16 research outputs found

    A New Handover Strategy between Femtocell and Macrocell for LTE-based Network

    Get PDF
    [[abstract]]The femtocell networks that use Home eNodeB (HeNB) and existing networks as backhaul connectivity can fulfill the upcoming demand of high data rate for wireless communication system as well as can extend the coverage area. We consider so me parameters which are interference, velocity, RSS and QoS level in handover. We propose a new handover strategy between femtocell and macrocell for LTE-based network in hybrid access mode. This strategy can avoid unnecessary handover and reduce handover failure. In this paper we analyzed three scenarios after handover decision strategy procedure: hand-in (CSG and non-CSG), hand-out.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20110703~20110704[[iscallforpapers]]Y[[conferencelocation]]Sao Paulo, Brazil[[countrycodes]]BR

    Using syntactic rules to combine opinion elements in Chinese opinion mining systems

    Get PDF
    [[abstract]]Most Chinese opinion mining systems use the specific pattern and nearby approach to combine relevant opinion elements (feature words and opinion words) to express the opinion tendencies of authors. In this paper, we propose a rule-based ad hoc method to study the combination problem of Chinese opinion elements. We extracted the opinion elements of articles based on lexicons and then combined them with the different sentence patterns and grammars to analyze the authors’ opinions. Because the articles on the online communities such as blogs, wikis, online forums, etc. do not have a defined format, there are often opinion comments that do not refer to the topic, resulting in information loss and significantly reduced recall. Therefore, the “default topic” method is proposed to correct this type of problem. Additionally, there might be errors when using the nearby approach to combine opinion elements. Thus, we propose the concept of “clause priority” to increase precision. After 20 months of long-term tracking and analysis, the experimental result indicates that the method proposed in this paper had good precision, recall, and F1 of opinion tendency analysis for review articles.[[notice]]補正完畢[[journaltype]]國外[[ispeerreviewed]]Y[[booktype]]紙本[[booktype]]電子版[[countrycodes]]KO

    A Channel Quality-aware Scheduling and Resource Allocation Strategy for Downlink LTE Systems

    Get PDF
    [[abstract]]Today, the main purpose of a scheduler for Long Term Evolution (LTE) is to provide the best system performance. However, it may decrease the system performance to have latency and starvation of lower priority connections in a resource allocation phase. There has been little research performed on LTE downlink scheduling and resource allocation. This paper proposes an efficient algorithm that includes scheduling strategies and resource allocation mechanisms, to avoid the latency or starvation of lower priority connections and to maintain system performance in downlinks of LTE. The algorithm discusses five levels of bandwidth request situations to assign priority and to allocate the bandwidth for each connection. Therefore, we design an LTE downlink scheduling scheme and a resource allocation strategy that not only aims to achieve the system’s highest performance but also avoids latency and starvation problems. As shown in the results of simulations, the proposed algorithm can provide proportional fairness and high system performance in downlinks of LTE systems.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]US

    The Sleep Control Strategy for Wireless Sensor Networks

    Get PDF
    [[abstract]]The sensor node in a wireless sensor network has the characteristics of low power consumption and a non-rechargeable sensor node. Therefore, power consumption is limited. Effectively controlling the power of the sensor node and extending the life time of the whole network become very important issues. In this paper, we offer the optimal sleep control for wireless sensor networks: randomly setting the sensor nodes in the entire network and determining the sleeping probability by the distance between the sensor node and sink. This method reduces the transmission frequency of the sensor nodes that are closer to the sink and effectively reaches the network's loading balance. However, the sensor nodes process their sleeping schedules according to their own residual power to save energy.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]KO

    A Novel Packet Scheduling Scheme for Downlink LTE System

    Get PDF
    [[abstract]]Long term evolution (LTE) is the next generation wireless system. There are not many researches for LTE downlink scheduling. It uses orthogonal frequency division multiple access (OFDMA) in downlink. Until now, the goal for the LTE scheduler is achieving the system highest performance, but it will cause to lower priority connection delay or starvation under limited bandwidth resources. Therefore, we design a LTE downlink scheduling scheme and resource allocation strategy which are not only to achieve the system highest performance, but also avoid latency and starvation problem.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20111014~20111016[[iscallforpapers]]Y[[conferencelocation]]Dalian, China[[countrycodes]]CH

    HIP-based Handover Mechanism under MIH Architecture in Heterogeneous Wireless Networks

    Get PDF
    [[abstract]]In this paper, we offers a HIP-based vertical handover scheme under MIH architecture in heterogeneous wireless network. Many diversity wireless access technologies are offering in Next Generation Wireless Networks (NGWN). In NGWN, the integration of wireless access network will be accomplished by seamless handover which contains many challenges i.e. service mobility, vertical handover, common authentication, unified accounting/billing, security mechanisms, QoS and service provisioning, etc. Toward this direction, our research aims to provide a complete integration of heterogeneous network architecture and support a fit mobility management for network to seamless handover. We focus on simulation about vertical handover execution for WiMAX to WiFi scenario. Our idea can modify defects of Mobile IP and SIP. And it provides internet users always best connection. Moreover, we hope to contribute our research to beyond 4G wireless networks.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20110621~20110623[[booktype]]紙本[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]Gyeongju, Korea[[countrycodes]]KO

    Distributed Fault-Tolerant Embeddings of Rings in Incrementally Extensible Hypercubes with Unbounded Expansion

    Get PDF
    [[abstract]]The Incrementally Extensible Hypercube (IEH) is a generalization of interconnection network that is derived from the hypercube. Unlike the hypercube, the IEH can be constructed for any number of nodes. That is, the IEH is incrementally expandable. In this paper, the problem of embedding and reconfiguring ring structures is considered in an IEH with faulty nodes. There are a novel embedding algorithm proposed in this paper. The embedding algorithm enables us to obtain the good embedding of a ring into a faulty IEH with unbounded expansion, and such the result can be tolerated up to O(n*log2m ) faults with congestion 1, load 1, and dilation 4. The presented embedding methods are optimized mainly for balancing the processor loads, while minimizing dilation and congestion as far as possible.[[notice]]補正完畢[[journaltype]]國際[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]TW

    Simulation of Meshes in a Faulty Supercube with Unbounded Expansion

    Get PDF
    [[abstract]]Reconfiguring meshes in a faulty Supercube is investigated in the paper. The result can readily be used in the optimal embedding of a mesh (or a torus) of processors in a faulty Supercube with unbounded expansion. There are embedding algorithms proposed in this paper. These embedding algorithms show a mesh with any number of nodes can be embedded into a faulty Supercube with load 1, congestion 1, and dilation 3 such that O(n2-w2) faults can be tolerated, where n is the dimension of the Supercube and 2w is the number of nodes of the mesh. The meshes and hypercubes are widely used interconnection architectures in parallel computing, grid computing, sensor network, and cloud computing. In addition, the Supercubes are superior to hypercube in terms of embedding a mesh and torus under faults. Therefore, we can easily port the parallel or distributed algorithms developed for these structuring of mesh and torus to the Supercube.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]KO

    An Integrated Building Fire Evacuation System with RFID and Cloud Computing

    Get PDF
    [[abstract]]Building fire is a common disaster happening in our daily life that causes unfortunate casualties and deaths. Successfully escaping from fire depends on the design of evacuation route and time, as most of the damage of fire is caused due to lack of evacuation equipments or poor design of the emergency route. In this research work, we designed a hybrid building fire evacuation system (HBFES) on a mobile phone using Radio Frequency Identification (RFID) techniques and Cloud Computing. The system will be implemented at Tamkang University on Lanyang campus. Several existing computer or mobile phone applications, namely Viewpoint Calculator, Path planner, and MobiX3D viewer will be used on the system to rapidly calculate reliable evacuation routes when building fire takes place.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20111014~10111016[[ispeerreviewed]]Y[[booktype]]紙本 電子版[[iscallforpapers]]Y[[conferencelocation]]Dalian, China[[countrycodes]]CH

    A Real-time Decision Support with Cloud Computing Based Fire Evacuation System

    Get PDF
    [[abstract]]An effective evacuation system can help people escape from building fire. Most evacuation systems consist of a indoor positioning system, a back-end database, and a display device with calculation and display software. However, very few of them can smartly determine which evacuation route is the best decision. If all the locations of the evacuating people can be simultaneously determined, the best evacuation routes can be decided to avoid congestion, and survival rate can increase. The previous radio frequency identification (RFID) based evacuation system focused on detecting the RFID tags using a mobile phone in order to determine the location of the mobile phone user so that an evacuation route can be displayed. However, the system is available for one person regardless of the number of evacuating people or exits. This study is based on the previous RFID based evacuation system investigating the best evacuation routes. The system introduces cloud computing that calculates for positioning the evacuating people and determining the optimum evacuation routes for each of them. The system will be implemented at Tamkang University on Lanyang campus.[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20111024~20111026[[booktype]]紙本;電子版[[iscallforpapers]]Y[[conferencelocation]]Macao[[countrycodes]]MA
    corecore