نتایج جستجو برای: insufficient capacity in processing

تعداد نتایج: 17067742  

2006
Alessandro Vanelli-Coralli Roberto Padovani Jilei Hou John E. Smee

The potential capacity gains of coordinated processing in the reverse link of a cellular system are evaluated. Three different matched filter-based receiver schemes, successive intra-cell interference cancellation, successive intraand intercell interference cancellation, and centralized successive interference cancellation, are analyzed considering different path loss exponents and various limi...

Journal: :Journal of Neurology, Neurosurgery & Psychiatry 1981

2013
Lili Sun Yang Yang Zenggang Xiong Xiaoyong Zhao

MapReduce is an important distributed processing model for large-scale data-intensive applications. As an open-source implementation of MapReduce, Hadoop provides enterprises with a cost-efficient solution for their analytics needs. However, the default HDFS block placement policy assumes that computing nodes in a cluster are homogeneous, and tries to balance load by placing blocks randomly, wh...

With an advance in technologies, different tumor features have been collected for Breast Cancer (BC) diagnosis, processing of dealing with large data set suffers some challenges which include high storage capacity and time require for accessing and processing. The objective of this paper is to classify BC based on the extracted tumor features. To extract useful information and diagnose the tumo...

Journal: Iranian Economic Review 2020

hoosing the appropriate site is important in the construction of units such as agricultural processing industries. In this study, we try to determine the factors affecting the exploitation of the agricultural processing industries and measure the share of location as one of the important issues in locating research. The 2572 data were collected from the Agricultural Jihad Organization of Mazand...

2011
M. Suhail Rehman Mohammad Hammoud Majd F. Sakr

Large-scale distributed processing frameworks such as Hadoop are currently enjoying wide popularity for big data computation. Performance Analysis and monitoring under these frameworks are inherently difficult especially in a virtualized environment. Existing distributed monitoring tools can only report virtual resource usage. Such reported information might be insufficient for developers and u...

Journal: :J. Systems Science & Complexity 2007
Le Yi Wang Gang George Yin

This paper studies identification of systems in which the system output is quantized, transmitted through a digital communication channel, and observed afterwards. The concept of the CR Ratio is introduced to characterize impact of communication channels on identification. The relationship between the CR Ratio and Shannon channel capacity is discussed. Identification algorithms are further deve...

Journal: :Comp.-Aided Civil and Infrastruct. Engineering 2006
Jianyang Zheng Yinhai Wang Nancy L. Nihan Mark E. Hallenbeck

Signal cycle failure (or overflow) is an interrupted traffic condition in which a number of queued vehicles are unable to depart due to insufficient capacity during a signal cycle. Cycle failure detection is essential for identifying signal control problems at intersections. However, typical traffic sensors do not have the capability of capturing cycle failures. In this paper, we introduce an a...

Journal: :CoRR 2018
Zheng Qin Zhaoning Zhang Xiaotao Chen Yuxing Peng

We present Fast-Downsampling MobileNet (FD-MobileNet), an efficient and accurate network for very limited computational budgets (e.g., 10-140 MFLOPs). Our key idea is applying a fast downsampling strategy to MobileNet framework. In FD-MobileNet, we perform 32× downsampling within 12 layers, only half the layers in the original MobileNet. This design brings three advantages: (i) It remarkably re...

Journal: :IACR Cryptology ePrint Archive 2012
Dion Boesten Boris Skoric

We study the channel capacity of q-ary fingerprinting in the limit of large attacker coalitions. We extend known results by considering the Combined Digit Model, an attacker model that captures signal processing attacks such as averaging and noise addition. For q = 2 we give results for various attack parameter settings. For q ≥ 3 we present the relevant equations without providing a solution. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید