57 research outputs found
CLEVER: a cooperative and cross-layer approach to video streaming in HetNets
We investigate the problem of providing a video streaming service to mobile users in an heterogeneous cellular network composed of micro e-NodeBs (eNBs) and macro e-NodeBs (MeNBs). More in detail, we target a cross-layer dynamic allocation of the bandwidth resources available over a set of eNBs and one MeNB, with the goal of reducing the delay per chunk experienced by users. After optimally formulating the problem of minimizing the chunk delay, we detail the Cross LayEr Video stReaming (CLEVER) algorithm, to practically tackle it. CLEVER makes allocation decisions on the basis of information retrieved from the application layer aswell as from lower layers. Results, obtained over two representative case studies, show that CLEVER is able to limit the chunk delay, while also reducing the amount of bandwidth reserved for offloaded users on the MeNB, as well as the number of offloaded users. In addition, we show that CLEVER performs clearly better than two selected reference algorithms, while being very close to a best bound. Finally, we show that our solution is able to achieve high fairness indexes and good levels of Quality of Experience (QoE)
Traffic Management and Networking for Autonomous Vehicular Highway Systems
We develop traffic management and data networking mechanisms and study their integrated design for an autonomous transportation system. The traffic management model involves a multi-lane multi-segment highway. Ramp managers regulate admission of vehicles into the highway and their routing to designated lanes. Vehicles moving across each lane are organized into platoons. A Platoon Leader (PL) is elected in each platoon and is used to manage its members and their communications with the infrastructure and with vehicles in other platoons. We develop new methods that are employed to determine the structural formations of platoons and their mobility processes in each lane, aiming to maximize the realized flow rate under vehicular end-to-end delay constraints. We set a limit on the vehicular on-ramp queueing delay and on the (per unit distance) transit time incurred along the highway. We make use of the platoon formations to develop new Vehicle-to-Vehicle (V2V) wireless networking cross-layer schemes that are used to disseminate messages among vehicles traveling within a specified neighborhood. For this purpose, we develop algorithms that configure a hierarchical networking architecture for the autonomous system. Certain platoon leaders are dynamically assigned to act as Backbone Nodes (BNs). The latter are interconnected by communications links to form a Backbone Network (Bnet). Each BN serves as an access point for its Access Network (Anet), which consists of its mobile clients. We study the delay-throughput performance behavior of the network system and determine the optimal setting of its parameters, assuming both TDMA and IEEE 802.11p oriented wireless channel sharing (MAC) schemes. Integrating these traffic management and data networking mechanisms, we demonstrate the performance tradeoffs available to the system designer and manager when aiming to synthesize an autonomous transportation system operation that achieves targeted vehicular flow rates and transit delays while also setting the data communications network system to meet targeted message throughput and delay objectives
Epithelioid Angiosarcoma of the Small Intestine After Occupational Exposure to Radiation and Polyvinyl Chloride: A case Report and Review of Literature
Angiosarcomas represent 1–2% of soft tissue sarcomas and most frequently occur in the subcutis. They may affect internal
organs, such as the heart, liver, and spleen, and only rarely do they emerge in the gastrointestinal tract. The association
between angiosarcomas and certain toxic chemical substances or previous external-beam radiation therapy is well
documented
Meta-analysis of gene expression microarrays with missing replicates
<p>Abstract</p> <p>Background</p> <p>Many different microarray experiments are publicly available today. It is natural to ask whether different experiments for the same phenotypic conditions can be combined using meta-analysis, in order to increase the overall sample size. However, some genes are not measured in all experiments, hence they cannot be included or their statistical significance cannot be appropriately estimated in traditional meta-analysis. Nonetheless, these genes, which we refer to as <it>incomplete genes</it>, may also be informative and useful.</p> <p>Results</p> <p>We propose a meta-analysis framework, called "Incomplete Gene Meta-analysis", which can include incomplete genes by imputing the significance of missing replicates, and computing a meta-score for every gene across all datasets. We demonstrate that the incomplete genes are worthy of being included and our method is able to appropriately estimate their significance in two groups of experiments. We first apply the <it>Incomplete Gene Meta-analysis </it>and several comparable methods to five breast cancer datasets with an identical set of probes. We simulate incomplete genes by randomly removing a subset of probes from each dataset and demonstrate that our method consistently outperforms two other methods in terms of their false discovery rate. We also apply the methods to three gastric cancer datasets for the purpose of discriminating diffuse and intestinal subtypes.</p> <p>Conclusions</p> <p>Meta-analysis is an effective approach that identifies more robust sets of differentially expressed genes from multiple studies. The incomplete genes that mainly arise from the use of different platforms may also have statistical and biological importance but are ignored or are not appropriately involved by previous studies. Our Incomplete Gene Meta-analysis is able to incorporate the incomplete genes by estimating their significance. The results on both breast and gastric cancer datasets suggest that the highly ranked genes and associated GO terms produced by our method are more significant and biologically meaningful according to the previous literature.</p
Protocol Independent Multicasting in Wireless Mesh Networks
Multicast in wireless networks received a lot of attention, from ad-hoc networks, to structured multi-hop meshes. However, the support of the standard Protocol Independent Multicast (PIM) protocol has been dismissed as non important (or non feasible), given that its straightforward application on wireless networks does not work properly. In this work we analyze the reasons why PIM standard implementations interacts badly with wireless networks and propose simple countermeasures that do not require modifications of the standard, but only small modifications of the implementation. The Dense Mode version of PIM is implemented in ns-3 and results are presented showing the performance of the protocol and its overheads in mesh networks with fixed mesh routers and both fixed and mobile end-user clients
Recommended from our members
Optimal Link Capacity Assignments in Teleprocessing and Centralized Computer Networks
International Telemetering Conference Proceedings / September 28-30, 1976 / Hyatt House Hotel, Los Angeles, CaliforniaWe consider a centralized network model representing a teleprocessing or a centralized computer communication network. The network is topologically described by a tree structure. A single central node represents a data-processing center, while the other nodes correspond to remote terminals. A maximal average message delay value is prescribed. A cost function is assumed to incorporate a term representing link costs, dependent only on the link flows, and a term involving weighted (distance related) sum of the powers of the link-capacity values. We then solve for the optimal link capacity assignment, yielding the minimal value of the cost function under the prescribed maximal message delay value.International Foundation for TelemeteringProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection
Recommended from our members
On the Combined Performance of Joint Access Control/Modulation/Coding Schemes
International Telemetering Conference Proceedings / November 14-16, 1978 / Hyatt House Hotel, Los Angeles, CaliforniaThe combined performance of a multi-access communication channel under joint access control/modulation/coding procedures is examined. The multi-access channel serves as a shared information transmission medium in a data communication network, such as a satellite, computer or terrestrial radio communication network. The performance of the underlying modulation/coding scheme is expressed in terms of the corresponding bit-error probability vs. signal-to-noise ratio curve. The computational cutoff error rate is also used as a proper performance measure characterizing the joint modulation/coding scheme. The performance of the underlying access-control algorithm is described by the message-delay vs. network-throughput curve. Integrating these performance functions, the combined performance of the joint access-control/modulation/coding procedure is derived. In particular, under proper bandwidth and power limitations, one can then evaluate the total amount of information that can be transmitted through the channel, in a reliable and timely fashion, at prescribed bit-error-probability and message-delay values, under various communication link, transceiver, repeater and antenna conditions.International Foundation for TelemeteringProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection
Topological Synthesis of Mobile Backbone Networks for Managing Ad Hoc Wireless Networks
Abstract. In this paper, we overview our approaches and methods to the topological synthesis and management of Mobile Backbone Network (MBN) based architectures. Such backbone networks are intended to aid in the support of multimedia applications across mobile ad hoc wireless networks. An MBN based ad hoc network employs backbone nodes, operating in a manner similar to that used by base-stations in a cellular network. In contrast with the latter, in an MBN system these nodes are mobile and are selected dynamically to best track the mobility trends of the involved units and best adapt to the environmental topography of the area of operations. Such networks integrate the MBN with ad hoc networking and routing approaches to support non-realtime and realtime multimedia applications. In this manner, network services offer applications a choice of best-effort transport as well as guaranteed end-to-end quality of service (QoS) performance. To design the topology of the mobile backbone network, we incorporate mobileuser location distribution information. We consequently introduce an approach based on the use of pattern recognition techniques in synthesizing cluster regions that serve as key components of the mobile backbone. Intra-cluster and intercluster topology design methods are then used to complete the construction of a reliable backbone network. Simplified hierarchical routing mechanisms are then invoked for distributing flows across the backbone
- …