Simulation Setup Sample Clauses

Simulation Setup. As deployment setup, the Vodafone LTE small cell testbed network deployment shown in Fig. 2.2 was used. The test network covers an area of approximately one square kilometre and includes two macro sites and 21 small cells represented by the black shapes and red dots, respectively. We use this existing testbed to simulate a relatively dense HetNet scenario. The propagation model is based on a high resolution 3D ray tracing path loss prediction model. This model takes into account clutter, terrain and building data and it guarantees a realistic and accurate propagation model. The user distribution is based on real traffic data extracted from the live network. We assume an inband operation of D2D where D2D UEs use the UL frequency band assigned for cellular (licensed) transmission. However, D2D and cellular UEs are scheduled on different resources which is termed as ’overlay’ operation. The results are based on Monte Carlo simulations and are averaged over 100 simulation runs. The operating frequency applied for the simulations is 2.6 GHz. The maxi- mum transmit powers of macro-cells, small-cells and UEs are 46, 30 and 23 dBm respectively. The fractional path loss compensation power control algorithm in (3.18) is valued with P0 = −90 dBm and α = 0.8 (considered as an optimal value in [54]. An average number of links of 336 is herein considered. Further, without loss of generality, Ith is set to -130 dB as it is proven that this value cre- ates multiple instances of association ambiguity and is worth investigating. The
AutoNDA by SimpleDocs
Simulation Setup. The simulation setup consists of three separate sub-systems: a) the ASV platform, b) the acoustic localization and c) the diver. The simulation is implemented in the Robot Operating System (ROS) where the diver and ASV have each their own ROS master. The ROS masters communicate through an acoustic modem simulation that corrupts the diver position information with noise and randomly creates dropouts in the communication. Using this setup the concept can be tested and proven using pure simulation experiments. This was already done in (Xxxxxxxx, et al. 2013). However, switching directly from pure simulation to human in-the-loop operation is not advised. Therefore the simulation experiments are refined using the hardware in-the-loop simulations. The experiments are made increasingly complex by introducing new hardware agents instead of simulated ones. In the case of diver leader ASV follower two such iterations are needed: 1. ASV hardware in-the-loop – the diver and acoustic interogation are simulated but the real vehicle is used 2. ROV hardware in-the-loop – the diver is simulated using a remotely operated underwater vehicle. The acoustics is performed in a real-environment but without any diver interference or diver related noise The third iteration would introduce a real diver at which stage the experiments no longer contain simulated parts. This experiment can then be used as validation. Experiments are designed to be repeatable therefore in all scenarios the diver is simulated as moving between two points. This provides an idealized, but easily analyzed, version of the diver movements underwater. On the borders of the transect the diver abruptly switches the course of his movements thus showing the amount of overshoot that can be expected due to slow update rates of the diver estimation filter.
Simulation Setup. The simulation consists of three main agents: a) diver, b) buddy and c) ASV. The ASV is included as the communication infrastructure will have to take into account that two USBL devices and one modem are operating in a predetermined three agent interrogation cycle. Hardware will be integrated into the simulation similar as in section 5.3. Four iterations can be defined: 1. Diver tablet hardware in-the-loop – all systems are simulated, except the diver tablet that is fully operational as if used underwater to validate the diver application

Related to Simulation Setup

  • Outputs Analogue and digital outputs of protected content are allowed if they meet the requirements in this section and if they are not forbidden elsewhere in this Agreement..

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Compressed Work Week The Company and Union recognize the concept of the compressed work week. It is further understood that the compressed work week conditions will apply only to those departments that are on the compressed work week.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4. 5.7.2 BellSouth shall make available the following channelization systems and interfaces: 5.7.2.1 DS1 Channelization System: channelizes a DS1 signal into a maximum of twenty- four (24)

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • NETWORK INTERCONNECTION METHODS 3.1 The Interconnection provided herein may not be used solely for the purpose of originating a Party’s own interexchange traffic.

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!