This document summarizes a research paper that proposes a Peak Load Spectrum Pricing (PLSP) algorithm for dynamic radio spectrum management. The PLSP algorithm uses peak load pricing concepts from economics to set spectrum prices. It calculates optimal prices for different time periods based on factors like operating costs, demand levels, and willingness to pay. The algorithm has five phases: request submission, pricing model determination, price calculation, auction, and spectrum allocation. It determines prices for both peak and off-peak periods, using auctions during peaks and peak load charging during off-peaks. The goal is to allocate spectrum efficiently while considering multiple factors like costs, demand, and fairness. The paper argues the PLSP algorithm provides advantages over single-price
This document summarizes a journal article that proposes a peak load pricing algorithm for dynamic radio spectrum management. It begins by introducing the concepts of dynamic spectrum access and a harmonized usage band (HUB) reserved for controlling dynamic spectrum access. It then describes climax load charging (CLC), a pricing model used by utilities where higher prices are charged during peak demand periods and lower prices during off-peak periods. The authors suggest applying CLC and peak load pricing theory to set spectrum prices in the HUB, with the optimal price determined by operating costs, the cost of additional capacity, and willingness to pay.
Study and Analysis Capacity of MIMO Systems for AWGN Channel Model ScenariosIJERA Editor
Future wireless communication systems can utilize the spatial properties of the wireless channel to enhance the spectral efficiency and therefore increases its channel capacity. This can be designed by deploying multiple antennas at both the transmitter side and receiver side. The basic measure of performance is the capacity of a channel; the maximum rate of communication for which arbitrarily small error probability can be achieved. The AWGN (additive white Gaussian noise) channel introduces the notion of capacity through a heuristic argument. The AWGN channel is then used as a basic building block to check the capacity of wireless fading channels in contrast to the AWGN channel. There is no single definition of capacity for fading channels that is applicable in all situations. Several notions of capacity are developed, and together they form a systematic study of performance limits of fading channels. The various capacity measures allow us to observe clearly the various types of resources available in fading channels: degrees of freedom, power and diversity. The MIMO systems capacity can be enhanced linearly with large the number of antennas. This paper elaborates the study of MIMO system capacity using the AWGN Channel Model, Channel Capacity, Channel Fast Fading, Spatial Autocorrelation and Power delay profile for various channel environments.
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
In this paper, three beamforming design are considered for multi user MIMO system. First, transmit
beamformers are fixed and the receive (RX) beamformers are calculated. Transmit beamformer (TX-BF)is
projectedas a null space of appropriate channels. It reduces the interference for each user. Then the receiver
beamformer is determined which maximize the SNR. This beamforming design provides less computation time.
The second case is joint TX and RX beamformer for SNR maximization. In this transmitter and receiver
beamformer are calculated using extended alternating optimization (EAO) algorithm. The third one is joint
transmitter and receiver beamforming for SNR and SINR maximization using EAO algorithm. This algorithm
provides better error performance and sum rate performance. All the design cases are simulated by using
standard multipath channel model. Our simulation results illustrate that compared to the least square design and
zero forcing design, the joint TX and RX beamforming design using EAO algorithm provides faster
beamforming and improved error performance and sum rate.
energy lifetime control algorithm for variable target load demands of ad hoc ...INFOGAIN PUBLICATION
The energy and lifetime of Ad hoc wireless sensor-target networks are improved using load control algorithm with different parameters and coverage load in demand, as well as sensor-target configurations. The main goal is to increase the lifetime of sensors by selecting appropriate sensor subsets to satisfy the minimum required value of overall coverage failure probability. The algorithm investigates the different sensor subsets, according to their coverage failure probabilities, and varying intervals of target load demands
Effective capacity in cognitive radio broadcast channelsMarwan Hammouda
Abstract—In this paper, we investigate effective capacity by
modeling a cognitive radio broadcast channel with one secondary transmitter (ST) and two secondary receivers (SRs) under quality-of-service constraints and interference power limitations.We initially describe three different ooperative channel sensing strategies with different ard-decision combining algorithms at the ST, namely OR, Majority, and AND rules. Since the channel sensing occurs with possible errors, we consider a combined
interference power constraint by which the transmission power of the secondary users (SUs) is bounded when the channel is sensed as both busy and idle. Furthermore, regarding the channel sensing decision and its correctness, there exist ...
This document discusses enhancing available transfer capability (ATC) in deregulated electricity markets using flexible AC transmission system (FACTS) devices. It analyzes using thyristor controlled series compensator (TCSC), static VAR compensator (SVC), and unified power flow controller (UPFC) individually and in combinations to boost single area ATC and multi-area ATC. Particle swarm optimization is employed to determine the optimal device settings. The study evaluates ATC enhancement on the IEEE 30 bus and 118 bus test systems for selected bilateral, multilateral, and area transactions, and also calculates the installation costs.
Review of various adaptive modulation and coding techniques in wireless networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes a journal article that proposes a peak load pricing algorithm for dynamic radio spectrum management. It begins by introducing the concepts of dynamic spectrum access and a harmonized usage band (HUB) reserved for controlling dynamic spectrum access. It then describes climax load charging (CLC), a pricing model used by utilities where higher prices are charged during peak demand periods and lower prices during off-peak periods. The authors suggest applying CLC and peak load pricing theory to set spectrum prices in the HUB, with the optimal price determined by operating costs, the cost of additional capacity, and willingness to pay.
Study and Analysis Capacity of MIMO Systems for AWGN Channel Model ScenariosIJERA Editor
Future wireless communication systems can utilize the spatial properties of the wireless channel to enhance the spectral efficiency and therefore increases its channel capacity. This can be designed by deploying multiple antennas at both the transmitter side and receiver side. The basic measure of performance is the capacity of a channel; the maximum rate of communication for which arbitrarily small error probability can be achieved. The AWGN (additive white Gaussian noise) channel introduces the notion of capacity through a heuristic argument. The AWGN channel is then used as a basic building block to check the capacity of wireless fading channels in contrast to the AWGN channel. There is no single definition of capacity for fading channels that is applicable in all situations. Several notions of capacity are developed, and together they form a systematic study of performance limits of fading channels. The various capacity measures allow us to observe clearly the various types of resources available in fading channels: degrees of freedom, power and diversity. The MIMO systems capacity can be enhanced linearly with large the number of antennas. This paper elaborates the study of MIMO system capacity using the AWGN Channel Model, Channel Capacity, Channel Fast Fading, Spatial Autocorrelation and Power delay profile for various channel environments.
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
In this paper, three beamforming design are considered for multi user MIMO system. First, transmit
beamformers are fixed and the receive (RX) beamformers are calculated. Transmit beamformer (TX-BF)is
projectedas a null space of appropriate channels. It reduces the interference for each user. Then the receiver
beamformer is determined which maximize the SNR. This beamforming design provides less computation time.
The second case is joint TX and RX beamformer for SNR maximization. In this transmitter and receiver
beamformer are calculated using extended alternating optimization (EAO) algorithm. The third one is joint
transmitter and receiver beamforming for SNR and SINR maximization using EAO algorithm. This algorithm
provides better error performance and sum rate performance. All the design cases are simulated by using
standard multipath channel model. Our simulation results illustrate that compared to the least square design and
zero forcing design, the joint TX and RX beamforming design using EAO algorithm provides faster
beamforming and improved error performance and sum rate.
energy lifetime control algorithm for variable target load demands of ad hoc ...INFOGAIN PUBLICATION
The energy and lifetime of Ad hoc wireless sensor-target networks are improved using load control algorithm with different parameters and coverage load in demand, as well as sensor-target configurations. The main goal is to increase the lifetime of sensors by selecting appropriate sensor subsets to satisfy the minimum required value of overall coverage failure probability. The algorithm investigates the different sensor subsets, according to their coverage failure probabilities, and varying intervals of target load demands
Effective capacity in cognitive radio broadcast channelsMarwan Hammouda
Abstract—In this paper, we investigate effective capacity by
modeling a cognitive radio broadcast channel with one secondary transmitter (ST) and two secondary receivers (SRs) under quality-of-service constraints and interference power limitations.We initially describe three different ooperative channel sensing strategies with different ard-decision combining algorithms at the ST, namely OR, Majority, and AND rules. Since the channel sensing occurs with possible errors, we consider a combined
interference power constraint by which the transmission power of the secondary users (SUs) is bounded when the channel is sensed as both busy and idle. Furthermore, regarding the channel sensing decision and its correctness, there exist ...
This document discusses enhancing available transfer capability (ATC) in deregulated electricity markets using flexible AC transmission system (FACTS) devices. It analyzes using thyristor controlled series compensator (TCSC), static VAR compensator (SVC), and unified power flow controller (UPFC) individually and in combinations to boost single area ATC and multi-area ATC. Particle swarm optimization is employed to determine the optimal device settings. The study evaluates ATC enhancement on the IEEE 30 bus and 118 bus test systems for selected bilateral, multilateral, and area transactions, and also calculates the installation costs.
Review of various adaptive modulation and coding techniques in wireless networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Review of various adaptive modulation and coding techniques in wireless networkeSAT Journals
Abstract Adaptive modulation and coding (AMC) is a method which adapts its transmitting parameters according to the channel state and is used in various modern wireless communications to maximize spectrum efficiency by minimizing the error rate. One of the driving strengths of AMC is the Signal-to-Noise Ratio (SNR) estimation and feedback channel for adaptation. Degrading effects caused due to sudden variation in the channel over time sometimes require the transmission link to react appropriately so it can minimize the Bit Error Rate (BER). There are various adaptive methods to implement the same like variable rate, variable error probability, and variable coding or hybrid technique. This article focuses upon variable power technique and describes two to three different power techniques and tries to make a comparison between two of them i.e, channel inversion and water-filling. Keywords- Adaptive Modulation and Coding (AMC), Bit Error Rate (BER), channel inversion, water-filling
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
This document analyzes methods for optimal path selection and power allocation in heterogeneous wireless networks where a user can transmit data through multiple radio access technologies (RATs) simultaneously. It formulates the bandwidth and power allocation problem as an optimization problem to maximize total system capacity. The Newton and modified Newton methods are proposed to find the optimal solution. Simulation results show the modified Newton method achieves higher total system capacity compared to the Newton method.
Optimal channel switching over gaussian channels under average power and cost...Deepshika Reddy
This document describes proposed methods for optimally switching between channels under average power and cost constraints. It first considers generic cost values and characterizes the optimal strategy. It then relates channel cost to noise power using logarithmic cost functions to obtain specific results. The proposed methods are: 1) analyze switching between two channels, 2) among three channels, or 3) a single channel. Key findings include showing optimal strategies utilize maximum power and cost, and involve at most three channels. Relations between optimal power levels for two-channel switching are also derived.
IRJET- A Proficient Time Slot Attainment on the Hybrid TDMA / CSMA Multi-Chan...IRJET Journal
This document presents a proposed hybrid TDMA/CSMA multi-channel MAC protocol for VANETs called HTC-MAC. HTC-MAC aims to provide efficient time slot acquisition on the control channel to reduce collision probability. It eliminates unnecessary control packets from the existing HER-MAC protocol. Analysis and simulation results show that HTC-MAC outperforms HER-MAC by acquiring time slots faster, especially in dense scenarios with many contending nodes. The probability of all nodes acquiring time slots within a given number of frames is higher for HTC-MAC compared to HER-MAC.
This document discusses multiple-input multiple-output (MIMO) systems. It begins by outlining the motivations and aspirations for developing MIMO, including achieving high data rates near 1 Gbps while maintaining quality of service. It then covers MIMO system modeling and capacity studies. Different MIMO designs are presented that aim to achieve spatial multiplexing gain or diversity gain. Practical MIMO systems and architectures like V-BLAST are described. Networking applications of MIMO including MAC protocols are also discussed.
This document informs Masoud Yadollahi zadeh that his paper titled "Profit Maximization in Competitive Electricity Markets" has been accepted for oral presentation at the IEEE 3rd International Power and Energy Conference (PECon2010) in Kuala Lumpur, Malaysia from November 29 to December 1, 2010. The author is asked to address comments from reviewers to improve the paper and pre-register for the conference. The acceptance is conditional on at least one author attending to present the paper.
A review of Wireless Information and Power Transfer in Multiuser OFDM SystemsIJERA Editor
We study the resource allocation algorithm design for multiuser orthogonal frequency division multiplexing
(OFDM) downlink systems with simultaneous wireless information and power transfer. The algorithm design is
formulated as a non-convex optimization problem for maximizing the energy efficiency of data transmission
(bit/Joule delivered to the users). In particular, the problem formulation takes into account the minimum
required system data rate, heterogeneous minimum required power transfers to the users, and the circuit power
consumption. Subsequently, by exploiting the method of timesharing and the properties of nonlinear fractional
programming, the considered non-convex optimization problem is solved using an efficient iterative resource
allocation algorithm. Recently, simultaneous wireless information and power transfer (SWIPT) becomes
appealing by essentially providing a perpetual energy source for the wireless networks. For the TDMA-based
information transmission, we employ TS at the receivers; for the OFDMA-based information transmission, we
employ PS at the receivers. Under the above two scenarios, we address the problem of maximizing the weighted
sum-rate over all users by varying the time/frequency power allocation and either TS or PS ratio, subject to a
minimum harvested energy constraint on each user as well as a peak and/or total transmission power constraint.
The document discusses distributed power allocation strategies for wireless sensor networks with energy harvesting capabilities. It proposes using an asymmetric Nash bargaining algorithm where a relay allocates power to users based on their channel state information and requirements. This achieves a faster decay rate of 1/SNR. Simulations show the approach provides substantial tradeoffs between system performance and complexity compared to conventional methods. It also uses frequency division multiple access to divide bandwidths among users.
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...IJSRED
This document discusses an asynchronous cognitive radio network with wireless energy harvesting capabilities. It proposes a model where a primary ad hoc network operates alongside a cognitive secondary network, with the primary nodes connected to a power grid and the secondary nodes capable of harvesting radio frequency (RF) energy. The channel access of both networks is asynchronous and modeled using time-space Poisson point processes. An analytical framework is developed based on stochastic geometry to evaluate the performance of this asynchronous cognitive radio network with wireless energy harvesting secondary nodes.
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
This document proposes a flexible channel allocation algorithm for cooperative cognitive radio networks using secondary user detection. It introduces Flexible Channel Cooperation (FLEC) which allows secondary users to optimize their use of resources including channels and time slots from primary users. The document develops efficient resource allocation algorithms for FLEC, including a distributed bargaining algorithm and centralized heuristic algorithm. It evaluates the performance of FLEC and shows it provides throughput improvements of 20-60% over conventional identical channel cooperation. A centralized heuristic algorithm achieves near-optimal performance with only 5% loss compared to the optimal centralized algorithm, providing a good tradeoff between performance and complexity.
Presented at Connectivity Week on May 27, 2010 in Santa Clara, CA. Draft White Paper of the OASIS Energy Market Infromation Exchange Technical Commitee.
DORA: Server Based VANETs and its ApplicationsIRJET Journal
This document discusses a server-based vehicle communication system called DORA that aims to efficiently allocate network resources for vehicles uploading files to roadside access points. It formulates the problem as a finite-horizon sequential decision process and proposes algorithms like dynamic optimal random access and joint DORA to compute optimal transmission policies for vehicles at single and multiple access points. The performance is evaluated using simulations and shows efficiency over existing solutions. Key aspects covered are the system model, traffic and channel models, distributed medium access control, problem formulation and proposed optimization algorithms.
Reality based mobility model Analyzed over reactive and proactive routing pro...ijsrd.com
This document analyzes the performance of reactive (AODV, DSR) and proactive (DSDV) routing protocols under realistic mobility models in natural disaster scenarios. It simulates two scenarios - a fire in a 4-story building and a road accident in hilly areas - using the Manhattan Grid and RPGM mobility models in NS2. The performance is evaluated based on end-to-end delay, throughput, and packet delivery ratio. The results show that DSDV generally has lower delay while AODV has better throughput and packet delivery, and protocol performance is significantly impacted by the mobility model used.
This document summarizes a research paper that analyzes techniques to reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. It discusses how OFDM signals can have high PAPR which requires power amplifiers with large dynamic ranges. Two PAPR reduction techniques are analyzed: partial transmit sequence (PTS) and selective mapping (SLM). The performance of these techniques is evaluated and compared to reduce PAPR in OFDM systems.
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...IJERA Editor
In this paper, we propose a new simple relaying strategy based on bit-interleaved convolutionally coded starquadrature amplitude modulation (QAM) along with coherent/ noncoherent detection. Exploiting this property, a hard limiter is used to enhance power amplifier (PA) efficiency at the relay. Here we are using the higher order modulation for improving relay communication, and also employ the accurate relay technique. Moreover, we show that the proposed approach retains differential detectability, which results in a significant reduction of receiver complexity with robustness against phase ambiguity, by analyzing our proposed method in terms of asymptotic pairwise error probability (PEP), Furthermore, the effectiveness of the proposed scheme in terms of PA efficiency is confirmed by comparing the statistical distributions of the corresponding instantaneous signal power. And also implement the PEP in MIMO systems for improving the powerefficiency. All the theoretical results agree with those obtained by computer simulations.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This document is a letter informing Dr. Masoud Yadollahi Zadeh that their paper titled "A New Approach To Obtain Maximum Benefit In Electricity Markets Based On The Newton Iteration Equation" has been accepted for presentation at the 13th IASME/WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering in Angers, France from November 17-19, 2011. The letter provides information on registering for the conference, guidelines for preparing papers for the proceedings, and notes that the best papers may be invited for journal publication. It encourages Dr. Yadollahi Zadeh's attendance and participation in the conference.
Compressive spectrum sensing using two-stage scheme for cognitive radio netwo...IJECEIAES
The modern applications of communications that use wideband signals suffer the lacking since the resources of this kind of signals are limited especially for fifth generation (5G). The compressive spectrum sensing (COMPSS) techniques address such issues to reuse the detected signals in the networks and applications of 5G. However, the raw techniques of COMPSS have low compression ratio and high computational complexity rather than high level of noise variance. In this paper, a hybrid COMPSS scheme has been developed for both non-cooperative and cooperative cognitive radio networks. The proposed scheme compiles on discrete wavelet transform single resolution (DWT-SR) cascaded with discrete cosine transform (DCT). The first is constructed according to the pyramid algorithm to achieve 50% while the second performed 30% compression ratios. The simulation and analytic results reveal the significant detection performance of the proposed technique is better than that of the raw COMPSS techniques.
MPC-EAR : Maximal Power Conserved And Energy Aware Routing in Ad hoc Networksijsrd.com
Power preservation in wireless ad hoc networks is a decisive factor as energy resources are inadequate at the electronic devices in use. Power-aware routing strategies are fundamentally route selection strategies built on accessible ad hoc routing protocols. This paper proposed a new Maximal Power Conserved And Energy Aware Routing (MPC-EAR ) topology for mobile ad hoc networks that enhances the network life span. Simulation results prove that the projected protocol has a higher performance other minimal energy usage, energy level aware and energy conserving routing protocols such as MTPR, MMECR and CMMECR.
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...ijccsa
With recent developments in cloud computing, a paradigm shift from rather static deployment of resources to more dynamic, on-demand practices means more flexibility and better utilization of resources. This demands new ways to efficiently configure networks. In this paper, we will characterize a class of competitive cloud services that telecom operators could provide based on the characteristics of telecom infrastructure through an applicable streaming service architecture. Then, we will model this architecture as a cost-based mathematic model. This model provides a tool to evaluate and compare the cost of software services for different telecom network topologies and deployment strategies. Additionally, with each topology it acts as a means to characterize the deployment solution that yields the lowest resource usage over the entire network. These applications are illustrated through numerical analysis. Finally, a proof-of-concept prototype is deployed to shows dynamic properties of the service in the architecture and the model above
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)CSCJournals
This paper addresses Dynamic Spectrum Sharing (DSS) between two wireless operators. The Universal Mobile Telecommunication System (UMTS) network is used as a case study. The proposed protocol is evaluated under the uniform and non-uniform traffic conditions. The underlying principles of the algorithm can be deployed in the UMTS extension Band (2500MHz-2690MHz) which is yet to be allocated or the re-farmed GSM spectrum (900MHz/1800MHz). The simulation results for the proposed protocol shows that significant spectrum sharing gains can be obtained. However such spectrum efficiency gain need to be carefully balanced with the complexity in terms of latency (delays) and additional overhead it brings to the network. The results show that significant spectrum sharing gain of 4.0 % and 2.0 % can be obtained under uniform and non-uniform traffic conditions
Review of various adaptive modulation and coding techniques in wireless networkeSAT Journals
Abstract Adaptive modulation and coding (AMC) is a method which adapts its transmitting parameters according to the channel state and is used in various modern wireless communications to maximize spectrum efficiency by minimizing the error rate. One of the driving strengths of AMC is the Signal-to-Noise Ratio (SNR) estimation and feedback channel for adaptation. Degrading effects caused due to sudden variation in the channel over time sometimes require the transmission link to react appropriately so it can minimize the Bit Error Rate (BER). There are various adaptive methods to implement the same like variable rate, variable error probability, and variable coding or hybrid technique. This article focuses upon variable power technique and describes two to three different power techniques and tries to make a comparison between two of them i.e, channel inversion and water-filling. Keywords- Adaptive Modulation and Coding (AMC), Bit Error Rate (BER), channel inversion, water-filling
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
This document analyzes methods for optimal path selection and power allocation in heterogeneous wireless networks where a user can transmit data through multiple radio access technologies (RATs) simultaneously. It formulates the bandwidth and power allocation problem as an optimization problem to maximize total system capacity. The Newton and modified Newton methods are proposed to find the optimal solution. Simulation results show the modified Newton method achieves higher total system capacity compared to the Newton method.
Optimal channel switching over gaussian channels under average power and cost...Deepshika Reddy
This document describes proposed methods for optimally switching between channels under average power and cost constraints. It first considers generic cost values and characterizes the optimal strategy. It then relates channel cost to noise power using logarithmic cost functions to obtain specific results. The proposed methods are: 1) analyze switching between two channels, 2) among three channels, or 3) a single channel. Key findings include showing optimal strategies utilize maximum power and cost, and involve at most three channels. Relations between optimal power levels for two-channel switching are also derived.
IRJET- A Proficient Time Slot Attainment on the Hybrid TDMA / CSMA Multi-Chan...IRJET Journal
This document presents a proposed hybrid TDMA/CSMA multi-channel MAC protocol for VANETs called HTC-MAC. HTC-MAC aims to provide efficient time slot acquisition on the control channel to reduce collision probability. It eliminates unnecessary control packets from the existing HER-MAC protocol. Analysis and simulation results show that HTC-MAC outperforms HER-MAC by acquiring time slots faster, especially in dense scenarios with many contending nodes. The probability of all nodes acquiring time slots within a given number of frames is higher for HTC-MAC compared to HER-MAC.
This document discusses multiple-input multiple-output (MIMO) systems. It begins by outlining the motivations and aspirations for developing MIMO, including achieving high data rates near 1 Gbps while maintaining quality of service. It then covers MIMO system modeling and capacity studies. Different MIMO designs are presented that aim to achieve spatial multiplexing gain or diversity gain. Practical MIMO systems and architectures like V-BLAST are described. Networking applications of MIMO including MAC protocols are also discussed.
This document informs Masoud Yadollahi zadeh that his paper titled "Profit Maximization in Competitive Electricity Markets" has been accepted for oral presentation at the IEEE 3rd International Power and Energy Conference (PECon2010) in Kuala Lumpur, Malaysia from November 29 to December 1, 2010. The author is asked to address comments from reviewers to improve the paper and pre-register for the conference. The acceptance is conditional on at least one author attending to present the paper.
A review of Wireless Information and Power Transfer in Multiuser OFDM SystemsIJERA Editor
We study the resource allocation algorithm design for multiuser orthogonal frequency division multiplexing
(OFDM) downlink systems with simultaneous wireless information and power transfer. The algorithm design is
formulated as a non-convex optimization problem for maximizing the energy efficiency of data transmission
(bit/Joule delivered to the users). In particular, the problem formulation takes into account the minimum
required system data rate, heterogeneous minimum required power transfers to the users, and the circuit power
consumption. Subsequently, by exploiting the method of timesharing and the properties of nonlinear fractional
programming, the considered non-convex optimization problem is solved using an efficient iterative resource
allocation algorithm. Recently, simultaneous wireless information and power transfer (SWIPT) becomes
appealing by essentially providing a perpetual energy source for the wireless networks. For the TDMA-based
information transmission, we employ TS at the receivers; for the OFDMA-based information transmission, we
employ PS at the receivers. Under the above two scenarios, we address the problem of maximizing the weighted
sum-rate over all users by varying the time/frequency power allocation and either TS or PS ratio, subject to a
minimum harvested energy constraint on each user as well as a peak and/or total transmission power constraint.
The document discusses distributed power allocation strategies for wireless sensor networks with energy harvesting capabilities. It proposes using an asymmetric Nash bargaining algorithm where a relay allocates power to users based on their channel state information and requirements. This achieves a faster decay rate of 1/SNR. Simulations show the approach provides substantial tradeoffs between system performance and complexity compared to conventional methods. It also uses frequency division multiple access to divide bandwidths among users.
A REVIEW OF ASYNCHRONOUS AD HOC NETWORK WITH WIRELESS ENERGY HARVESTING AND C...IJSRED
This document discusses an asynchronous cognitive radio network with wireless energy harvesting capabilities. It proposes a model where a primary ad hoc network operates alongside a cognitive secondary network, with the primary nodes connected to a power grid and the secondary nodes capable of harvesting radio frequency (RF) energy. The channel access of both networks is asynchronous and modeled using time-space Poisson point processes. An analytical framework is developed based on stochastic geometry to evaluate the performance of this asynchronous cognitive radio network with wireless energy harvesting secondary nodes.
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
This document proposes a flexible channel allocation algorithm for cooperative cognitive radio networks using secondary user detection. It introduces Flexible Channel Cooperation (FLEC) which allows secondary users to optimize their use of resources including channels and time slots from primary users. The document develops efficient resource allocation algorithms for FLEC, including a distributed bargaining algorithm and centralized heuristic algorithm. It evaluates the performance of FLEC and shows it provides throughput improvements of 20-60% over conventional identical channel cooperation. A centralized heuristic algorithm achieves near-optimal performance with only 5% loss compared to the optimal centralized algorithm, providing a good tradeoff between performance and complexity.
Presented at Connectivity Week on May 27, 2010 in Santa Clara, CA. Draft White Paper of the OASIS Energy Market Infromation Exchange Technical Commitee.
DORA: Server Based VANETs and its ApplicationsIRJET Journal
This document discusses a server-based vehicle communication system called DORA that aims to efficiently allocate network resources for vehicles uploading files to roadside access points. It formulates the problem as a finite-horizon sequential decision process and proposes algorithms like dynamic optimal random access and joint DORA to compute optimal transmission policies for vehicles at single and multiple access points. The performance is evaluated using simulations and shows efficiency over existing solutions. Key aspects covered are the system model, traffic and channel models, distributed medium access control, problem formulation and proposed optimization algorithms.
Reality based mobility model Analyzed over reactive and proactive routing pro...ijsrd.com
This document analyzes the performance of reactive (AODV, DSR) and proactive (DSDV) routing protocols under realistic mobility models in natural disaster scenarios. It simulates two scenarios - a fire in a 4-story building and a road accident in hilly areas - using the Manhattan Grid and RPGM mobility models in NS2. The performance is evaluated based on end-to-end delay, throughput, and packet delivery ratio. The results show that DSDV generally has lower delay while AODV has better throughput and packet delivery, and protocol performance is significantly impacted by the mobility model used.
This document summarizes a research paper that analyzes techniques to reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. It discusses how OFDM signals can have high PAPR which requires power amplifiers with large dynamic ranges. Two PAPR reduction techniques are analyzed: partial transmit sequence (PTS) and selective mapping (SLM). The performance of these techniques is evaluated and compared to reduce PAPR in OFDM systems.
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...IJERA Editor
In this paper, we propose a new simple relaying strategy based on bit-interleaved convolutionally coded starquadrature amplitude modulation (QAM) along with coherent/ noncoherent detection. Exploiting this property, a hard limiter is used to enhance power amplifier (PA) efficiency at the relay. Here we are using the higher order modulation for improving relay communication, and also employ the accurate relay technique. Moreover, we show that the proposed approach retains differential detectability, which results in a significant reduction of receiver complexity with robustness against phase ambiguity, by analyzing our proposed method in terms of asymptotic pairwise error probability (PEP), Furthermore, the effectiveness of the proposed scheme in terms of PA efficiency is confirmed by comparing the statistical distributions of the corresponding instantaneous signal power. And also implement the PEP in MIMO systems for improving the powerefficiency. All the theoretical results agree with those obtained by computer simulations.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This document is a letter informing Dr. Masoud Yadollahi Zadeh that their paper titled "A New Approach To Obtain Maximum Benefit In Electricity Markets Based On The Newton Iteration Equation" has been accepted for presentation at the 13th IASME/WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering in Angers, France from November 17-19, 2011. The letter provides information on registering for the conference, guidelines for preparing papers for the proceedings, and notes that the best papers may be invited for journal publication. It encourages Dr. Yadollahi Zadeh's attendance and participation in the conference.
Compressive spectrum sensing using two-stage scheme for cognitive radio netwo...IJECEIAES
The modern applications of communications that use wideband signals suffer the lacking since the resources of this kind of signals are limited especially for fifth generation (5G). The compressive spectrum sensing (COMPSS) techniques address such issues to reuse the detected signals in the networks and applications of 5G. However, the raw techniques of COMPSS have low compression ratio and high computational complexity rather than high level of noise variance. In this paper, a hybrid COMPSS scheme has been developed for both non-cooperative and cooperative cognitive radio networks. The proposed scheme compiles on discrete wavelet transform single resolution (DWT-SR) cascaded with discrete cosine transform (DCT). The first is constructed according to the pyramid algorithm to achieve 50% while the second performed 30% compression ratios. The simulation and analytic results reveal the significant detection performance of the proposed technique is better than that of the raw COMPSS techniques.
MPC-EAR : Maximal Power Conserved And Energy Aware Routing in Ad hoc Networksijsrd.com
Power preservation in wireless ad hoc networks is a decisive factor as energy resources are inadequate at the electronic devices in use. Power-aware routing strategies are fundamentally route selection strategies built on accessible ad hoc routing protocols. This paper proposed a new Maximal Power Conserved And Energy Aware Routing (MPC-EAR ) topology for mobile ad hoc networks that enhances the network life span. Simulation results prove that the projected protocol has a higher performance other minimal energy usage, energy level aware and energy conserving routing protocols such as MTPR, MMECR and CMMECR.
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...ijccsa
With recent developments in cloud computing, a paradigm shift from rather static deployment of resources to more dynamic, on-demand practices means more flexibility and better utilization of resources. This demands new ways to efficiently configure networks. In this paper, we will characterize a class of competitive cloud services that telecom operators could provide based on the characteristics of telecom infrastructure through an applicable streaming service architecture. Then, we will model this architecture as a cost-based mathematic model. This model provides a tool to evaluate and compare the cost of software services for different telecom network topologies and deployment strategies. Additionally, with each topology it acts as a means to characterize the deployment solution that yields the lowest resource usage over the entire network. These applications are illustrated through numerical analysis. Finally, a proof-of-concept prototype is deployed to shows dynamic properties of the service in the architecture and the model above
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)CSCJournals
This paper addresses Dynamic Spectrum Sharing (DSS) between two wireless operators. The Universal Mobile Telecommunication System (UMTS) network is used as a case study. The proposed protocol is evaluated under the uniform and non-uniform traffic conditions. The underlying principles of the algorithm can be deployed in the UMTS extension Band (2500MHz-2690MHz) which is yet to be allocated or the re-farmed GSM spectrum (900MHz/1800MHz). The simulation results for the proposed protocol shows that significant spectrum sharing gains can be obtained. However such spectrum efficiency gain need to be carefully balanced with the complexity in terms of latency (delays) and additional overhead it brings to the network. The results show that significant spectrum sharing gain of 4.0 % and 2.0 % can be obtained under uniform and non-uniform traffic conditions
Spectrum sharing in cognitive radio networks IJECEIAES
Cognitive radio networks are the next step to tackle scarcity in wireless networks given the increasing demand of radioelectric spectrum where the proposed solution is to share said resource to improve this situation. In the present article, a review of the current state of spectrum sharing in cognitive radio networks. To achieve this purpose, the articles published over the last 4 years on the matter were reviewed including topics such as mobile networks and TV. Some studies and simulations proposed to share the spectrum is shown. The current state of the studies reveals that there has been significant progress in this research area yet it is necessary to continue similar studies and set in motion different schemes.
Innovation and spectrum regulation and property rights : IEEE DySpan paper 2005roberto ercole
A paper from 2005.
This paper looks at the regulatory changes that are required to allow technologies such as quick and easy access to radio spectrum. Without such changes it will not be possible for DySPAN technologies to make the inroads into the market, that are required to ensure spectrum is used with the optimum economic efficiency. This access to market requires greater use of a technology neutral spectrum property right.
https://ieeexplore.ieee.org/document/1542663?denied=
IRJET - An Auction Mechanism for Product Verification using CloudIRJET Journal
The document summarizes a research paper that proposes an auction mechanism for product verification using cloud computing. The key points are:
1. The paper presents an auction process for allocating commodities (land) between customers (buyers) and owners (sellers) using an options-based sequential auction algorithm in the cloud.
2. To enhance trust between buyers and sellers, a third party (the government) is introduced to verify product documents and handle the entire auction process.
3. The auction occurs in two stages - document verification by the government, followed by price matching to select the buyer with the highest bid for the verified product.
Performance Analysis of Dedicated-In-Band Control for Cognitive Radio NetworksIJSRED
This document analyzes different strategies for dedicating in-band control channels for cognitive radio networks (CRNs). It models a scenario of an outdoor stadium with 16 access points and users in fixed seat locations. It evaluates the performance of entwined and underlay strategies for selecting a dedicated control channel in terms of success rate and throughput of control messages. The entwined strategy avoids using a channel as the control channel if a primary user becomes active on it, while the underlay strategy continues using the channel at reduced transmission power. Simulation results show that the underlay strategy achieves higher success rates and throughput of control messages compared to the entwined strategy.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Review Paper on 802.11ax Scheduling and Resource Allocationijtsrd
Nowadays a fast remote Internet association is a need as opposed to a luxury. IEEE 802.11ax could be a revolution to present an improvement over this age of 802.11. 802.11ax has been accepted to convey next generation Wireless Local Area Network WLAN techniques. 802.11ax using multiple techniques as using modulation 1024 Quadrature Amplitude Modulation QAM , Orthogonal Frequency Division Multiple Access OFDMA , robust high efficiency signaling for better operation at a significantly lower Received Signal Strength Indication RSSI , Target Wakeup Time TWT where the station can request to wake up at any time in the future and more. 802.11ax achieves multiple benefits as enabling a more than 35 speed burst, reduce overhead and latency, and more. This paper gives a review of the IEEE 802.11ax resource allocation scheduling in both 1 Downlink DL data transfer 2 Uplink UL data transfer. Ibrahim Masri | Erdal Erdal | Atilla Ergüzen "Review Paper on 802.11ax Scheduling and Resource Allocation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38162.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/38162/review-paper-on-80211ax-scheduling-and-resource-allocation/ibrahim-masri
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
This document analyzes the impact of signaling load on call blocking and dropping in UMTS networks. It calculates the acquisition time for different signaling service types based on message length and transmission rates. It then estimates the maximum number of signaling sessions that can be supported simultaneously within the control interval based on a signal-to-interference ratio analysis. An example traffic scenario is provided to illustrate the benefits of studying how different signaling loads affect network performance. The analysis aims to efficiently allocate radio resources and preserve quality of service for both signaling and user data traffic.
Soft real time auction scheme for task allocation in wireless sensor networkseSAT Publishing House
1) The document proposes a Soft Real Time Auction (SRT-A) scheme for task allocation in wireless sensor networks to improve energy efficiency compared to existing real time auction algorithms.
2) In SRT-A, the winner is chosen at the end of a time slot rather than immediately when the bid exceeds a threshold, giving all nodes a fair chance to participate. Wait time is also used to allow nodes with higher bids to bid earlier.
3) The algorithm is evaluated through simulations showing SRT-A achieves better bid values in less time compared to existing real time auction algorithms for task allocation in wireless sensor networks.
Ant-colony and nature-inspired heuristic models for NOMA systems: a reviewTELKOMNIKA JOURNAL
The increasing computational complexity in scheduling the large number of users for non-orthogonal multiple access (NOMA) system and future cellular networks lead to the need for scheduling models with relatively lower computational complexity such as heuristic models. The main objective of this paper is to conduct a concise study on ant-colony optimization (ACO) methods and potential nature-inspired heuristic models for NOMA implementation in future high-speed networks. The issues, challenges and future work of ACO and other related heuristic models in NOMA are concisely reviewed. The throughput result of the proposed ACO method is observed to be close to the maximum theoretical value and stands 44% higher than that of the existing method. This result demonstrates the effectiveness of ACO implementation for NOMA user scheduling and grouping.
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
The document proposes a Maximum Connected Load Balancing Cover Tree (MCLCT) algorithm to optimize coverage and connectivity in wireless sensor networks. The MCLCT consists of two strategies: 1) A Coverage Optimizing Recursive heuristic that forms maximum disjoint cover sets to ensure full coverage of points of interest. 2) A Probabilistic Load Balancing strategy that determines routing paths in a way that balances energy load evenly among nodes. Simulation results show the MCLCT achieves longer network lifetime than previous algorithms by balancing energy consumption through dynamic cover tree construction and efficient power utilization among sensor nodes.
This document discusses resource allocation and mobility management in wireless communication systems. It covers three key areas of resource allocation: bandwidth management, transmission power management, and antenna management. It also discusses two important aspects of mobility management: location management and handoff management. Resource allocation and mobility management are important for designing efficient wireless networks that can support high-speed data and fair resource sharing among users.
This document proposes a scheme to dynamically optimize cellular network utilization by encouraging subscribers to use services when certain cells are underutilized. It involves measuring cell load indicators like transmitted power and code usage. Cells with low load would be selected and subscribers in those cells would receive offers for reduced tariffs via cell broadcast to boost utilization. This aims to maximize revenue by increasing cellular yield without impacting highly loaded cells. Key performance indicators and an algorithm are presented for selecting candidate cells for this utilization enhancement scheme.
1) The document presents a model for estimating the earnings of a mobile communication network using sensitivity analysis.
2) The model uses five parameters related to mobile traffic intensity - number of users, number of calls, call duration, initial cost per call duration, and price per call duration - to estimate profits under different scenarios.
3) Sensitivity analysis via tornado graphs show that profits are most sensitive to the number of calls and call duration. This suggests companies should focus on increasing these factors to maximize earnings.
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...IRJET Journal
1) The document proposes a traffic-based resource and energy allocation algorithm to improve energy efficiency in LTE networks using MIMO and OFDMA technologies.
2) It analyzes existing resource allocation schemes that focus on energy efficiency but do not guarantee quality of service (QoS) for users, especially in high traffic load scenarios.
3) The proposed algorithm aims to minimize energy consumption at base stations while satisfying certain QoS requirements for users, even with high traffic loads, by allocating resources across multiple carrier components.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
Similar to A Novel Idea of Dynamic Radio Spectrum Management Using Peak Load Pricing Algorithm (20)
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
Direct-sequence code-division multiple access (DS-CDMA) is
currently the subject of much research as it is a promising
multiple access capability for third and fourth generations
mobile communication systems. The synchronous DS-CDMA
system is well known for eliminating the effects of multiple
access interference (MAI) which limits the capacity and
degrades the BER performance of the system. In this paper,
we investigate the bit error rate (BER) performance of a
synchronous DS-CDMA system over a wideband mobile
radio channel. The BER performance is affected by the
difference in path length ΔL and the number of arriving
signals N. Furthermore, the effect of these parameters is
examined on the synchronous DS-CDMA system for different
users’ number as well as different processing gain Gp. In this
environment and under the above conditions the performances
of the BPSK (Binary Phase Shift Keying) and the QPSK
(Quadrature Phase Shift Keying) modulations are compared.
The promising simulation results showed the possibility of
applying this system to the wideband mobile radio channel.
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISEditor Jacotech
With microblogging platforms such as Twitter generating
huge amounts of textual data every day, the possibilities of
knowledge discovery through Twitter data becomes
increasingly relevant. Similar to the public voting mechanism
on websites such as the Internet Movie Database (IMDb) that
aggregates movies ratings, Twitter content contains
reflections of public opinion about movies. This study aims to
explore the use of Twitter content as textual data for
predicting the movie rating. In this study, we extract number
of tweets and compiled to predict the rating scores of newly
released movies. Predictions were done with the algorithms,
exploring the tweet polarity. In addition, this study explores
the use of several different kinds of tweet classification
Algorithm and movie rating algorithm. Results show that
movie rating developed by our application is compared to
IMDB and Rotten Tomatoes.
Non integer order controller based robust performance analysis of a conical t...Editor Jacotech
The design of robust controller for any non linear process is a
challenging task because of the presence of various types of
uncertainties. In this paper, various design methods of robust
PID controller for the level control of conical tank are
discussed. Uncertainties are of different types, among that
structured uncertainty of 30% is introduced to the nominal
plant for analysing the robustness. As a first step, the control
of level is done by using conventional integer order controller
for both nominal and uncertain system. Then, the control is
done by means of Fractional Order Proportional Integral
Derivative (FOPID) controller for achieving robustness. With
the help of time series parameters, a comparison is made
between conventional PID and FOPID with respect to the
simulated output using MATLAB and also analyzed the
robustness.
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...Editor Jacotech
This document summarizes a research study that examined factors causing stress among female doctors working in public and private sector hospitals in India. The study aimed to identify whether there were associations between hospital sector (public or private) and 12 different stress measures among 300 female doctors. A survey was administered to collect data. Chi-square tests found statistically significant associations (p < 0.05) between hospital sector and 11 of the 12 stress measures, including stress due to workload, working conditions, physical exertion, emotional exhaustion, job security, organizational support, work-family conflict, family adjustment, task demands, patient expectations, and working hours. Only the association between sector and stress due to psychosomatic problems was not statistically significant. The results indicate
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
The Impact of Line Resistance on the Performance of Controllable Series Compe...Editor Jacotech
In recent years controllable FACTS devices are increasingly
integrated into the transmission system. FACTS devices that
provide series control such as Controllable Series Compensator
(CSC) has significant effect on the voltage stability of Electric
Power system. In this work impact of line resistance on the
performance of CSC in a single-load infinitive-bus (SLIB)
model is investigated. The proposed framework is applied to
SLIB model and obtained results demonstrates that line
resistance has considerable effect on voltage stability limits and
performance of CSC.
Security Strength Evaluation of Some Chaos Based Substitution-BoxesEditor Jacotech
Recently, handful amount of S-boxes, using the various
methods such as affine transformations, gray coding,
optimization, chaotic systems, etc, have been suggested. It is
prudent to use cryptographically strong S-boxes for the design
of powerful ciphers. In this paper, we sampled some widely
used 8×8 S-boxes which are recently synthesized and security
analysis and evaluation is executed to uncover the best
candidate(s). The performance analysis is exercised against
the crucial measures like nonlinearity, linear approximation
probability, algebraic immunity, algebraic complexity,
differential uniformity. These parameters are custom selected
because their scores decide the security strength against
cryptographic assaults like linear cryptanalysis, algebraic
attacks, and differential cryptanalysis. The anticipated
analysis in this work facilitates the cryptographers, designers,
researchers to choose suitable candidate decided over many
parameters and can be engaged in modern block encryption
systems that solely rely on 8×8 S-box. Moreover, the analysis
assists in articulating efficient S-boxes and to evaluate the
attacks resistivity of their S-boxes.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
Performance analysis of aodv with the constraints of varying terrain area and...Editor Jacotech
Mobile Ad Hoc Networks (MANETs) are wireless networks,
where there is no requirement for any infrastructure support to
transfer data packets between mobile nodes. These nodes
communicate in a multi-hop mode; each mobile node acts
both as a host and router. The main job of Quality of Service
(QoS)[1][2] routing in MANETs is to search and establish
routes among different mobile nodes for satisfying QoS
requirements of wireless sensor networks as PDR, Average
end-to-end delay, Average Throughput. The QoS routing
protocols efficient for commercial, real-time and multimedia
applications are in demand for day to day activities[2].
Modeling of solar array and analyze the current transient response of shunt s...Editor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
License plate recognition an insight to the proposed approach for plate local...Editor Jacotech
License Plate Recognition (LPR) system for vehicles is an innovative and a very challenging area for research due to the innumerous plate formats and the nonuniform outdoor illumination conditions during which images are acquired. Thus, most approaches developed, work under certain restrictions such as fixed illumination, stationary background and limited speed. Algorithms developed for LPR systems are generally composed of three significant stages: 1] localization of the license plate from an entire scene image; 2] segmentation of the characters on the plate; 3] recognition of each of the segmented characters. A simple approach for preprocessing of the images, localization and extraction phase has been described in this paper. Numerous procedures have been developed for LPR systems and are assessed in this paper taking into consideration issues like processing time, computational power and recognition rate wherever available.
Design of airfoil using backpropagation training with mixed approachEditor Jacotech
Levenberg-Marquardt back-propagation training method has some limitations associated with over fitting and local optimum problems. Here, we proposed a new algorithm to increase the convergence speed of Backpropagation learning to design the airfoil. The aerodynamic force coefficients corresponding to series of airfoil are stored in a database along with the airfoil coordinates. A feedforward neural network is created with aerodynamic coefficient as input to produce the airfoil coordinates as output. In the proposed algorithm, for output layer, we used the cost function having linear & nonlinear error terms then for the hidden layer, we used steepest descent cost function. Results indicate that this mixed approach greatly enhances the training of artificial neural network and may accurately predict airfoil profile.
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
Wireless Sensor Network has several issues and challenges due to limited battery backup, limited computation capability, and limited computation capability. These issues and challenges must be taken care while designing the algorithms to increase the Network lifetime of WSN. Routing, the act of moving information across an internet world from a source to a destination is one of the vital issue associated with Wireless Sensor Network. The Ant Colony Optimization (ACO) algorithm is a probabilistic technique for solving computational problems that can be used to find optimal paths through graphs. The short route will be increasingly enhanced therefore become more attractive. The foraging behavior and optimal route finding capability of ants can be the inspiration for ACO based algorithm in WSN. The nature of ants is to wander randomly in search of food from their nest. While moving, ants lay down a pheromone trail on the ground. This chemical pheromone has the ability to evaporate with the time. Ants have the ability to smell pheromone. When selecting their path, they tend to select, probably the paths that has strong pheromone concentrations. As soon as an ant finds a food source, carries some of it back to the nest. While returning, the quantity of chemical pheromone that an ant lay down on the ground may depend on the quantity and quality of the food. The pheromone trails will lead other ants towards the food source. The path which has the strongest pheromone concentration is followed by the ant which is the shortest paths between their nest and food source. This paper surveys the ACO based routing in various Networking domains like Wireless Sensor Networks and Mobile Ad Hoc Networks.
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability..
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
One of the parent´s main concerns nowadays it to know their children´s whereabouts. Some applications exist to address this issue and most of them rely on internet connection which makes the solution expensive. In this paper we present a low cost solution, based on SMS, and with the ability to remotely configure the child monitoring process. We also present the architecture and the full flowchart of the child application whenever a SMS is received. This case study uses Android and the more recent location API – the Fused Location Provider. For obvious reasons, the security issue has been a concern, which resulted in a configuration module in the child application to specify authorized senders
Leader Election Approach: A Comparison and SurveyEditor Jacotech
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those issues which ensure the efficiency of the algorithm for election leader. Here a comparison will be provided to show the advantages and disadvantages of different election algorithms. The comparison would be based on the number of messages passing and the order of time complexity.
Leader election approach a comparison and surveyEditor Jacotech
This document summarizes and compares several leader election algorithms in distributed systems. It discusses the Bully algorithm and some modifications, including using two successors, dividing nodes into sets, and using max-heap and Fibonacci heap data structures. The algorithms are compared based on time complexity, number of messages required, and memory usage. The Fibonacci heap approach is identified as the most efficient with O(log n) time complexity and minimum message passing of log(n).
Modeling of solar array and analyze the current transientEditor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
Performance analysis of aodv with the constraints ofEditor Jacotech
This document summarizes a research paper that analyzed the performance of the AODV routing protocol in wireless sensor networks under different terrain area sizes and pause times using the NS-3 simulator. The researchers found that packet delivery ratio remained nearly constant for small terrain areas but decreased for larger areas. Average throughput decreased with larger terrain areas, while average delay remained nearly constant for small areas but increased for larger ones. The paper concludes that AODV has better performance in networks with high mobility and size and is preferred for real-time traffic over other protocols like DSR and DSDV.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A Novel Idea of Dynamic Radio Spectrum Management Using Peak Load Pricing Algorithm
1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No.5, December 2014
1
A Novel Idea of Dynamic Radio Spectrum Management
Using Peak Load Pricing Algorithm
By
1st
Md. Kabir Uddin, 2nd
M Abdus Sobhan, 3rd
Mohammad Noor Nabi
1st
, 3rd
Independent University, Bangladesh, Bashundhara, Dhaka
2nd
Prime University, Mirpur-1, Dhaka, Bangladesh
1st
kabiruddin@gmail.com, 2nd
sobhan30@gmail.com, 3rd
nabi2k2@yahoo.com
ABSTRACT
The concept of Dynamic Spectrum Access (DSA) will allow the
radio spectrum to be traded in a market like scenario allowing
Wireless Service Providers (WSPs) to lease chunks of spectrum
on a short-term basis. Such market mechanisms will lead to
competition among WSPs where they not only compete to
acquire spectrum but also attract and retain users. Currently,
there is little understanding on how such a dynamic trading
system will operate so as to make the system feasible under
economic terms. Synthetic monitoring is a good complement
when used with passive monitoring that together will help
provide visibility on application health during off peak hours
when transaction volume is low. Several concepts are reviewed
that are central to the design of spectrum management
algorithms emphasizing on spectrum charging and allocation. In
connection with these concepts and models, the authors
suggested a Peak Load Spectrum Charging Algorithm for the
Harmonized Usages Band (HUB) operated by the spectrum
broker for homogeneous CDMA networks.
Keywords
CLC, Peak Load Charging, DSA, WSP, HUB
1. INTRODUCTION
A radio spectrum management agency of the government is
accountable for the planning, allocation, harmonization and
management of the joint access of the electromagnetic spectrum
through operational, engineering, and administrative procedures
[1]. Spectrum management of the agency has some objectives
to facilitate electronic systems to carry out their function in the
intended environment without causing or suffering
unacceptable interference. There are some crucial factors that
have an impact on spectrum management including spectrum
regulation and licensing, spectrum pricing, spectrum sharing,
spectrum allocation-assignment, and system design for
spectrum competence. Each license is for a fixed amount of
spectrum in a given region and is intended for a specific
purpose (i.e. mobile wireless spectrum in cellular and PCS
bands). The result has been inefficient and inflexible for the use
of assigned spectrum, and the low deployment of new wireless
services. Traditional spectrum allocation results in a slow
process of assigning spectrum licences [4]. For example, large
swaths of allocated spectrum are poorly utilized. Almost 90%
of spectrum on average stays unused much of the time. Between
20-90% of unused broadcast spectrum is in rural area [5].
Additionally, measurements indicate that spectrum utilization
varies dramatically in location and time. DSA approaches,
made possible in large part to frequency agile software defined
radios and cognitive radios, may be broadly divided into
coordinated and uncoordinated approaches. In harmonized
DSA, a given amount of spectrum is reserved for dynamic
assignment to network operators and users in a given region.
There are some requests for spectrum which are sent to a
spectrum server and licenses are assigned for a given time
period (i.e. half an hour) to operators and/or users. Network
operators and/or users, in uncoordinated DSA determine the
location of unused spectrum through spectrum measurements
and may begin operating in this used spectrum object to
interference constraints. Regarding spectrum property rights,
uncoordinated DSA of incumbent license holders raises
interesting questions viewing their spectrum license as
exclusive in a given region while proponents of DSA state
spectrum can be shared as long as interference to incumbent is
acceptable.
2. HARMONIZED USAGES BAND
A contiguous block of spectrum, Harmonized Usages Band
(HUB) is reserved by regulating authorities for controlling
dynamic access. The HUB spectrum can be allocated to use as
multiple parts to individual network operators or users to
support multiple different services. For example, it can support
mobile CDMA and TDMA voice and data services and OFDM
fixed wireless services. For a geographical region, allocation of
various parts of HUB spectrum to individual networks or users
is controlled by the spectrum Broker Figure 01 [2]. The
spectrum broker grants a time bound lease to the requesters for
a given amount of spectrum. Key to the operation of this
spectrum broker is the charging and allocating paradigms.
3. CLIMAX LOAD CHARGING
Climax Load Charging (CLC) refers to Peak Load Pricing
(PLP) of economically non-storable commodities whose
demand varies periodically. The use of CLC is often utilized by
electricity, telephone and other public utilities and also the
Internet as a means of reflecting the investment have made to
2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No.5, December 2014
2
meet climax demand for their services. This charging scheme
corresponds to high competition and charge discrimination
problems when efficiency is needed due to the increasing role
for services in the economy. Therefore it is ideal for industry
practice and real world applications. The authors show the
PLSP (?) algorithm and how its constraints could be translated
into the spectrum pricing problem.
CLC refers to the „on-peak‟ and „off-peak‟ time period. On
peak usually is described when the demand of the product
exceeds the supply and additional units should be produced,
when off peak is considered as the condition when supply
satisfies the demand. According to the literature, the market
conditions determine which period is „high‟ and which season is
„low‟. Usually the model is applied to monopolistic markets
where the units‟ producer i.e. the regulated sector has full
control of the management environment but today is spread
over competitive industries i.e. airlines and hostels? The
constraints of the CLC after deriving efficient prices are mainly
to maximize the welfare profit, called also the net social benefit
and optimize the producer‟s profit in terms of revenues.
As illustrated in Figure 02 [8] the producer charges a higher
price (PHi), PHi =b+β, the b equals the operational cost and β is
the cost of providing a unit of additional capacity, during peak
times (DHi) and a lower price (PL0), PL0=b, during off-peak
times (DL0).
Building on Peter O. Steiner‟s model [7-8] the following
equations derive for the welfare equation:
ω=TR+S-TC --------------(i)
If the total revenue gathered is TR and S is consumers‟ surplus,
and TC goes towards the total costs, then the difference, ω, is
the net social benefit.
ω =
x
0
P(x) dx - C(x) --------(ii)
P(x) for demand function, C(x) for total cost function, and X for
x1, x2 ... ... xn is the total demand.
In other cases, during the peak hour diverse technology might
be deployed to help fulfill the demand. For instance during the
peak-period it may be more economical to employ an additional
technology type to meet the peak-period demand, anticipating
lower construction costs and higher operating costs, thus
offering cost advantages.
A very interesting case is the CLC with demand and supply
uncertainty. “Efficient pricing rules require consideration of
willingness to pay for services rendered, when supply is
sufficient to meet demand, and for services not rendered plus
any rationing cost incurred in excess demand states”. In this
case the possibility of “outage” arises, which is the excess
demand in certain states. The costs associated with outage are
separated into three elements (1) rationing cost, which is the
cost incurred by utility in allocated scarce supply; (2) disruption
cost; and (3) surplus loss. Assuming multiple time periods, the
price in each time period should be set equal to the expected,
deterministic short run marginal cost, including the expected
marginal disruption and rationing costs. On the capacity side,
per unit cost equals the expected marginal disruption and
rationing costs. Summarizing the utility needs to use both price
rationing as well as quantity rationing to efficiently allocate
available capacity.
According to the Peak Load Pricing (PLP) theory, there are two
models under uncertainty mode; the one refers to single
technology and single pricing period and the second to multiple
periods and multiple technologies. Assume T periods, t=1, ...
...T of equal length in a typical day. Demand in period t is
denoted as Xt (Pt, ωt), ω ε Ω and is assumed to be only a
function of Pt. P equals to p1, p2, ... pt the vector of T prices.
Assuming also several technologies h equals to 1, ... ...,H. The
available capacity would be defined as
Zh (Y, ω)=
h
S
j
j
1
(Yj ω) ----------(iii)
Consequently the Ut, willingness to pay function at period t is
Ut (Q, ω) =
Q
0
Pt (X, ω) dx ---------(iv)
Pt(X, ω) is the demand function. According to the theory of
peak-load pricing [9] there are certain conditions developed to
characterize the optimal reliability and capacity, where the
formulas are getting more complicated.
In a single charging period with only one technology used, the
optimal price could be calculated as follows. The optimal price
will include also the willingness to pay (Λ). Assuming that the
system is characterized with multiplicative uncertainty, the
optimal price will be the product of maximizing the welfare
function for single technology and single pricing period:
P**
=b + (
) – Λ ------------(v)
where b usually is the operating cost at the agent‟s side to
handle as many operators and bids configured i.e. Internet cost,
software updates. β usually is the cost of producing an
additional unit, in this case would be the opportunity cost if the
licenses were assigned to different operators in that particular
time window T; α, γ parameters defined in the theory of peak
load charging.
There are several pricing periods but the authors assume the
simple case with only one technology CDMA, considering
homogeneous networks and licenses. As a result, it will be easy
to formulate problems with the equations (iii) and (iv) defining
the optimal reliability, capacity and optimal price under the
condition of h equals to 1. In that case it can be calculated that
the optimal price in each pricing period, similarly with equation
(v).
The CLC is gaining relevance, including the two reasons.
“First, with growing competitiveness of the market for
interconnection services, the regulator tends to replace the
regime of fixed prices with a price-cap regime. Second, since
the Internet user is biased towards off-peak times, Internet
service providers have an interest in more refined CLC of call-
origination charges”.
3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No.5, December 2014
3
4. PEAK LOAD SPECTRUM PRICING
ALGORITHM
From the study of the most popular dynamic charging
paradigms it is obvious that the one size fits all does not work in
this spectrum problem. Some of the certain charging paradigms
on telecommunications recommended in Pricing
Communication Networks, but they could serve more the
bandwidth specifications and requirements rather than
following the spectrum terminology, where the source is broken
into channels and it is not treated as an entity and also there is
no congestion factor.
Dynamic charging approach of a hybrid system can be
recommended using the advantages of auctions and CLC.
During the off-peak period, the authors argue that the CLC
approach is used, during the peak-period the auctions mode is
more apt. In the off-peak time the charge is decided from the
peak load charging, when in the auction mode, the system is
using as reserve the price that was decided in the last off-peak
period and was stored in the table of a database. The system is
querying the database and is deciding about the auction‟s
reserve price in Figure 04. The system is managed from an
agent described as information broker, is hosting an application
that consists of an algorithm that handles the spectrum demand
and according to the network load decides what charging
algorithm to apply. Also the agent is aware of the spectrum
utilization of each user that owns a chunk of the spectrum. The
ultimate goal of the broker is to allocate the spectrum efficiently
and assign the winners, determining about the price they have to
pay. The capacity is measured as the number of available
licenses or channels that could be assigned to the mobile
wireless operators that request additional spectrum for each
time period T.
There are five phases consisted in the PLSP algorithm‟s
timeline Figure 03. In the first phase, the preliminary phase, the
bidders submit the spectrum requests in vectors that contain
information about the bidders and their intentions, such as
required spectrum and accepted channel interference. In the
second phase the broker compares the requests with the
available spectrum channels and determines about the pricing
model of the next phase, whether auctions or CLC.
At the step T2 the broker receives all the bids and is ready to
manipulate them. After that making decision the broker enters
the third phase. In case of auctions the broker is querying the
database to determine about the reserve price. Then the bidders
complete their vector submission adding the price. In case of
PLSP the broker computes the charge. It is calculated by
applying the single technology with multiple pricing periods.
The input would be the bid vector as described in phase1 and
for each time period T a different optimal price will be
calculated and announced to the bidders as the price they have
to pay per channel, in order to gain access to additional
spectrum. The optimal price after calculated is stored in a
simple database or a buffer; each entry into the database‟s table
is related to a time stamp, in order to keep track of the historical
date and the price. In phase 4 the broker runs the auction, when
for simplicity the author assumes only one round with a single-
unit auction without any negotiation included between the
broker and the bidders. In order to announce the winners, the
brokers run a winner determination algorithm similar to „Integer
programming for combinatorial auction winner determination
and Algorithm for optimal winner determination in
combinatorial auctions‟ [3,7]. The applied winner determination
algorithm „weighs‟ also other parameters besides the bidders‟
price such as „Stickiness‟, emergency or high priority issues and
social welfare. The algorithm should be able to rank the winners
according to the previous and announce the winners. Finally in
phase 5 the spectrum winners reconfigure their equipment into
the new frequency.
There are several advantages of this spectrum pricing algorithm.
First it is not only based on charge to determine about the
winners but also other critical parameters. This increases the
system‟s fairness and efficiency aiming to grant access more
often to the „small player‟ and reveal also the real demand and
the bidders‟ preferences.
A second advantage is that system is flexible to assign price
anytime, computing the optimal price for each time period. The
database as introduced in converting the whole application into
an efficient system based on historical data enhancing the whole
process. The mentioned system is a comparison between a peak
load pricing algorithm and any single-unit algorithm deciding
about the optimum solution according to the revenues and the
spectrum‟s allocation efficiency.
4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No. 2 Issue No.5, December 2014
4
5. CONCLUSION AND FUTURE WORKS
The bidders, in different simultaneous auctions could bid that
will include only one stage with a couple of rounds which will
be investigated further in the future. A faster per-auction
process is aimed to perform where the licenses‟ agenda will be
according to the initial bidders‟ preferences. The announced
license list should be interference free especially at co-located
regions. A platform of web based will allow the bidders to
participate in auction characterized from efficient spectrum
reuse. The broker should be an artificial intelligent agent that
will host advanced allocation and pricing algorithm. This
system could have also a practical value, since the applied
charging algorithms are used in real problems and applications.
Its practical perspective is increasing the research value and is
motivating the researches for further studies. Economic theories
have been used to analyze networking [6] and communications
problems where interacting decision-makers have conflicting
objectives. In particular, auction and game theories are good
tools to deal with distributed problems from an economic point
of view. This is because the service quality that each user
receives in a competitive environment is often affected by the
action of other users who also try to contend for the same pool
of resources. Dynamic Spectrum Allocation coupled with fine
granularity switching of services by end-users will engender a
flexible and competitive environment for trading wireless
services. Regarding to this, auction and game theories that are
captured the interaction among spectrum broker, service
providers, and end-users in a multi-provider setting.
6. REFERENCES
[1] Federal Communications Commission (FCC). [Online].
Available: http://wireless.fcc.gov/
[2] “A Case for Coordinated Dynamic Spectrum Access in Cellular
Network”, T. Kamakaris, M. Buddhikot, R. Iyer, in Proceedings
of 1st
IEEE DySPAN, Baltimore, MD, Nov. 2005
[3] Md. Kabir Uddin and M Abdus Sobhan, “
On the Implications of
Current Radio Spectrum Management Issues in Bangladesh.”,
IJCSIS, Vol-12, No- 3, pp. 16-21, 2014
[4] Md. Kabir Uddin and M Abdus Sobhan, “A Study on the Radio
Spectrum Management in South Asian Countries: Challenges
and Opportunities”, IJCSIS, Vol- 12, No- 3, pp. 11-15, 2014
[5] Md. Kabir Uddin, “A Comparative Study of Spectrum Pricing
for 3G and WiMAX in Asia and Europe Countries”, MSc Thesis,
in ETE, IUB
[6] Mr. Kabir Uddin, “Network Wide Statistics of TCP Indicators
Measurement Reassume the Status of the 3G Network
Monitoring” UITS
[7] “Dynamic Peak Load Pricing”, O Shy, 2001 [Online]. Available:
http://www. econ.haifa.ac.il/~ozshy/peak37.pdf
[8] “Peak loads and Efficient Pricing”, Steiner P.O., Quarterly
Journal of Economics, vol.71, pp. 585-610. Nov.1957
[9] “The theory of peak load pricing: A survey”, M. Crew, C.
Fernando, P. Kleindorfer, Journal of Regulatory Economics, vol.
8, no.3, pp. 215-248, Nov.1995