摘要:
A method, in a relay-based wireless communication system, for performing downlink ARQ process, is proposed according to the invention. The method comprises: the BS sends first data to the RS, the first data multiplexing second data for one or more terminal equipments; if the transmission of the first data fails, unsolicited ARQ process to the RS is triggered by the BS, so as to perform the retransmission of the first data; the RS demultiplexs the first data transmitted from the BS to generate the second data, and sends the demultiplexed second data to the terminal equipment; if the transmission of the second data fails, the unsolicited ARQ process to the terminal equipment is triggered by the RS, so as to perform the retransmission for the second data; and the terminal equipment receives the second data and triggers a passive ARQ process for the reception of the second data.
摘要:
The user equipment includes a processor configured to receive a broadcast message, the broadcast message including RACH parameters. The processor transmits a first message following receipt of the broadcast message. The processor receives a second message. The processor transmits a third message, the third message including power settings based on a successful transmission of the first message, and receives a fourth message, the fourth message including contention resolution information that adjusts the RACH parameters. The user equipment decodes RACH parameters and the contention information to obtain decoded RACH parameters, and adjusts an initial transmit power of the user equipment to be a first transmit power based on the decoded RACH parameters.
摘要:
The method includes a first encryption step of encrypting each of a plurality of data streams to obtain a respective encrypted data stream, a mapping step of mapping the plurality of encrypted data streams obtained in the first encryption step to a plurality of transmission streams for transmission via the optical transmission units, wherein the transmission streams and optical transmission units are in a one-to-one relationship, and wherein each transmission stream is mapped to by at least two of the plurality of encrypted data streams. The method further includes a second encryption step of encrypting each of the plurality of transmission streams to obtain a respective encrypted transmission stream, and a transmission step of transmitting each of the plurality of encrypted transmission streams obtained in the second encryption step via a respective optical transmission unit.
摘要:
Techniques are disclosed for optimally scheduling computations that involve multiple factors, the cost of evaluations and probabilities of success of which are known. For example, a methodology is provided for determining an optimal schedule of a multi-factor test in sub-quadratic time. While the methodology has wide ranging application, we illustrate a particular applicability to a security application involving multi-factor authentication in a cloud computing environment, as well as applicability to the contact center agent scheduling.