共查询到20条相似文献,搜索用时 21 毫秒
1.
介绍了“广播式视频点播”方案,可以解决传统VOD系统存在的用户数量有限的问题,就其节目制作、播控和传输描述了系统的原理结构,并对系统所采用的MPEG-4编解码、组播及IP over DVB等关键技术作了简要介绍。 相似文献
2.
By deducing the distribution of the normalized channel covariance matrix, a novel limited feedback scheme is proposed under multiple users (MU) multiple-input multiple-output (MIMO) broadcast channel (BC) system. The proposed scheme has advantages in three aspects. First, it has no constraints on the number of users or antennas. Second, each user's feedback bits are independent of the number of receiving antennas. Third, the proposed scheme avoids the storage of large-size codebook on the transceivers. Simulation results show that the performance of the proposed scheme is close to the perfect channel state information (CSI) case and it just needs a small number of feedback bits. 相似文献
3.
A threshold-based priority scheme in which a tuning parameter is used to provide adequate quality of service to real-time traffic while providing the best possible service to the non-real-time traffic is proposed. The priority scheme is a generalization of the static priority scheme and the one-limited scheme and is more flexible than both. For this scheme, the authors carry out a queueing analysis and obtain the joint distribution of the queue-lengths. They show by numerical examples how the parameter of this scheme can be tuned dynamically, so that the tuning function can be integrated with the call admission policy 相似文献
4.
Mobile user tracking is a major issue. We propose a novel approach for user tracking, in which the tracking activity is adapted to both user and system activity. The basic idea is to make the user-location update-rate dependent not only on the user activity (such as the call profile and mobility pattern). Rather, it is also made dependent on the signaling load, which reflects the actual cost of the update operation. Thus, at low-signaling load locations, the users are to transmit location update messages more frequently. To carry out this approach, we propose a load-adaptive threshold scheme (LATS): the network determines for each cell a registration threshold level (which depends on the cell load) and announces it, as a broadcast message, to the users. The user computes its own registration priority and then transmits a registration message only if its priority exceeds the announced threshold level. Thus, whenever the local load on the cell is low, the registration activity increases, while in loaded cells the registration activity decreases. Our analysis shows that the LATS reduces the paging cost, in comparison with other dynamic methods, without increasing the wireless cost of registration. Moreover, if higher user density is coupled with less mobility (e.g., consider vehicles), then the LATS strategy offers further performance improvement. The load-adaptive strategy can be used in addition to any other dynamic tracking strategy. Furthermore, the computational complexity imposed on the user is identical to that required by an equivalent load-insensitive scheme 相似文献
5.
We describe an electronic implementation of a security scheme to control access to a building. Access to the building by a person alone is not possible but access by a group of authorized people whose number satisfies a prescribed threshold is permissible. The scheme makes use of the shared-secret symmetry cryptography together with smart-card technology. The access key of a person is carefully encoded and stored on a smart card which can also be used for many other purposes. Access records are kept on these smart cards in a distributive fashion and with duplication. Innocent people are able to present information regarding their recent accesses to the building and yet practically cannot be accused of fabricating these records. The scheme permits the use of a standalone controller and eliminates the need for expensive wiring to a remote central database of authorized users. 相似文献
6.
7.
8.
The results of a simulation study undertaken to evaluate a high-performance packet-switching fabric supporting point-to-point and multipoint communications are presented. This switching fabric contains several components, each based on conventional binary routing networks. The most novel element is the copy network, which performs the packet replication needed for multipoint connections. Results characterizing the performance of the copy network are presented. Several architectural alternatives for conventional binary routing networks are also evaluated. For example, the performance gains obtainable by using cut-through switching in the context of binary routing networks with small buffers are quantified. One surprising result is that networks constructed from nodes with more then two input and output ports can perform less well than those constructed from binary nodes. This result is quantified and explained 相似文献
9.
拾屯广播电视站位于徐州市区西北 ,机房距徐州市有线广播电视中心机房 13.98km。拾屯光纤网设计采用二级光纤实现 ,按 12个光节点设计 ,一期开通 6个 ,每个光节点用 2根纤芯 ,一主一备。1 技术要求(1)本系统采用 75 0MHz邻频系统 ,其中 5~ 6 5MHz传送上行信号 ,87~ 75 0MHz为下行传播频带 ,87~ 5 5 0MHz用于传输下行的电视信号及广播 ,5 5 0~ 75 0MHz用于数字电视、数据等数字业务。(2 )下行电视的频带内可以传输 5 4套PAL -D制式电视节目。(3)一级光纤网C/N =5 1dB ,两级光纤网C/N≥4 8dB。(4)CTB≤ … 相似文献
10.
应用自发布里渊散射模型和受激布里渊散射模型,在1550nm通信窗口,分别对短距离和长距离普通单模光纤中的布里渊散射阈值进行了研究.对于短距离传输,分析了自发布里渊阈值增益系数与光纤数值孔径以及有效长度的依赖关系. 相似文献
11.
The minimal model of tracer glucose disappearance allows the measurement in man of important metabolic parameters from a labeled IVGTT (intravenous glucose tolerance test). Usually 30 blood samples are drawn to measure the insulin and the labelled glucose concentration time courses, which provide the data base for the model identification. In this paper, we address the problem of reducing the number of blood samples withdrawn without, however, deteriorating parameter estimation. By using a stepwise approach, largely based on optimal experiment design theory, we have derived a reliable reduced sampling schedule, which comprises only 14 total samples. The practical application of this reduced schedule has been validated by applying it in a new set of human experiments, completely independent of the ones used in the design phase. 相似文献
12.
报导了光输出反馈损耗调制型双稳Ar离子激光器的实验结果,激光谐振腔内放置一个用作损耗调制器的的电光晶体LiNbO3。利用光探测器的非线性饱和特性控制腔内损耗,器件的双稳特性随各参量(激光输出到光探测器的反馈系数η、反馈损耗调制系数B、光探测器的饱和光强ID,输入光信号强度I以及激光器的泵浦电流iA)变化的规律,与半经典理论计算的结果完全一致。 相似文献
13.
14.
Design of a broadcast packet switching network 总被引:2,自引:0,他引:2
An overview is given of a system designed to handle a heterogeneous and dynamically changing mix of applications. It is based on fiber-optic transmission systems and high-performance packet switching and can handle applications ranging from low-speed data to voice to full-rate video. A novel feature is a flexible multipoint connection capability suitable for broadcast and conferencing applications. The architecture of a switching systems that can be used to support this network is described 相似文献
15.
Steinberg Y. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(8):2867-2877
In this work, coding for the degraded broadcast channel controlled by random parameters is studied. Two main paradigms are considered: where side information on the random parameters is provided to the transmitter in a noncausal manner (termed here noncausal coding), and where side information is provided in a causal manner (termed causal coding). Inner and outer bounds are derived on the capacity region with noncausal coding. For the special case where the nondegraded user is informed about the channel parameters, it is shown that the inner bound is tight, thus deriving the capacity region for that case. For causal coding, a single-letter characterization of the capacity region is derived. This characterization is expressed via auxiliary random variables (RVs), and can also be interpreted by means of Shannon strategies, as the formula for the capacity of the single-user channel with causal coding derived by Shannon. The capacity region of a class of binary broadcast channels with causal coding is computed, as an example. Applications to watermarking are suggested. In particular, the results on noncausal coding can be used to derive the capacity region of a watermarking system where the channel (attacker) is fixed, and the watermark is subject to several stages of attack, or a watermarking system where the encoder is required to encode watermarks for both private and public users 相似文献
16.
Caire G. Shamai S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(7):1691-1706
A Gaussian broadcast channel (GBC) with r single-antenna receivers and t antennas at the transmitter is considered. Both transmitter and receivers have perfect knowledge of the channel. Despite its apparent simplicity, this model is, in general, a nondegraded broadcast channel (BC), for which the capacity region is not fully known. For the two-user case, we find a special case of Marton's (1979) region that achieves optimal sum-rate (throughput). In brief, the transmitter decomposes the channel into two interference channels, where interference is caused by the other user signal. Users are successively encoded, such that encoding of the second user is based on the noncausal knowledge of the interference caused by the first user. The crosstalk parameters are optimized such that the overall throughput is maximum and, surprisingly, this is shown to be optimal over all possible strategies (not only with respect to Marton's achievable region). For the case of r>2 users, we find a somewhat simpler choice of Marton's region based on ordering and successively encoding the users. For each user i in the given ordering, the interference caused by users j>i is eliminated by zero forcing at the transmitter, while interference caused by users j相似文献
17.
K. Y. Ko N. S. Gorla Mike W. T. Wong Y. S. Lee 《International Journal of Electronics》2013,100(2):175-187
This paper presents a simple design for test, an oscillation-based test methodology (OTM) scheme for a threshold detector circuit which is commonly used in telephone tone ringer applications. The method proposed is based on a three-phase testing procedure. In phase one, OTM is employed to achieve high fault coverage without the need for test generation. This is followed by the measurement of the power supply current in phase two to identify and locate faults. In phase three, node voltage measurements are utilized to further improve the fault diagnostic resolution. 相似文献
18.
The performance of nonlinear estimators of signal parameters in noise appears to exhibit a threshold phenomenon. Below a critical value of signal-to-noise ratio (SNR), the performance of these estimators deviates significantly from the Cramer-Rao bound. In a large-error (ambiguity-prone) SNR region, the Barankin bound has been proved to be an advantageous tool to assess the attainable performance and the threshold value. Obviously, when the estimation problem involves additional unknown nuisance parameters, the mean square error (MSE) of the estimator does not decrease. However, the impact of these nuisance parameters on the threshold value is not clear. In this correspondence, we discuss the influence of unknown nuisance parameters on the threshold value. The analysis is done for the common problem concerning estimating parameters of a Gaussian process. We confine our scope to a simplified problem concerning only two estimated parameters. However, we explain how this simplified analysis can be used to handle a more complicated problem comprising multiple nuisance parameters. We derive a sufficient condition applied to the structure of the data covariance matrix. When the condition is satisfied, then the need to estimate additional nuisance parameters does not change the threshold value. Using the proposed condition, we prove that the threshold SNR in passive source localization does not increase when the spectral parameters of the source are unknown, whereas the presence of another source at an unknown bearing may change the threshold SNR 相似文献
19.
Erwin G. Krasnow a partner at Verner Liipfert Bernhard McPherson; formerly Senior Vice President General Counsel Jill Abeshouse Stern associate 《Telematics and Informatics》1984,1(3):321-347
Deregulation is a frequently used term within the telecommunications industry in the United States. Advocated by Chairman Mark Fowler of the Federal Communications Commission (FCC), the emphasis of deregulation is to let the marketplace dictate the economic and technological forces in the telecommunications environment. Through reduced governmental burdens, a marketplace approach could promote a social Darwinism philosophy in weeding out the weak competition and thereby establishing economic prices at the most competitive level in the telecommunications field. This article first addresses the marketplace approach to broadcast regulation in terms of Congressional and FCC actions. Then, factors outside the FCC that shape the telecommunications industry will be discussed. Last, marketplace “unregulation” in the 1980's will be explained. 相似文献
20.
F. M. Andreev D. A. Grib I. V. Taranchenko 《Radioelectronics and Communications Systems》2007,50(8):452-457
Expressions determining quality criteria of adaptive threshold detectors of different types for not fluctuating signal are obtained. Comparative analysis of their abilities of radar subsurface object detection is performed. 相似文献