... following
three scenarios.
2 EURASIP Journal on Wireless Communications and Networking
Streaming
client 1
Base
station
Streaming
client 2
Streaming
server
Streaming
client 3
Figure 1: Streaming video ... Steinbach, and J. A. Nossek, “Anal-
ysis of distortion due to packet loss in streaming video trans-
mission over wireless communication links,” in Proceedings of
the...
... transmission uniformly within 0 and 3 s. The simu-
lation parameters are listed in Table 6.
In general working environment, both downlink and
uplink traffic can occur. For the downlink direction,
QAP ... Washington, pp. 344–348 (2009)
13. J Klaue, B Rathke, A Wolisz, EvalVid–a framework for video transmission and
quality evaluation. In Proceeding of the 13th International Conferen...
... this
basis in the analysis for optimal beamforming and SINR optimization. The results show that
in the case of opportunistic beamforming scenarios in Rayleigh channels only beamforming
gains are ... lightweight terminals
Multiple antenna arrays have been for long considered for increasing the wireless link per-
formance in applications where the size and cost of their implemen...
... resource allocation
for connections within the same MS is the responsibility
of the MS.
For the downlink transmission, because the current
traffic condition of each connection, e.g., buffered ... and
channel condition of each connection. After the
arrangement of radio resources in accordance with these
priorities, the information of resource arrangements for
connections in each fram...
... Central.
For information about publishing your research in Journal of Orthopaedic Surgery and Research or
any BioMed Central journal, go to
http://www.josr-online.com/authors/instructions/
For information ...
thresholds of each risk factor and thecombined factors in order to provide more meaningful
information for surgeons for clinical use.
Results
The Harris hip scores for...
... than fractional objective functions
with convex numerator functions, and convex denominator functions and finitely
many convex constraint functions and a geometric constraint set, is considered. ... functions and convex
denominator functions, finitely many convex constraint functions, and a geometric
constraint set, is considered. Using parametric approach, we transform the problem
(MFP) into...
... justification-based TMS mechanism to
manage all design alternatives. This maintains consistency among the solutions, candidates and design
reasons in the design rationale network defined in Section ... cycle option selection based on the difference of value and
physical lifetimes for life cycle design, ” Proceedings of the International Conference on Engineering
Design 2...
... following definitions from [8].
Definit ion 1.1. We say that a function Γ satisfies “hypothesis I”if
(a) Γ is a nonnegative C
1
function on (0,∞),
(b) Γ is strictly increasing, Γ(2t)
≥ ηΓ(t)forsomefixedη>1andΓ(2t) ... log
2
c]andΓ
(t)ismonotoneon
(0,
∞).
Model functions for the Γ satisfy hypothesis I are Γ(t)
= t
d
with d>0, and their linear
combinations with positive coefficients. Mode...
... nsmissions thus reducing
the overall throughput.
To improve the throughput in noisy environments, chan-
nel coding is performed after encryption. Unfortunately, per-
forming both encryption and coding ... computationally intensive for many
wireless end devices (e.g., personal data assistants (PDA),
mobile phones). In fact, as both encryption and coding can
be performed at the link lay...