Downlink Transmission Model Sample Clauses

Downlink Transmission Model. ‌ 1k Nk Let denote the aggregate beamformer from all RRHs towards the k-th IT as wk = [wH , · · · , wH ]H ∈ CMN×1, where wnk ∈ CM×1 is the beamforming vector from the n-th RRH to the k-th IT, k ∈ Li. Similarly, the aggregate channel between all RRHs 1k Nk and the k-th IT is denoted as hk = [hH , · · · , hH ]H ∈ CMN×1, where hnk ∈ CM×1 is the channel vector between the n-th RRH and the k-th IT, k ∈ Li. The received signal at the k-th IT, k ∈ Li is given by zk = hHwksk + ∑ hHw js j + nk, ∀k ∈ Li (3.3) k k
AutoNDA by SimpleDocs
Downlink Transmission Model. ‌ 1i Ni The aggregate beamforming vector from all the RRHs towards the i-th IT, i ∈ Li, as wi = [wH,··· , wH ]H ∈ CMN×1 is denoted, where wni ∈ CM×1 is the beamformer 1e Ne from the n-th RRH towards the i-th IT. ve = [vH , · · · , vH ]H ∈ CMN×1 represents the aggregate beamforming vector from all the RRHs to the e-th active ET. Similarly, let hni ∈ CM×1 represent the channel vector between the n-th RRH and the i-th IT, the aggregate channel vector between all the RRHs and the i-th IT is denoted by hi = [hH,··· , hH ]H ∈ CMN×1. The received signals at the i-th IT, i ∈ Li, is then 1i given by Ni yi = hH wis[IT] + ∑ hH w js[IT] + ∑ hHves[ET] + ni, (4.1) j/=i ∈Xx

Related to Downlink Transmission Model

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Transmission Service Point-To-Point Transmission Service provided under Part II of the Tariff on a firm and non-firm basis.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: • Personal Data in transfer over SAP internal networks is protected according to SAP Security Policy. • When data is transferred between SAP and its customers, the protection measures for the transferred Personal Data are mutually agreed upon and made part of the relevant agreement. This applies to both physical and network based data transfer. In any case, the Customer assumes responsibility for any data transfer once it is outside of SAP-controlled systems (e.g. data being transmitted outside the firewall of the SAP Data Center).

  • Loop Transmission Types 3.1 Subject to the conditions set forth in Section 1 of this Attachment, Verizon shall allow CBB to access Loops unbundled from local switching and local transport, in accordance with this Section 3 and the rates and charges provided in the Pricing Attachment. Verizon shall allow CBB access to Loops in accordance with, but only to extent required by, Applicable Law. The available Loop types are as set forth below:

  • Merchant Transmission Facilities “Controllable A.C. Merchant Transmission Facilities” shall mean transmission facilities that (1) employ technology which Transmission Provider reviews and verifies will permit control of the amount and/or direction of power flow on such facilities to such extent as to effectively enable the controllable facilities to be operated as if they were direct current transmission facilities, and

  • Transmission System The facilities controlled or operated by the Transmission Provider within the PJM Region that are used to provide transmission service under Part II and Part III of the Tariff.

  • Transmission Facilities The NTO owns certain transmission facilities over which the ISO will have day-to-day operational control to maintain these facilities in a reliable state, as defined by the Reliability Rules and all other applicable reliability rules, standards and criteria, and in accordance with the ISO Tariffs, ISO Related Agreements and ISO Procedures (“ISO Operational Control”). These NTO facilities shall be classified as “NTO Transmission Facilities Under ISO Operational Control,” and are listed in Appendix A-1 of this Agreement. The NTO also will be responsible for providing notification to the ISO with respect to actions related to certain other transmission facilities. These facilities shall be classified as “NTO Transmission Facilities Requiring ISO Notification,” and are listed in Appendix A-2 of this Agreement. Transmission facilities may be added to, or deleted from, the lists of facilities provided in Appendices A-1 and A-2 herein by mutual written agreement of the ISO and the NTO owning and controlling such facilities. Currently listed facilities will be posted on the ISO’s OASIS.

  • Interoffice Transmission Facilities BellSouth shall provide nondiscriminatory access, in accordance with FCC Rule 51.311 and Section 251(c)(3) of the Act, to interoffice transmission facilities on an unbundled basis to <<customer_name>> for the provision of a telecommunications service.

  • NETWORK INTERCONNECTION METHODS 64.1 This Section sets forth the terms and conditions for Network Interconnection Methods (NIMs) provided between CenturyLink and CLEC for the Interconnection Facilities established between the Parties’ networks. Additionally, this Section describes the physical architecture for the Interconnection of the Parties’ facilities and equipment required for the transmission and routing of Local Traffic, ISP-Bound Traffic, IntraLATA LEC Toll Traffic, VoIP-PSTN Traffic, Transit Traffic and Jointly Provided Switched Access Service Traffic.

Time is Money Join Law Insider Premium to draft better contracts faster.