• Nenhum resultado encontrado

[PDF] Top 20 Detection techniques for the uplink of LTE

Has 10000 "Detection techniques for the uplink of LTE" found on our website. Below are the top 20 most common "Detection techniques for the uplink of LTE".

Detection techniques for the uplink of LTE

Detection techniques for the uplink of LTE

... Despite of the second generation being designed to support only voice communications, in the later releases, data transmission were implemented and those standards become the ...generation ... See full document

82

Application of Model Detection Techniques to Health Monitoring for the Electrical Network of More Electric Aircraft

Application of Model Detection Techniques to Health Monitoring for the Electrical Network of More Electric Aircraft

... objective, the system shall be adequately modelled at various levels to fulfil the different ...for the as- sessment of the power quality, where the high frequency effect from ... See full document

6

Comparative Performance Analysis of Machine Learning Techniques for Software Bug Detection

Comparative Performance Analysis of Machine Learning Techniques for Software Bug Detection

... supports the metrics based classification. The results of the experiments showed that there is no significant difference in the performance of different classification ... See full document

9

Exploiting JavaScript Birthmarking Techniques for Code Theft Detection

Exploiting JavaScript Birthmarking Techniques for Code Theft Detection

... and the others having low percentages. The comparison with the "amazon-es" and "amazon-fr" indicate a low percentage (below 33%) of similarity which indicates that Amazon do ... See full document

77

Estimating the Performance of Direct-Detection DPSK in Optical Networking Environments Using Eigenfunction Expansion Techniques

Estimating the Performance of Direct-Detection DPSK in Optical Networking Environments Using Eigenfunction Expansion Techniques

... problem of in-band crosstalk has been the focus of widespread attention in applications based on OOK and a great number of techniques appropriate to evaluate its effect on system ... See full document

10

MIMO techniques implementation on FPGA for future wireless transmission systems (4G/LTE)

MIMO techniques implementation on FPGA for future wireless transmission systems (4G/LTE)

... as the Third generation Partnership Project (3GPP). The 3GPP is the union of telecommunications standard development organizations that specifies the Third Generation Universal ... See full document

114

ADVANCED IMAGE PROCESSING TECHNIQUES FOR DETECTION AND QUANTIFICATION OF DRUSEN

ADVANCED IMAGE PROCESSING TECHNIQUES FOR DETECTION AND QUANTIFICATION OF DRUSEN

... to the success of this work, to whom I would like to express my gratitude, and to the institutions they ...University of Aberdeen, for all his collaboration during this work, who introduced to ... See full document

225

A Survey of Copy-Move Forgery Detection Techniques for Digital Images

A Survey of Copy-Move Forgery Detection Techniques for Digital Images

... era of digital revolution made it very easy to access, process and share ...verifying the integrity of images is of great importance. With the rapid advancement in the image ... See full document

8

Early Detection of Lung Cancer Using Neural Network  Techniques

Early Detection of Lung Cancer Using Neural Network Techniques

... nodule detection scheme in [4] is presented in Multi-Slice Computed Tomography (MSCT) scans using ...early detection of lung nodule by analyzing LUNG CT images which achieves 80% result ...nodule ... See full document

6

Behavioral modeling of the NB-IoT Uplink physical laye

Behavioral modeling of the NB-IoT Uplink physical laye

... modulation techniques and protocols usually use behavioral models simulated in MATrix LABoratory (MATLAB) to test their ...without the concern for real time data processing, clock cycles and latency are ... See full document

144

Techniques for the detection of pathogenic Cryptococcus species in wood decay substrata and the evaluation of viability in stored samples

Techniques for the detection of pathogenic Cryptococcus species in wood decay substrata and the evaluation of viability in stored samples

... collection. Each sample analysed by each technique was plated on 10 NSA plates containing 200 mg/L chloram- phenicol. Moist, shiny, dark brown colonies were identi- fied as belonging to the C. neoformans/C. gattii ... See full document

4

4MORE uplink system level performance

4MORE uplink system level performance

... systems. The vision for this new generation includes provision of a broadband component for which various implementation technologies are being considered, one of them being ...MC-CDMA. The ... See full document

5

A COMPARISION OF VARIOUS EDGE DETECTION TECHNIQUES IN MOTION PICTURE FOR IDENTIFYING A SHARK FISH

A COMPARISION OF VARIOUS EDGE DETECTION TECHNIQUES IN MOTION PICTURE FOR IDENTIFYING A SHARK FISH

... create the silhouettes of a 3D scene is identifying the silhouette edges in the image ...in the image barriers and extract silhouette edges using image giving out ...methods. The ... See full document

8

Implementation of an LTE software defned radio for the ORCIP testbed

Implementation of an LTE software defned radio for the ORCIP testbed

... With the increasing demand for bandwidth and higher data rates, 3GPP introduce a way to transmit multiple LTE carriers in ...bandwidth of 100 ...bandwidth of 640 MHz. The CCs aggregated ... See full document

106

Implementação de um sistema de comunicações móveis para o Uplink

Implementação de um sistema de comunicações móveis para o Uplink

... as the number of subcarriers increases, the composite time-domain signal starts to look like Gaussian noise, which has a high peak-to-average power ratio (PAPR) that can cause problems for ... See full document

103

Comparison of three diagnostic techniques for the detection of leptospires in the kidneys of wild house mice ( leptospires in the kidneys of wild house mice (Mus musculus

Comparison of three diagnostic techniques for the detection of leptospires in the kidneys of wild house mice ( leptospires in the kidneys of wild house mice (Mus musculus

... on the epithelial cells or in the lumen of renal tubules was similar to that obtained by Scanziani et ...In the present study, there was only one case in which t he presence of t he ... See full document

5

Applying matrix decomposition techniques to edge detection operators

Applying matrix decomposition techniques to edge detection operators

... paper the application of decomposition techniques to derivative edge detectors is ...these techniques to zero-crossing edge ...improvement of six times less MADs is achieved when ... See full document

6

Performance Comparison of Turbo Code in WIMAX System with Various  Detection Techniques

Performance Comparison of Turbo Code in WIMAX System with Various Detection Techniques

... on the IEEE ...level of services. In mobile wireless environment the channel is hostile and behaves ...transmit the faithful data over these system the BER performance is further ... See full document

5

Evaluation of Wellness Detection Techniques using Complex Activities Association for Smart Home Ambient

Evaluation of Wellness Detection Techniques using Complex Activities Association for Smart Home Ambient

... evaluation of existing techniques for wellness detection of elderly people in WSN based smart ...location of sub activity, time gap between adjacent sub activities and their temporal ... See full document

11

Multiuser detection for the uplink of clustered 5G systems with universal frequency reuse

Multiuser detection for the uplink of clustered 5G systems with universal frequency reuse

... on the overall system’s spectral efficiency. Due to the physical scarcity of the frequency spectrum it is highly desirable to have universal frequency ...employ the same physical ... See full document

8

Show all 10000 documents...