1,706 research outputs found

    A New Handover Strategy between Femtocell and Macrocell for LTE-based Network

    Get PDF
    [[abstract]]The femtocell networks that use Home eNodeB (HeNB) and existing networks as backhaul connectivity can fulfill the upcoming demand of high data rate for wireless communication system as well as can extend the coverage area. We consider so me parameters which are interference, velocity, RSS and QoS level in handover. We propose a new handover strategy between femtocell and macrocell for LTE-based network in hybrid access mode. This strategy can avoid unnecessary handover and reduce handover failure. In this paper we analyzed three scenarios after handover decision strategy procedure: hand-in (CSG and non-CSG), hand-out.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20110703~20110704[[iscallforpapers]]Y[[conferencelocation]]Sao Paulo, Brazil[[countrycodes]]BR

    Using syntactic rules to combine opinion elements in Chinese opinion mining systems

    Get PDF
    [[abstract]]Most Chinese opinion mining systems use the specific pattern and nearby approach to combine relevant opinion elements (feature words and opinion words) to express the opinion tendencies of authors. In this paper, we propose a rule-based ad hoc method to study the combination problem of Chinese opinion elements. We extracted the opinion elements of articles based on lexicons and then combined them with the different sentence patterns and grammars to analyze the authors’ opinions. Because the articles on the online communities such as blogs, wikis, online forums, etc. do not have a defined format, there are often opinion comments that do not refer to the topic, resulting in information loss and significantly reduced recall. Therefore, the “default topic” method is proposed to correct this type of problem. Additionally, there might be errors when using the nearby approach to combine opinion elements. Thus, we propose the concept of “clause priority” to increase precision. After 20 months of long-term tracking and analysis, the experimental result indicates that the method proposed in this paper had good precision, recall, and F1 of opinion tendency analysis for review articles.[[notice]]補正完畢[[journaltype]]國外[[ispeerreviewed]]Y[[booktype]]紙本[[booktype]]電子版[[countrycodes]]KO

    A Channel Quality-aware Scheduling and Resource Allocation Strategy for Downlink LTE Systems

    Get PDF
    [[abstract]]Today, the main purpose of a scheduler for Long Term Evolution (LTE) is to provide the best system performance. However, it may decrease the system performance to have latency and starvation of lower priority connections in a resource allocation phase. There has been little research performed on LTE downlink scheduling and resource allocation. This paper proposes an efficient algorithm that includes scheduling strategies and resource allocation mechanisms, to avoid the latency or starvation of lower priority connections and to maintain system performance in downlinks of LTE. The algorithm discusses five levels of bandwidth request situations to assign priority and to allocate the bandwidth for each connection. Therefore, we design an LTE downlink scheduling scheme and a resource allocation strategy that not only aims to achieve the system’s highest performance but also avoids latency and starvation problems. As shown in the results of simulations, the proposed algorithm can provide proportional fairness and high system performance in downlinks of LTE systems.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]US

    The Sleep Control Strategy for Wireless Sensor Networks

    Get PDF
    [[abstract]]The sensor node in a wireless sensor network has the characteristics of low power consumption and a non-rechargeable sensor node. Therefore, power consumption is limited. Effectively controlling the power of the sensor node and extending the life time of the whole network become very important issues. In this paper, we offer the optimal sleep control for wireless sensor networks: randomly setting the sensor nodes in the entire network and determining the sleeping probability by the distance between the sensor node and sink. This method reduces the transmission frequency of the sensor nodes that are closer to the sink and effectively reaches the network's loading balance. However, the sensor nodes process their sleeping schedules according to their own residual power to save energy.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]KO

    A Novel Packet Scheduling Scheme for Downlink LTE System

    Get PDF
    [[abstract]]Long term evolution (LTE) is the next generation wireless system. There are not many researches for LTE downlink scheduling. It uses orthogonal frequency division multiple access (OFDMA) in downlink. Until now, the goal for the LTE scheduler is achieving the system highest performance, but it will cause to lower priority connection delay or starvation under limited bandwidth resources. Therefore, we design a LTE downlink scheduling scheme and resource allocation strategy which are not only to achieve the system highest performance, but also avoid latency and starvation problem.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20111014~20111016[[iscallforpapers]]Y[[conferencelocation]]Dalian, China[[countrycodes]]CH

    HIP-based Handover Mechanism under MIH Architecture in Heterogeneous Wireless Networks

    Get PDF
    [[abstract]]In this paper, we offers a HIP-based vertical handover scheme under MIH architecture in heterogeneous wireless network. Many diversity wireless access technologies are offering in Next Generation Wireless Networks (NGWN). In NGWN, the integration of wireless access network will be accomplished by seamless handover which contains many challenges i.e. service mobility, vertical handover, common authentication, unified accounting/billing, security mechanisms, QoS and service provisioning, etc. Toward this direction, our research aims to provide a complete integration of heterogeneous network architecture and support a fit mobility management for network to seamless handover. We focus on simulation about vertical handover execution for WiMAX to WiFi scenario. Our idea can modify defects of Mobile IP and SIP. And it provides internet users always best connection. Moreover, we hope to contribute our research to beyond 4G wireless networks.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20110621~20110623[[booktype]]紙本[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]Gyeongju, Korea[[countrycodes]]KO

    Feng Shui: A Comparison of the Original Concept and Its Current Westernized Version

    Get PDF
    Feng Shui is an ancient art, science, and philosophy that originated in China 3000 years ago. Followers of Feng Shui believe that they can find a better place or create a better living environment through the Feng Shui principles. Feng Shui is not only popular in China and Asia; its popularity also has dramatically increased in Western countries. Architects, interior designers, and landscape architects in the West have used Feng Shui as a design guideline for pursuing a harmonious living environment for many years. However, the different cultural backgrounds, the lack of basic knowledge of its true principles, and the lack of scientific data have resulted in concerns over the application of Feng Shui in the West. The Black-Sect Tibetan Tantric School of Feng Shui (known as Modern Feng Shui or BTB Feng Shui) is a very common school of Feng Shui in Western culture. The purpose of Modern Feng Shui is to help the discipline become easier to adapt and more suitable for the West and to encourage the application of Feng Shui principles into daily life. However, by trying to simplify its principles, Modern Feng Shui is potentially deviating from the true core wisdom of Feng Shui. Since the popularity of Feng Shui is continuously growing and many different professionals are attempting to apply the discipline to their fields, it is important to understand what is meant by Traditional Feng Shui principles and their core concepts and how to incorporate them. The purpose of this thesis is, first, to discuss the principles and history of Feng Shui, and second, to provide a design metric that follows both the Traditional Feng Shui III principles and BTB Modern Feng Shui principles. Finally, using the Traditional Feng Shui principles and Modern Feng Shui design metrics on the same floor plan, the two different results are compared to understand why the application of Modern Feng Shui might be at risk of losing the core concepts of Traditional Feng Shui

    Faulty-Tolerant Algorithm for Mapping a Complete Binary Tree in an IEH

    Get PDF
    [[abstract]]Different parallel architectures may require different algorithms to make the existent algorithms on one architecture be easily transformed to or implemented on another architecture. This paper proposes a novel algorithm for embedding complete binary trees in a faulty Incrementally Extensible Hypercube (IEH). Furthermore, to obtain the replaceable node of the faulty node, 2-expansion is permitted such that up to (n+1) faults can be tolerated with dilation 3, congestion 1 and load 1. The presented embedding methods are optimized mainly for balancing the processor loads, while minimizing dilation and congestion as far as possible. According to the result, we can map the parallel algorithms developed by the structure of complete binary tree in an IEH. These methods of reconfiguring enable extremely high-speed parallel computation.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[booktype]]紙本[[countrycodes]]GR

    Distributed Fault-Tolerant Embeddings of Rings in Incrementally Extensible Hypercubes with Unbounded Expansion

    Get PDF
    [[abstract]]The Incrementally Extensible Hypercube (IEH) is a generalization of interconnection network that is derived from the hypercube. Unlike the hypercube, the IEH can be constructed for any number of nodes. That is, the IEH is incrementally expandable. In this paper, the problem of embedding and reconfiguring ring structures is considered in an IEH with faulty nodes. There are a novel embedding algorithm proposed in this paper. The embedding algorithm enables us to obtain the good embedding of a ring into a faulty IEH with unbounded expansion, and such the result can be tolerated up to O(n*log2m ) faults with congestion 1, load 1, and dilation 4. The presented embedding methods are optimized mainly for balancing the processor loads, while minimizing dilation and congestion as far as possible.[[notice]]補正完畢[[journaltype]]國際[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]TW

    Simulation of Meshes in a Faulty Supercube with Unbounded Expansion

    Get PDF
    [[abstract]]Reconfiguring meshes in a faulty Supercube is investigated in the paper. The result can readily be used in the optimal embedding of a mesh (or a torus) of processors in a faulty Supercube with unbounded expansion. There are embedding algorithms proposed in this paper. These embedding algorithms show a mesh with any number of nodes can be embedded into a faulty Supercube with load 1, congestion 1, and dilation 3 such that O(n2-w2) faults can be tolerated, where n is the dimension of the Supercube and 2w is the number of nodes of the mesh. The meshes and hypercubes are widely used interconnection architectures in parallel computing, grid computing, sensor network, and cloud computing. In addition, the Supercubes are superior to hypercube in terms of embedding a mesh and torus under faults. Therefore, we can easily port the parallel or distributed algorithms developed for these structuring of mesh and torus to the Supercube.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]KO
    corecore