... 192984, 13 pages
doi:10.1155/2008/192984
Research Article
Optimal JPWL Forward Error Correction
Rate Allocation for Robust JPEG 2000 Images and
Video Streaming over Mobile Ad Hoc Networks
Max Agueh,
1
Jean-Franc¸ois ... traces, we derive in this paper an optimal wireless JPEG 2000
compliant forward error correction (FEC) rate allocation scheme...
... still possible. For
instance, from (30 )and( 31), we see that if d
(1)
and d
(2)
are
givenforoneURA,wecanstilldotheoptimaldesignby
choosing appropriate values for d
(1)
and d
(2)
for the other
URA. ... Wireless Communications and Networking
Volume 2007, Article ID 45084, 10 pages
doi:10.1155/2007/45084
Research Article
Optimal Design of Uniform Rectangular Antenna Arrays...
... a high level of fear and moderate levels of pride
and reproach due to the fact that he does not want to admit
his fear and is afraid to get blamed for not helping. Therefore,
although he feels ... perception, these symbols are perceptual images like a
face, a person, a melody, a voice, and so forth. Neural and
symbolic information processing can be seen as information
processing...
... 2008, Article ID 717614, 14 pages
doi:10.1155/2008/717614
Research Article
A Refinement of Jensen’s Inequality for a Class of
Increasing and Concave Functions
Ye Xia
Department of Computer and Information ... θ
2
that satisfies 1.30 for all admissible q, t,andx
1
.
8 Journal of Inequalities and Applications
Lemma 1.3. For any integer n ≥ 1, and for all x
1
, ,x
n
with ea...
... and it falls
into the interval of 10
−4
···10
−1
for TGS, 5 · 10
−5
···10
−2
for BBEAd and BBEAe, and 0.01 ···0.2 for AMBER in the
case of different channels and different SNRs, respectively.
For ... ,0]
T
) and the step-sizes of the algorithms were
optimized empirically. In the case of Figures 9 and 10,weset
γ
= 0.1 for TGS and TGSI, γ = 0.002 for BBEAd, γ = 0.01
for...
... and the sequence {x
n
} generated by (1.7),
where α
n
∈ [0, a] for some a ∈ [0,1), Then {x
n
} is well defined and F ⊂ C
n
∩ Q
n
for every
n
∈ N ∪{0}.
Proof. It is obvious that C
n
is closed and ... Theory and Applications
Volume 2007, Article ID 59735, 8 pages
doi:10.1155/2007/59735
Research Article
Strong Convergence Theorems of the CQ Method for
Nonexpansive Semigroups
H...
... times
for both f
c
(t)andvar(t) related to the three frequency bands.
From Figures 7 and 8, for the case shown in Figures 5 and
6, the optimal threshold was found to be 0.0455 Hz (for LF)
and 0.003 ... Australia for providing
access to the Perinatal Research Centre; and Dr. Chris Burke
and Ms. Jane Richmond from the Royal Children’s Hospi-
tal in Brisbane, Australia for...
... of the utility function
incorporates the information of both the network side (chan-
nel) and the user side (rate and delay) in a unified way for ra-
dio resource allocation. We focus our attention ... multiplier method for
solving problems of optimum allocation of resources,” Opera-
tions Research, vol. 11, no. 3, pp. 399–417, 1963.
[26]H.HaradaandR.Prasad,Simulation and Softwa...
... of the utility function
incorporates the information of both the network side (chan-
nel) and the user side (rate and delay) in a unified way for ra-
dio resource allocation. We focus our attention ... 2004.
[6] H. Holma and A. Toskala, WCDMA for UMTS: Radio Access for
Third Generation Mobile Communications,JohnWiley&Sons,
New York, NY, USA, 2000.
[7] K. Navaie and H. Yan...
... mean rates
for the users are shown and compared for B
= 1(i.e.,
beamforming without coordination) and B
= 3, 7 using the
proposed optimal BD scheme. There are 10 users per cell
randomly and uniformly ... contribute
inter-cluster interference, while for B
= 3twotiers
of interfering cells are accounted for. User locations are
generated randomly, uniformly, and independently in...