This document proposes and evaluates a new radio access technology (RAT) selection algorithm called Network Controlled Cell Breathing (NCCB) for heterogeneous CDMA/TDMA networks handling multiple services. NCCB aims to increase capacity by controlling the effective cell radius of the CDMA network to reduce interference. Several RAT selection strategies are presented that combine NCCB with service-based policies. System-level simulations of voice and interactive traffic show NCCB can achieve significant throughput gains over traditional load balancing approaches by better managing interference patterns.
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...ijwmn
Hierarchical Genetic Algorithms (HGA) as a tool for search and optimizing methodology have now reached a mature stage. The minimum resource facility to carry user traffic, termed a channel unit (CU), is composed of a one time-slot and one code in the TD-CDMA/TDD system. The control of the number of CUs depends on the traffic load solves varied and asymmetrical traffic problems in the 3G system. In a cellular network, the call arrival rate, call duration and the communication overhead between the base stations and the control center are vague and uncertain, regardless of whether the criteria of concern are nonlinear, constrained, discrete or NP hard. In this paper, the HGA is used to tackle the neural network (NN) topology as well as the fuzzy logic controller for the dynamic CU allocation scheme in wireless cellular networks. Therefore, we propose a new efficient HGA CUs Allocation (HGACA) in cellular networks. It aims to efficiently satisfy the diverse quality-of-service (QoS) requirements of multimedia traffic. The results show our algorithm has a lower blocking rate, lower dropping rate, less update overhead, and shorter channel-acquisition delay than previous methods
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...IOSR Journals
Abstract: One of the drawback of multicarrier code division multiple access (MC CDMA) is the high peak to
average power ratio (PAPR). In this paper A novel scheme based on pulse shaping described for PAPR
reduction. Here three different pulse shaping filters (Raised cosine, Sinc power pulse and Nyqist pulse) are
described for PAPR reduction in MC CDMA system. The method is based on the proper selection of the pulses
for shaping the different sub carriers of the MC CDMA modulation scheme. It is shown by computer simulation
that the scheme achieves the significant improvement in PAPR reduction in MC CDMA system. Its
implementation complexity is much low in comparison to the previous published methods. Thus pulse shaping
technique can be used not only to shape the spectrum of the transmitted signal but also to reduce its PAPR. In
computer simulation It is observed that by using nyquist pulse near about 6.8 db PAPR is obtained. Which is
considerable PAPR reduction than a PAPR value of Original MC CDMA signal
Keywords: MC CDMA, PAPR, PULSE SHAPING, BPSK
Successful interference cancellation with Blind Equalization method for MC-CD...IJTET Journal
Abstract— The increasing demand for wireless services has created the need for cost effective transmission techniques that can exploit scarce spectral resources efficiently. Inorder to achieve the high data rates needed to meet the quality of service requirements of future multimedia applications, MC-CDMA has been considered as good air-interface candidate, especially for the downlink. However, the user capacity of MC-CDMA system is essentially limited by interference. This interference can be mitigated by employing precoding techniques, IB-DFE based receivers and other efficient interference suppression techniques. In the proposed system, combined Iterative IA precoding at the transmitter with IB-DFE based processing at the receiver is suggested for MC-CDMA systems. The matrices for this nonlinear space-frequency equalizer are obtained by minimizing the overall MSE of all data streams at each subcarrier.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...ijwmn
Hierarchical Genetic Algorithms (HGA) as a tool for search and optimizing methodology have now reached a mature stage. The minimum resource facility to carry user traffic, termed a channel unit (CU), is composed of a one time-slot and one code in the TD-CDMA/TDD system. The control of the number of CUs depends on the traffic load solves varied and asymmetrical traffic problems in the 3G system. In a cellular network, the call arrival rate, call duration and the communication overhead between the base stations and the control center are vague and uncertain, regardless of whether the criteria of concern are nonlinear, constrained, discrete or NP hard. In this paper, the HGA is used to tackle the neural network (NN) topology as well as the fuzzy logic controller for the dynamic CU allocation scheme in wireless cellular networks. Therefore, we propose a new efficient HGA CUs Allocation (HGACA) in cellular networks. It aims to efficiently satisfy the diverse quality-of-service (QoS) requirements of multimedia traffic. The results show our algorithm has a lower blocking rate, lower dropping rate, less update overhead, and shorter channel-acquisition delay than previous methods
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...IOSR Journals
Abstract: One of the drawback of multicarrier code division multiple access (MC CDMA) is the high peak to
average power ratio (PAPR). In this paper A novel scheme based on pulse shaping described for PAPR
reduction. Here three different pulse shaping filters (Raised cosine, Sinc power pulse and Nyqist pulse) are
described for PAPR reduction in MC CDMA system. The method is based on the proper selection of the pulses
for shaping the different sub carriers of the MC CDMA modulation scheme. It is shown by computer simulation
that the scheme achieves the significant improvement in PAPR reduction in MC CDMA system. Its
implementation complexity is much low in comparison to the previous published methods. Thus pulse shaping
technique can be used not only to shape the spectrum of the transmitted signal but also to reduce its PAPR. In
computer simulation It is observed that by using nyquist pulse near about 6.8 db PAPR is obtained. Which is
considerable PAPR reduction than a PAPR value of Original MC CDMA signal
Keywords: MC CDMA, PAPR, PULSE SHAPING, BPSK
Successful interference cancellation with Blind Equalization method for MC-CD...IJTET Journal
Abstract— The increasing demand for wireless services has created the need for cost effective transmission techniques that can exploit scarce spectral resources efficiently. Inorder to achieve the high data rates needed to meet the quality of service requirements of future multimedia applications, MC-CDMA has been considered as good air-interface candidate, especially for the downlink. However, the user capacity of MC-CDMA system is essentially limited by interference. This interference can be mitigated by employing precoding techniques, IB-DFE based receivers and other efficient interference suppression techniques. In the proposed system, combined Iterative IA precoding at the transmitter with IB-DFE based processing at the receiver is suggested for MC-CDMA systems. The matrices for this nonlinear space-frequency equalizer are obtained by minimizing the overall MSE of all data streams at each subcarrier.
Improving data transmission in the vanet using multi criteria decision making...ijfcstjournal
In vehicular ad
-
hoc networks the packets are sent using multi
-
hop methods and the receiving limit of a
message is gradually extended, but the exponential increment of the number of nodes re
-
broadcasting a
message results in broadcast storm problem in data
broadcasting in this case. Some characteristics like
high speed of nodes, rapid topological changes and repetitive discontinuities have made it difficult
to
design an efficient broadcasting protocol for these networks.
We have offered a novel fuzzy method
based on multi
-
criteria decision
-
making (MCDM) for prioritizing the
vehicles in selection of the most proper neighbor to broadcast data in this paper. With using this f
uzzy
method, the most proper vehicles participate in data broadcasting. The results of
simulation using NS show
that because of selecting the neighboring vehicles with high priority in data broadcasting, the spee
d of
sending the packs is increased and the network load is considerably decreased. This method also
considerably decreases broadca
sting traffic.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
What is the purpose of 5G flexible duplexing?
The purpose of 5G flexible duplexing is to allow the most flexible use of an operator's spectrum for time-frequency resources in a single framework. 5G Flexible duplexing should inherently support both paired and unpaired spectrum and be forward compatible with full-duplex 5G.
A preliminary evaluation of bandwidth allocation model dynamic switchingIJCNCJournal
Bandwidth Allocation Models (BAMs) are used in orde
r to define Bandwidth Constraints (BCs) in a per-
class basis for MPLS/DS-TE networks and effectively
define how network resources like bandwidth are
obtained and shared by applications. The BAMs propo
sed (MAM – Maximum Allocation Model, RDM –
Russian Dolls Model, G-RDM – Generic RDM and AllocT
C-Sharing) attempt to optimize the use of
bandwidth resources on a per-link basis with differ
ent allocation and resource sharing characteristics
. As
such, the adoption of distinct BAMs and/or changes
in network resource demands (network traffic profil
e)
may result in different network traffic allocation
and operational behavior for distinct BAMs. This pa
per
evaluates the resulting network characteristics (li
nk utilization, preemption and flows blocking) of u
sing
BAMs dynamically with different traffic scenarios.
In brief, it is investigated the dynamics of BAM
switching with distinct traffic scenarios. The pape
r presents initially the investigated BAMs in relat
ion to
their behavior and resource allocation characterist
ics. Then, distinct BAMs are compared using differe
nt
traffic scenarios in order to investigate the impac
t of a dynamic change of the BAM configured in the
network. Finally, the paper shows that the adoption
of a dynamic BAM allocation strategy may result in
benefits for network operation in terms of link uti
lization, preemption and flows blocking.
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...IJCSEA Journal
In this document, we look at various time domain channel estimation methods with this constraint of null carriers at spectrumborders.We showin detail howto gauge the importance of the “border effect” depending on the number of null carriers, which may vary from one system to another. Thereby we assess the limit of the technique discussed when the number of null carriers is large. Finally the DFT with the truncated singular value decomposition (SVD) technique is proposed to completely eliminate the impact of the null subcarriers whatever their number. A technique for the determination of the truncation threshold for any MIMO-OFDM system is also proposed.
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationIOSR Journals
Abstract: MC-CDMA (Multi Carrier Code Division Multiple Access) plays an important role in modern wireless communications. Modern communication required an efficient spectrum usage and capacity and throughput.MC-CDMA provided the solution of these problems. MIMO refers to links with multiple antennas at the transmitter and receiver side. CDMA systems combined with multiple antennas is a promising technique, beyond 3G and 4G wireless communications. MIMO provides spatial diversity, which mitigates the fading. The usage of multiple antennas can significantly improve the performance of wireless communication system. This work also derives simulation through MATLAB of average bit error rate verses bit energy to noise ratio of multicarrier code division multiple access over Rayleigh channel using QPSK and BPSK modulation additive white Gaussian noise. Keywords: AWGN,BER,MC-CDMA, QPSK Modulation, Rayleigh Channel.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
New Technique Combining the Tone Reservation Method with Clipping Technique t...IJECEIAES
Nonlinear distortions and impairments appear in multicarrier signal with high fluctu- ations when amplified by a Radio Frequency Power Amplifier (RF PA). This article is a contribution to improving the Tone Reservation (TR) method dedicated to reducing fluctuations in the Orthogonal Frequency Division Multiplexing (OFDM) modulation. This method exploits the null sub-carriers in communications standards in order to generate a correction signal used to reduce the Peak-to-Average Power Ratio (PAPR) with nevertheless limited performances due to the reduced number of these sub-carriers. For this purpose, our contribution is to combine the TR method with the Clipping (CL) method to improve the PAPR reduction without significantly impacting the quality of transmissions. We also show the gain provided by this strategy compared to the use of classical methods. Experiments using a simulated example on a complete WiMax 802:16e transmitter have been made in order to investigate the PAPR reduction performances on presence of the non-linear Power Amplifier model based on gain compression response and phase distortion.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
What is the purpose of 5G flexible duplexing?
The purpose of 5G flexible duplexing is to allow the most flexible use of an operator's spectrum for time-frequency resources in a single framework. 5G Flexible duplexing should inherently support both paired and unpaired spectrum and be forward compatible with full-duplex 5G.
A preliminary evaluation of bandwidth allocation model dynamic switchingIJCNCJournal
Bandwidth Allocation Models (BAMs) are used in orde
r to define Bandwidth Constraints (BCs) in a per-
class basis for MPLS/DS-TE networks and effectively
define how network resources like bandwidth are
obtained and shared by applications. The BAMs propo
sed (MAM – Maximum Allocation Model, RDM –
Russian Dolls Model, G-RDM – Generic RDM and AllocT
C-Sharing) attempt to optimize the use of
bandwidth resources on a per-link basis with differ
ent allocation and resource sharing characteristics
. As
such, the adoption of distinct BAMs and/or changes
in network resource demands (network traffic profil
e)
may result in different network traffic allocation
and operational behavior for distinct BAMs. This pa
per
evaluates the resulting network characteristics (li
nk utilization, preemption and flows blocking) of u
sing
BAMs dynamically with different traffic scenarios.
In brief, it is investigated the dynamics of BAM
switching with distinct traffic scenarios. The pape
r presents initially the investigated BAMs in relat
ion to
their behavior and resource allocation characterist
ics. Then, distinct BAMs are compared using differe
nt
traffic scenarios in order to investigate the impac
t of a dynamic change of the BAM configured in the
network. Finally, the paper shows that the adoption
of a dynamic BAM allocation strategy may result in
benefits for network operation in terms of link uti
lization, preemption and flows blocking.
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...IJCSEA Journal
In this document, we look at various time domain channel estimation methods with this constraint of null carriers at spectrumborders.We showin detail howto gauge the importance of the “border effect” depending on the number of null carriers, which may vary from one system to another. Thereby we assess the limit of the technique discussed when the number of null carriers is large. Finally the DFT with the truncated singular value decomposition (SVD) technique is proposed to completely eliminate the impact of the null subcarriers whatever their number. A technique for the determination of the truncation threshold for any MIMO-OFDM system is also proposed.
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationIOSR Journals
Abstract: MC-CDMA (Multi Carrier Code Division Multiple Access) plays an important role in modern wireless communications. Modern communication required an efficient spectrum usage and capacity and throughput.MC-CDMA provided the solution of these problems. MIMO refers to links with multiple antennas at the transmitter and receiver side. CDMA systems combined with multiple antennas is a promising technique, beyond 3G and 4G wireless communications. MIMO provides spatial diversity, which mitigates the fading. The usage of multiple antennas can significantly improve the performance of wireless communication system. This work also derives simulation through MATLAB of average bit error rate verses bit energy to noise ratio of multicarrier code division multiple access over Rayleigh channel using QPSK and BPSK modulation additive white Gaussian noise. Keywords: AWGN,BER,MC-CDMA, QPSK Modulation, Rayleigh Channel.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
New Technique Combining the Tone Reservation Method with Clipping Technique t...IJECEIAES
Nonlinear distortions and impairments appear in multicarrier signal with high fluctu- ations when amplified by a Radio Frequency Power Amplifier (RF PA). This article is a contribution to improving the Tone Reservation (TR) method dedicated to reducing fluctuations in the Orthogonal Frequency Division Multiplexing (OFDM) modulation. This method exploits the null sub-carriers in communications standards in order to generate a correction signal used to reduce the Peak-to-Average Power Ratio (PAPR) with nevertheless limited performances due to the reduced number of these sub-carriers. For this purpose, our contribution is to combine the TR method with the Clipping (CL) method to improve the PAPR reduction without significantly impacting the quality of transmissions. We also show the gain provided by this strategy compared to the use of classical methods. Experiments using a simulated example on a complete WiMax 802:16e transmitter have been made in order to investigate the PAPR reduction performances on presence of the non-linear Power Amplifier model based on gain compression response and phase distortion.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
There are many types of wireless channel impairments such as noise, path loss, shadowing, and fading and impairment Mitigation techniques should be adopted according to system requirements and channel environments.
This presentation is a part of the final product DVD ,, Every child like to play” made by all partner schools involved in project. Responsible of final product: Sredno Obshtoobrazovatelno Uchilishte "Vasil Levski", Haskovo, Bulgaria.
http://youtu.be/EDuyxY0D7Yw
A first for Tales is a MMA face off between 'Multiple Malt Ambassadors' from Diageo, Beam/Suntory and William Grant.
Six ambassadors, two from each company with one whisky per person that they have to win the audience over with. The Catch? They only have 5 minutes and they aren't allowed to say A.How old it is B.What distillery it's from C. One whisky per company must be under 10 years old, the other can be anything from the warehouses that they fancy sharing with the lucky attendees.
The moderators will ask questions to the group and the audience in a fun, interactive seminar that will educate as well as entertain as these warriors go head to head. In the end it's the audience who decides on the champion. In the words of the immortal Highlander, "There can be only one!"
The event will be masterfully moderated World-renowned whisky writer and expert Dave Broom.
The contenders are: Ewan Morgan (Diageo), Gregor Cattanach (Diageo), Johnnie Mundell (Beam/Suntory), Iain McCallum (Beam/Suntory), Mitch Bechard (Wm Grants) and Lorne Cousin (Wm Grants).
This presentation is a part of the final product DVD ,, Traditions and customs specific to winter holiday” made by 7th Primary School of Tripoli, Greece about Winter holidays. Responsible of final product: Sredno Obshtoobrazovatelno Uchilishte "Vasil Levski", Haskovo, Bulgaria.
http://youtu.be/AXV8UXlIFG4
http://youtu.be/FfYv8KrmWD8
As independent spirit brands continue to make waves in the global drinks industry, the number of people wanting a piece of the action has multiplied massively.
Entrepreneurs are finding there’s not shortage of people offering cash investment, or industry players offering sales, distribution and other services, for a slice of equity.
So when there are multiple offers on the table from both potential partners and investors, how do you choose which deal to take? Get to right and you’ll have the resources to help you go further, faster.
Get it wrong and you could end up making no one rich but the lawyers.
Delivered by a world class group of drinks entrepreneurs, this seminar will provide real insight and practical advice on the pros and cons of different financial and distribution deals, at different stages of your business, helping you navigate your way to the smartest money!
"Around Brazil in 40.000 Alembics" is a seminar conducted by Felipe Jannuzzi, a journalist and researcher at Mapa da Cachaça, a reference about cachaça recognized as one of the best cultural projects in Brazil by the Federal Ministry of Culture, and Jean Ponce, one of the most respected mixologists in Brazil with experience commanding the bar at "DOM", from the chef Alex Atala, elected as the seventh-best restaurant in the world. Felipe has been studying cachaça and traveling around Brazil discovering some of the best alembics in the country. While tasting some outstanding cachaças, he is also creating content (videos, articles, infographics, music) to show what this sugarcane spirit is all about. Although cachaça is the third most consumed spirit in the world, very few is known about the artisanal cachaças – a category represented by thousands of alembic producers spread all around Brazil. Jean Ponce has been studying cachaças and Brazilian ingredients for the past fifteen years and will bring to the seminar his philosophy and approach concerning the use of the spirit in mixology. This seminar will be an opportunity to share some of these stories mapped along the Brazilian alembics and a way to demonstrate all aspects involving cachaça, proposing a new look at its history, production techniques (industrial x artisanal), regional terroir, customs, flavors, cocktail recipes and its relations with the Brazilian culture, mixology and gastronomy.
This presentation is the final product DVD "Quiz” made by all partners in project. Students prepares the cards of questions and answers about partner countries. Responsible of final product: Kalvarijos Gimnazija, Kalvarija, Lithuania.
This presentation is the final product DVD "Quiz” made by all partners in project. Students prepares the cards of questions and answers about partner countries. Responsible of final product: Kalvarijos Gimnazija, Kalvarija, Lithuania.
This presentation is a part of the final product DVD ,, Traditions and customs specific to winter holiday” made by Escola Básica de Alvor, Portugal about Winter holidays. Responsible of final product: Sredno Obshtoobrazovatelno Uchilishte "Vasil Levski", Haskovo, Bulgaria.
http://youtu.be/a_8OuHi0NR8
The great Sourced Whiskey Scandal tells the story of independent bottlers or Non-Distiller Producers purchasing bulk whiskey from a former Seagram’s distillery and covertly bottling it for phony-backstory brands.
Although industry insiders have known about sourced whiskey for years and it has been reported in trade publications, consumers perceived many so-called NDP brands to be dishonest and reported them to the federal government for Tax & Trade Bureau (TTB) regulation violations, while class-action lawyers are suing them. Lumped in the middle of this controversy, dozens of honest sourced whiskey bottlers saw their business greatly impacted from the negative publicity despite never hiding the whiskey's origins.
In “The Audacity of Sourced Whiskey,” the seminar explores the business of sourced whiskey, detailing the storied history of Kentucky distilleries selling barrels to each other. The seminar will detail what distilleries sell sourced whiskey and give attendees an idea of where the whiskey is coming from, while explaining what and why distilleries require confidentiality in their sourced whiskey contracts.
While this seminar may be deemed controversial, it’s time people learn the truth about Sourced Whiskey. It’s not a dirty word, and independent bottlers should not be punished for practicing a 200-year-old American whiskey business model. Or should they?
Do you consider yourself a lover and connoisseur of aged spirits? Some say the best whisk(e)ys are the ones old enough to drink themselves. Whatever you fancy, may it be agave based or from a picturesque chateau in Cognac, the wood of the barrel defines much of the character. We will take a look at the obvious indicators like char level, dressing, and age. In addition we will analyze the many factors at play from the tannin and lactones reacting with the distillate to the speed of oxidation impacted by both pressure and temperature. The aging process is not just about time. Each barrel has a life, a lineage, and a story to tell. Some barrels have been shipped around the world and stored in the harshest of winters or enjoyed the tropical delights. If only barrels had passports to log their great journeys and guide us through their storied past and present!
In this session we will take your palate for a trip as we taste through expressions of neutral grain distillate that have been aged in all corners of the world. We invite you to compare and contrast to see how climate comes into play. Learn how to take this into your own bars and mimic the forces of nature on barrel-aged cocktails. Upon completion of this seminar you will have a keen understanding of exactly how coconut, chocolate, toffee or cherry notes develop!
Students supervised by their Biology, Geograpy, English and ICT teachers prepared a common photo album of flora, fauna and geographical features of the region. This product was integrated in Biology, Geograpy and English classes. Responsible: College Pierre et Marie Curie, Albert Cedex, France.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
JAVA 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementati...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
TCP Performance Measurement in GPRS Link Adaptation ProcessCSCJournals
This paper presents the results of measured TCP performance in the LA process during the deployment of GPRS CS1 and CS2 coding schemes and after the activation of two more coding schemes, CS3 and CS4. The measurements are done under various network scenarios based on users’ physical locations in one of Malaysia’s commercially deployed live GPRS networks. End-to-end FTP file transfer application is used for the assessment together with tracing at the GPRS air interface. The results show that TCP works well in the LA process and can adapt to the frequent switching between the coding schemes without any problem. The average throughput is increased by 23% for urban areas owing to the activation of higher coding schemes and aided by TCP tuning. It is also shown that bad radio condition is the main factor affecting throughput. TCP performance is seen to be constant in all scenarios and it can cope with GPRS mobility and bad radio condition, although at the expense of reduced throughput.
ABSTRACT : Performance enhancement of smart antennas versus their complexity for commercial wireless
applications. The goal of the study presented in this paper is to investigate the performance improvement
attainable using relatively simple smart antenna techniques when applied to the third-generation W-CDMA air
interface. Methods to achieve this goal include fixed multi beam architectures with different beam selection
algorithms (maximum power criterion, combined beams) or adaptive solutions driven by relatively simple direction
finding algorithms. After comparing these methods against each other for several representative scenarios, some
issues related to the sensitivity of these methods are also studied, (e.g., robustness to environment, mismatches
originating from implementation limitations, etc.). Results indicate that overall, conventional beam forming
seems to be the best choice in terms of balancing the performance and complexity requirements, in particular
when the problem with interfering high-bit-rate W-CDMA 3g users is considered.
LTE Cellular Networks Packet Scheduling Algorithms in Downlink and Uplink Tra...ijwmn
This survey paper provides a detailed explanation of Long Term Evolution (LTE) cellular network’s packet scheduling algorithms in both downlink and uplink directions. It starts by explaining the difference between Orthogonal Frequency Division Multiple Access (OFDMA) that is used in downlink transmission, and Single Carrier – Frequency Division Multiple Access (SC-FDMA) is used in uplink. Then, it explains the difference between the LTE scheduling process in the donwlink and uplink through explaining the interaction between users and the scheduler. Then, it explains the most commonly used downlink and uplink scheduling algorithms through analyzing their formulas, characteristics, most suitable conditions for them to work in, and the main differences among them. This explanation covers the Max Carrier-toInterference (C/I), Round Robin (RR), Proportional Fair (PF), Earliest Deadline First (EDF), Modified EDF-PF, Modified-Largest Weighted Delay First (M-LWDF), Exponential Proportional Fairness (EXPPF), Token Queues Mechanism, Packet Loss Ratio (PLR), Quality Guaranteed (QG), Opportunistic Packet Loss Fair (OPLF), Low Complexity (LC), LC-Delay, PF-Delay, Maximum Throughput (MT), First Maximum Expansion (FME), and Adaptive Resource Allocation Based Packet Scheduling (ARABPS). Lastly, it provides some concluding remarks.
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkEditor Jacotech
domains: none of them are suitable, alone, for the wide range of traffic services expected in ATM-based networks. Therefore, some integration of these basic schemes should be considered. In this paper, we propose a new traffic control algorithm, called the Bandwidth optimization Algorithm (BOA). BOA is a multi-level control algorithm that attempts to optimally manage network resources and perform traffic control among a wide range of traffic services in ATM-based networks. The basic objective of BOA is to meet the quality of service requirements for different traffic sources, while making the best possible use of network bandwidth. In addition. BOA attempts to minimize network congestion in a preventive way.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
Performance Analysis for Parallel MRA in Heterogeneous Wireless NetworksEditor IJCATR
This paper analysis a different methods to find optimal path for services and power allocation to heterogeneous wireless network. Under heterogeneous wireless networks, a user can send data through a single or multi RATs (Radio Access Technology) simultaneously. The objective of this paper is to choose the optimal path for the services and power allocation to that bandwidth (BW) distributed joint allocation algorithm using Newton and modified Newton are adopted and the total system capacity compared. The analysis is done in Matlab and simulation results are compared. The numerical result shows that compare to Newton method, modified Newton method maximize the total system capacity.
Pilot Decontamination over Time Frequency and Space Domains in Multi-Cell Ma...IJECEIAES
In this article, we show that Pilot contamination problem can be seen as a source separation problem using time, frequency, and space domains. Our method capitalizes on a nonunitary joint diagonalization of spatial quadratic time-frequency (STFD) signal representation to identify the desired and interfering users. We first compute the noise subspace from the STFD matrices selected appropriately. Secondly, we use the noise subspace obtained to estimate the Elevation (El) and the Azimuth (Az) angles for which the MUSIC cost function is maximized. Numerical simulations are provided to illustrate the effectiveness and the behavior of the proposed approach.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Cell breathing
1. Network Controlled Cell Breathing in Multi-service
heterogeneous CDMA/TDMA scenarios
J. Pérez-Romero, O. Sallent, R. Agustí,
Universitat Politècnica de Catalunya (UPC)
E-mail: [jorperez, sallent, ramon] @ tsc.upc.edu
Abstract.- This paper proposes a new Radio Access Technology
(RAT) selection algorithm for multi-service scenarios which
allows increasing the capacity of heterogeneous CDMA/TDMA
systems by controlling the effective cell radius of the CDMA-
based system (i.e. a network-controlled cell-breathing), so that the
interference level is reduced. The strategy is evaluated in a
scenario including voice and interactive traffic and combined with
service-based RAT selection strategies.
I. INTRODUCTION
The heterogeneous radio access networks (RANs) concept
proposes a flexible and open architecture for a large variety of
wireless access technologies, applications and services with
different QoS demands as well as different protocol stacks.
Wireless networks differ from each other by air interface
technology, cell-size, services, price, access, coverage and
ownership. The complementary characteristics offered by the
different radio access technologies (RATs) make possible to
exploit the trunking gain leading to a higher overall
performance than the aggregated performances of the stand-
alone networks. Clearly, this potential gain of Beyond 3G
(B3G) systems requires a proper management of the available
radio resources. Common Radio Resource Management
(CRRM) refers to the set of functions that are devoted to
ensure an efficient and coordinated use of the available radio
resources in heterogeneous networks scenarios [1]-[3]. They
should ensure that the operator’s goals in coverage and QoS are
met while providing as high as possible overall capacity (i.e.
the sum of the capacities achieved in every single RAN).
Within CRRM, the initial RAT selection, i.e. the allocation of
connections to specific RANs at session initiation, and the
vertical handover (VHO), i.e. the capability to switch on-going
connections from one RAN to another, are the key enablers to
properly manage the heterogeneous radio access network
scenario and become then key CRRM functions [4].
CRRM has been identified as an important issue by the 3GPP,
which defines some recommendations and architectures for
CRRM operation [1][2], as well as by the research community.
For example, the literature has covered the effects of load
balancing in inter-RAT handover procedures. In particular, in
[5], the effect of tuning the load-based handover (HO)
thresholds depending on the load of inter-system/inter-
layer/inter-frequency cells is studied. In [6], a force-based load
balancing approach is proposed for initial RAT selection and
vertical HO decision making. In turn, in [7] the authors
compare the load balancing principles with respect to service-
based CRRM policies. Similarly, Lincke discusses the CRRM
problem from a more general perspective in e.g. [8] and
references therein, comparing several substitution policies and
evaluating them by means of simulations. In [9] a framework
for defining initial RAT selection policies combining service-
based criteria and radio networks considerations is presented.
This paper focuses on a heterogeneous scenario where
interference-limited CDMA-based access systems (e.g. UMTS)
coexist with FDMA/TDMA-based access systems (e.g.
GSM/EDGE). The underlying idea of the CRRM approach
developed in this paper is to take advantage of the coverage
overlap that these systems may provide in a certain service area
in order to improve the overall interference pattern generated in
the scenario for the CDMA-based systems and, consequently,
to improve the capacity of the overall heterogeneous network.
This can be achieved by controlling the effective cell radius of
CDMA-based system (i.e. a controlled cell-breathing effect)
through appropriate initial RAT selection and vertical handover
approaches. This concept, denoted as Network-Controlled
Cell-Breathing (NCCB) was originally proposed by the authors
in [10] and [11], where it was evaluated in a scenario with a
single voice service, revealing that it achieves a significant
throughput gain with respect to a classical load balancing
approach. In turn, this paper focuses on the case when several
services are considered, in which the CRRM solutions should
also take into account that not all the existing RANs may have
the same abilities to handle all the services, resulting in
different perceived QoS. For example, in GSM/GPRS systems
interactive traffic is handled by means of shared channels while
in UMTS dedicated channels can be used instead, thus
allowing lower transmission delays. In this sense, this paper
advances state-of-the art developments in the CRRM field by
exploiting the concept of NCCB through CRRM strategies in
multi-service scenarios, proposing specific algorithms and
evaluating them with detailed system level simulations in order
to proof the concepts.
The rest of the paper is organised as follows. Section II
describes the Network Controlled Cell Breathing concept as the
basis for developing several RAT selection strategies, as
explained in Section III. Section IV describes the simulation
model and performance results are presented in section V.
Finally, conclusions are summarised in Section VI.
II. NETWORK CONTROLLED CELL BREATHING
The controlled cell-breathing strategy is illustrated in Fig. 1
for a situation where CDMA and FDMA/TDMA cells are co-
sited, although it could be also applicable in situations when no
co-siting exists. RT denotes the planned cell radius in
FDMA/TDMA and RC denotes the variable effective cell
radius in CDMA. Notice that, for a given service, the
FDMA/TDMA cells ensure the coverage in the whole area. In
2. turn, by an appropriate control of the effective cell radius RC in
CDMA cells (e.g. in the figure by changing from RC2 to RC1)
through CRRM strategies, the required transmitted power
levels and the inter-cell interference will be reduced, thus
improving the capacity for the considered service in the
CDMA RAT. Notice that, depending on the existing load
conditions as well as the robustness of the specific services to
interference, the CDMA radius could be eventually set to RT.
In practice, due to the shadowing effects, the cell radius is
controlled by setting the maximum propagation loss that can be
allowed for a given RAT. Then, users with low propagation
loss will be allocated to the CDMA cells and users with high
propagation loss will be allocated to the FDMA/TDMA cells.
RT
RC1
co-site cells
FDMA/TDMA coverage area
CDMA coverage area
RC2
Fig. 1 Network controlled cell-breathing
III. RAT SELECTION STRATEGIES
RAT selection strategies decide the adequate access network
that each user should be connected to. This decision is taken at
session initiation, this case denoted as Initial RAT selection
procedure, as well as during session lifetime, which can trigger
a Vertical Handover procedure in case the current RAT must
be changed. RAT selection strategies may respond to different
principles, like e.g. service-based policies (i.e. allocating the
RAT according to the service characteristics) or load balancing
principles (i.e. try to keep similar load levels in the different
RATs). In the following, several strategies combining the
Network Controlled Cell Breathing concept explained in the
previous section with service characteristics are presented for a
scenario with conversational (i.e. voice) and interactive (i.e.
www) services. The UMTS Terrestrial Radio Access Network
(UTRAN) and the GSM/EDGE Radio Access Network
(GERAN) are considered as examples of the CDMA and the
FDMA/TDMA RATs.
1) NCCB strategy: In this case, the CRRM strategy is based
only on the NCCB concept, without taking into account service
information, so that the same RAT selection condition is
applied to both voice and www users. Specifically, at session
initiation, the RAT selection decision is taken according to the
path loss measurements in the best UTRAN cell, provided by
the terminal in the establishment phase. The path loss is
computed by measuring the received downlink power from a
common control channel whose transmitted power is broadcast
by the network. Measurements are averaged in periods of T
seconds. In case that the resulting path loss PLUTRAN is above a
given threshold PLth, the selected RAT will be FDMA/TDMA
(i.e. GERAN), while if the path loss is below the threshold the
selected RAT will be CDMA (i.e. UTRAN). In case that there
is no capacity available for the new session in the selected
RAT (i.e. admission control is not passed), the other RAT will
be selected instead. Then, if no capacity is neither available in
the other RAT, the session will be blocked. The corresponding
vertical handover decision procedure is shown in Fig. 2. The
idea behind this procedure is to keep the high path loss users
connected to FDMA/TDMA and the low path loss users to
CDMA depending on how the propagation conditions vary
along the session lifetime. Nevertheless, and in order to avoid
undesired ping-pong effects leading to continuous RAT
changes for users with path loss close to the threshold PLth, an
hysteresis margin ∆ (dB) is introduced together with a number
of consecutive samples that each condition must be fulfilled
before the VHO decision is triggered. This number is Mup when
the condition is the path loss being above the threshold and
Mdown for the path loss below the threshold.
VHO PROCEDURE
PLUTRAN>PLth+∆
during Mup
consecutive samples
Y
N
User in UTRAN
User in UTRAN
Y
N
N
VHO to GERAN Do NOTHING
Y
PLUTRAN<PLth-∆
during Mdown
consecutive
samples
Y
VHO to UTRAN
N
Fig. 2 VHO with the NCCB strategy
VHO PROCEDURE
PLUTRAN>PLth+∆
during Mup
consecutive
samples
Y
N
User in UTRAN
User in UTRAN
Y
N
N
VHO to GERAN Do NOTHING
Y
PLUTRAN<PLth-∆
during Mdown
consecutive
samples
Y
VHO to UTRAN
N
Voice user
Y
N
Fig. 3 VHO with the VG_NCCB strategy
2) NCCBvoice strategy: In this case, the NCCB strategy is
applied only for voice users, while www users follow a
service-based policy and they are allocated by default in
UTRAN provided that there is enough capacity. Otherwise,
they are moved to GERAN and they will try to return to
UTRAN each time they need a horizontal handover.
3) VG (Voice GERAN) strategy: In this case, the RAT
selection is done according to the service type, so that voice
users are served through GERAN and www users through
UTRAN, provided that there is enough capacity available in
the selected RAT [9]. In case that there is not enough capacity
the other RAT is selected instead. In such a case, the user will
3. try to return to the preferred RAT each time a horizontal
handover is required.
4) VG_NCCB strategy: This case corresponds to the
combination between NCCB and VG policy, so that for low
path losses the VG policy is applied while for high path losses
users are allocated to GERAN regardless the service. The
corresponding flow diagram for the VHO condition is shown in
Fig. 3. Also the convenience of executing a VHO is always
checked when a horizontal handover is required. Notice that,
according to this strategy, and for moderate traffic loads, voice
traffic is mainly served through GERAN while www traffic is
shared between UTRAN and GERAN depending on path loss.
IV. SIMULATION MODEL
The considered approaches have been evaluated by means of
system level simulations in a scenario that considers 7
omnidirectional cells for GERAN and 7 for UTRAN. The cells
of both RANs are collocated. The cell radius is 1 km. In case of
GERAN, it is assumed that the 7 cells represent a cluster so
that all of them operate with different carrier frequencies. The
main parameters of the User Equipment (UE) and the Base
Station (BS) are summarised in Table I. It is assumed that all
terminals have multi-mode capabilities, i.e. they can be
connected either to UTRAN or to GERAN. The urban
macrocell propagation model in [12] is considered for both
systems, corresponding to Lp(dB)=128.1+37.6log(d(km)) with
an additional shadowing with standard deviation 10 dB. The
mobility model in [13] is considered with speed 3 km/h.
Voice calls are generated according to a Poisson process with
an average call rate of 10 calls/h/user and exponentially
distributed call duration with an average of 180 s. In UTRAN,
the Radio Access Bearer (RAB) for voice users is the 12.2 kb/s
speech defined in [14]. In turn, in GERAN, voice users are
allocated to a TCH-FS (traffic channel full-rate speech), i.e.
one time slot in each frame. Interactive users follow the www
browsing model given in [13], with 5 pages per session, an
average reading time between pages of 30s, an average of 25
packets per page, and interarrival packet time 0.125s for the
uplink and 0.0228s for the downlink. The average packet size
is 366 bytes. A session rate of 24 sessions/h/user is assumed.
WWW browsing service is provided in UTRAN by means of
dedicated channels (DCH) making use of the transport channel
type switching procedure. The considered RAB assumes a
maximum bit rate of 64 kb/s in the uplink and 128 kb/s in the
downlink [14]. In turn, in GERAN, the www service is
provided through a PDCH (Packet Data Channel) with a round
robin scheduling algorithm to allocate transmissions to users
sharing the same time slot. On the other hand, a link adaptation
mechanism operating in periods of 1s is used to select, for each
user, the highest modulation and coding scheme (MCS) that
ensures the specific sensitivity requirements. The highest
modulation scheme considered in this paper is MCS-7.
A summary of the main RRM parameters in UTRAN and
GERAN is given in Table II. With respect to the admission
control procedure in UTRAN, three conditions are checked [1],
namely the uplink load factor after user acceptance should be
below the threshold ηmax, the downlink transmitted power
below Pmax and there must be code sequences available. With
respect to GERAN, voice users are accepted provided that
there are available time slots, while interactive users are always
accepted at session initiation in idle state. Voice users have
precedence over www users, so that slots occupied by www
users are allocated to incoming voice users when there are not
other free slots. All slots are reversible except the slot 0 of the
carrier transmitting the broadcast channel.
TABLE I UTRAN BS AND UE PARAMETERS
BS parameters UTRAN GERAN
Maximum transmitted power 43 dBm 43 dBm
Thermal noise -104 dBm -117 dBm
Common Control Channels Power 33 dBm 43 dBm
Maximum DL power per user 41 dBm N/A
Number of carriers 1 3
UE parameters UTRAN GERAN
Maximum transmitted power 21 dBm 33 dBm
Minimum transmitted power -44 dBm 0 dBm
Thermal noise -100 dBm -113 dBm
DL Orthogonality factor 0.4 N/A
Multislot class N/A 2 UL, 3 DL,
4 UL+DL
TABLE II RRM PARAMETERS
UTRAN
UL admission threshold (ηmax) 1.0
DL admission threshold (Pmax) 42 dBm
Active Set size 1
Replacement hystheresis 3 dB
Time to trigger handover 0.64 s
BLER target voice 1%
BLER target interactive 10%
Dropping condition 1 dB below target during 20 s
GERAN
Maximum number of TBFs per slot UL: 8, DL:32
Minimum power to trigger handover -100 dBm
Samples to trigger handover 3
Dropping condition 5 dB below sensitivity during 20 s
NCCB ALGORITHM PARAMETERS
Measurement interval (T) 1s
Hystheresis margin (∆) 1 dB
Mup 3
Mdown 3
V. RESULTS
V.A. Performance comparison
This section analyses the performance achieved by the different
strategies under different situations regarding load and traffic
mix. Fig. 4 plots the corresponding load in UTRAN and
GERAN (i.e. the uplink cell load factor in UTRAN and the
number of occupied time slots with respect to the total number
of time slots in GERAN) as a function of the number of www
users, respectively, for a situation with 600 voice users in the
scenario and for the different strategies. PLth=120 dB is
considered in NCCB. Clearly NCCB and NCCBvoice achieve
a better load balancing among the two RATs, so that there is
more room in GERAN to accommodate www users and
therefore their delay will not increase so much (see the packet
delay in Fig. 5). In turn, with the service-based strategies VG
and VG_NCCB, GERAN is overloaded. Notice also that in all
the cases, the highest load factor in UTRAN occurs with
NCCBvoice because it is the strategy with the largest number
of voice and www users in UTRAN (i.e. all voice users with
path loss below PLth and all the www users will mainly be
4. allocated in UTRAN).
0.4
0.5
0.6
0.7
0.8
0.9
1
200 300 400 500 600 700 800
www users
ULLoad
UTRAN (NCCBvoice) UTRAN (NCCB) UTRAN (VG_NCCB) UTRAN (VG)
GERAN (NCCBvoice) GERAN (NCCB) GERAN (VG_NCCB) GERAN (VG)
Fig. 4 Load in UTRAN and GERAN with the different strategies
600 voice
0
1
2
3
4
5
6
7
8
9
10
200 300 400 500 600 700 800
www users
ULDelaywww(s)
NCCBvoice
NCCB
VG_NCCB
VG
Fig. 5 UL average packet delay for www users
The results in terms of www packet delay are shown in Fig. 5.
For the VG_NCCB strategy the average delay reaches very
high values. The reason is that, with this strategy, GERAN is
completely overloaded because it contains the voice users
(according to VG policy) as well as the www users with path
loss above PLth. As a result, there are few slots available for
www users so they will experience very few opportunities to
transmit their packets, thus increasing the delay. Among the
rest of policies, the pure service-based policy VG achieves the
lowest delay because in this case www users are mainly served
through UTRAN. In turn, the performance with NCCB is worst
because of the www users that are served through GERAN,
which experience a higher delay. Finally, NCCBvoice achieves
a delay performance closer to VG because www users are
mainly served through UTRAN.
Fig. 6 and Fig. 7 plot the Block Error Rate (BLER) for voice
users in UTRAN and GERAN, respectively, as a function of
the number of www users for the case with 600 voice users in
the scenario. While the differences in GERAN are small, the
worst performance in UTRAN is achieved with the VG policy,
which suffers a high BLER degradation for large path losses.
Some BLER reduction is achieved with the VG_NCCB
strategy, which reduces the load factor in UTRAN (see Fig. 4)
by allocating high path loss www users to GERAN. In turn, the
NCCB and NCCBvoice strategies achieve the best
performance thanks to allocating the high path loss users in
GERAN. In this case, a slightly worst behaviour is observed
with NCCBvoice because of the larger load factor in UTRAN.
600 voice
0
0.5
1
1.5
2
2.5
200 300 400 500 600 700 800
www users
ULBLERvoiceUTRAN(%)
NCCBvoice
NCCB
VG_NCCB
VG
Fig. 6 UL BLER in UTRAN for the 600 voice users case
600 voice
0
0.2
0.4
0.6
0.8
1
1.2
1.4
200 300 400 500 600 700 800
www users
ULBLERvoiceGERAN(%)
NCCBvoice
NCCB
VG_NCCB
VG
Fig. 7 UL BLER in GERAN for the 600 voice users case
V.B. Setting of the threshold PLth
The previous results have shown that from the delay point of
view the best performance is achieved by the pure service
policy VG, followed by NCCBvoice, while from the point of
view of BLER, the best performance is achieved by NCCB and
NCCBvoice, and the latter performs better in terms of delay.
Consequently, NCCBvoice appears to have the best behaviour
among the considered strategies. Taking this into account, in
the following the appropriate setting of the path loss threshold
PLth in this strategy is analysed. To this end, some simulations
have been performed by considering different values of PLth
according to the path loss distribution for several traffic mixes.
They are PLth=110 dB (20-th percentile), PLth=115 dB (40-th
percentile), PLth=120 dB (60-th percentile) and PLth=125 dB
(80-th percentile). Fig. 8 and Fig. 9 plot the average www
delay for the different values of PLth and for two voice loads,
namely 400 and 800 users, respectively. Notice that, from the
point of view of www users, it is better to have reduced values
of PLth because the NCCB policy applies only to voice users
while www users are allocated in UTRAN. As a result,
increasing the number of voice users in UTRAN (i.e. by
increasing PLth) turns into a higher load factor that degrades
the performance of www delay. On the contrary, from the point
of voice users, as discussed in [10], the appropriate setting is to
select a PLth value that balances the load among RATs.
Fig. 10 and Fig. 11 plot the total aggregated throughput for the
considered load levels. From the observation of this figure and
the delay performances, it can be concluded that the setting of
the PLth threshold depends on the existing traffic mix in the
scenario. Particularly, the following cases can be distinguished:
- For moderate loads of voice and www (e.g. 400 voice and
5. 200 www) there is not a high sensitivity to PLth.
- For moderate voice load and high www load (e.g. 400 voice
and 1000 www) the best setting would be around PLth=110
dB, mainly because of the lowest delay achieved by www
users, although the differences with PLth=115 dB are small.
- For high voice load and moderate www load (e.g. 800 voice
and 200 www) the best performance is achieved with
PLth=120 dB, like in the case with only voice users [10]. This
value achieves a good trade-off between balancing the load
among the two RATs and at the same time distributing users
according to the path loss.
- For high loads of voice and www users (e.g. 800 voice and
600 www) the best performance is achieved by PLth=115 dB,
which provides a good trade-off between balancing the load
among the RATs while keeping a low delay for www users.
400 voice
0
0.2
0.4
0.6
0.8
1
1.2
1.4
200 300 400 500 600 700 800 900 1000
www users
ULDelaywww(s)
PLth=110 dB
PLth=115 dB
PLth=120 dB
PLth=125 dB
Fig. 8 UL www packet delay for different values of PLth with 400 voice users
800 voice
0
5
10
15
20
25
30
35
40
200 250 300 350 400 450 500 550 600
www users
ULDelaywww(s)
PLth=110 dB
PLth=115 dB
PLth=120 dB
PLth=125 dB
Fig. 9 UL www packet delay for different values of PLth with 800 voice users
VI. CONCLUSIONS
This paper has proposed a CRRM strategy based on controlling
the effective cell radius of CDMA cells in heterogeneous
scenarios with CDMA and TDMA/FDMA-based RATs, so that
the CDMA interference can be reduced and the total capacity
increased. This strategy has been analysed and compared
against other possibilities including service-based concepts in a
scenario with www and voice users. It has been observed that
the best performance can be achieved when applying the
proposed NCCB strategy to voice users while trying to allocate
www users in UTRAN. Also the setting of the parameter PLth
depending on the specific traffic mix has been discussed.
ACKNOWLEDGMENTS
This work has been performed in the framework of the IST
AROMA project, which is partly funded by the European
Community and by the Spanish Research Council (CICYT)
under COSMOS grant TEC2004-00518 and TEC2004-0053.
400 voice
2
2.2
2.4
2.6
2.8
3
3.2
3.4
3.6
3.8
4
200 300 400 500 600 700 800 900 1000
www users
ULThroughput(Mb/s)
PLth=110 dB
PLth=115 dB
PLth=120 dB
PLth=125 dB
Fig. 10 UL throughput for different values of PLth for 400 voice users
800 voice
3
3.2
3.4
3.6
3.8
4
4.2
4.4
4.6
4.8
5
200 250 300 350 400 450 500 550 600
www users
ULThroughput(Mb/s)
PLth=110 dB
PLth=115 dB
PLth=120 dB
PLth=125 dB
Fig. 11 UL throughput for different values of PLth for 800 voice users
REFERENCES
[1] 3GPP TR 25.881 v5.0.0 “Improvement of RRM across RNS and
RNS/BSS”
[2] 3GPP TR 25.891 v0.3.0 “Improvement of RRM across RNS and
RNS/BSS (Post Rel-5) (Release 6)”
[3] J. Pérez-Romero, O.Sallent, R.Agustí, M. Díaz-Guerra, Radio
Resource Management Strategies in UMTS,John Wiley & Sons, 2005.
[4] J. Pérez-Romero et al.“Common Radio Resource Management:
Functional Models and Implementation Requirements”, 16th PIMRC
Conference, Berlin, 2005.
[5] A. Tölli, P. Hakalin, “Adaptive load balancing between multiple
cell layers”, IEEE VTC Fall, Vol. 3, Sept. 2002, pp.1691 – 1695.
[6] A. Pillekeit, F. Derakhshan, E. Jugl, A. Mitschele-Thiel, “Force-
based load balancing in co-located UMTS/GSM networks”, VTC
2004-Fall. 2004 IEEE 60th
Vol. 6, 26-29 Sept. 2004 pp. 4402 – 4406.
[7] X. Gelabert, J. Pérez-Romero, O. Sallent, R. Agustí, “On the
suitability of Load Balancing Principles in Heterogeneous Wireless
Access Networks”, Wireless Personal Multimedia Communications
Symposium (WPMC’05), Aalborg, Denmark, September, 2005.
[8] S. Lincke-Salecker, “The Benefits of Load Sharing when
Dimensioning Networks”, Proceedings of the 37th
Annual Simulation
Symposium (ANSS’04), April, 2004.
[9] J. Pérez-Romero, O. Sallent, R. Agustí “Policy-based Initial RAT
Selection algorithms in Heterogeneous Networks”, 7th MWCN
Conference, Marrakesh, 2005.
[10] J. Pérez-Romero, O.Sallent, R.Agustí, L.Wang, H.Aghvami “A
Novel Algorithm for Radio Access Technology Selection in
Heterogeneous B3G networks”, VTC 2006-Spring, May, 2006.
[11] J. Pérez-Romero, O.Sallent, R.Agustí, N.García, L.Wang,
H.Aghvami “Network-Controlled Cell-Breathing for Capacity
Improvement in Heterogeneous CDMA/TDMA Scenarios”, WCNC
Conference, April, 2006.
[12] 3GPP TR 25.942 “Radio Frequency (RF) system scenarios”
[13] UMTS 30.03 v3.2.0 TR 101 112 “Selection procedures for the
choice of radio transmission technologies of the UMTS”, ETSI, April,
1998.
[14] 3GPP TS 34.108 “Common Test Environments for User
Equipment (UE); conformance testing”