control and security devices are commonly used such as Bluetooth. As the authors know, in these systems the antenna is an important part of devices that determines...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Analysis of Capacitive Fed Microstrip Antenna for Wideband Applications
The parametric analysis of capacitive fed micro-strip antenna suspended above the ground plane has been presented in this paper. For the analysis purpose, the reference structure has been taken from paper. In this paper parameters of capacitive fed micro-strip antenna is varied and the corresponding variation of radiation performance (return...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Optimal Distributed Scheduling in Wireless Networks Under SINR Interference Model
Radio resource sharing mechanisms are key to ensuring good performance in wireless networks. In their seminal paper, Tassiulas and Ephremides introduced the Maximum Weighted Scheduling algorithm, and proved its throughput-optimality. Since then, there have been extensive research efforts to devise distributed implementations of this algorithm. Recently, distributed adaptive CSMA scheduling...
Provided By Cornell University
-
Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation
Large-scale Vehicular Ad Hoc NETwork (VANET) simulators by and large employ simple statistical channel models. By design, such models do not account for specific objects in the region of interest when estimating the channel. While computationally efficient, these models were shown to be unable to provide satisfactory accuracy on a...
Provided By Carnegie Mellon University
-
Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel
This paper considers the problem of filter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an Eavesdropper (Eve), over a Gaussian Multiple-Input Multiple-Output (MIMO) wiretap channel. This problem involves designing, subject to a power constraint, the transmit and the receive filters which...
Provided By Institute of Electrical & Electronic Engineers
-
On Achievable Rates for Channels With Mismatched Decoding
The problem of mismatched decoding for discrete memoryless channels is addressed. A mismatched cognitive multiple-access channel is introduced, and an inner bound on its capacity region is derived using two alternative encoding methods: superposition coding and random binning. The inner bounds are derived by analyzing the average error probability of...
Provided By Institute of Electrical & Electronic Engineers
-
Review on Monitoring Systems of the Road Network
The network monitoring is a way to detect quickly and effectively all problems having an impact on the road network and to evaluate them in a structured way. It also helps to allocate resources on the basis of priority in order to address, in timely, the urgent situations and to...
Provided By Engg Journals Publications
-
GTAC 2013: Android UI Automation
As Android gains popularity in the mobile world, application developers and OEM vendors are exploring ways to perform end-to-end UI driven testing of applications or entire platform. With a brief review of existing UI Automation solutions on Android, in this webcast the presenter going to introduce the recently released Android...
Provided By Oleksiy Kovyrin
-
Efficient Routing on Multilayered Communication Networks
The authors study the optimal routing on multilayered communication networks, which are composed of two layers of sub-networks. One is a wireless network, and the other is a wired network. They develop a simple recurrent algorithm to find an optimal routing on this kind of multilayered network, where the single-channel...
Provided By National University of Singapore
-
Enhancing Security in Cyber Physical Systems Through Policy Based Trust Management Against Deception Attack
The World is moving towards invisible computers, Ubiquitous Computing (any information everywhere), Pervasive Computing (which combines current network technology with wireless computing), Ambient Intelligence (which refers to electronic environments that are sensitive and responsive to the presence of people), and Traditional Embedded System (which is a closed system, not only...
Provided By VIT Software, LLC
-
Comparative Study of Classification Techniques with Labeled Data in Wireless Sensor Network
The wireless sensor nodes are getting smaller, but Wireless Sensor Networks (WSNs) are getting larger with the technological developments, currently containing thousands of nodes and possibly millions of nodes in the future. To deal with the large volume of data produced by these special kinds of wireless networks, one approach...
Provided By PT. Phase Solusindo
-
An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks
A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that can has no fixed or predetermined topology, with mobile nodes and dynamic membership changes. A self-organizing network is a network that can automatically extend, change, configure and optimize its topology, coverage, capacity, cell size, and channel allocation, based...
Provided By Karpagam University
-
Novel T-Shaped Planar Dual Band Antenna With Slotted Ground for ISM/WLAN Operations
In this paper, the authors propose a novel T-shaped planar dual band antenna in that two inverted L-shapes are used as additional resonators to produce the lower and upper resonant modes with high return loss. As a result, a dual band antenna for covering 2.4GHz and 5.2GHz ISM/WLAN bands is...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Real Time GPS Tracking System for Transport Operations
It is a dynamic GPS based auto-fare calculator made for India. This application helps in bringing fairness to Indian Auto rickshaw industry. This application enables the user to be in more control of his travel, check where exactly he is being driven to and checking the fare and the distance....
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Reduction of Complexity for Estimating the Open Loop Pitch of the CS-ACELP Codec
G.729 or Conjugate structure algebraic CELP is a audio voice codec that compresses speech signal based on model characteristics of human voice. This paper deals with the reduction of the computational complexity for estimating the open loop pitch of the CS-ACELP codec, described in ITU recommendation G.729. For reduction in...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
A Novel DFT Spreading Technique for Reduction of Peak-to-Average Power Ratio (PAPR) in OFDM Systems
The transmitted signal in an OFDM system can have high peak values due to the presence of many subcarriers. The high Peak-to-average Power Ratio (PAPR), as compared to a single carrier system in an OFDM system is detrimental for its proper operation. It decreases the Signal-to-Quantization Noise Ratio (SQNR) of...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Securing RJSON Data Between Middleware and Smart Phones Through Java Script Based Cryptographic Algorithms
Smartphone has become the most typical and popular mobile device in recent years. It combines the functionality of mobile phone and PDA. Besides, it provides many computers' functionality, Middleware as processing, communication, data storage and etc. It also provides many computers' service, such as web browser, portable media player, video...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Turn Prohibition Routing Investigation for Irregular, 2D-Mesh and 3D-Mesh Based Network on Chip
Network on Chip (NoC) has established itself as an alternative to the on chip bus to meet the increasing requirements of complex communication needs of System on Chip (SoC). A popular choice of topology for generic Network on Chip has been 2D Meshes. Similarly for application specific Network on Chip...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Network Security-Proposals
The explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Loss of irreplaceable data is a very real threat for any...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Study and Analysis of Scientific Scopes, Issues and Challenges Towards Developing a Righteous Wireless Body Area Network
The escalating applies of wireless networks and the constant tininess of electrical devices have empowered the development of Wireless Body Area Network (WBAN). In this network various sensors are attached on clothing or on the body or even implanted under the skin. This network enables medical doctor to distantly monitor...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
PAPR Reduction Technique Using Advanced Peak Windowing Method of OFDM System
PAPR reduction techniques, peak windowing found its way into practical implementation without side information while maintaining a good spectral characteristic compared with the clipping method. In a real system, however, when successive peaks emerge less than a half of the window size, windows will unfortunately overlap. As a result, the...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Persuasive Cued Click Points with Click Draw Based Graphical Password Scheme
Now-a-days, graphical password is used as an alternative to text-based passwords, biometric and tokens. The authors use Graphical passwords because peoples can remember images better than the text. The Graphical passwords are divided into three categories: click-based graphical password, choice-based graphical password and draw-based graphical password. In this paper, they...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
New Energy Efficient Approach for Underwater Acoustic Networks
The underwater acoustic network is the type wireless sensor network. The sensor network is deployed for sensing the environment conditions. Wireless sensor network is deployed on the far places like forests, deserts, underwater, etc. The battery of the sensor node is limited, it is difficult to recharge or replace the...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Survey of Load Balancing Approachs in Peer-to-Peer Network
In recent years, structured Peer-To-Peer (P2P) has gained an important role in the design of large-scale distributed systems. However, due to their strict data placement rules, they are often prone to three main load imbalances, i.e., range, data, and execution skew. Further imbalance may result due to non-uniform distribution of...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Optimum Directivity Patterns of Concentric Ring Arrays with Dipole Radiators for Wireless Communications
In the literature survey concentric ring arrays using isotropic radiators are reported. Sufficient data is not available to optimization of the first side lobe level, null to null beam width and directivity. In this paper, the author is proposed the problem of designing concentric ring arrays with practical radiating element....
Provided By K L University
-
Performance Comparison of Discrete Hartley Transform (DHT) and Fast Fourier Transform (FFT) OFDM System in AWGN Channel
In the current scenario so many advanced techniques are finding a way as a substitute for complex DFT - based OFDM system. One of such type of technique is Discrete Hartley Transform. The requirement of only real arithmetic computations for the proposed technique makes it more advantageous in terms of...
Provided By Sardar Patel University
-
Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem
Selection is one of the key operations of Genetic Algorithm (GA). This paper presents a comparative analysis of GA performance in solving Multi-Objective Network Design Problem (MONDP) using different parent selection methods. Three problem instances were tested and results show that on the average tournament selection is the most effective...
Provided By University of Illinois, Rehab Services
-
Centrality-Based Network Coder Placement for Peer-to-Peer Content Distribution
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation cost: every node in the network has to code. Interested in minimizing resource consumption of network coding while maintaining its performance, in this paper, the authors propose a practical network coder placement algorithm which achieves...
Provided By WasatchWare
-
Challenges and Issues in 4G - Networks Mobility Management
Wireless broadband technology is now in motion to provide higher data rate, wider coverage and improved mobility. Towards this, the 4G-network is an integration of various wireless technologies and expected to provide seamless mobility. Moreover 4G-networks will be entirely packet switched systems based on IP protocol. One of the research...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Chain Clustered Communication Protocol for WSN
A Wireless Sensor Network (WSN) is composed of a collection of sensor nodes. Sensor nodes being small energy constrained devices; hence the main focus is that these have to be as energy efficient as possible. The focus should also be on minimizing the transmitting and receiving of data, as these...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Mobile Location-Based Tour Guide System
Mobile phones are the most commonly used communication tools. Using mobile phones to obtain information is not only quick, but also more convenient shortcut to improve people's lives. In the paper, the authors propose the software development architecture based on Web services. This framework introduces the three-layer architecture of Web...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Maintaining a Directed, Triangular Formation of Mobile Autonomous Agents
This paper analyzes a class of distributed control laws which encompasses and generalizes three previously considered types of control laws for maintaining a triangular formation in the plane consisting of three point-modeled, mobile autonomous agents. It is shown that the control laws considered can cause any initially non-collinear, positively-oriented {resp....
Provided By International Press
-
Greed Is Good: Scalable Routing Via Greedy Embedding
The authors investigate the construction of greedy embeddings in polylogarithmic dimensional Euclidian spaces in order to achieve scalable routing through geographic routing. They propose a practical algorithm which uses random projection to achieve greedy forwarding on a space of dimension O(log(n)) where nodes have coordinates of size O(log(n)), thus achieving...
Provided By DoCoMo USA Labs
-
Green Firewall: An Energy-Efficient Intrusion Prevention Mechanism in Wireless Sensor Network
Wireless Sensor Networks (WSNs) are vulnerable to security attacks due to the broadcast nature of transmission and limited computation capability. After Intrusion Detection Systems (IDSs) identifies an mobile intruder, IDS may broadcast the blacklist to all nodes in network. This method is energy inefficient because all nodes have to receive...
Provided By Binghamton University
-
RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation
The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world...
Provided By Binghamton University
-
On the Accuracy of RFID-Based Localization in a Mobile Wireless Network Testbed
The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multi-hop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large scale wireless network...
Provided By Binghamton University
-
Least Square-SVM Detector for Wireless BPSK in Multi-Environmental Noise
Support Vector Machine (SVM) is a statistical learning tool developed to a more complex concept of Structural Risk Minimization (SRM). In this paper, SVM is applied to signal detection in communication systems in the presence of channel noise in various environments in the form of Rayleigh fading, Additive White Gaussian...
Provided By University of Balamand
-
Improved Root-Mean-Square-Gain-Combining for SIMO Channels
The major problem that wireless communication systems undergo is multipath fading caused by scattering of the transmitted signal. However, the authors can treat multipath propagation as multiple channels between the transmitter and receiver to improve the signal-to-scattering-noise ratio. While using Single Input Multiple Output (SIMO) systems, the diversity receivers extract...
Provided By University of Balamand
-
Above the Nominal Limit Performance Evaluation of Multiwavelength Optical Code-Division Multiple-Access Systems
The authors provide an analysis for the performance of a Multi-Wave-length Optical Code-Division Multiple-Access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. They address the problem of overlapping in such a system and how it can directly affect the Bit...
Provided By University of Balamand
-
Min-Cost Multicast Networks in Euclidean Space
Space information flow is a new field of research recently proposed by Li and Wu,. It studies the transmission of information in a geometric space, where information flows can be routed along any trajectories, and can be encoded wherever they meet. The goal is to satisfy given end-to-end unicast/multicast throughput...
Provided By Fudan University
-
(I)rationality Of Investors On Croatian Stock Market? Explaining The Impact Of American Indices On Croatian Stock Market
This paper aims to detect and explain co-movements and spillover effects between American and Croatian stock markets. Following the methodology and findings of Erjavec and Cota (2007), the dependency of the Corbel index to the main US indices (DJIA, S&P500, NASDAQ) is further examined. The econometric study is widened, and...
Provided By University of Zagreb
-
Optimizing Cognitive Ad-Hoc Wireless Networks for Green Communications
This paper investigates the potential of smart routing in minimization of radio environment pollution in cognitive ad-hoc wireless networks. A wireless ad-hoc sensor network based on the IEEE 802.11b standard is used as a simulation testbed to determine statistical distribution of interference levels. Three different routing methods are used -...
Provided By University of Zagreb
-
A 400Mb/s Radix-4 MAP Decoder With Fast Recursion Architecture
Turbo decoder's throughput is highly restricted by the recursion architecture of MAP decoder. In this paper, a new architecture of MAP decoder is presented. The authors improve the recursion architecture of the traditional Radix-4 MAP decoder in order to gain higher throughput, meanwhile the modification could reduce the coding gain...
Provided By Fudan University
-
Analysis of Traffic Splitting Mechanisms for 2D Mesh Sensor Networks
For many applications of sensor networks, it is essential to ensure that messages are transmitted to their destinations within delay bounds and the buffer size of each sensor node is as small as possible. In this paper, the authors firstly introduce the system model of a mesh sensor network. Based...
Provided By Fudan University
-
Video-Centric Network Coding Strategies for 4G Wireless Networks: An Overview
The impact of Internet content and IP based television on networks is growing. Video is now ubiquitous in the home and on the street. It demands new approaches to video transmission to meet the growing traffic volume. This paper presents a novel strategy for network coding in video transmission. It...
Provided By MIT
-
Subcarrier Allocation in OFDMA With Time Varying Channel and Packet Arrivals
This paper considers the design of efficient low-complexity algorithms for dynamic allocation of subcarriers to users in a multiuser transmitter using Orthogonal Frequency Division. The effects upon throughput and delay performances of several canonical algorithms of varying the number of users, the number of subcarriers, and the statistical characteristics of...
Provided By Middle East Technical University
-
On the Carrier Frequency Offset Estimation for Frequency Hopping Burst Mode Mobile Radio
In this paper, the authors evaluate the Cramer-Rao Bounds (CRB) for the estimation of the Carrier Frequency Offset (CFO) for general QAM modulations with no knowledge of the transmitted sequence (blind operation) in Frequency Hopping (FH) based short burst mode mobile radios. They investigate the blind CFO estimation problem in...
Provided By Middle East Technical University
-
Cut-Off Rate Based Outage Probability Analysis of Frequency Hopping Mobile Radio Under Jamming Conditions
This paper deals with the achievable spectral efficiency and outage analysis of short burst Frequency Hopping (FH) mobile radios under heavy jamming scenarios. With the use of outage probability analysis based on cut-off rate, the maximum spectral efficiency (bits/dimension) and the required number of Radio Frequency Bursts (RFB) (or degrees...
Provided By Middle East Technical University
-
Low-Complexity Iterative Channel Estimation and Tracking for Time-Varying Multi-Antenna Systems
The iterative channel estimation and tracking problem is considered for time-varying frequency-flat fading Multi-Input Multi-Output (MIMO) systems. In order to jointly estimate and track the time-varying multi-antenna channel, the Pilot Symbol Assisted Modulation (PSAM) technique is generalized to the multi-antenna systems. By distributing the pilot symbols along the transmitted block,...
Provided By Middle East Technical University
-
Iterative Frequency Domain Equalization for Single-Carrier Wideband MIMO Channels
Single Carrier Frequency Domain Equalization (SCFDE) is receiving considerable attention recently due to its comparable complexity and performance with OFDM. In this paper, an iterative SC-FDE with decision feedback in frequency domain is proposed for wideband Multiple-Input Multiple-Output (MIMO) channels and more general multi-path vector channels as a generalization of...
Provided By Middle East Technical University
-
Joint Channel Estimation and Decoding With Low-Complexity Iterative Structures in Time-Varying Fading Channels
A low-complexity Iterative Channel Estimation (ICE) algorithm is proposed with the promise of improved error performance. The new algorithm operates the LMS filter both in the forward and the backward directions along a block. The feedback from the decoder to the estimator is in the form of soft decisions. The...
Provided By Middle East Technical University
-
A Survey of Network Simulators Supporting Wireless Networks
This paper contains a survey about network simulators supporting wireless networks. It aims to find a wireless network simulator which would help researchers develop and analyze simulation models in a reliable and not-too-complex way. So, it describes four popular network simulators, i.e. J-Sim, OM- NeT++, ns-2 and OPNET Modeler, and...
Provided By Middle East Technical University
-
Optimal Buffer Partitioning on a Multiuser Wireless Link
Memory is a limited resource in communication devices. While communication, computation and memory capabilities continuously increase, with the advance of standards and systems such as 3G and broadband wireless MAN, there is also a substantial increase in the demand for bandwidth and memory. For example, a typical WiMax base station...
Provided By Middle East Technical University
-
Practical Wireless Network Coding and Decoding Methods for Multiple Unicast Transmissions
The authors propose a simple yet effective wireless network coding and decoding technique. It utilizes spatial diversity through cooperation between nodes which carry out distributed encoding operations dictated by generator matrices of linear block codes. For this purpose, they make use of greedy codes over the binary field and show...
Provided By Middle East Technical University
-
A Survey of Recent Work on Energy Harvesting Networks
Harvesting ambient energy from the environment has become an attractive possibility for nodes in wireless networks. In addition to being environmentally friendly, energy harvesting networks promise almost perpetual operation which has been a holy grail for autonomous networks such as wireless sensor networks, and more recently M2M. However, achieving these...
Provided By Middle East Technical University
-
Optimal Packet Scheduling on an Energy Harvesting Broadcast Link
The minimization of transmission completion time for a given number of bits per user in an energy harvesting communication system, where energy harvesting instants are known in an offline manner is considered. An achievable rate region with structural properties satisfied by the 2-user AWGN Broadcast Channel capacity region is assumed....
Provided By Middle East Technical University
-
An Algorithm for Proportional-Fair Downlink Scheduling in the Presence of Energy Harvesting
This paper considers the allocation of time slots in a frame, as well as power and rate to multiple receivers on an energy harvesting downlink. Energy arrival times that will occur within the frame are known at the beginning of the frame. The goal is to solve an optimization problem...
Provided By Middle East Technical University
-
12 Tips For Accurate Project Estimating
Projects typically involve many dynamic aspects, yet they're often constrained by finite conditions. These contradictory forces make it very difficult to determine with pinpoint accuracy the time and effort required. By using a set of proactive estimating techniques to scope, plan, and constrain your project conditions, you can dramatically improve...
Provided By Project Smart
-
Making Change Happen
Managing change requires a leadership team with project management, communication and analytical skills with a high degree of results orientation. The latter is important as when a journey of change is embarked upon, the environment in which the change is being implemented immediately changes. A changing environment often calls for...
Provided By Project Smart
-
Project Recovery Efforts: The Struggling Project
Project recovery is the effort and activities related to addressing troubled projects. In other words, the activities that lead you to recognise that the project is troubled, then bring you to a decision point on whether or not to save that project, then those activities you might undertake to drive...
Provided By Project Smart
-
Where Is Project Management Going?
The environment in which businesses operate dictates the way in which projects are executed. As project managers, we need to focus on developing business practices that make a real and lasting difference in company performance. Understanding the issues that make up the social, cultural, and informational environment in which the...
Provided By Project Smart
-
The Problem With IT Project Management
Most corporate IT environments have significant complexity. Even if the set of systems and applications are small in number, their interconnections, customisations, and dependencies quickly evolve into a morass of complexity referred to as the "IT rat's nest". Into this environment of IT complexity, the business continues to impose their...
Provided By Project Smart
-
Project Management Starts With A Capital C
Communication, Communication, Communication! In the world of project management today, it has become increasingly more important to turn our efforts toward more effective means of communication, especially since many of us are faced with more and more virtual teams operating around the globe. Start your projects on the right foot,...
Provided By Project Smart
-
Developing A New Project Scorecard
Managers and project managers gauge the success of any project undertaken through a new project scorecard. In the development of this scorecard, relevant metrics will have to he pre - determined. Most companies see the need to use scorecards in order to assess and measure how corporate efforts contribute to...
Provided By Project Smart
-
Packet-Switching Network-on-Chip Features Exploration and Characterization
The era of bus-dominated communication architectures for SoCs might end soon: the increasing number of cores used on a single die used in response to the power-hungry applications tends to make SoC designs more and more communication-centric. Communication structure synthesis is an increasingly challenging problem; bus-based structures are still leading...
Provided By Pontifícia Universidade Catolica do Rio Grande do Sul
-
True Talent Management Looks At The Family Portrait
You promote or hire a talented executive and learn that the whole family shows up for the assignment. Salary can be great, relocation expenses thorough, and the benefits package ideal. Yet, none of these insure that a candidate will take, or be successful in, the promotion or relocation, because if...
Provided By Mansueto Ventures
-
Morgan Spurlock On His Doc Sponsors: "We Should Have Asked For So Much More Money"
At the photo shoot for the April feature, the director of Pom Wonderful Presents The Greatest Movie Ever Sold talks about the process of scavenging for cash in exchange for blatant product placement in his film about product placement.
Provided By Mansueto Ventures
-
10 Things I Wish I Knew Before Going On My First Interview
This paper explains 10 concrete steps you can take to increase the probability of being invited back for subsequent interviews, or for raising the probability of a formal offer being extended to you. First, be prepared. It can't be emphasized enough the importance of being well prepared for a job...
Provided By Net-Temps
-
Top Online Sources For Finding Telecommuting Employment
The first place most job seekers look when they want to find employment is in their local newspapers. But if you're looking for a telecommuting job you'll find that companies with work-from-home positions rarely advertise in newspapers. The Internet is one of the best places to find a telecommuting position....
Provided By Net-Temps
-
Completing A Job Application
Most employers will require you to complete an employment application, even if you have submitted a resume. Take your application as seriously as your resume. Prepare your responses before you are given the application. Applications request the same basic information. Gather the information in advance and have it typed on...
Provided By Net-Temps
-
Textual Signs Reading for Indoor Semantic Map Construction
Semantic maps have come up to facilitate high-level human robot interaction like "Deliver a laptop for maintenance". Textual signs posted on the walls and room doors in indoor environments are environment features that could be easily identified by service robots. These signs provide some semantic information like the function of...
Provided By Cairo University