This document summarizes and compares various best-effort resource block scheduling algorithms for LTE uplink networks. It describes Heuristic Localized Gradient Algorithm (HLGA), Frequency Domain Packet Scheduling (FDPS) algorithms including carrier-by-carrier, largest-metric-value-RB-first, riding peaks, and RB-grouping. It also covers First Maximum Expansion (FME) and Recursive Maximum Expansion (RME) algorithms. Tables are provided to illustrate how each algorithm assigns resource blocks to user equipment to maximize resource utilization while considering constraints like contiguity. The goal is to analyze these algorithms and their impact on system throughput and energy consumption.
Energy efficient resources allocations for wireless communication systemsTELKOMNIKA JOURNAL
The energy consumption level of the telecommunication process has become a new
consideration in resource management scheme. It is becoming a new parameter in the resource
management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power
control scheme and user grouping method to keep the rational energy consumption level of the resource
management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes
the energy efficiency by giving the power to the user which have good channel conditions. The user
grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user
get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission
process. This power control scheme and user grouping method can optimize the spectral and energy
efficiency without increasing the time complexity of the system.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
Improved Ad-Hoc Networks Using Cooperative DiversityIJCSIT Journal
In this paper an ad-hoc network having source, a
destination and a third station which is a relay is analyzed.
The channels used here are modeled having thermal noise,
Rayleigh fading and path loss. Different methods for
combining and diversity protocols are compared.
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks IJECEIAES
Today, science and technology is developing, particularly the internet of things (IoT), there is an increasing demand in the sensor field to serve the requirements of individuals within modern life. Wireless sensor networks (WSNs) was created to assist us to modernize our lives, saving labor, avoid dangers, and that bring high efficiency at work. There are many various routing protocols accustomed to increase the ability efficiency and network lifetime. However, network systems with one settled sink frequently endure from a hot spots issue since hubs close sinks take a lot of vitality to forward information amid the transmission method. In this paper, the authors proposed combining the colony optimization algorithm ant colony optimization (ACO) routing algorithm and mobile sink to deal with that drawback and extend the network life. The simulation results on MATLAB show that the proposed protocol has far better performance than studies within the same field.
Energy efficient resources allocations for wireless communication systemsTELKOMNIKA JOURNAL
The energy consumption level of the telecommunication process has become a new
consideration in resource management scheme. It is becoming a new parameter in the resource
management scheme besides throughput, spectral efficiency, and fairness. This work proposes a power
control scheme and user grouping method to keep the rational energy consumption level of the resource
management scheme. Inverse water-filling power allocation is a power allocation scheme that optimizes
the energy efficiency by giving the power to the user which have good channel conditions. The user
grouping method becomes the solution for carrier aggregation (CA) scheme that prevents edge cell user
get the resources from the high-frequency carrier. This can prevent energy wastage in the transmission
process. This power control scheme and user grouping method can optimize the spectral and energy
efficiency without increasing the time complexity of the system.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
Improved Ad-Hoc Networks Using Cooperative DiversityIJCSIT Journal
In this paper an ad-hoc network having source, a
destination and a third station which is a relay is analyzed.
The channels used here are modeled having thermal noise,
Rayleigh fading and path loss. Different methods for
combining and diversity protocols are compared.
Incorporate ACO routing algorithm and mobile sink in wireless sensor networks IJECEIAES
Today, science and technology is developing, particularly the internet of things (IoT), there is an increasing demand in the sensor field to serve the requirements of individuals within modern life. Wireless sensor networks (WSNs) was created to assist us to modernize our lives, saving labor, avoid dangers, and that bring high efficiency at work. There are many various routing protocols accustomed to increase the ability efficiency and network lifetime. However, network systems with one settled sink frequently endure from a hot spots issue since hubs close sinks take a lot of vitality to forward information amid the transmission method. In this paper, the authors proposed combining the colony optimization algorithm ant colony optimization (ACO) routing algorithm and mobile sink to deal with that drawback and extend the network life. The simulation results on MATLAB show that the proposed protocol has far better performance than studies within the same field.
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
Nowadays, Vehicular Ad-Hoc Network (VANET) has got more attention from the researchers. The researchers have studied numerous topics of VANET, such as the routing protocols of VANET and the MAC protocols of VANET. The aim of their works is to improve the network performance of VANET, either in terms of energy consumption or packet delivery ratio (PDR) and delay. For this research paper, the main goal is to find the coefficient of a, b and c of three non-linear equations by using a Newton- Raphson method. Those three non-linear equations are derived from a different value of Medium Access Control (MAC) protocol's parameters. After that, those three coefficient is then will be used in optimization of the VANET in terms of energy, PDR, and delay.
Address-light and energy aware routing protocol for wireless sensor networkTELKOMNIKA JOURNAL
In recent years, sensor networks applications were used in many criteria. Because of its vast applications, so many researchers studied these networks. Wireless sensor networks contain significant number of sensor nodes; they are suitable medium for collecting and sending data or informing the sink about an event. This study presents a new integrated method for routing in sensor networks which is based on remaining energy of the nodes and existing space between each node and the sink. This method is more suitable for large and medium volume of data. Lifetime enhancement of the network is the main purpose of this method which is obtained by fair division of nodes roles in transmission of data to the sink. In ALERP algorithm (Address Light, Label-Based and Energy-Aware Routing Protocol), in order to reduce network overload and energy consuming as well as enhancement of network lifetime, we used predetermined routes as well as routing based on packet labels. Energy consumption in the entire network is another advantage of this method. The existence of various parameters on this algorithm will lead to more flexibility of it. Generally, conducted simulations indicate higher uniformity in energy consumption of nodes.
Equity-Based free channels assignment for secondary users in a cognitive radi...IJECEIAES
The present paper addresses the equity issue among the secondary users in a cognitive radio network. After using a multi scheduler algorithm and a fairness metric namely Jain’s Equity Index; we enhance the equity between the secondary users’ transfer rates by 0.64 in average, relative to a previous work.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...ijwmn
This article investigates mobility load balancing (MLB) algorithm implementation through network
simulator (ns-3) in long term evolution (LTE) systems employing orthogonal frequency division multiple
access (OFDMA) for downlink (DL) data transmission. MLB is introduced by the third generation
partnership project (3GPP) as a key target of LTE self-organizing networks (SONs) [1]. Our contribution
is twofold. First, we implemented elementary procedures (EPs) related to load management (LM) function
of the X2-application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs
’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’. Second, we
implemented a MLB based adaptive handover (HO) algorithm enabling to configure adaptively HO
hysteresis threshold for each neighbouring cell, of an overloaded cell, according to its current load
information. Numerical results show how, through suitable simulation scenarios, MLB enables enhancing
network performance in terms of overall throughput, packet loss ratio (PLR) and fairness without incurring
HO overhead.
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...TELKOMNIKA JOURNAL
In this paper, the system performance of an amplify-and-forward (AF) relaying network over
Rician Fading Channel is proposed, analyzed and demonstrated. For details this analysis, the energy and
information are transferred from the source to the relay nodes by two methods: 1) time switching protocol
and 2) power splitting protocol. Firstly, due to the constraint of the wireless energy harvesting at the relay
node, the analytical mathematical expressions of the achievable throughput and the outage probability of
both schemes were proposed and demonstrated. After that, the effect of various system parameters on the
system performance is rigorously studied with closed-form expressions for the system performance.
Finally, the analytical results are also demonstrated by Monte-Carlo simulation in comparison with the
closed-form expressions. The numerical results demonstrated the effect of various system parameters,
such as energy harvesting time, power splitting ratio, source transmission to noise power, and the
threshold value, on the system performance of AF wireless relay nodes. The results show that the
analytical mathematical and simulated results match for all possible parameter values for both schemes.
Adaptive resources assignment in OFDM-based cognitive radio systemsIJECEIAES
Spectrum efficiency of orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) systems can be improved by adaptive resources allocation. In resources allocation, transmission resources such as modulation level and transmission power are adaptively assigned based on channel variations. The goal of this paper is maximize the total transmission rate of secondary user (SU). Hence, we investigate adaptive power and modulation allocation to achieve this purpose. For power allocation, we investigate optimal and conventional methods and then introduce a novel suboptimal algorithm to calculate the transmission power of each subcarrier. In addition, for adaptive modulation, we consider two kinds of modulations including multi-quadrature amplitude modulation (MQAM) and multi-phase-shift keying (MPSK). Also, simulation results are indicated the performance of our algorithm.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Energy efficiency in ieee 802.11 standard wlan through mwtdpeSAT Journals
Abstract The main goal of this work is to achieve the energy efficiency in 802.11 WLAN through minimizing the energy consumption in the network. In this proposed study, we introduced a modification in DCF for enhancing the performance of WLAN and it is achieved by giving a new definition for the DCF function of transmission. Generally, in DCF the way AP transmits for the various nodes is one-way during the process of polling. The proposed function modification for DCF enhances the IEEE 802.11 standard DCF Multi-Way Transmission DCF Protocol (MWTDP) with an improved version MWTDP it gives a low-complexity mechanism by which the active and non-active stations in the BSS save energy during the process of polling. With the inception of MWTDP transmissions are taken place in multi-way the access to the WLAN channel for mobile nodes in the list generated for polling with the SIFS interval whenever the transmission in receiving data packet from AP. Index Terms: MWTDP (Multi-Way transmission DCF Protocol), WLAN (Wireless LAN), DCF(Distributed Coordination Function)
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and time dimension. So several scheduling algorithms need to be analyzed for femtocells networks. In this paper we introduce a performance analysis of three distinct scheduling algorithms of mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...chokrio
The wireless sensor network is composed of a set of nodes which energy is limited in terms of computing, storage and communication power. In this network, a few nodes become cluster head which causes the energetic heterogeneity of the network, therefore the behavior of the sensor network becomes very unstable as soon as the life of the first node is elapsed. SEP has proposed the extension of time to network stability before the death of the first node and the reduction of unstable time before
the death of the last node. This protocol is based on the election
of cluster head by the balance of the probabilities of the
remaining energy for each node. In this paper, we propose to improve SEP by fuzzy logic (SEP-FL). We show by simulation in MATLAB that the proposed method increases the stability period and decreases the instability of the sensor network compared with LEACH, LEACH-FL and SEP taking into account the energy level and the distance to the base station. We conclude by studying the parameters of heterogeneity as the protocol proposed (SEP-FL) provides a longer interval of stability for large values of additional energy brought by the more powerful nodes (advanced).
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
Nowadays, Vehicular Ad-Hoc Network (VANET) has got more attention from the researchers. The researchers have studied numerous topics of VANET, such as the routing protocols of VANET and the MAC protocols of VANET. The aim of their works is to improve the network performance of VANET, either in terms of energy consumption or packet delivery ratio (PDR) and delay. For this research paper, the main goal is to find the coefficient of a, b and c of three non-linear equations by using a Newton- Raphson method. Those three non-linear equations are derived from a different value of Medium Access Control (MAC) protocol's parameters. After that, those three coefficient is then will be used in optimization of the VANET in terms of energy, PDR, and delay.
Address-light and energy aware routing protocol for wireless sensor networkTELKOMNIKA JOURNAL
In recent years, sensor networks applications were used in many criteria. Because of its vast applications, so many researchers studied these networks. Wireless sensor networks contain significant number of sensor nodes; they are suitable medium for collecting and sending data or informing the sink about an event. This study presents a new integrated method for routing in sensor networks which is based on remaining energy of the nodes and existing space between each node and the sink. This method is more suitable for large and medium volume of data. Lifetime enhancement of the network is the main purpose of this method which is obtained by fair division of nodes roles in transmission of data to the sink. In ALERP algorithm (Address Light, Label-Based and Energy-Aware Routing Protocol), in order to reduce network overload and energy consuming as well as enhancement of network lifetime, we used predetermined routes as well as routing based on packet labels. Energy consumption in the entire network is another advantage of this method. The existence of various parameters on this algorithm will lead to more flexibility of it. Generally, conducted simulations indicate higher uniformity in energy consumption of nodes.
Equity-Based free channels assignment for secondary users in a cognitive radi...IJECEIAES
The present paper addresses the equity issue among the secondary users in a cognitive radio network. After using a multi scheduler algorithm and a fairness metric namely Jain’s Equity Index; we enhance the equity between the secondary users’ transfer rates by 0.64 in average, relative to a previous work.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...ijwmn
This article investigates mobility load balancing (MLB) algorithm implementation through network
simulator (ns-3) in long term evolution (LTE) systems employing orthogonal frequency division multiple
access (OFDMA) for downlink (DL) data transmission. MLB is introduced by the third generation
partnership project (3GPP) as a key target of LTE self-organizing networks (SONs) [1]. Our contribution
is twofold. First, we implemented elementary procedures (EPs) related to load management (LM) function
of the X2-application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs
’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’. Second, we
implemented a MLB based adaptive handover (HO) algorithm enabling to configure adaptively HO
hysteresis threshold for each neighbouring cell, of an overloaded cell, according to its current load
information. Numerical results show how, through suitable simulation scenarios, MLB enables enhancing
network performance in terms of overall throughput, packet loss ratio (PLR) and fairness without incurring
HO overhead.
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...TELKOMNIKA JOURNAL
In this paper, the system performance of an amplify-and-forward (AF) relaying network over
Rician Fading Channel is proposed, analyzed and demonstrated. For details this analysis, the energy and
information are transferred from the source to the relay nodes by two methods: 1) time switching protocol
and 2) power splitting protocol. Firstly, due to the constraint of the wireless energy harvesting at the relay
node, the analytical mathematical expressions of the achievable throughput and the outage probability of
both schemes were proposed and demonstrated. After that, the effect of various system parameters on the
system performance is rigorously studied with closed-form expressions for the system performance.
Finally, the analytical results are also demonstrated by Monte-Carlo simulation in comparison with the
closed-form expressions. The numerical results demonstrated the effect of various system parameters,
such as energy harvesting time, power splitting ratio, source transmission to noise power, and the
threshold value, on the system performance of AF wireless relay nodes. The results show that the
analytical mathematical and simulated results match for all possible parameter values for both schemes.
Adaptive resources assignment in OFDM-based cognitive radio systemsIJECEIAES
Spectrum efficiency of orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) systems can be improved by adaptive resources allocation. In resources allocation, transmission resources such as modulation level and transmission power are adaptively assigned based on channel variations. The goal of this paper is maximize the total transmission rate of secondary user (SU). Hence, we investigate adaptive power and modulation allocation to achieve this purpose. For power allocation, we investigate optimal and conventional methods and then introduce a novel suboptimal algorithm to calculate the transmission power of each subcarrier. In addition, for adaptive modulation, we consider two kinds of modulations including multi-quadrature amplitude modulation (MQAM) and multi-phase-shift keying (MPSK). Also, simulation results are indicated the performance of our algorithm.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Energy efficiency in ieee 802.11 standard wlan through mwtdpeSAT Journals
Abstract The main goal of this work is to achieve the energy efficiency in 802.11 WLAN through minimizing the energy consumption in the network. In this proposed study, we introduced a modification in DCF for enhancing the performance of WLAN and it is achieved by giving a new definition for the DCF function of transmission. Generally, in DCF the way AP transmits for the various nodes is one-way during the process of polling. The proposed function modification for DCF enhances the IEEE 802.11 standard DCF Multi-Way Transmission DCF Protocol (MWTDP) with an improved version MWTDP it gives a low-complexity mechanism by which the active and non-active stations in the BSS save energy during the process of polling. With the inception of MWTDP transmissions are taken place in multi-way the access to the WLAN channel for mobile nodes in the list generated for polling with the SIFS interval whenever the transmission in receiving data packet from AP. Index Terms: MWTDP (Multi-Way transmission DCF Protocol), WLAN (Wireless LAN), DCF(Distributed Coordination Function)
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and time dimension. So several scheduling algorithms need to be analyzed for femtocells networks. In this paper we introduce a performance analysis of three distinct scheduling algorithms of mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...chokrio
The wireless sensor network is composed of a set of nodes which energy is limited in terms of computing, storage and communication power. In this network, a few nodes become cluster head which causes the energetic heterogeneity of the network, therefore the behavior of the sensor network becomes very unstable as soon as the life of the first node is elapsed. SEP has proposed the extension of time to network stability before the death of the first node and the reduction of unstable time before
the death of the last node. This protocol is based on the election
of cluster head by the balance of the probabilities of the
remaining energy for each node. In this paper, we propose to improve SEP by fuzzy logic (SEP-FL). We show by simulation in MATLAB that the proposed method increases the stability period and decreases the instability of the sensor network compared with LEACH, LEACH-FL and SEP taking into account the energy level and the distance to the base station. We conclude by studying the parameters of heterogeneity as the protocol proposed (SEP-FL) provides a longer interval of stability for large values of additional energy brought by the more powerful nodes (advanced).
Analysis of LTE Radio Load and User ThroughputIJCNCJournal
A recurring topic in LTE radio planning pertains to the maximum acceptable LTE radio interface load, up to which a targeted user data rate can be maintained. We explore this topic by using Queuing Theory elements to express the downlink user throughput as a function of the LTE Physical Resource Block (PRB) utilization. The resulting formulas are expressed in terms of standardized 3GPP KPIs and can be readily evaluated from network performance counters. Examples from live networks are given to illustrate the results, and the suitability of a linear decrease model is quantified upon data from a commercial LTE network.
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traffic is growing rapidly and spectrum resources are becoming scarce in wireless networks. Due to this, the wireless network capacity will not meet the traffic demand. To address this problem, using cellular systems in an unlicensed spectrum emerged as an effective solution. In this case, cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an efficient channel assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model, we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from 25.5% to 48.7% in different user arrival rates compared to the conventional method. We evaluated the generalization performance of the trained agent, to confirm channel allocation efficiency in terms of average throughput under the different user arrival rates.
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcem...IJCNCJournal
Recently, mobile traf ic is growing rapidly and spectrum resources are becoming scarce in wireless
networks. Due to this, the wireless network capacity will not meet the traf ic demand. To address this
problem, using cellular systems in an unlicensed spectrum emerged as an ef ective solution. In this case,
cellular systems need to coexist with Wi-Fi and other systems. For that, we propose an ef icient channel
assignment method for Wi-Fi AP and cellular NB, based on the DRL method. To train the DDQN model,
we implement an emulator as an environment for spectrum sharing in densely deployed NB and APs in
wireless heterogeneous networks. Our proposed DDQN algorithm improves the average throughput from
25.5% to 48.7% in dif erent user arrival rates compared to the conventional method. We evaluated the
generalization performance of the trained agent, to confirm channel allocation ef iciency in terms of
average throughput under the dif erent user arrival rates
A Deterministic Heterogeneous Clustering Algorithmiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...ijwmn
Coordinated multi-point transmission and reception (CoMP) is introduced in LTE-A to mitigate co-channel
interference and improve the cell-edge user experience. In this paper we propose a joint transmission
scheme for LTE-CoMP and we enhance the performance of CoMP with two techniques: 1- dynamic MIMO
cell selection and 2- closed loop MIMO with global precoding matrix selection. A cell-edge user selects the
base stations that jointly transmit the desired signal from the available ones (we assumed 3). The user also
selects the closed loop precoding matrices for MIMO in a joint fashion to fit the independent MIMO
channels from two base stations (eNBs). In addition, edge users are likely to be subject to severe Cochannel
interference from eNBs outside the joint transmission set.To address co-channel interference from
the base station(s) that are not included in CoMP joint transmission set, the user equipment employs
Minimum Mean Squared Error receiver with Interference Rejection Combining (MMSE-IRC). We illustrate
the effect of fading correlation between elements of the transmit and receive antennas. Also, the effect of
the desired to interference eNB power ratio in case of medium correlation for 3 and 4 layers using MMSEIRC
receiver is studied. Also we compare the BER performance for 3 and 4 layers in case of different values of the desired to interference eNB power ratio. Simulation results show that the performance of CoMP with cell selection considerably improves the performance. Also, global selection of the precoding matrices outperforms local selection. In addition, using MMSE-IRC gives much better performance than the conventional minimum mean square error (MMSE) in the presence of co-channel interference.
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Journals
Abstract Deployment of low power base station (pico) in macro cell is a key for providing high data rates. Cell range expansion is one of the features of LTE-advanced where low power base station in a heterogeneous network can increase their coverage area and neighboring cells can offload users to low power base station to reduce overload in macro cell. This presents a very challenging multi-user communication problem. Co-channel deployed Het-Net will experience interference between pico and macro. The main challenge of pico cells embedded into a macro cell is to let more users profit from the additional bandwidth introduced into the network. Enhanced Inter-cell Interference Coordination (eICIC) has been introduced to solve interference problem. Scheduling for eICIC is used to provide best solution for interference mitigation, overload in macro cell, fairness in resource usage by users. In this paper we have analyzed Round Robin scheduling for eICIC, results prove that fairness is maintained between users and throughput has been improved. Key Words: LTE - Long term Evolution, UE - User Equipment, eNB – eNodeB.
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...IJCNCJournal
We propose in this paper a simulation implementation of Self-Organizing Networks (SON) optimization
related to mobility load balancing (MLB) for LTE systems using ns-3 [1]. The implementation is achieved
toward two MLB algorithms dynamically adjusting handover (HO) parameters based on the Reference
Signal Received Power (RSRP) measurements. Such adjustments are done with respect to loads of both an
overloaded cell and its cells’ neighbours having enough available resources enabling to achieve load
balancing. Numerical investigations through selected key performance indicators (KPIs) of the proposed
MLB algorithms when compared with another HO algorithm (already implemented in ns-3) based on A3
event [2] highlight the significant MLB gains provided in terms global network throughput, packet loss rate
and the number of successful HO without incurring significant overhead.
Similar to Mobiles Energy Consumption in LTE Uplink Networks (20)
Now-a-days, Internet has become an important part of human’s life, a person
can shop, invest, and perform all the banking task online. Almost, all the organizations have
their own website, where customer can perform all the task like shopping, they only have to
provide their credit card details. Online banking and e-commerce organizations have been
experiencing the increase in credit card transaction and other modes of on-line transaction.
Due to this credit card fraud becomes a very popular issue for credit card industry, it causes
many financial losses for customer and also for the organization. Many techniques like
Decision Tree, Neural Networks, Genetic Algorithm based on modern techniques like
Artificial Intelligence, Machine Learning, and Fuzzy Logic have been already developed for
credit card fraud detection. In this paper, an evolutionary Simulated Annealing algorithm is
used to train the Neural Networks for Credit Card fraud detection in real-time scenario.
This paper shows how this technique can be used for credit card fraud detection and
present all the detailed experimental results found when using this technique on real world
financial data (data are taken from UCI repository) to show the effectiveness of this
technique. The algorithm used in this paper are likely beneficial for the organizations and
for individual users in terms of cost and time efficiency. Still there are many cases which are
misclassified i.e. A genuine customer is classified as fraud customer or vise-versa.
Wireless sensor networks (WSN) have been widely used in various applications.
In these networks nodes collect data from the attached sensors and send their data to a base
station. However, nodes in WSN have limited power supply in form of battery so the nodes
are expected to minimize energy consumption in order to maximize the lifetime of WSN. A
number of techniques have been proposed in the literature to reduce the energy
consumption significantly. In this paper, we propose a new clustering based technique
which is a modification of the popular LEACH algorithm. In this technique, first cluster
heads are elected using the improved LEACH algorithm as usual, and then a cluster of
nodes is formed based on the distance between node and cluster head. Finally, data from
node is transferred to cluster head. Cluster heads forward data, after applying aggregation,
to the cluster head that is closer to it than sink in forward direction or directly to the sink.
This reduction in distance travelled improves the performance over LEACH algorithm
significantly.
The next generation wireless networks comprises of mobile users moving
between heterogeneous networks, using terminals with multiple access interfaces and
services. The most important issue in such environment is ABC (Always Best Connected) i.e.
allowing the best connectivity to applications anywhere at any time. For always best
connectivity requirement various vertical handover strategies for decision making have
been proposed. This paper provides an overview of the most interesting and recent
strategies.
This paper presents the design and performance comparison of a two stage
operational amplifier topology using CMOS and BiCMOS technology. This conventional op
amp circuit was designed by using RF model of BSIM3V3 in 0.6 μm CMOS technology and
0.35 μm BiCMOS technology. Both the op amp circuits were designed and simulated,
analyzed and performance parameters are compared. The performance parameters such as
gain, phase margin, CMRR, PSRR, power consumption etc achieved are compared. Finally,
we conclude the suitability of CMOS technology over BiCMOS technology for low power
RF design.
In Cognitive Radio Networks (CRN), Cooperative Spectrum Sensing (CSS) is
used to improve performance of spectrum sensing techniques used for detection of licensed
(Primary) user’s signal. In CSS, the spectrum sensing information from multiple unlicensed
(Secondary) users are combined to take final decision about presence of primary signal. The
mixing techniques used to generate final decision about presence of PU’s signal are also
called as Fusion techniques / rules. The fusion techniques are further classified as data
fusion and decision fusion techniques. In data fusion technique all the secondary users
(SUs) share their raw information of spectrum detection like detected energy or other
statistical information, while in decision fusion technique all the SUs take their local
decisions and share the decision by sending ‘0’ or ‘1’ corresponding to absence and presence
of PU’s signal respectively. The rules used in decision fusion techniques are OR rule, AND
rule and K-out-of-N rule. The CSS is further classified as distributed CSS and centralized
CSS. In distributed CSS all the SUs share the spectrum detection information with each
other and by mixing the shared information; all the SUs take final decision individually. In
centralized CSS all the SUs send their detected information to a secondary base station /
central unit which combines the shared information and takes final decision. The secondary
base station shares the final decision with all the SUs in the CRN. This paper covers
overview of information fusion methods used for CSS and analysis of decision fusion rules
with simulation results.
ZigBee has been developed to support lower data rates and low power consuming
applications. This paper targets to analyze various parameters of ZigBee physical (PHY).
Performance of ZigBee PHY is evaluated on the basis of energy consumption in
transmitting and receiving mode and throughput. Effect of variation in network size is
studied on these performance attributes. Some modulation schemes are also compared and
the best modulation scheme is suggested with tradeoffs between different performance
metrics.
This paper gives a brief idea of the moving objects tracking and its application.
In sport it is challenging to track and detect motion of players in video frames. Task
represents optical flow analysis to do motion detection and particle filter to track players
and taking consideration of regions with movement of players in sports video. Optical flow
vector calculation gives motion of players in video frame. This paper presents improved
Luacs Kanade algorithm explained for optical flow computation for large displacement and
more accuracy in motion estimation.
A rapid progress is seen in the field of robotics both in educational and industrial
automation sectors. The Robotics education in particular is gaining technological advances
and providing more learning opportunities. In automotive sector, there is a necessity and
demand to automate daily human activities by robot. With such an advancement and
demand for robotics, the realization of a popular computer game will help students to learn
and acquire skills in the field of robotics. The computer game such as Pacman offers
challenges on both software and hardware fronts. In software, it provides challenges in
developing algorithms for a robot to escape from the pool of attacking robots and to develop
algorithms for multiple ghost robots to attack the Pacman. On the hardware front, it
provides a challenge to integrate various systems to realize the game. This project aims to
demonstrate the pacman game in real world as well as in simulation. For simulation
purpose Player/Stage is used to develop single-client and multi-client architectures. The
multi- client architecture in player/stage uses one global simulation proxy to which all the
robot models are connected. This reduces the overhead to manage multiple robots proxy.
The single-client architecture enables only two robot models to connect to the simulation
proxy. Multi-client approach offers flexibility to add sensors to each port which will be used
distinctly by the client attached to the respective robot. The robots are named as Pacman
and Ghosts, which try to escape and attack respectively. Use of Network Camera has been
done to detect the global positions of the robots and data is shared through inter-process
communication.
In Content-Based Image Retrieval (CBIR) systems, the visual contents of the
images in the database are took out and represented by multi-dimensional characteristic
vectors. A well known CBIR system that retrieves images by unsupervised method known
as cluster based image retrieval system. For enhancing the performance and retrieval rate
of CBIR system, we fuse the visual contents of an image. Recently, we developed two
cluster-based CBIR systems by fusing the scores of two visual contents of an image. In this
paper, we analyzed the performance of the two recommended CBIR systems at different
levels of precision using images of varying sizes and resolutions. We also compared the
performance of the recommended systems with that of the other two existing CBIR systems
namely UFM and CLUE. Experimentally, we find that the recommended systems
outperform the other two existing systems and one recommended system also comparatively
performed better in every resolution of image.
Information Systems and Networks are subjected to electronic attacks. When
network attacks hit, organizations are thrown into crisis mode. From the IT department to
call centers, to the board room and beyond, all are fraught with danger until the situation is
under control. Traditional methods which are used to overcome these threats (e.g. firewall,
antivirus software, password protection etc.) do not provide complete security to the system.
This encourages the researchers to develop an Intrusion Detection System which is capable
of detecting and responding to such events. This review paper presents a comprehensive
study of Genetic Algorithm (GA) based Intrusion Detection System (IDS). It provides a
brief overview of rule-based IDS, elaborates the implementation issues of Genetic Algorithm
and also presents a comparative analysis of existing studies.
Step by step operations by which we make a group of objects in which attributes
of all the objects are nearly similar, known as clustering. So, a cluster is a collection of
objects that acquire nearly same attribute values. The property of an object in a cluster is
similar to other objects in same cluster but different with objects of other clusters.
Clustering is used in wide range of applications like pattern recognition, image processing,
data analysis, machine learning etc. Nowadays, more attention has been put on categorical
data rather than numerical data. Where, the range of numerical attributes organizes in a
class like small, medium, high, and so on. There is wide range of algorithm that used to
make clusters of given categorical data. Our approach is to enhance the working on well-
known clustering algorithm k-modes to improve accuracy of algorithm. We proposed a new
approach named “High Accuracy Clustering Algorithm for Categorical datasets”.
Brain tumor is a malformed growth of cells within brain which may be
cancerous or non-cancerous. The term ‘malformed’ indicates the existence of tumor. The
tumor may be benign or malignant and it needs medical support for further classification.
Brain tumor must be detected, diagnosed and evaluated in earliest stage. The medical
problems become grave if tumor is detected at the later stage. Out of various technologies
available for diagnosis of brain tumor, MRI is the preferred technology which enables the
diagnosis and evaluation of brain tumor. The current work presents various clustering
techniques that are employed to detect brain tumor. The classification involves classification
of images into normal and malformed (if detected the tumor). The algorithm deals with
steps such as preprocessing, segmentation, feature extraction and classification of MR brain
images. Finally, the confirmatory step is specifying the tumor area by technique called
region of interest.
A Proxy signature scheme enables a proxy signer to sign a message on behalf of
the original signer. In this paper, we propose ECDLP based solution for chen et. al [1]
scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the
proxy requirements and require only elliptic curve multiplication and elliptic curve addition
which needs less computation overhead compared to modular exponentiations also our
scheme is withstand against original signer forgery and public key substitution attack.
Water marking has been proposed as a method to enhance data security. Text
water marking requires extreme care when embedding additional data within the images
because the additional information must not affect the image quality. Digital water marking
is a method through which we can authenticate images, videos and even texts. Add text
water mark and image water mark to your photos or animated image, protect your
copyright avoid unauthorized use. Water marking functions are not only authentication, but
also protection for such documents against malicious intentions to change such documents
or even claim the rights of such documents. Water marking scheme that hides water
marking in method, not affect the image quality. In this paper method of hiding a data using
LSB replacement technique is proposed.
Today among various medium of data transmission or storage our sensitive data
are not secured with a third-party, that we used to take help of. Cryptography plays an
important role in securing our data from malicious attack. This paper present a partial
image encryption based on bit-planes permutation using Peter De Jong chaotic map for
secure image transmission and storage. The proposed partial image encryption is a raw data
encryption method where bits of some bit-planes are shuffled among other bit-planes based
on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De
Jong map the position of all the bit-planes are permuted. The result of the several
experimental, correlation analysis and sensitivity test shows that the proposed image
encryption scheme provides an efficient and secure way for real-time image encryption and
decryption.
This paper presents a survey of Dependency Analysis of Service Oriented
Architecture (SOA) based systems. SOA presents newer aspects of dependency analysis due
to its different architectural style and programming paradigm. This paper surveys the
previous work taken on dependency analysis of service oriented systems. This study shows
the strengths and weaknesses of current approaches and tools available for dependency
analysis task in context of SOA. The main motivation of this work is to summarize the
recent approaches in this field of research, identify major issue and challenges in
dependency analysis of SOA based systems and motivate further research on this topic.
In this paper, proposed a novel implementation of a Soft-Core system using
micro-blaze processor with virtex-5 FPGA. Till now Hard-Core processors are used in
FPGA processor cores. Hard cores are a fixed gate-level IP functions within the FPGA
fabrics. Now the proposed processor is Soft-Core Processor, this is a microprocessor fully
described in software, usually in an HDL. This can be implemented by using EDK tool. In
this paper, developed a system which is having a micro-blaze processor is the combination
of both hardware & Software. By using this system, user can control and communicate all
the peripherals which are in the supported board by using Xilinx platform to develop an
embedded system. Implementing of Soft-Core process system with different peripherals like
UART interface, SPA flash interface, SRAM interface has to be designed using Xilinx
Embedded Development Kit (EDK) tools.
The article presents a simple algorithm to construct minimum spanning tree and
to find shortest path between pair of vertices in a graph. Our illustration includes the proof
of termination. The complexity analysis and simulation results have also been included.
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
Radio Frequency identification (RFID) technology has become emerging
technique for tracking and items identification. Depend upon the function; various RFID
technologies could be used. Drawback of passive RFID technology, associated to the range
of reading tags and assurance in difficult environmental condition, puts boundaries on
performance in the real life situation [1]. To improve the range of reading tags and
assurance, we consider implementing active backscattering tag technology. For making
mobiles of multiple radio standards in 4G network; the Software Defined Radio (SDR)
technology is used. Restrictions in Existing RFID technologies and SDR technology, can be
eliminated by the development and implementation of the Software Defined Radio (SDR)
active backscattering tag compatible with the EPC global UHF Class 1 Generation 2 (Gen2)
RFID standard. Such technology can be used for many of applications and services.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
2. more RBs to a UE which also increases the throughput but it was achieved at the expense of increased power.
Loop Power control techniques [5] is done in two ways: Open Loop Power Control (OPLC) method, where
the UE decides the power level depending on the channel conditions at that instant and Closed Loop Power
Control (CLPC) method where the UE decides the power level based on the channel conditions as well as the
feedback from the BS. The studies so far have not considered the power consumption in an RB which
inadvertently translates to the power consumed by the UE. In this paper, we have introduced a novel method
to reduce power by utilizing the SINR information per RB of the communication channel. Each RB
experiences a different SINR due to the random nature of the channel caused by fading, noise and obstacles
that could be from a car to a high rise building or mountains. These SINRs are then compared with the SINR
levels given in the CQI table [10]. The lower bound of the SINR level to which an SINR value falls is chosen
as the new value, while the throughput remains unchanged clearly seen from the table. Difference between
the new and the old SINR is obtained which is used as a metric by which the UE can reduce its power to
transmit the data at the same throughput. All through the simulation the MCS conditions laid out for LTE
uplink is considered i.e., the same MCS must be used on all the RBs that have been assigned to a UE.
Scheduling of the RBs in this paper is achieved by using the Best Effort -RB schedulers. These set of
schedulers were chosen as they give priorities to the UE/RB with good SINR conditions as a result of which
data transmission failure is minimum.
The system is a 7 cell network and only one sector is considered for the analysis. A 5 MHz bandwidth was
used which allots 25 RBs [12] for the system per half the Transmit Time Interval (TTI). A TTI is 1 micro
seconds.
The paper is structured as follows: Section II explains the Best effort RB scheduling algorithms, Section III
gives the description of the SINR based power control algorithm, Section IV describes the system model,
Section V analyses the performances of the Best effort RB scheduling algorithms, Section VI shows the
results obtained and section VII concludes and discusses the future works.
II. BEST E FFORT -RB SCHEDULING ALGORITHMS
Best Effort -RB scheduling algorithms are schedulers that assign the RBs based on the UE-RB pair that has
the highest value of the utility metric/function. They aim to maximize the utilization of the radio resources
and may or may not consider the fairness [6] (fair distribution of the resources amongst the users).
A. Heuristic Localized Gradient Algorithm (HLGA).
In [7] the authors have presented a scheduler called Heuristic Localized Gradient Algorithm which finds the
UE-RB pair that has the maximum value. Once all the deserving UEs have been served, then it checks for
RBs that are not adjacent to each other but have been allocated to the same UE. In such a case it allocates the
RBs between them to the same UE. Finally if any RBs are still remaining, it allocates them to UE-RB pairs
that satisfy the contiguity constraint. This management of free RBs makes it a zero-RB-wastage scheduler.
TABLE I. HLGA
UE 1
UE 2
UE 3
RB 1
0.26
0.82
0.41
RB 2
1.65
0.50
0.39
RB3
0.10
0.30
0.47
RB 4
1.60
0.90
0.62
RB 5
0.85
0.63
0.89
RB 6
0.88
0.87
0.59
Table I shows the assignment of RB’s to UE’s by HLGA. The colour assignments are as follows: Red depicts
UE 1, green depicts UE 2 and blue depicts UE 3.The values given in the boxes are the value of a
metric/utility function as chosen by the developer.
RB 2 and RB 4 are assigned to UE 1 in the first step as all of them have a higher value. But when it scans RB
5 it finds that it has a higher value to UE 3 and so it assigns RB 5 to UE 3. Next it goes to RB 6 and finds that
it can’t assign it to UE 1 because it would violate the contiguity constraint so instead it assigns to UE 2. Now
it checks for any RBs that will satisfy the contiguity constraint. And in this case since RB 3 comes in
between RB 2 and RB 4 which are assigned to UE 1, it is also assigned to UE 1 to satisfy the contiguity
constraint. Also as RB 1 is not assigned to any UE it is allocated to UE 1 as it satisfies the contiguity
constraint.
B. Frequency Domain Packet Scheduling (FDPS).
The authors of [8] have proposed four heuristic algorithms.
124
3. i. FDPS-carrier-by-carrier
ii. FDPS-largest-metric-value-RB-first
iii. FDPS-riding peaks
iv. FDPS-RB-grouping
FDPS-carrier-by-carrier:The FDPS-carrier-by-carrier is a sequential RB allocating algorithm. It allocates
the RB’s starting by taking the first RB and finding which user gives the maximum UE-RB value. Once a UE
has been assigned a RB, it can no longer be assigned RBs unless it satisfies the contiguity constraint. Then it
moves on to the next RB and correspondingly finds the UE with the highest UE-RB value.
Table II shows the assignment of the RBs. Here RB 1 is scanned first and as UE 2 has the highest value it
assigns it to UE 2. Next RB 2 is scanned and since UE 1 has a higher value it assigns it to UE1. Then it goes
to RB 3 and finds that UE 3 has a high value and hence it is given to UE 3. When it reaches RB 4, it can’t
assign it to UE 1 as it violates the contiguity constraint, as it moves on to RB 5, UE 3 has the highest value
and it satisfies the contiguity constraint, hence it is assigned to UE 3 again. RB 6 again belongs to UE 1 but it
can’t be assigned to it again for the same reasons. As this scheme sequentially assigns the RBs to the UEs, it
leads to an unlikely event of a UE’s highest metric being allotted to it.
FDPS-largest-metric-value-RB-first:The FDPS-largest-metric-value-RB-first is similar to HLGA as it
allocates the users with the highest UE-RB metric first and assigns the RBs between adjacent RBs as well.
But it does not deal with the extra remaining unused RBs. The other downside is the assignment of all the
RBs that fall between two high UE-RB value to a particular UE could lead to some users not assigned any
RBs.
Table III clearly shows that RB 1 is left unused and is not allotted to any user. This problem is more
prominent when the number of UEs is less the number of RBs allocated to a system and does not occur if the
number of UEs is more than the RBs.
TABLE II. F DPS-C ARRIER-BY-CARRIER
UE 1
UE 2
UE 3
RB 1
0.26
0.82
0.41
RB 2
1.65
0.50
0.39
RB3
0.10
0.30
0.47
RB 4
1.60
0.90
0.62
RB 5
0.85
0.63
0.89
RB 6
0.88
0.87
0.59
TABLE III. FDPS-LARGEST-METRIC-VALUE-RB -F IRST
UE 1
UE 2
UE 3
RB 1
0.26
0.82
0.41
RB 2
1.65
0.50
0.39
RB3
0.10
0.30
0.47
RB 4
1.60
0.90
0.62
RB 5
0.85
0.63
0.89
RB 6
0.88
0.87
0.59
RB 5
0.85
0.63
0.89
RB 6
0.88
0.87
0.59
RB 5
0.85
0.63
0.89
RB 6
0.88
0.87
0.59
TABLE IV. FDPS-RIDING PEAKS
UE 1
UE 2
UE 3
RB 1
0.26
0.82
0.41
RB 2
1.65
0.50
0.39
RB3
0.10
0.30
0.47
RB 4
1.60
0.90
0.62
TABLE V. FDPS-RB GROUPING
UE 1
UE 2
UE 3
RB 1
0.26
0.82
0.41
RB 2
1.65
0.50
0.39
RB3
0.10
0.30
0.47
RB 4
1.60
0.90
0.62
FDPS-riding peaks: The third algorithm specified in their paper, the FDPS-riding-peaks assigns each user the
RB with whom it has a maximum UE-RB value. This approach seems good in terms of user fairness for slow
varying channels where there are slight changes in the channel conditions between adjacent RBs. In such
channel conditions the maximum or peaks of each UE are allocated their corresponding RBs. Then the RBs
around the peak RBs will also be allocated to the same UE. This assures that the highest metric of each UE is
125
4. used. But in cases where the channel conditions across the RBs changes rapidly it turns out to be wasting a
lot of RBs. This also results in allocating a UE at most only one RB which makes a UE transmit at maximum
power as the power is always divided amongst the RBs allocated to a UE. As shown in table IV only RB 2,
RB 3 and RB 5 are used and the remaining RBs are never used.
FDPS-RB-grouping: The last algorithm, the FPDS-RB-grouping overcomes the shortcoming of FDPSriding-peaks by grouping the RBs into ‘n’ groups, each with ‘m’ RBs. The “peak riding” is then applied over
these RB groups. Thus the rapid channel variations can be overcome.
Here the RBs are grouped into 3 groups with 2 RBs each (table V). The UEs are allocated the RB groups
depending on who has the highest value in the RB group. The different shadings denote the RB groups.
FPDS-RB-grouping gives a better performance over FDPS-riding-peaks only when there are lesser number
of UEs.
C. First Maximum Expansion (FME).
FME [9] first finds the UE-RB that has the highest metric value. Then it checks for the next highest UE-RB
on its right and left sides. If it still belongs to the same UE, it assigns to the RB to the same UE. It expands to
the right if the right UE-RB value is greater than the left UE-RB value and vice versa if the left is greater than
the right. This continues until the next highest UE-RB value belongs to another UE. And again it repeats the
process of checking the UE-RB values on its right and left side. This algorithm also incorporates the
management of the remaining free RBs making it a zero-RB-wastage scheduler.
As shown in table VI, UE 1-RB 2 has the highest metric. It then checks on its left and right side. As neither
side belongs to it, on to its left UE 2 is assigned RB 1. RB 3 is assigned to UE 3. It then checks the value on
the right which belongs to UE 1 but it cannot be assigned to UE 1 as it violates the contiguity constraint. So it
checks for the next highest UE-RB and again it belongs to UE2 which obviously violates the contiguity
constraint. Hence the remaining RBs are allocated to UE 3 as it satisfies the contiguity constraint.
D. Recursive Maximum Expansion (RME).
RME [9] is also similar to FME but the difference is it will always begin a new search for the highest UE-RB
every time a user has been allocated an RB and none of the adjacent RBs belong to it. This process is
repeated until all the RBs have been used or all the users have been served. If there are unused RBs, they are
allocated only if the contiguity constraint is satisfied. It also incorporates the management of the free RBs.
Table VII shows the allotment of RB’s. RB 2 having the highest value is assigned to UE 1. Then it checks on
the right and left to find any RBs that are of high value and belong to it. But since none of the RBs that are of
high value belong to it, it starts a new search. UE 1 can now no longer be assigned RBs until all the UE have
been assigned an RB. The next highest value is RB 4 but since UE 1 has already been served it cannot be
assigned to it. So instead it assigns it to UE 2 as RB 1 has the highest value and it hasn’t been served. Then
again it checks for the highest values on either side but since none belong to it starts the scan all over again to
find the highest value available. Due to this repeatedly scanning process it is called recursive. Lastly, any
RBs that are not used are assigned to UEs which satisfies the contiguity constraint.
TABLE VI. F IRST MAXIMUM E XPANSION
UE 1
UE 2
UE 3
RB 1
0.26
0.82
0.41
RB 2
1.65
0.50
0.39
RB3
0.10
0.30
0.47
RB 4
1.60
0.90
0.62
RB 5
0.85
0.63
0.89
RB 6
0.88
0.87
0.59
III. S INR BASED P OWER CONTROL
The SINR based power control method uses the knowledge of the SINReff, effective Signal-to- Interference
plus Noise ratio. SINReff is the SINR of each resource element in a RB. The reason for using this metric is for
the very fact that each resource element experiences different levels of SINR. This helps us to have a better
estimate of the channel conditions. Using a CQI table described in [10] where the SINR is divided in 15
different levels, the SINR obtained is then compared with the SINR given in the CQI table. Depending on
where the current SINR falls, the lower boundary of the SINR is assigned as the new SINR. The difference
between the new SINR and the old SINR is calculated and used a metric to reduce the power of the UE.
As the SINR is the ratio of the signal power and the noise plus interference, it is assumed that at a particular
instant, the SINR is directly proportional to the signal power or the transmitter power. So, reducing the SINR
126
5. translates to reducing the UE power as well.
TABLE VII. RECURSIVE MAXIMUM EXPANSION
RB 1
RB 2
RB3
RB 4
RB 5
RB 6
UE 1
0.26
1.65
0.10
1.60
0.85
0.88
UE 2
0.82
0.50
0.30
0.90
0.63
0.87
UE 3
0.41
0.39
0.47
0.62
0.89
0.59
IV. UE’S TRANSMITTING POWER:
The transmitting power of the UE is calculated by the following formulae
Pmin=min( Pnew, Pue) dBm
(1)
where,
Pmin= minimum transmitting power, dBm
Pnew= power obtained from the CQI table, dBm
Pue = power of UE without applying the power control method, dBm
Pue is given by,
Pue = Pmax – 10log10(M)
(2)
Where,
Pmax= 21 dBm
M= number of RBs allocated to a user
Pnew is formulated as follows,
Pnew= Pue - (SINRobt - SINRred)
(3)
where,
SINRobt= SINR generated from the channel
SINRred= SINR obtained from the CQI table
The difference obtained is considered unitless and hence is just a metric.
SINRobt =
(4)
ue / N
where,
N= 25, number of RBs
SINRue is the SINR of a user over an RB and C is the Shannon capacity given by
C=1/N
(5)
eff)
As mentioned earlier SINReff is the effective SINR per resource element per user and is
mathematically formulated as
SINReff = P*GUE*GBS
(6)
Ch/ n+I
where,
P : transmitting power of a UE over one resource element
GUE : antenna gain of the UE
GBS
n : thermal noise in the subcarrier
I : inter-cell interference per resource element
GCh : total channel gain= PL * SSHD
PL : pathloss between a UE and the BS
SSHD : log-normal shadowing
Table VIII shows an example of how the power reduction is carried. The steps can be viewed in the order of
the left column towards the right column.
Assume that the users UE 1, UE 2 and UE 3 were transmitting at Pmax. The SINR of each UE is obtained and
is subtracted from the SINR values obtained from the CQI table. The difference is then stored as a difference
metric and has no unit associated with it. The difference metric is then subtracted from each UE’s
transmitting power to obtain the new power which is lower than the previous transmitting powers of the UEs.
127
6. Algorithm
1. Let S be the SINR matrix of the UEs that have been allocated RBs.
2. Let P ue be the matrix of the initial UEs powers and SCQIL, SCQIU be the lower and upper bounds of the
CQI SINR levels respectively.
3. Let S_new be the matrix of the new SINRs obtained from the CQI table.
4. If SCQIL
i=1: number of UEs; j=1: number of RBs
CQIU
then, S_new(i,j) = SCQI L
5. For i=1: number of UEs
6. For j=1: number of RBs
7.
Diff(i,j) = S(i,j) - S_new(i,j)
8.
Pnew(i,j) = Pue(i,j) - Diff(i,j)
9.
Find P min(i,j) = min(Pue(i,j), Pmin(i,j))
10.
End
11.
End
TABLE VIII: POWER REDUCTION USING T HE SINR TO CQI M APPING
Current
SINR
(dB)
UE1
13.3099
New SINR
from the CQI
table
(dB)
11.5
Difference
Metric
Power of UE
(dBm),
P max
Reduced
power
(dBm)
1.8099
20.9691
19.1592
UE2
8.13943
7
1.1394
20.9691
19.8297
UE3
18.7021
17
1.7021
20.9691
19.2670
V. SYSTEM MODEL
A 7 cell hexagonal network shown in fig. 1 was considered for the simulations. The system parameters are
given in table IX.
The UEs, denoted by the red cross, are equally spaced at about 48 meters from each other. A total of 388
possible UEs position per sector is generated. The base stations, denoted by the green triangle, of the outer
cells, referred to as the interfering cells, are at a distance of 1732 meters from the central base station.
The UEs are transmitting at the Pmax i.e., 21 dBm. The inter cell interference in obtained by the following
formulae
I(k,i) = Pmax *GUE*GBS
(7)
Ch / PL * SSHD
where,
I(k,i) : ICI of the ith user in the kth cell, k=1-6
Pmax : transmitting power of a UE
GUE : antenna gain of the UE
GBS
n : thermal noise in the subcarrier
PL : pathloss between a UE and the BS
SSHD : log-normal shadowing
Four different scenarios were analyzed for the ICI.
Scenario 1:A user from each interfering (outer) cell was chosen. These users were placed exactly at the same
positions in each of the interfering cells.
Scenario 2: Just as scenario 1, one user from each interfering cells was chosen. But unlike scenario 1, these
users were randomly placed in each of the outer interfering cells.
Scenario 3: Here the users were placed as far as possible and away from the radiation coverage of the central
base station so that they generated less interference on the central cell.
Scenario 4: Lastly, the users were placed as close and in line of the radiation coverage on the central base
station thereby generating the maximum interference.
128
7. Scenarios 3 and 4 are the best and worst case of inter-cell interference of our system and serve as the
boundary for checking the validity of the ICIs of scenarios 1 and 2. Fig. 2 shows the cumulative distribution
function (CDF) of the inter-cell interference for the various scenarios. From the figure it can be clearly seen
that the ICI of scenario 1 and 2 fall between the ICI of scenario 3 and 4 which is what we desire. For the
simulation the ICI value of the randomly placed users i.e., scenario 2, is chosen given its practical reality.
TABLE IX: SYSTEM PARAMETERS
Parameter
Value
Network layout
Propagation scenario
Thermal noise, n
Base station antenna gain, GBS
UE antenna gain, GUE
System Bandwidth
Number of Resource Blocks, N
Maximum UE transmitting power
Traffic
Shadowing
Path loss model
7 cells, 3 sectors/cell
Macro 3 ( ISD 1.7 Km)
-160 dBm/Hz
17 dBi
7 dBi
5 MHz
25
21 dBm
Full buffer
Log-normal shadowing with =5 dB
Okumura-Hata Model
UE height
BS height
Number of users per simulation
1.5 meters
35 meters
10,20,40,60 and 100
The pathloss of the users was generated using Okumura-Hata’s model for a large city and is depicted in fig.
3. The pathloss is given as,
PL= A + B*log10(d)
(8)
Where,
A = 69.55 + 26.16*log10(fc) - 13.82*log10(hbs)) - ahm;
B = 44.9 - 6.55*log10(hbs);
ahm = 3.2*(log10(11.75*hue))2- 4.97, antenna height correction factor
d = distance between the users and the base station
hbs = height of BS, hue= height of UE
The effective SINR was obtained by using (6) and its CDF is shown in fig. 4. It can be inferred that the
system has a SINR range of about 40 dB.
Figure 1. 7 cell network
129
8. Figure 2. CDF of Inter-cell interference
The capacity of the system was calculated using Shanon’s capacity which is given by,
C=1/N
eff)
(9)
Using the obtained capacity C, the spectral efficiency was calculated using the CQI table shown in table X.
Fig. 5 shows the spectral efficiency and the Shannon’s capacity bound for the derived SINReff.
Figure 3. Pathloss generated using Okumura-Hata’s model
VI.PEFORMANCE ANALYSIS
A. RB Usage Ratio.
The RB usage ratio is the amount of RB that has been used per transmit time interval (TTI) to the total
available RB of the system in percentage.
It is given as follows.
RBusage= RBallc/N x 100 %
(10)
Where,
RBusage = RB usage ration in percentage
RBallc = RBs used by the allocation algorithm per TTI
N = 25, total number of RBs for the system per TTI
130
9. Figure 4. CDF of SINReff
Figure 5. Spectral efficiency with Shannon’s bound.
From fig. 6 it can be clearly seen that HLGA, FME and RME always uses all the RBs as all of them
incorporate the free RBs management scheme. On the other hand FDPS-largest-metric-value-RB-first shows
a steady growth in the RB usage as the number of UEs increases and achieves full usage of the RBs once the
number of UEs is more than the number of RBs.
The curve of FDPS Riding Peaks follows an exponential growth as the number of UEs increases whereas the
FPDS-RB-grouping has a better performance over FPDS Riding Peaks when the number of UE is 10 which
was anticipated and greater then 10 UEs it has a very poor graph.
FDPS-carrier-by-carrier has the worst performance as the UEs that have assigned RBs cannot be reassigned
new RB unless they satisfy the contiguity constraint. This is limiting the allocation of several RBs to a UE
and hence aggregates in the poor usage of RBs.
B. Overall Throughput Of The System
The overall throughput generated by each algorithm is analyzed and shown in fig. 7. The throughput of the
system is obtained by using MCS data rates specified in the CQI table, table X [10]. FDPS-carrier-by-carrier
and FPDS-RB-grouping are below the 50 Mbps mark in all the cases of different set of UEs and this can be
understood and justified from the very fact that they also had the lowest RB usage ratio. Note that the
throughput of FPDS-RB-grouping is better then FDPS Riding Peaks for 10 UEs but beyond that it is less then
FDPS Riding Peaks which is also related to the RB usage ratio. HLGA, FME and RME show a steady
131
10. increase in the throughput as the number of UEs increases. FDPS-largest-metric-value-RB-first shows the
best increase in throughput as it always chooses the highest SINR valued RB for a UE. It can be seen that it
even out performs FME which actually has a 100% RB usage ratio in all cases of set of UEs. This is for the
fact that FME does not always choose the highest SINR valued RB unlike FDPS-largest-metric-value-RBfirst.
Figure 6. RB usage ratio
Figure 7. Overall throughput of the system.
VII.RESULTS
From the performance analysis of the scheduling algorithms, it can be clearly deduced that the throughput is
directly proportional to the RB usage ratio. A special case has been observed where the throughput of FME is
less than FDPS-largest-metric-value-RB-first despite FMEs 100% RB usage ratio compared to 90% RB
usage ratio of FDPS-largest-metric-value-RB-first. The reason being FDPS-largest-metric-value-RB-first
always chooses only the highest SINR valued RB whereas FME does not necessarily do so. The proposed
SINR based power control method was applied to each of the algorithms. Though not shown, the throughput
of the system is not affected and remains the same even after the power control was applied.
The performances of each algorithm are summarized in the table XI.
The aim of this method was to reduce the transmitting power of the UEs as much as possible and in a way
avoid transmitting at the maximum power i,e., 21 dBm. Fig.8 and fig.9 show the before and after results. The
effects of power control are clearly visible for FDPS Riding Peaks. It shows that the transmitting power was
always at 21 dBm regardless of the number of UEs as at most only one RB is allocated to a UE. By applying
the power control algorithm it can be seen that the power per RB is around 19 dBm. It has been reduced by 2
132
11. dBm (46 mWatts). Similar trend in the reduction of the power per RB can be seen for the other algorithms as
well. Thus there is a significant amount of change in the power per RB by applying the power control.
TABLE X. C QI TABLE [10].
SINR Range (dB)
-7< SINR -5
-5< SINR
CQI
1
Modulation
QPSK
Code rate
0.0761
Bits per Resource element (Kbps)
0.1523
-3
2
QPSK
0.1172
0.2344
-3< SINR -1
3
QPSK
0.1884
0.3770
-1< SINR
4
QPSK
0.3008
0.6016
1< SINR
5
QPSK
0.4384
0.8770
3< SINR
6
QPSK
0.5879
1.1758
5< SINR
7
16QAM
0.3691
1.4766
7< SINR
8
16QAM
0.4785
1.9141
8.5< SINR
9
16QAM
0.6015
2.4063
10< SINR
10
64QAM
0.4550
2.7305
11.5< SINR
11
64QAM
0.5537
3.3223
13.5 < SINR
12
64QAM
0.6504
3.9023
15< SINR
13
64QAM
0.7539
4.5234
17< SINR
14
64QAM
0.8525
5.1152
SINR
15
64QAM
0.9258
5.5547
TABLE XI: PERFORMANCE TABLE
HLGA
FDPS-C-by-C
FDPS-LMF
FDPS-RP
FDPS-RBG
FME
RME
RB usage
(%)
100
43
90
79
46
100
100
Throughput
(Mbps)
69.7293
37.3265
67.0087
50.8961
40.3780
53.0164
77.6781
Power reduction per
UE (%)
24.2587
28.0282
24.2908
20.9174
27.2601
25.6464
24.1837
Figure 8. Power per RB before power control
133
12. Figure 9. Power per RB after power control
VIII. CONCLUSIONS AND FUTURE W ORKS
The proposed power control method with its simplicity has proven to be an effective method to reduce the
transmission power of the UEs in LTE uplink networks. The power of the UEs which were found to be as
high as 125 mWatts in the case of FDPS-riding-peaks and as low as 70 mWatts in the case of FME without
the power control was drastically reduced to 98.5 mWatts and to 48.19 mWatts respectively after the power
control was applied. The findings show that the power per UE/RB can be reduced by upto 28% and proves
that SINR based power control will help ease the battery consumption of the UE without decreasing the
throughput.
The throughput of the system was very good because of the use of the Best Effort Schedulers. HLGA, FDPSlargest-metric-value-RB-first and Recursive Maximum Expansion have shown better performances in both
the RB usage ratio and the throughput. Throughput of the system could reach upto 77 Mbps (RME) and RB
usage of upto 100% in cases of HLGE, FME and RME.
This work can be extended to networks that incorporate relays which should produce a further reduction of
the UEs power. Also a model of the UE power performance with the SINR based power control can be
designed to test the performance of the algorithm in real time.
REFERENCES
[1] Stefania Sesia, Issam Toufik And Matthew Baker, “LTE – The UMTS Long Term Evolution, From Theory To
Practice”, First Edition. Pgs. 8-10, John Wiley & Sons, Ltd. ISBN: 978-0-470-69716-0, 2009.
[2] Ronny Yongho Kim,Shantidev Mohanty, “Advanced Power Management Techniques In Next-Generation Wireless
Networks”, IEEE Communications Magazine,May 2010.
[3] Scott Fowler, “Study On Power Saving Based On Radio Frame In LTE Wireless Communication System Using
DRX”, SCPA 2011 And Saconas 2011.
[4] Mads Lauridsen, Anders Riis Jensen, And Preben Mogensen “Reducing LTE Uplink Transmission Energy By
Allocating Resources”, IEEE, 2011.
[5] Arne Simonsson And Anders Furuskär, “Uplink Power Control In LTE - Overview And Performance”, IEEE
Vehicular Technology Conference, 2008.
[6] Mohamed Salah, “Comparative Performance Study Of LTE Uplink Schedulers”, Thesis, Queen's University, 2011.
[7] M. Al-Rawi, R. Jantti, J. Torsner, And M. Sagfors, “Opportunistic Uplink Scheduling For 3G LTE Systems”, IEEE,
2008.
[8] Suk-Bok, B. Lee, L. Pefkianakis, A. Meyerson, S. Xu, And S. Lu, “Proportional Fair Frequency Domain Packet
Scheduling For 3GPP LTE Uplink,” IEEE, 2009.
[9] L. A. M. R. De Temino, G. Berardinelli, S. Frattasi, And P. E. Mogensen, “Channel-Aware Scheduling Algorithms
134
13. For SC-FDMA In LTE Uplink”, IEEE, 2008.
[10] Marcel Jar And Gerhard Fettwise, “Throughtput Maximization For LTE Uplink Via Resource Allocation”, IEEE,
2012.
[11] Hyung G. Myung, “Introduction To Single Carrier FDMA”, 15th European Signal Processing Conference
(EUSIPCO), 2007.
[12] 3GPP TS 36.101 V11.3.0, “User Equipment (UE) Radio Transmission And Reception”, Pg. 23, 2012.
135