Neuro-fuzzy admission control in mobile communications systems
|
|
- Julian Booker
- 5 years ago
- Views:
Transcription
1 University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University of Wollongong Raad, Raad, Neuro-fuzzy admission control in mobile communications systems, PhD thesis, School of Electrical, Computer and Telecommunications Engineering, University of Wollongong, This paper is posted at Research Online.
2 NOTE This online version of the thesis may have different page formatting and pagination from the paper copy held in the University of Wollongong Library. UNIVERSITY OF WOLLONGONG COPYRIGHT WARNING You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorise you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. A court may impose penalties and award damages in relation to offences and infringements relating to copyright material. Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form.
3 6. Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 6.1. Outline In the previous two chapters multi-service mobile networks with fixed bandwidth reservation were studied. One conclusion that was made was that as cells get smaller, bandwidth reservation becomes less effective in guaranteeing better performance for handover connections. In this chapter, connection admission control and adaptive bandwidth reservation using fuzzy logic is investigated. In Section 6.2 fuzzy logic is used heuristically to design an adaptive bandwidth reservation scheme that modifies the amount of bandwidth reserved depending on the handover rate. In Section 6.3 fuzzy logic is then applied to the admission control problem where the velocity of the mobile terminal as well as the bandwidth available (in surrounding cells) are taken into account before a connection is admitted. 152
4 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Adaptive Fuzzy Bandwidth Reservation As discussed in earlier chapters, handover call blocking is more undesirable from a user s point of view than new call blocking. Hence, the handover grade of service (GoS) should be kept under certain constraints. One method that has was investigated in Chapters 4 and 5 was fixed bandwidth reservation. Fixed bandwidth reservation is simple but is not adaptive to the network conditions. To guarantee a certain GoS, a network designer has to dimension each cell for the maximum network load. To maintain the performance of handover blocking, adaptive bandwidth reservation could be used. Adaptive bandwidth reservation attempts to modify the bandwidth being reserved in the cell to meet handover blocking probability constraints. For example, more bandwidth is reserved when the handover rate into a cell increases. There are different proposals for implementing adaptive bandwidth reservation. One is to make certain assumptions about the entire network, derive an approximate model and implement the model in a controller. [NAG1996] for example, has proposed such a method. In most cases simplifying assumptions have to be made in order to make the problem tractable (as was done in Chapters 4 and 5), namely that cell dwell and call holding times are exponentially distributed and that the arrival processes of both new and handover calls are poissonian. While these assumptions hold for larger cells, this may not be true as the cell sizes shrink down. In fact studies in [CHL1995] and [ZAN1996] show that lognormal and gamma distributed call holding and dwell times apply when cells become micro or pico-cellular. Fuzzy logic gives a methodology for numerically designing control systems that seem complex and intractable. In this chapter we propose the use of an adaptive
5 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 154 fuzzy reservation (AFR) scheme to control the amount of reserved bandwidth based on the measured handover rate into a cell. Fuzzy logic allows the design of the controller to be individually adaptable to a particular cell and hence has the potential of allowing better utilisation of bandwidth under particular conditions. In this section, a fuzzy logic controller is designed heuristically and then further refined. Using the design process as in [LIN1996], Figure 6.1 shows the formal design of the Fuzzy Logic Admission Controller based on the data collected from the cellular network simulations. Input Data from External Source Fuzzy Algorithm Design Data Output Data to external world Figure 6.1. Formal design of Fuzzy Logic Admission Controller. The design data in the Figure 6.1 was generated from a simulation of a cellular network. The new call rate was kept constant, while the handover rate was increase and the blocking probability of handover calls was measured. This is also carried out for different values of the number of reserved channels. The design data was then used to generate and modify membership functions. These membership functions in effect stored the design data in a form that can be applied when an input is received that falls within the design range. In this case the input signal is the handover call rate, and the output signal is the number of
6 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 155 channels that have to be reserved in order to maintain the handover blocking probability. This is clearly shown in Figure 6.1 as the top and bottom states. The Fuzzy Algorithm at the heart of the Fuzzy Logic Admission Controller is shown in the three IF-THEN rules that were initially chosen. The rules dictate how the different membership functions interact to come to the final output signal. These rules were arrived at through trial and error. Three rules were found to be insufficient to represent the data set and eventually more rules were added to better represent the design data, which is to adapt the number of reserved channels to the handover rate. The Fuzzy interference engine or algorithm is shown is more detail in Figure 6.2. More detailed examples of how the calculations are done are shown in Chapter 3. Step 1: Input Data Processing Step 2: Fuzzification Input Data Step 3: Left Hand Computation. (AND operations) Fuzzy Inference Step 4: Right Hand Computation. (OR operations) Output Data Step 5: Output Data Processing Figure 6.2. The Fuzzy Inference Engine.
7 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 156 A fuzzy logic controller was designed with one input and one output. The input and output are the handover rate into the cell and the amount of bandwidth to reserve, respectively. Figures 6.3 and 6.4 show the input and output membership functions of the initial design. Here it is assumed that the new connection load remains constant while handover load into a cell is allowed to vary (hence the single input). Each variable has three membership functions. The handover rate is either: Low, Normal or High and the capacity (to reserve) is either: Low, Moderate or High. Hence the fuzzy logic rules for this case are: IF (handover rate is Low) THEN (capacity reserved is Low). IF (handover rate is Normal) THEN (capacity reserved is Moderate). IF (handover rate is High) THEN (capacity reserved is High). Figure 6.5 shows the amount of bandwidth that needs to be reserved as the handover rate increases (i.e. it is the output of the fuzzy rules stated above when applied to the membership functions in Figures 6.3 and 6.4). The parameters for this simulation were chosen heuristically based on extensive knowledge of the network simulation. The figure shows that there are plateaus around the decision points (where the handover rate goes from Low to Moderate to High). This gives fuzzy logic a more stable performance than other schemes when the input data is being measured from the real world and entered into the system. For instance, there are going to be variations and inaccuracies in the measured data. Hence there has to be a significant shift in the input conditions to bring about a change in the output result. The handover rate has to shift an appropriate value before the decision is made to shift the amount of bandwidth to reserve.
8 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Low Normal High Degree of membership Handover rate (calls/sec) Figure 6.3. Membership functions of the input handover rate. 1 Low Moderate Degree of membership High Capacity (% of Total) Figure 6.4. Membership functions of the reserved capacity. The designed fuzzy logic controller was used in a simulation and tested for the required GoS requirements. In the simulation, it was assumed that the cell dwell time is 100 seconds, the new call holding time is 100 seconds and both are assumed to be exponentially distributed. The simulated cellular network was assumed to have a ring structure and hence made handover implementation simpler without compromising the results. All the simulations were run independently until the error between separate runs was less than 5%. The measured data (the handover rate into a cell) was exponentially smoothed before being used as an input to reduce the noise due to the short sampling rate, which was 180 seconds. The sampling period was picked based on the handover rate so that a meaningful value could be obtained, while at the same time being short enough to be able to react to fast changing conditions.
9 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Capacity (Fraction) Handover rate (calls/sec) Figure 6.5. The reserved capacity versus the handover rate. The initial design (stated above) did not meet the required GoS in the simulation. The GoS was set at for handover calls, (this probability is the highest value that is acceptable from a user s point of view and most service providers aim for or lower). The reason for the initial design not being able to meet the GoS constraint is that the amount of bandwidth being reserved in the High state was not sufficient. A more accurate representation of the process was required and hence more membership functions were added. Figures 6.6 and 6.7 show the new membership functions for the handover rate and the capacity to reserve. This number of membership functions came about through trial and error. This is a weakness of fuzzy logic in some respects, but a neuro-fuzzy approach is implemented in Chapter 7 which allows the automatic determination and training of the fuzzy sets. Figure 6.8 shows the resulting reservation output for all handover inputs. The figure shows that the plateaus are still evident but have been reduced in width as more membership functions were added.
10 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 159 Mod High High Very High 1 Low Normal Extremely High 0.8 Degree of membership Extremely Very High Handover rate (calls/sec) Figure 6.6. The new input membership functions for handover rate. moderate Modhigh high llow Very high Extremely High Extremely very high Degree of membership Capacity (Fraction of Total) Figure 6.7. The output membership functions of the modified fuzzy logic contoller design Reserved Bandwidth (Fraction 0.04 of Total) Handover rate (calls/sec)
11 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 160 Figure 6.8. The output of fuzzy logic reservation with 1 input obtained from the modified fuzzy logic controller design. The new and handover connection blocking results are shown in Figure 6.9. The figure shows that the modified fuzzy logic controller is able to maintain the handover call blocking rate at by reserving the appropriate amount of bandwidth based on the measured handover rate in the simulation. The results in Figure 6.9 are also compared to the fixed bandwidth reservation case where a fixed amount of bandwidth is reserved to maintain a better handover blocking rate. In this case the fixed amount of reservation is 30kb/sec. The figure shows that for a new call arrival rate of 0.82 calls/sec, the performance of fixed bandwidth reservation has been optimized for this set of conditions by producing a new call blocking rate of 0.02 and a handover call blocking rate of Hence the adaptive fuzzy reservation (AFR) is being compared against the best possible fixed bandwidth reservation scheme (FR3 in Figure 6.9). In the fixed reservation case the handover blocking probability deteriorates to an unacceptable level once the handover rate increases. A further comparison of the AFR scheme and fixed bandwidth reservation is made through a cost factor. In this case the cost factor is calculated through the following equation: C = P + 10P n This cost factor C gives a weighting of 10 for each dropped handover call, where P n is the new call blocking probability and P h is the handover blocking probability. Figure 6.10 shows that as the load increases, the AFR significantly outperforms the most optimal fixed reservation scenario. h
12 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Blocking Probability AFR new call blocking AFR handover call blocking FR3 new call blocking FR3 handover call blocking New Call load in call/sec Figure 6.9. New and handover blocking probabilities obtained from a network simulation using the modified fuzzy logic controller (AFR) AFR FR Cost New Call load in call/sec Figure Cost Comparisons of Adaptive Reservation and Fixed Bandwidth Reservation.
13 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Velocity Based Fuzzy Logic Admission Control In Section 6.2, fuzzy logic-based dynamic bandwidth reservation was investigated. The results indicated that the GoS performance of handover connections can be maintained under dynamically changing conditions. In Section 6.2 only the new call rate was used as an input to the fuzzy controller. In this section, the objective is to determine whether by adding more information to the fuzzy logic controller it is possible to improve this performance further. Here, terminal velocity and congestion conditions in surrounding cells are taken into account before a connection is admitted to the network. By combining the velocity and bandwidth variables, the system is inherently taking into account the handover rate. (Recall from earlier chapters that the handover rate is dependent on the mean cell dwell time and mean call holding time. The velocity, in combination with the cell size is used to determine the mean cell dwell time). The main advantage of considering velocity as a separate input is that a group of fast moving or slow moving terminals can be separated out using the fuzzy controller Velocity Based Admission Control A new fuzzy admission controller (FAC) that is based on three inputs: the current available bandwidth in the cell, the bandwidth availability in the next cell (the cell the mobile is most likely to handover to) and the velocity of the mobile terminal is thus proposed. The main objective of the FAC is to reject new connection attempts from mobile terminals that are likely to require many handovers when the current cell or neighboring cells are in a congested state. The idea is that a more accurate decision can be made about admission once this information is available.
14 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 163 The advantage of using fuzzy logic for such a scheme is quickly evident. By simply stating the IF THEN rules, the fuzzy logic admission controller is implemented. It would have been difficult to relate inputs such as velocity and bandwidth in an analytical sense (but it is possible with the admission boundary changing as a function of velocity and available bandwidth). However, it is also evident from Table 6.1 (which shows that 27 rules are needed to achieve the desired results) that fuzzy logic suffers from scalability problems and the number of rules grows exponentially as the number of inputs increases. The membership functions for the bandwidth availability in the current cell and in the next cell are shown in Figures 6.11 and 6.12, respectively. They were chosen in the following manner. Each variable has 3 membership functions: bandwidth being Available, Congested and Not Available. Both variables have the same membership functions but Figure 6.12 shows a zoomed-in view of the last two membership functions. The speed variable has 5 membership functions: Stationary, Slow, Average, Fast and Very Fast as shown in Figure For the output decision which is to accept or reject the call, there are four membership functions, Reject, Weakly Reject, Weakly Accept and Accept, which are shown in Figure The reason for having 4 membership functions for the output is that it allows a smoother transition between the Reject and Accept decisions than if only two membership functions were present. Table 6.1. The Fuzzy Rule Set for Fuzzy Admission Control. 1. If (Current Bandwidth is No Bandwidth) then (Decision is Reject) (1) 2. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Very Fast) then (Decision is Accept) (1) 3. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Fast) then (Decision is Accept) (1) 4. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Average) then (Decision is Accept) (1) 5. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Slow) then (Decision is Accept) (1) 6. If (Current Bandwidth is congested) and (Next Bandwidth is Available) and (Speed is Stationary) then (Decision is Weakly Accept) (1)
15 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Stationary) then (Decision is Weakly Accept) (1) 8. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Slow) then (Decision is Weakly Accept) (1) 9. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Average) then (Decision is Weakly Accept) (1) 10. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Fast) then (Decision is Weakly Accept) (1) 11. If (Current Bandwidth is congested) and (Next Bandwidth is congested) and (Speed is Very Fast) then (Decision is Weakly Accept) (1) 12. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1) 13. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1) 14. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Average) then (Decision is Weakly Accept) (1) 15. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Slow) then (Decision is Accept) (1) 16. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Stationary) then (Decision is Accept) (1) 17. If (Current Bandwidth is Available) and (Next Bandwidth is Available) then (Decision is Accept) (1) 18. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Stationary) then (Decision is Accept) (1) 19. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Slow) then (Decision is Accept) (1) 20. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Average) then (Decision is Accept) (1) 21. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Fast) then (Decision is Weakly Accept) (1) 22. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Very Fast) then (Decision is Weakly Reject) (1) 23. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1) 24. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1) 25. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Average) then (Decision is Weakly Accept) (1) 26. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Slow) then (Decision is Accept) (1) 27. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Stationary) then (Decision is Accept) (1) The membership functions for the current and next cell bandwidth are generalized bell curves, while the membership functions for speed and the output decision are bell curves. Generalised bell curves have the same characteristic slopes as the bell curve but could take on a higher variance. This suits the amount of bandwidth better as this covers a wider range of values of available bandwidth than the standard bell curve. The standard bell curve is more
16 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 165 suited to the speeds where it is expected that different velocity classes of mobile vehicles have velocities that follow a bell curve. No Bandwidth 1 Available Congested 0.8 Degree of membership Current Bandwidth Figure Membership Functions of Current Bandwidth ( in number of channels) No Bandwidth 1 Available Congested 0.8 Degree of membership Next Cell Bandwidth Figure Membership Functions of Bandwidth Availability in the Next Cell (in Number of Channels).
17 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 166 Stationary Slow Average Fast Very Fast Degree of membership Speed Figure Membership Functions of Speed (km/h). Reject 1 Weakly Reject Weakly Accept Accept 0.8 Degree Of membership Decision Figure Membership Functions of the Output Decision.
18 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks The Fuzzy Rule Set The complete fuzzy rule set for the FAC was shown earlier in Table 6.1. While there are many rules (27 in all), only a few of then are critical. These are related to the Reject and Weakly Reject membership functions of the output decision. The critical set of rules is shown in Table 6.2. These include i) when either of the current cells have congestion conditions (i.e. they are using the last 5% of the available bandwidth) and the speed is fast or very fast then weakly reject. ii) when there is no bandwidth available in the next cell, and the speed is very fast then reject the connection. These rules were arrived at heuristically. Table 6.2. The critical set of rules. 12. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1). 13. If (Current Bandwidth is congested) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1). 22. If (Current Bandwidth is Available) and (Next Bandwidth is congested) and (Speed is Very Fast) then (Decision is Weakly Reject) (1). 23. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Very Fast) then (Decision is Reject) (1). 24. If (Current Bandwidth is Available) and (Next Bandwidth is No Bandwidth) and (Speed is Fast) then (Decision is Weakly Reject) (1) The Admission Control Surface The next four figures show the admission surface of the fuzzy admission controller. The admission surface indicates the output of the fuzzy controller. A higher value indicates that the connection is more likely to be admitted. Figure 6.15 shows the admission surface when bandwidth is available in the next cell (it was set to 50% of the total bandwidth in this example). Here the 50% value is chosen as a demonstration only to show what the admission surface would look
19 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 168 like when half the bandwidth is available. The figure shows that all connections are accepted except for the case when bandwidth is not available in the current cell. Figure 6.16 shows the admission surface when 95% of the bandwidth in the next cell is in use. Since the boundary for accepting or rejecting is chosen to be 5% of the total bandwidth, in this case the same admission surface is obtained as in Figure However, the results in Figure 6.16 show that mobile terminals traveling at high speed have a lower admission value than those traveling at lower speeds. Figure 6.17 shows the admission surface when the bandwidth usage in the next cell is in the congested state (97% of bandwidth is unavailable). The figure shows that as speeds exceed the 100 km/h, most connections are being rejected. It also shows that there is an error when the current bandwidth is 99 channels- it is still allowing connections to be made. This error was later corrected as the membership functions of the admission controller were tuned. The error is shown here to highlight another potential problem with heuristically designing a fuzzy logic controller. The outputs have to be carefully inspected to make sure that they display the correct behavior. In Chapter 7, a neuro-fuzzy approach is used which relies on collected data to build the fuzzy controller and hence significantly reduces these types of errors. Figure 6.18 shows that when no bandwidth is available in the next cell, blocking of connections occurs past the 60 km/h mark. In Figures , the decision output is a value between 0 and 10. The values simply indicate, how correct a decision is, but in this case, any value that is greater than 5 is considered as admit and reject is used otherwise. A hard limit was obtained here to get a better indication of the blocking probabilities, but the range of values from the admission surface (0 to 10) can be utilized to make a fuzzy admission decision. For example, this value could be used to admit the connection but with reduced bandwidth based on the admission value.
20 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 169 Current Bandwidth (Channels) Speed (km/h) Figure Admission Surface Obtained when Bandwidth in the Next Cell is Available. Current Bandwidth (Channels) Speed (km/h) Figure Admission Surface Obtained when Bandwidth in the next Cell is Nearly Congested.
21 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 170 Speed (km/h) Current Bandwidth (Channels) Figure Admission Surface Obtained when Bandwidth in the Next Cell is Congested. Figure Admission Surface Obtained when Bandwidth in the Next Cell is Not Available.
22 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Simulation Results for Velocity Based Admission Control The ring network simulation similar to the one used in Section was used. However this time instead of having a cell dwell time generated by an exponential distribution, mobile terminals belong to a certain speed category. Each speed category has a mean value and follows a Gaussian distribution. Once a mobile terminal commences a connection at a particular speed that speed is kept constant for the duration of the connection. It is assumed that this velocity is accurately measured and passed on to the fuzzy admission controller. Velocity can be measure through the assistance of Global Positioning System (GPS) or through signal strength measurements over time. Using the fuzzy connection admission controller (FCAC) in the simulation, results for the new and handover call blocking probabilities were obtained. Figure 6.19 shows these results compared to the case when fixed bandwidth reservation is used (in this case 1 channel is reserved). The results show that better new call blocking is obtained when using FCAC at the expense of obtaining worse handover call blocking. FCAC is able to perform a similar function as fixed bandwidth reservation (by allowing handover calls to have a lower handover blocking probability). An advantage of FCAC is the ability to allow more control over the admission process (in this case the system is discriminating against mobile terminals that are going fast when congestion conditions are present). This obviously leads to issues about fairness when congestion conditions arise. However it may be argued that to recover from congestion conditions more quickly one needs to reduce the load into the congested cell and in effect that is what the FCAC is doing.
23 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks FCAC Blocking Probability 10-2 Fixed Reservation 10-3 FCAC new calls FR1 new calls FCAC handover calls FR1 handover calls Call Arrival Rate (calls/sec) Figure Blocking Probabilities for Fuzzy Connection Admission Control (FCAC) and Fixed Reservation with 1 Channel Reserved (FR1). Recall that the results obtained in Chapter 5 indicated that reserving more bandwidth when the handover rate is high compared to new call rate did not yield significantly better performance for handover traffic. To determine whether the FCAC designed in this section can outperform fixed bandwidth reservation the fuzzy logic controller was tested for a range of cell sizes. The results are shown in Figure The arrival rate is kept constant at 0.85 calls/sec and the mobile terminals velocity mix is kept the same for both the FCAC and FR1. The following velocity mix was used: 10% stationary, 20% slow, 50% average, 10% fast and 10% very fast. The results in Figure 6.20 show that the FCAC has very good new call blocking performance across the entire cell size range shown. FR1 has better performance in terms of handover blocking for larger cells but as the
24 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 173 cell size gets smaller and especially below the cell size of 100m, performance of the FCAC is the same as that of the fixed reservation case. Hence as the cell size gets smaller, the FCAC has the same handover performance but has a better new call blocking performance. This can be interpreted as the FCAC having better utilization performance than fixed bandwidth reservation for small cell sizes FCAC new calls FR1 new calls FCAC handover calls FR1 handover calls Blocking Probability FCAC Cell size (m) Figure Blocking Probability for Different Cell Sizes. While this result might look interesting, it is not significant as not reserving any bandwidth at all will result in similar handover blocking performance (as the cell size is reduced), while at the same time having lower new call blocking performance (equal to handover blocking probability). Hence, while the FCAC might outperform fixed bandwidth reservation for small cell sizes, in fact, at the same load, not having any reserved bandwidth is better for this case (when the cell size is small). As a result, a conclusion can be made that while FCAC can provide better control over admission (differentiation at different velocities) it does not significantly outperform fixed bandwidth reservation. The next section
25 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 174 looks at the dynamic behavior of the FCAC and fixed bandwidth reservation, while the subsequent sections deals with the utilization issues of the FCAC Dynamic Performance of FCAC and Fixed Reservation To further check if any advantage is obtained when the FCAC is used instead of fixed bandwidth reservation (FR), dynamic behavior of used bandwidth in one of the cells in the network was obtained for both cases. Figure 6.21(a) and 6.21(b) show the used bandwidth over time for FR1 (Fixed Reservation with 1 channel reserved) and the FCAC, respectively. A general observation between the two graphs does not show any major difference in behavior. Results show that there are sharp rises towards blocking states over short periods of time. The only difference is that when the FCAC is used, the almost cyclic peaks and troughs are more frequent than when using FR1. Used bandwidth in FR1 tends to stay close to blocking states for longer periods than when the FCAC scheme is used Utilization Study of FCAC and Fixed Reservation In this section the utilization performance of the FCAC and FR is examined. The aim is to determine which scheme can accept a higher load while maintaining the GoS constraints. For this case a new call blocking probability of 0.01 and a handover call blocking probability of were used as GoS constraints. Through simulation the highest loads were determined that satisfied the GoS constraints for different cell radii. Figure 6.22 shows the performance of FCAC11 to FCAC14 against the results obtained for FR0 to FR3. FCAC11 to FCAC14 are the original FCAC with value adjustments made to the membership functions. FR0 to FR3 are fixed bandwidth reservations of 0 channels to 3 channels respectively.
26 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Used Capacity (kb/sec) C lo c k ( s e c o n d s ) (a) Used Capacity (kb/sec) C lo c k ( s e c o n d s ) (b) Figure Dynamic Behavior of FR1(a) and FCAC (b). Figure 6.22 shows that the best load results are obtained by using fixed bandwidth reservation optimized to the particular cell conditions. The best result obtained by the FCAC matched FR2 when the cell size is small (less than 200m). The reason for the FCAC achieving better results when the cell size is small is that the predictions made about the cell dwell time through the velocity input are more accurate as the cell gets smaller and suffer as the cell gets larger. Utilization is held down by the handover blocking constraint and hence the new call blocking probabilities in most of the cases were better than the desired GoS constraints. The corresponding new call blocking probabilities are shown in Figure The figure shows that better results for new call blocking are
27 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 176 obtained by the FCAC against FR2. Again, the conclusion can be made that there is no significant advantage in using the FCAC in this case. Highest load of new calls(calls/sec) FR0 FCAC11 FR1 FR2 FCAC12 FCAC14 FCAC13 FR Cell Radius (m) Figure Optimized Loads for the Constraints of Handover Blocking of and New Call Blocking of 0.01.
28 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 177 New call blocking probability 10-2 FR0 FR1 FR2 FR3 FCAC11 FCAC12 FCAC13 FCAC Cell radius (m) Figure New call blocking probabilities for various FCAC and FR cases Utilization Study of FCAC and FR with Variable Load In the previous section the mobile network was homogenous with all cells having the same conditions. In this section the performance of the FCAC in the cellular network as a whole is studied. The FCAC was tested when congestion conditions exist in the cellular network but only in particular cells. As a special case, every 20 minutes, each cell has a probability of either being in a congested state or being in a normal state. For this simulation, the probability of being in a congested state is 0.1 and the probability of being in a normal state is 0.9. Hence, 10% of cells in the network would be experiencing congestion conditions, while the other 90% are operating at normal loads. The aim is to compare the two admission control schemes (FCAC and fixed bandwidth reservation) under congestion conditions.
29 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks 178 Figure 6.24 shows that the fuzzy logic controller appears to outperform fixed bandwidth reservation when the cell radius is small. The reason for this is that predictions about handover using the fuzzy logic controller are more accurate when the cell size is small. The figure shows the maximum new connection rate before the blocking constraints are exceeded. Figure 6.25 shows that the new call blocking probability appears to be always better for the FR2 and Figure 6.26 shows that the handover blocking probability appears to be consistently better for the FCAC than FR2. While the results for the FCAC show some improvement over fixed bandwidth reservation, the values are small and insignificant to be considered as an advantage over fixed reservation. Maximum New Call Arrival rate (calls/sec) FR2 FCAC Cell Radius (km) Figure Maximum new call load while maintaining constraints of new call blocking of 0.01 and handover call blocking of with a congestion variation of 20%.
30 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks New Call Blocking Probability FR2 FCAC Cell Radius (km) Figure The new call blocking probability (corresponding to the results in Figure 6.24). Handover Call Blocking Probability FR2 FCAC Cell Radius (km) Figure handover call blocking probability (corresponding to the results in Figure 6.24).
31 Fuzzy Logic Admission Control in Micro-Cellular Mobile Networks Conclusion In this chapter, fuzzy logic was studied in the context of the mobile network. A fuzzy logic controller was designed and simulated to perform adaptive bandwidth reservation. A simple fuzzy logic controller was designed which took into account a dynamically changing handover rate, while assuming the arrival rate remained constant and its performance was investigated and compared to Fixed bandwidth reservation (Section 6.2). The results produced were encouraging but a problem was identified in correctly tuning the fuzzy logic controller to the desired constraints. This problem is pursued in the next chapter where a Neuro- Fuzzy controller is developed. A fuzzy logic controller which considered both terminal velocity and bandwidth being used in surrounding cells was designed, investigated and compared to fixed reservation (Section 6.3). The results showed that the fuzzy controller is able to match the results that fixed bandwidth reservation achieved under static conditions (i.e. the new and handover connection loads are constant) while being able to dynamically guarantee a minimum handover blocking probability (which fixed bandwidth reservation can not achieve) and at the same time giving the network designer more control over the admission policy into the network. Whilst the Fuzzy controller did not out-perform the fixed bandwidth reservation schemes (in terms of utilization), it is clear that it is adaptive to velocity and bandwidth availability in surrounding cells, whilst the fixed reservation scheme is not. In the next chapter the fuzzy controller is replaced by a Neuro-Fuzzy controller that facilitates better performance as more information about the network is made available.
Neuro-fuzzy admission control in mobile communications systems
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Neuro-fuzzy admission control in mobile communications systems
More informationNeuro-fuzzy admission control in mobile communications systems
University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 25 Neuro-fuzzy admission control in mobile communications systems Raad Raad University
More informationDEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM
DEFINITION OF SUITABLE SIMULATION SCENARIOS FOR DYNAMIC INVESTIGATIONS IN CELLULAR NETWORKS WITH STEAM Holger Pampel Enrico Jugl Lucent Technologies Network Systems GmbH Thurn-und-Taxis Strasse 10 90411
More informationCongestion control in TCP
Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed
More informationAssignment 7: TCP and Congestion Control Due the week of October 29/30, 2015
Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for
More informationAn Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks
An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks Hong Bong Kim Telecommunication Networks Group, Technical University of Berlin Sekr FT5 Einsteinufer 25 1587 Berlin Germany
More informationTwo-dimensional Totalistic Code 52
Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable
More informationEvaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination
Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Richard Kershaw and Bhaskar Krishnamachari Ming Hsieh Department of Electrical Engineering, Viterbi School
More informationRobust Multi-class Signaling Overload Control for. Wireless Switches
Robust Multi-class Signaling Overload Control for Wireless Switches J. Pinheiro C. Loader, T. LaPorta, S. Kasera, M. Karaul, A. Hari 1 Novartis Pharmaceuticals jose.pinheiro@pharma.novartis.com Bell Labs
More informationOPTIMIZING A VIDEO PREPROCESSOR FOR OCR. MR IBM Systems Dev Rochester, elopment Division Minnesota
OPTIMIZING A VIDEO PREPROCESSOR FOR OCR MR IBM Systems Dev Rochester, elopment Division Minnesota Summary This paper describes how optimal video preprocessor performance can be achieved using a software
More informationWIRELESS/MOBILE networking is one of the strongest
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 3, MAY 2004 835 An Integrated Adaptive Bandwidth-Management Framework for QoS-Sensitive Multimedia Cellular Networks Sungwook Kim and Pramod K. Varshney,
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationIEEE 1588 PTP clock synchronization over a WAN backbone
Whitepaper IEEE 1588 PTP clock synchronization over a WAN backbone A field study comparing PTP clock synchronization accuracy against GPS external time reference in a live production WAN environment Contents
More information3 Graphical Displays of Data
3 Graphical Displays of Data Reading: SW Chapter 2, Sections 1-6 Summarizing and Displaying Qualitative Data The data below are from a study of thyroid cancer, using NMTR data. The investigators looked
More informationReinforcement Learning for Adaptive Routing of Autonomous Vehicles in Congested Networks
Reinforcement Learning for Adaptive Routing of Autonomous Vehicles in Congested Networks Jonathan Cox Aeronautics & Astronautics Brandon Jennings Mechanical Engineering Steven Krukowski Aeronautics & Astronautics
More informationChristos Papadopoulos
CS557: Measurements Christos Papadopoulos Adapted by Lorenzo De Carli Outline End-to-End Packet Dynamics - Paxon99b Wireless measurements - Aguayo04a Note: both these studies are old, so the results have
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationA Call Admission Protocol for Wireless Cellular Multimedia Networks
A Call Admission Protocol for Wireless Cellular Multimedia Networks Mokhtar A. Aboleaze Dept. of Computer Science and Engineering York University Toronto, ON. Canada aboelaze@cs.yorku.ca Fadi A. Aloul
More informationAnnex 10 - Summary of analysis of differences between frequencies
Annex 10 - Summary of analysis of differences between frequencies Introduction A10.1 This Annex summarises our refined analysis of the differences that may arise after liberalisation between operators
More information3 Graphical Displays of Data
3 Graphical Displays of Data Reading: SW Chapter 2, Sections 1-6 Summarizing and Displaying Qualitative Data The data below are from a study of thyroid cancer, using NMTR data. The investigators looked
More information3 Nonlinear Regression
CSC 4 / CSC D / CSC C 3 Sometimes linear models are not sufficient to capture the real-world phenomena, and thus nonlinear models are necessary. In regression, all such models will have the same basic
More informationDistributed Fault-Tolerant Channel Allocation for Cellular Networks
1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,
More informationChapter 5. Track Geometry Data Analysis
Chapter Track Geometry Data Analysis This chapter explains how and why the data collected for the track geometry was manipulated. The results of these studies in the time and frequency domain are addressed.
More informationAnalytical Modeling of Parallel Systems. To accompany the text ``Introduction to Parallel Computing'', Addison Wesley, 2003.
Analytical Modeling of Parallel Systems To accompany the text ``Introduction to Parallel Computing'', Addison Wesley, 2003. Topic Overview Sources of Overhead in Parallel Programs Performance Metrics for
More informationON THE VELOCITY OF A WEIGHTED CYLINDER DOWN AN INCLINED PLANE
ON THE VELOCITY OF A WEIGHTED CYLINDER DOWN AN INCLINED PLANE Raghav Grover and Aneesh Agarwal RG (Grade 12 High School), AA (Grade 11 High School) Department of Physics, The Doon School, Dehradun. raghav.503.2019@doonschool.com,
More informationNetwork Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links
Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how
More informationNon-Parametric Modeling
Non-Parametric Modeling CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Introduction Non-Parametric Density Estimation Parzen Windows Kn-Nearest Neighbor
More informationMINI-PAPER A Gentle Introduction to the Analysis of Sequential Data
MINI-PAPER by Rong Pan, Ph.D., Assistant Professor of Industrial Engineering, Arizona State University We, applied statisticians and manufacturing engineers, often need to deal with sequential data, which
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationMemory-Link Compression Schemes: A Value Locality Perspective
Memory-Link Compression Schemes: A Value Locality Perspective Martin Thuresson, Lawrence Spracklen and Per Stenström IEEE Presented by Jean Niklas L orange and Caroline Sæhle, for TDT01, Norwegian University
More informationWhite paper ETERNUS Extreme Cache Performance and Use
White paper ETERNUS Extreme Cache Performance and Use The Extreme Cache feature provides the ETERNUS DX500 S3 and DX600 S3 Storage Arrays with an effective flash based performance accelerator for regions
More informationCongestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem
Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases
More informationUser Based Call Admission Control Policies for Cellular Mobile Systems: A Survey
User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey Hamid Beigy and M. R. Meybodi Computer Engineering Department Amirkabir University of Technology Tehran, Iran {beigy, meybodi}@ce.aut.ac.ir
More informationA New Call Admission Control scheme for Real-time traffic in Wireless Networks
A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612
More informationIdentifying Layout Classes for Mathematical Symbols Using Layout Context
Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi
More informationAutomatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic
Automatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic Chris K. Mechefske Department of Mechanical and Materials Engineering The University of Western Ontario London, Ontario, Canada N6A5B9
More informationEnd-to-End Mechanisms for QoS Support in Wireless Networks
End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of
More informationRise-Time Enhancement Techniques for Resistive Array Infrared Scene Projectors
Rise-Time Enhancement Techniques for Resistive Array Infrared Scene Projectors Greg Franks a, Joe LaVeigne a, Kevin Sparkman a, Jim Oleson a a Santa Barbara Infrared, Inc., 30 S. Calle Cesar Chavez, #D,
More informationSUPPORT OF HANDOVER IN MOBILE ATM NETWORKS
SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS Péter Fazekas fazekasp@hit.hit.bme.hu Tel: (36) 1-463-3256 Fax: (36) 1-463-3263 Department of Telecommunications Pázmány Péter sétany 1/D Polytechnic University
More informationIPv6-based Beyond-3G Networking
IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless
More informationChapter 15 Introduction to Linear Programming
Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of
More informationTraffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach
Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Suriti Gupta College of Technology and Engineering Udaipur-313001 Vinod Kumar College of Technology and Engineering Udaipur-313001
More informationPart 1: Calculating amplitude spectra and seismic wavelets
Geology 554 Environmental and Exploration Geophysics II Generating synthetic seismograms The simple in-class exercise undertaken last time illustrates the relationship between wavelet properties, interval
More informationLotus Sametime 3.x for iseries. Performance and Scaling
Lotus Sametime 3.x for iseries Performance and Scaling Contents Introduction... 1 Sametime Workloads... 2 Instant messaging and awareness.. 3 emeeting (Data only)... 4 emeeting (Data plus A/V)... 8 Sametime
More informationAdaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited
Adaptive Waveform Inversion: Theory Mike Warner*, Imperial College London, and Lluís Guasch, Sub Salt Solutions Limited Summary We present a new method for performing full-waveform inversion that appears
More informationFMA901F: Machine Learning Lecture 3: Linear Models for Regression. Cristian Sminchisescu
FMA901F: Machine Learning Lecture 3: Linear Models for Regression Cristian Sminchisescu Machine Learning: Frequentist vs. Bayesian In the frequentist setting, we seek a fixed parameter (vector), with value(s)
More informationX. A Relevance Feedback System Based on Document Transformations. S. R. Friedman, J. A. Maceyak, and S. F. Weiss
X-l X. A Relevance Feedback System Based on Document Transformations S. R. Friedman, J. A. Maceyak, and S. F. Weiss Abstract An information retrieval system using relevance feedback to modify the document
More informationPerformance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks
Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Izhak Rubin and Runhe Zhang Abstract We introduce Unmanned Vehicles (UVs) to aid the operation of the mobile
More informationHow Much Logic Should Go in an FPGA Logic Block?
How Much Logic Should Go in an FPGA Logic Block? Vaughn Betz and Jonathan Rose Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario, Canada M5S 3G4 {vaughn, jayar}@eecgutorontoca
More informationAn Efficient Resource Allocation Protocol for Multimedia Wireless Networks
International Journal of Advanced Trends in Computer Science and Engineering, Vol.2, No.1, Pages : 178-182 (213) Special Issue of ICACSE 213 - Held on 7-8 January, 213 in Lords Institute of Engineering
More informationA Geostatistical and Flow Simulation Study on a Real Training Image
A Geostatistical and Flow Simulation Study on a Real Training Image Weishan Ren (wren@ualberta.ca) Department of Civil & Environmental Engineering, University of Alberta Abstract A 12 cm by 18 cm slab
More informationIEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract
IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:
More informationEECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson
EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson 1.0 Introduction Distributed real-time process control, from a network communication view, involves
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationAdaptive QoS Platform in Multimedia Networks
Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New
More informationReliable Multicast in Mobile Networks
Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:
More informationSolving Traveling Salesman Problem Using Parallel Genetic. Algorithm and Simulated Annealing
Solving Traveling Salesman Problem Using Parallel Genetic Algorithm and Simulated Annealing Fan Yang May 18, 2010 Abstract The traveling salesman problem (TSP) is to find a tour of a given number of cities
More informationOptimizing the Parameters of Handover in LTE using SON System by Handling Mobility Robustness
Optimizing the Parameters of Handover in LTE using SON System by Handling Mobility Robustness G K Venkatesh PhD Scholar Jain University, Chickballapur, India Dr.P.V.Rao Prof. Dept. of ECE Rajarajeshwari
More informationCharacter Recognition
Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches
More informationAirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems
AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group
More informationMultiagent Traffic Management: An Improved Intersection Control Mechanism PRESENTED BY: PATRICIA PEREZ AND LAURA MATOS
Multiagent Traffic Management: An Improved Intersection Control Mechanism PRESENTED BY: PATRICIA PEREZ AND LAURA MATOS Outline Introduction The Original System Improving the Original Model Protocol Intersection
More informationAssignment 10: TCP and Congestion Control Due the week of November 14/15, 2012
Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for
More informationLotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said
FUZZY LOGIC Fuzzy Logic Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said Fuzzy logic is a means of presenting problems to
More information1 - Local smoothness analysis
Jarek Rossignac Although a smooth planar curve J may be represented in a variety of ways, representations based on polyloops are popular in computer graphics. The vertices of the polyloop L may be viewed
More informationSTRAW - An integrated mobility & traffic model for vehicular ad-hoc networks
STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks David R. Choffnes & Fabián E. Bustamante Department of Computer Science, Northwestern University www.aqualab.cs.northwestern.edu
More informationAnalysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks
Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall
More informationCONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE IN THREE-DIMENSIONAL SPACE
National Technical University of Athens School of Civil Engineering Department of Transportation Planning and Engineering Doctoral Dissertation CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE
More informationThe State of the American Traveler TM
The State of the American Traveler TM MOBILE EDITION Fall 2018 Volume 30 The Mobile Edition THIS FALL EDITION of The State of the American Traveler TM continues our ongoing exploration of travelers use
More informationCapacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands
Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Utility networks are going through massive transformations towards next
More information3 Nonlinear Regression
3 Linear models are often insufficient to capture the real-world phenomena. That is, the relation between the inputs and the outputs we want to be able to predict are not linear. As a consequence, nonlinear
More informationMETAL OXIDE VARISTORS
POWERCET CORPORATION METAL OXIDE VARISTORS PROTECTIVE LEVELS, CURRENT AND ENERGY RATINGS OF PARALLEL VARISTORS PREPARED FOR EFI ELECTRONICS CORPORATION SALT LAKE CITY, UTAH METAL OXIDE VARISTORS PROTECTIVE
More informationAppendix B. Standards-Track TCP Evaluation
215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error
More informationTraffic Management Tools for ATM Networks With Real-Time and Non-Real-Time Services
Traffic Management Tools for ATM Networks With Real-Time and Non-Real-Time Services Kalevi Kilkki Helsinki University of Technology e-mail: kalevi.kilkki@hut.fi Abstract This presentation considers some
More informationSmall Cells as a Service rethinking the mobile operator business
Small Cells as a Service rethinking the mobile operator business Mats Eriksson, CEO Arctos Labs Scandinavia AB -02-18 1 Executive summary Mobile operators (MNOs) face a huge challenge in meeting the data
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationLeased Line Charge Control
October 2012 Frontier Economics 1 RE-ALLOCATION OF COMMON COSTS Ofcom s proposals for the next are set out in the consultation issued in July 2012. The cost modelling includes a re-allocation of fixed
More informationCall Admission Control in IP networks with QoS support
Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice
More informationTRAVELTIME TOMOGRAPHY (CONT)
30 March 005 MODE UNIQUENESS The forward model TRAVETIME TOMOGRAPHY (CONT di = A ik m k d = Am (1 Data vecto r Sensitivit y matrix Model vector states the linearized relationship between data and model
More informationPromoting the Use of End-to-End Congestion Control in the Internet
Promoting the Use of End-to-End Congestion Control in the Internet IEEE/ACM Transactions on ing, May 3 1999 Sally Floyd, Kevin Fall Presenter: Yixin Hua 1 About Winner of the Communications Society William
More informationEffects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex
Effects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex Keiko I. Powers, Ph.D., J. D. Power and Associates, Westlake Village, CA ABSTRACT Discrete time series
More informationPerformance of relational database management
Building a 3-D DRAM Architecture for Optimum Cost/Performance By Gene Bowles and Duke Lambert As systems increase in performance and power, magnetic disk storage speeds have lagged behind. But using solidstate
More informationDIGITAL IMAGE ANALYSIS. Image Classification: Object-based Classification
DIGITAL IMAGE ANALYSIS Image Classification: Object-based Classification Image classification Quantitative analysis used to automate the identification of features Spectral pattern recognition Unsupervised
More informationFlow-start: Faster and Less Overshoot with Paced Chirping
Flow-start: Faster and Less Overshoot with Paced Chirping Joakim Misund, Simula and Uni Oslo Bob Briscoe, Independent IRTF ICCRG, Jul 2018 The Slow-Start
More informationHao Wang 1, Dave Laurenson 1, and Jane Hillston 2
A General Performance Evaluation Framework for Network Selection Strategies in 3G-WLAN Interworking Networks Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 1 Institute for Digital Communications 2 Laboratory
More informationRanking Algorithms For Digital Forensic String Search Hits
DIGITAL FORENSIC RESEARCH CONFERENCE Ranking Algorithms For Digital Forensic String Search Hits By Nicole Beebe and Lishu Liu Presented At The Digital Forensic Research Conference DFRWS 2014 USA Denver,
More informationPerformance Evaluation of Non-Intrusive Methods for Traffic Data Collection. Kamal Banger, Ministry of Transportation of Ontario
Abstract Performance Evaluation of Non-Intrusive Methods for Traffic Data Collection Kamal Banger, Ministry of Transportation of Ontario Nancy Adriano, P.Eng., Ministry of Transportation of Ontario For
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationEstimating Parking Spot Occupancy
1 Estimating Parking Spot Occupancy David M.W. Landry and Matthew R. Morin Abstract Whether or not a car occupies a given parking spot at a given time can be modeled as a random variable. By looking at
More informationReporting Mesh Statistics
Chapter 15. Reporting Mesh Statistics The quality of a mesh is determined more effectively by looking at various statistics, such as maximum skewness, rather than just performing a visual inspection. Unlike
More informationStop-and-Go Service Using Hierarchical Round Robin
Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows
More informationWelfare Navigation Using Genetic Algorithm
Welfare Navigation Using Genetic Algorithm David Erukhimovich and Yoel Zeldes Hebrew University of Jerusalem AI course final project Abstract Using standard navigation algorithms and applications (such
More informationA LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK
Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow
More informationQoS and Mobility in Multicast/Broadcast Services (MBSs) in Mobile WiMAX Systems
Asia Future Internet Mobile/Wireless School QoS and Mobility in Multicast/Broadcast Services (MBSs) in Mobile WiMAX Systems Ji Hoon Lee, Taekyoung Kwon*, and Yanghee Choi Seoul National University Sangheon
More information1.4.3 OPERATING SPEED CONSISTENCY
Geometric Design Guide for Canadian oads 1.4.3 OPEATING SPEED CONSISTENCY The safety of a road is closely linked to variations in the speed of vehicles travelling on it. These variations are of two kinds:
More informationEfficient Buffering in Reliable Multicast Protocols
Efficient Buffering in Reliable Multicast Protocols Oznur Ozkasap, Robbert van Renesse, Kenneth P. Birman, Zhen Xiao Dept. of Computer Science, Cornell University 4118 Upson Hall, Ithaca, NY 14853 {ozkasap,rvr,ken,xiao}@cs.cornell.edu
More informationDigital Image Processing. Prof. P. K. Biswas. Department of Electronic & Electrical Communication Engineering
Digital Image Processing Prof. P. K. Biswas Department of Electronic & Electrical Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Image Enhancement Frequency Domain Processing
More informationCHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY
23 CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY 3.1 DESIGN OF EXPERIMENTS Design of experiments is a systematic approach for investigation of a system or process. A series
More informationReview of the Robust K-means Algorithm and Comparison with Other Clustering Methods
Review of the Robust K-means Algorithm and Comparison with Other Clustering Methods Ben Karsin University of Hawaii at Manoa Information and Computer Science ICS 63 Machine Learning Fall 8 Introduction
More information