Long-Term Advancement Progressed (LTE-ADV) is the advancement of the long-term evolution,
which created via 3GPP. LTE-ADV aims to offer a transmission bandwidth of (100) MHz by using Carrier
Aggregation (CA) to aggregate LTE-ADV carriers. To increase the data capacity of the system and
resource allocation converts a very good tool. LTE-Advanced multiple Component Carriers (CCs) becomes
a difficult optimization problem. In the paper proposes a new scheduling algorithm and compares with a
different scheduling traditional algorithms that are proportional fair and round robin in the CA, in order to
find the best scheduler that provides high-quality throughput and improves fairness. It also evaluates
mapping model types are Mutual Information Effective SINR Mapping (MIESM) and Exponential Effective
SINR Mapping (EESM). The results show that the throughput in the proposed algorithm with MIESM
outperforms from others mapping and scheduling.
The 3GPP Long Term Evolution Advanced (LTE-A) standard specifies a set of pioneer features such as relay nodes and carrier aggregation. At the same time, the Software Defined Networks (SDN) have become an emerging technology which provides centralized control and programmability to modern networks. In the current communication environment, cloud computing could combine the advantages of both technologies in order to create a novel cloud assisted Software Defined LTEA architecture with relay nodes. Moreover, due to the increased requirements of modern services, the optimal resource allocation is a necessity. In such a context, this paper describes a QoS aware cross carrier scheduler for downlink flows, aiming at the optimization of system resources allocation. The proposed scheduler is evaluated against the PF, MLWDF, EXP/PF, EXP RULE, LOG RULE, FLS and FLSA schedulers in a cloud assisted Software Defined LTE-A topology with relay nodes. Simulation results show that the proposed scheduler improves the real time services performance while at the same time maintains an acceptable performance for best effort flows.
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
The 3GPP Long Term Evolution Advanced (LTE-A) standard specifies a set of pioneer features such as relay nodes and carrier aggregation. At the same time, the Software Defined Networks (SDN) have become an emerging technology which provides centralized control and programmability to modern networks. In the current communication environment, cloud computing could combine the advantages of both technologies in order to create a novel cloud assisted Software Defined LTEA architecture with relay nodes. Moreover, due to the increased requirements of modern services, the optimal resource allocation is a necessity. In such a context, this paper describes a QoS aware cross carrier scheduler for downlink flows, aiming at the optimization of system resources allocation. The proposed scheduler is evaluated against the PF, MLWDF, EXP/PF, EXP RULE, LOG RULE, FLS and FLSA schedulers in a cloud assisted Software Defined LTE-A topology with relay nodes. Simulation results show that the proposed scheduler improves the real time services performance while at the same time maintains an acceptable performance for best effort flows.
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
IEEE 8021.11 is the standard defined for WLAN(Wireless Local Area Network). It first
came into the picture in 1997 which offer a speed of 2Mbit/s. After that we have different
versions, 802.11b having speed 11Mbit/s, 802.11a/g having 54 Mbit/s, 802.11n having 600
Mbit/s, and even above Gbit/s rates in the latest 802.11ac. These speeds can be achieved
by means of different modulation and coding scheme, wider channel and adaptation of
Multiple Input Multiple Output (MIMO) technologies[7]. The 802.11ax will provide outstanding average throughput in the dense environment. Many clients connect with the
Access Point (AP) simultaneously using the Orthogonal frequency-division multiple access
(OFDMA) where AP divides the entire frequency band into multiple subsets of orthogonal
sub carrier called as Resource Unit (RU),These RUs are assigned to different user to transit
in parallel which make 802.11ax different from all other versions of 802.11 so we need some
scheduling and resource allocation mechanism to utilize the features of 802.11ax. Before
going to scheduling and resource allocation, let us discuss some features of 802.11ax
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
LTE Network is the common mobile technology these days around the world and all service providers seek to how improve the network capacity and deliver the best performance in terms of delivered data rates and coverage area. LTE network consists of many protocols that work together to establish network connectivity, these protocols add variable headers that contains many control information that the network needs to operate. At the same time these headers decrease the effective capacity of the network, so there is a need to optimize the overhead size that used in various channels. The study will illustrate the different overheads that effect on the network capacity and investigate the effect of different values on achieving the best network capacity.
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and time dimension. So several scheduling algorithms need to be analyzed for femtocells networks. In this paper we introduce a performance analysis of three distinct scheduling algorithms of mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Survey on scheduling and radio resources allocation in lteijngnjournal
This paper focuses on an essential task of the enhanced NodeB eNodeB element in LTE architecture, the
Radio Resource Manager RRM, which aims to accept or reject requests for connection to the network
based on some constraints and ensuring optimal distribution of radio resources between Users Equipments
UEs. Its main functionalities include Admission Control AC and Packet Scheduling PS.
This paper will center mainly on the PS part of the RRM task, which performs the radio resource
allocation in both uplink and downlink directions. Several approaches and algorithms have been proposed
in the literature to address this need (allocate resources efficiently), the diversity and multitude of
algorithms is related to the factors considered for the optimal management of radio resource, specifically,
the traffic type and the QoS (Quality of Service) requested by the UE.
In this article, an art’s state of the radio resource allocation strategies and a detailed study of several
scheduling algorithms proposed for LTE (uplink and downlink) are made. Therefore, we offer our
evaluation and criticism.
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...IJECEIAES
Nowadays, with the advent of smartphones, most of people started to make voice and video conference calls continuously even in a high mobility scenario, the bandwidth requirements have increased considerably, which can cause network congestion phenomena. To avoid network congestion problems and to support high mobility scenario, 3GPP has developed a new cellular standard based packet switching, termed LTE (Long Term Evolution). The purpose of this paper is to evaluate the performance of the new proposed algorithm, named Exponential Modified Largest Weighted Delay First „EXP-MLWDF‟, for high mobility scenario and with the presence of a large number of active users, in comparison with the wellknown algorithms such as a proportional fair algorithm (PF), Exponential Proportional Fairness (EXP/PF), Logarithm Rule (LOG-Rule), Exponential Rule (EXP-Rule) and Modified Largest Weighted Delay First (MLWDF). The performance evaluation is conducted in terms of system throughput, delay and PLR. Finally, it will be concluded that the proposed scheduler satisfies the quality of service (QoS) requirements of the real-time traffic in terms of packet loss ratio (PLR), average throughput and packet delay. Because of the traffic evolution, some key issues related to scheduling strategies that will be considered in the future requirements are discussed in this article.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
IEEE 8021.11 is the standard defined for WLAN(Wireless Local Area Network). It first
came into the picture in 1997 which offer a speed of 2Mbit/s. After that we have different
versions, 802.11b having speed 11Mbit/s, 802.11a/g having 54 Mbit/s, 802.11n having 600
Mbit/s, and even above Gbit/s rates in the latest 802.11ac. These speeds can be achieved
by means of different modulation and coding scheme, wider channel and adaptation of
Multiple Input Multiple Output (MIMO) technologies[7]. The 802.11ax will provide outstanding average throughput in the dense environment. Many clients connect with the
Access Point (AP) simultaneously using the Orthogonal frequency-division multiple access
(OFDMA) where AP divides the entire frequency band into multiple subsets of orthogonal
sub carrier called as Resource Unit (RU),These RUs are assigned to different user to transit
in parallel which make 802.11ax different from all other versions of 802.11 so we need some
scheduling and resource allocation mechanism to utilize the features of 802.11ax. Before
going to scheduling and resource allocation, let us discuss some features of 802.11ax
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
LTE Network is the common mobile technology these days around the world and all service providers seek to how improve the network capacity and deliver the best performance in terms of delivered data rates and coverage area. LTE network consists of many protocols that work together to establish network connectivity, these protocols add variable headers that contains many control information that the network needs to operate. At the same time these headers decrease the effective capacity of the network, so there is a need to optimize the overhead size that used in various channels. The study will illustrate the different overheads that effect on the network capacity and investigate the effect of different values on achieving the best network capacity.
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and time dimension. So several scheduling algorithms need to be analyzed for femtocells networks. In this paper we introduce a performance analysis of three distinct scheduling algorithms of mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Survey on scheduling and radio resources allocation in lteijngnjournal
This paper focuses on an essential task of the enhanced NodeB eNodeB element in LTE architecture, the
Radio Resource Manager RRM, which aims to accept or reject requests for connection to the network
based on some constraints and ensuring optimal distribution of radio resources between Users Equipments
UEs. Its main functionalities include Admission Control AC and Packet Scheduling PS.
This paper will center mainly on the PS part of the RRM task, which performs the radio resource
allocation in both uplink and downlink directions. Several approaches and algorithms have been proposed
in the literature to address this need (allocate resources efficiently), the diversity and multitude of
algorithms is related to the factors considered for the optimal management of radio resource, specifically,
the traffic type and the QoS (Quality of Service) requested by the UE.
In this article, an art’s state of the radio resource allocation strategies and a detailed study of several
scheduling algorithms proposed for LTE (uplink and downlink) are made. Therefore, we offer our
evaluation and criticism.
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...IJECEIAES
Nowadays, with the advent of smartphones, most of people started to make voice and video conference calls continuously even in a high mobility scenario, the bandwidth requirements have increased considerably, which can cause network congestion phenomena. To avoid network congestion problems and to support high mobility scenario, 3GPP has developed a new cellular standard based packet switching, termed LTE (Long Term Evolution). The purpose of this paper is to evaluate the performance of the new proposed algorithm, named Exponential Modified Largest Weighted Delay First „EXP-MLWDF‟, for high mobility scenario and with the presence of a large number of active users, in comparison with the wellknown algorithms such as a proportional fair algorithm (PF), Exponential Proportional Fairness (EXP/PF), Logarithm Rule (LOG-Rule), Exponential Rule (EXP-Rule) and Modified Largest Weighted Delay First (MLWDF). The performance evaluation is conducted in terms of system throughput, delay and PLR. Finally, it will be concluded that the proposed scheduler satisfies the quality of service (QoS) requirements of the real-time traffic in terms of packet loss ratio (PLR), average throughput and packet delay. Because of the traffic evolution, some key issues related to scheduling strategies that will be considered in the future requirements are discussed in this article.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
MECC scheduling algorithm in vehicular environment for uplink transmission in...IJECEIAES
Single Carrier Frequency Division Multiple Access (SC-FDMA) is chosen because of the lower peak-to-average power ratio (PAPR) value in uplink transmission. However, the contiguity constraint is one of the major constraint presents in uplink packet scheduling, where all RBs allocated to a single UE must be contiguous in the frequency-domain within each time slot to maintain its single carrier. This paper proposed an uplink-scheduling algorithm namely the Maximum Expansion with Contiguity Constraints (MECC) algorithm, which supports both the RT and NRT services. The MECC algorithm is deployed in two stages. In the first stage, the RBs are allocated fairly among the UEs. The second stage allocates the RBs with the highest metric value and expands the allocation on both sides of the matrix, M with respect to the contiguity constraint. The performance of the MECC algorithm was observed in terms of throughput, fairness, delay, and Packet Loss Ratio (PLR) for VoIP, video and best effort flows. The MECC scheduling algorithm is compared to other algorithms namely the Round Robin (RR), Channel-Dependent First Maximum Expansion (CD-FME), and Proportional Fairness First Maximum Expansion (PF-FME). From here, it can be concluded that the MECC algorithm shows the best results among other algorithms by delivering the highest throughput which is up to 81.29% and 90.04% than CD-FME and RR scheduler for RT and NRT traffic respectively, having low PLR and delay which is up to 93.92% and 56.22% of improvement than CD-FME for the RT traffic flow. The MECC also has a satisfactory level of fairness for the cell-edge users in a vehicular environment of LTE network.
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
RS Codes for Downlink LTE System over LTE-MIMO ChannelTELKOMNIKA JOURNAL
Nowdays, different applications require a modern generation of mobile communication systems;
long term evolution (LTE) is a candidate to achieve this purpose. One important challenge in wireless
communications, including LTE systems, is the suitable techniques of controlling errors that degrade
system performance in transmission systems over multipath fading channels. Different forward Error
correction (FEC) techniqes are required to improve the robustness of transmission channels. In this paper,
Reed-Solomon (RS) codes were used with a downlink LTE system over a LTE-MIMO channel. This
research contributes by combining RS codes that have low decoding complexity (by using hard decision
decoding) with a LTE-MIMO channel to improve downlink LTE system performance. The results show that
using RS codes clearly improves LTE system performance and thus decreases Bit Error Rates (BER)
more than convolutional and turbo codes which have high decoding complexity. Lastly, the results show
also extra improvements of downlink LTE system performance by increasing the number of antennas of
the LTE-MIMO channel.
Duplexing mode, ARB and modulation approaches parameters affection on LTE upl...IJECEIAES
The next generation of radio technologies designed to increase the capacity and speed of mobile networks. LTE is the first technology designed explicitly for the Next Generation Network NGN and is set to become the de-facto NGN mobile access network standard. It takes advantage of the NGN's capabilities to provide an always-on mobile data experience comparable to wired networks. In this paper LTE uplink waveforms displayed with various duplexing mode, Allocated Resources Blocks ARB, Modulation types and total information per frame, QPSK and 16 QAM used as modulation techniques and tested under AWGN and Rayleigh channels, similarity and interference of the generated waveforms tested using auto-correlation and cross-correlation respectively.
Review Paper on 802.11ax Scheduling and Resource Allocationijtsrd
Nowadays a fast remote Internet association is a need as opposed to a luxury. IEEE 802.11ax could be a revolution to present an improvement over this age of 802.11. 802.11ax has been accepted to convey next generation Wireless Local Area Network WLAN techniques. 802.11ax using multiple techniques as using modulation 1024 Quadrature Amplitude Modulation QAM , Orthogonal Frequency Division Multiple Access OFDMA , robust high efficiency signaling for better operation at a significantly lower Received Signal Strength Indication RSSI , Target Wakeup Time TWT where the station can request to wake up at any time in the future and more. 802.11ax achieves multiple benefits as enabling a more than 35 speed burst, reduce overhead and latency, and more. This paper gives a review of the IEEE 802.11ax resource allocation scheduling in both 1 Downlink DL data transfer 2 Uplink UL data transfer. Ibrahim Masri | Erdal Erdal | Atilla Ergüzen "Review Paper on 802.11ax Scheduling and Resource Allocation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38162.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/38162/review-paper-on-80211ax-scheduling-and-resource-allocation/ibrahim-masri
Index modulation is one of the promising techniques for future communications systems due to many improvement over the classical orthogonal frequency division multiplexing systems such as single RF chain, increased throughput for the same modulation order, achieved tradeoff between the efficiencies of the power and the spectral, and elimination of inter-channel interference. Many forms of index modulation researches exist where symbols are conveyed in antennas, subcarriers, time slots, and the space-time matrix. Spatial modulation is one member of index modulation family where symbols are conveyed in activating transmit/receive antennas. In this paper, a modification to a standard multiple input single output scheme by integrating spatial modulation using simplified mathematical procedure is achieved. In the transmitter side, data and activation symbols are distributed simultaneously using mathematical module and floor functions. At the receiver, a simplified maximum likelihood detector is used to obtain transmitted pair of symbols. To verify this, MATLAB simulink is used to simulate a downlink system where spatial modulation is applied to a base station. Results for different transmit antenna number and modulation order are obtained in the form of bit error rate versus signal to noise ratio.
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...ijwmn
Carrier Aggregation (CA) is one of the Long Term Evolution Advanced (LTE-A) features that allow mobile
network operators (MNO) to combine multiple component carriers (CCs) across the available spectrum to
create a wider bandwidth channel for increasing the network data throughput and overall capacity. CA has
a potential to enhance data rates and network performance in the downlink, uplink, or both, and it can
support aggregation of frequency division duplexing (FDD) as well as time division duplexing (TDD). The
technique enables the MNO to exploit fragmented spectrum allocations and can be utilized to aggregate
licensed and unlicensed carrier spectrum as well.
This paper analyzes the performance gains and complexity level that arises from the aggregation of three
inter-band component carriers (3CC) as compared to the aggregation of 2CC using a Vienna LTE System
Level simulator. The results show a considerable growth in the average cell throughput when 3CC
aggregations are implemented over the 2CC aggregation, at the expense of reduction in the fairness index.
The reduction in the fairness index implies that, the scheduler has an increased task in resource allocations
due to the added component carrier. Compensating for such decrease in the fairness index could result into
scheduler design complexity. The proposed scheme can be adopted in combining various component
carriers, to increase the bandwidth and hence the data rates.
PERFORMANCE ANALYSIS OF CARRIER AGGREGATION FOR VARIOUS MOBILE NETWORK IMPLEM...ijwmn
Carrier Aggregation (CA) is one of the Long Term Evolution Advanced (LTE-A) features that allow mobile network operators (MNO) to combine multiple component carriers (CCs) across the available spectrum to create a wider bandwidth channel for increasing the network data throughput and overall capacity. CA has a potential to enhance data rates and network performance in the downlink, uplink, or both, and it can support aggregation of frequency division duplexing (FDD) as well as time division duplexing (TDD). The technique enables the MNO to exploit fragmented spectrum allocations and can be utilized to aggregate licensed and unlicensed carrier spectrum as well. This paper analyzes the performance gains and complexity level that arises from the aggregation of three inter-band component carriers (3CC) as compared to the aggregation of 2CC using a Vienna LTE System Level simulator. The results show a considerable growth in the average cell throughput when 3CC aggregations are implemented over the 2CC aggregation, at the expense of reduction in the fairness index. The reduction in the fairness index implies that, the scheduler has an increased task in resource allocations due to the added component carrier. Compensating for such decrease in the fairness index could result into scheduler design complexity. The proposed scheme can be adopted in combining various component carriers, to increase the bandwidth and hence the data rates.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
Similar to Optimization a Scheduling Algorithm of CA in LTE ADV (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
2. TELKOMNIKA ISSN: 1693-6930
Optimization a Scheduling Algorithm of CA in LTE ADV (Sarmad K. Ibrahim)
2515
In paper [9] authors act that by separating the parcel scheduler into a frequency and
time domain additionally utilizing those utilizing using different algorithms, the throughput
reasonableness between clients can be adequately controlled. Authors [10] examine yet to
reflect on consideration on the argument over scheduling algorithm kinds: Proportional Fair then
Round Robin scheduling algorithms for Constant Bit Rate.
In this paper, we evaluate the effect of scheduling algorithm with throughput
performance. It is found that the proposed algorithm is the best concerning data transfer rate
and equality in distribution. This paper organized namely takes after: section two represents a
define regarding LTE-ADV, CA, SINR mapping and scheduling algorithms. The simulation end
results in regard to spoken after of section 3 finally, section four concludes the paper.
2. Overview of LTE-ADV
3GPP defines three channels of control, a random access channel (DRACH), a physical
transmission channel (PBCH) and a shared data channel (PDSCH) and reference signals for
the LTE downlink. The control channels are transmitted in the control region at the beginning of
each subframe; that is, in the 1st, 2 or 3 OFDM symbols [4], and the PBCH is plotted on the 72
central subcarriers (6 RB) of the available bandwidth. Figure 1 illustrates how the
aforementioned logical channels mapped on physical channels in a 20 MHz transfer scenario
situation (100 RB) [11]. 3GPP describes two synchronization message, the primary
"synchronization" and secondary synchronization" messages correspondingly (P-SS and S-SS),
which are used for the search and synchronization procedures of the UE cells. Note that in LTE,
the time ’divided into ’10’ ms’ frames, each frame divided into ’10’ sub frames and each
subframe divided into two-time-slots [12,13]. At last, a slot partitioned into 7-OFDM symbols
images (or 6 slots in the situation of amplified OFDM-cyclic-prefix).
Figure 1. Logical-to-physical downlink channels mappings
Figure 1 one frame mapping, where these mappings rehashed for-the-taking after
frames. In the domain of frequency, furthermore, 100 blocks of frequency are available within a
bandwidth of (20) MHz. Each block of frequency is of 12 sub-carriers over 15 kHz or
consequently implies one hundred eighty kHz. A frequency barrier concerning one hundred
eighty kHz for the duration over a symbol is known as a resource block (RB). Finally, inside
every RB, the signal references are targeted resource elements (RE) inside a pattern so much
optimizes the addition and equalization of the channels, wherever a resource element is a
symbol of 15 kHz sub-carrier OFDM that is presented for the_transmission. Every resource
block, therefore, includes 7x12=84 blocks of resources in the normal cyclic prefix.
3. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 6, December 2018: 2514-2521
2516
LTE -A is designed to support the distribution of multimedia services with IP-based, and
network architecture by the division to orthogonal frequency Multiple access (OFDMA) Depends
on air interface technology. LTE-ADV release-10 has characteristics, such as MIMO (Multiple
Output Multiple Output) transmission, multipoint coordinate transmission and reception “COMP“
and retransmission. One of the most important features of LTE-ADV described and applied in
this research (subsection below) is the CA of operators.
2.1. Carrier Aggregation (CA)
LTE-ADV completely fulfills these necessities and indeed surpasses them in a few
viewpoints [6]. CA is some about the foremost capabilities regarding LTE-ADV recommend
Figure 2. The idea of CA presents in this section, its implementation modes and scenarios. For
data on other progressive procedures, which were presented in LTE-ADV, the fascinated reader
is reported [14], these procedures and studies challenges of research for LTE-ADV are
summarized. CA points on accomplishing higher information peak rates, getting transfer speed
up to (100) MHz for LTE-ADV clients, whereas keeping up with the existing up to 20 MHz
transmission capacity in reverse compatibility for LTE-ADV clients. It is the method of gathering
numerous LTE CCs to permit LTE-ADV gadgets to utilize carrier to attain higher transmission
capacity. CA perform be accomplished among a mode of contiguous (i.e., the accumulated CCs
are contiguous among frequency domain) then between a non-contiguous mode.
Figure 2. Carrier aggregation concept
Furthermore, non-contiguous CA performs utilize CCs from distinctive groups or same
band as appeared in Figure 3. One result of this prerequisite is that allocation of contiguous
resources of over (20) MHz-for-an LTE-ADV transmission client is not conceivable since this
implies which the client information transmission would involve the regulator locales at the band
edges. For it cause, the LTE-ADV access structure contains the grouping of the allocated
bandwidth in blocks of (20). MHz [15,16].
Figure 3. Carrier aggregation modes
4. TELKOMNIKA ISSN: 1693-6930
Optimization a Scheduling Algorithm of CA in LTE ADV (Sarmad K. Ibrahim)
2517
2.2. SINR Model Mapping
The PHY abstraction, which is also called system link assignment and interface
expectation, affords such large-scale simulations interface for system level simulators and link
level. The abstraction of the PHY the flat frequency channels is rather unimportant since the
average of the quality of the channels is sufficient for the mapping of the quality of the
connection, but the of evaluation and execution for the high selective channels of frequency is
not so unimportant.
In general, it is primarily due to the lower bandwidth coherence concerning the
bandwidth signal that gives rise to the state of multi-channel in the collector. Though, to solve
this problem, numerous link abstraction procedures have been evaluated in the drafting of these
state multi- channels. EESM placed in the level of system assessments since then EESM has
broadly utilized for quality system link [17]. EESM could be a reasonable for LTE wireless
systems 3GPP preference or such outperforms the mean plans [18]. Advance it is outlined with
the results which exercise of link abstraction is the used channel model independent. While in
our outcomes it has been detected that if the exercise is done on a large number data set of
embodiments of channels agreeing to frequency selective channel high, then the resulting
adjustment can model a different extension of multi channels-state. The effective SINR mapping
based on mutual information (MIESM) works much better concerning complexity and execution
than other approaches [19].
2.3. Scheduling Algorithm
The scheduler logic is similar according to some multiplexer among who a packet that
will remain forwarded additional is saved within a buffer so many purposes namely a queue
system. The buffer space is cloven in a number of lines, every one as is back to keep the packet
of a sequence, as is characterized by using the source and destination IP addresses. In some
situation, the programming of the network algorithm decides just how the network community of
the buffer check [20–23].
2.3.1. Round Robin (RR) Scheduling
RR is the best scheduler, which disperses the assets similarly to all the clients. It works
by apportioning the resource blocks to the non-unfilled Radio link control (RLC) ”queues in
cyclic order. These non-empty RLC ”lines are also referred” as active streams. If all the flows
are apportioning to much of RBGs (Resource block Group) and they all are transmitted within in
sub frame of the same. Otherwise, on the off chance that a few of the streams are cleared out
unassigned at that point the assignment within the next frame will begin from the final. The
modulation and coding scheme for (MCS) distinctive transmission channels distributed agreeing
to the received Channel Quality Indicator (CQI).
Figure 4. RR scheduling mechanism
2.3.2. Proportional Fair (PF) Scheduling
PF supports the high use of resources while maintaining good equity between network
flows [24,25]. A user is likely to be programmed when the quality of the immediate channel is
high compared to its normal channel condition over time. Let 𝑀I be MCS assigned to a client
depending upon the corresponding CQI.
When (𝑀j, 𝐵) Mj is the TBS where 𝐵 is the No. of RB, used. The RB number is decided
based on the bandwidth of the transmission channel. Where (t) be the last normal throughput
customer performance 𝑗. Thus, the rate obtainable by the client given by
5. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 6, December 2018: 2514-2521
2518
𝑅(𝑘, 𝑡) =
𝑆(𝑀𝑗 ,𝐵)
τ
(1)
where 𝜏 is time interval of the transmission. Scheduling of the users done concurring to the
taking after relation.
𝑙(𝑘, 𝑡) = argmax
𝑗=1…𝑁
(𝑅(𝑘 , 𝑡) )/𝑇 (2)
Tj = (1 – 𝜆) 𝑇j (t) + 𝜆𝑇j * (𝑡) if j is schedule
= (1 – 𝜆)j (t) otherwise
𝜆 is a constant, which is very close to unity. 𝑇j*(𝑡) is throughput actual accomplished by user the
actual the 𝑗in the sub frame 𝑡.
Figure 5. PF scheduling mechanism
2.3.3. Proposed Algorithm Scheduling
The scheduler maximizes the data of the base station. The greatest throughput
accomplished by distributing assets on the premise of channel condition as it were. The client
with the largest value of CQI index wideband scheduled first. The scheduling and calculation of
the throughput is very similar to algorithm of PF expect divided by T. Achievable throughput for
sub frame 𝑡is given by (1)
𝑙(𝑘, 𝑡) = argmax
𝑗=1…𝑁
(𝑅(𝑘 , 𝑡) ) (3)
thus, it selects the client with highest throughput.
Figure 6. Proposed scheduling mechanism
6. TELKOMNIKA ISSN: 1693-6930
Optimization a Scheduling Algorithm of CA in LTE ADV (Sarmad K. Ibrahim)
2519
3. Simulation Results
Different number of UEs are set arbitrarily in two-sector sector of two eNodeB as shown
in Figure 7. The parameters of simulation utilized are decided by the 3GPP simulation cases.
Performance with PF, RR and proposed scheduling [9]. It was observed from 10 to 30 EUs with
various distances from the eNodeB and the mapping of UE is described in Table 1.
Figure 7. Shows LTE advanced nodes
Table 1. Parameters of Simulation
Parameters Assumptions
heightUE 1.5
mobilityModel Random Way Point
multipathModel 3GPP
powerUE 20 dB
Maximum number of carrier component 5
heightBS 30
powerBS 46 dB
Frequency band [800 1800 2000 2800 2900]
fft_size 2048
In Figure 8 shows, that RR more sent data is 242 Mb/s at 15 numbers of UEs because
RR is less efficiency of resource allocation and this algorithm some of the streams are left
unassigned, so the assignment in the next frame will start from the last stream that was not
assigned.
Figure 8. Simulation results for throughput (Mbps) vs UEs for RR
7. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 6, December 2018: 2514-2521
2520
In PF present in Figure 9, almost the same throughput with different number of UEs
except when the number 30 of Ues. This algorithm is more outperform from RR Regarding the
amount of data sent, and the stability of data transfer rate is 283 MB/s with different numbers of
UE because this algorithm admits a high use of resources while maintaining good equity
between the network flows.
Figure 9. Simulation results for throughput (Mbps) vs UEs for PF
Figures 10 and 11 show the proposed algorithm is better than the previous algorithms
concerning the transfer rate of data transfer to the highest number of users, the worst case of
throughput when the number is 10 UEs this rate is equal 282 MB/s. This algorithm is more
efficient because it depends on channel conditions.
Figure 10. Simulation results for throughput
(Mbps) vs UEs for proposed
Figure 11. Simulation results for throughput
(Mbps) and different scheduling algorithm
4. Conclusion
This paper has compared the performances Carrier Aggregation between Traditional
scheduling algorithm (RR and PF) and the proposed algorithm by using two type of SINR. It has
found the performance of the proposed algorithm with MIESM could provide more the
throughput and the fairness better than PF and RR for various UEs at EESM and MIESM,
Regarding data transfer rate and in the equal distribution among the number of users. Also,
8. TELKOMNIKA ISSN: 1693-6930
Optimization a Scheduling Algorithm of CA in LTE ADV (Sarmad K. Ibrahim)
2521
results show the small gap between two SINR mappings in the proposed algorithm, unlike the
other two algorithms. RR algorithm neglected users CQI feedback, which led to degradation in
system show. PF was not good when the user fair distance from the base station.
References
[1] Sirait F, Dani AW, Pangaribowo T. Capacity Improvement and Protection of LTE Network on Ethernet
Based Technique. TELKOMNIKA Indonesian Journal Electrical Engineering. 2018; 16(1): 200-9.
[2] Mostafa W, Mohamed E, Zekry A. Software implementation of LTE - advanced using matlab
Simulink. Int J Eng Technol. 2017; 6(4): 116-23.
[3] Mohamed MA, Raslan WM. Performance Analysis of LTE-Advanced Physical Layer. Int J Comput
Sci. 2014; 11(1): 80-7.
[4] Galih R. Carrier Aggregation Technique to Improve Capacity in LTE-Advanced Network.
TELKOMNIKA Telecommunication Computing Electronics and COntrol. 2016; 14(1): 119-128.
[5] Mai Y, Chen J. IP Multimedia Relay Architectures with Multi-RAT Support in LTE-Advanced. 7th Asia
Model Symp. 2013: 283-8.
[6] Alkhansa R, Artail H, Gutierrez-estevez DM. LTE-WiFi Carrier Aggregation for Future 5G Systems : A
Feasibility Study and Research Challenges. Procedia - Procedia Comput Sci. 2014; 34: 133-40.
[7] Stefania S, Issam T, Matthew B. LTE, the UMTS long term evolution: from theory to practice. A John
Wiley and Sons, Ltd. 2009; 6: 136-144.
[8] Hanzaz Z, Schotten HD. Analysis of Effective SINR Mapping Models for MIMO OFDM in LTE
System. 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
2013: 1509-15.
[9] Trivedi RD, Patel MC. Comparison of Different Scheduling Algorithm for LTE. Int J Emerg Technol
Adv Eng. 2014; 4(5): 334-9.
[10] Mohankumar NM, Devaraju JT. Performance Evaluation of Round Robin and Proportional Fair
Scheduling Algorithms for Constant Bit Rate Traffic in LTE. IJCNWC. 2013; 3: 41-5.
[11] Soni G, Verma C. Performance Investigation of LTE Systems based on NI PXIe-5644R Vector Signal
Transceiver. Global Conference on Communication Technologies (GCCT 2015). 2015: 755-60.
[12] Mohammed EIRVS. LTE-Advanced: Technology and Performance Analysis. Thesis: University of
Vaasa Faculty. 2011.
[13] Yonis AZ, Abdullah MFL, Ghanim MF. LTE-FDD and LTE-TDD for Cellular Communications. 2012:
1467-71.
[14] Akyildiz IF, Gutierrez-estevez DM, Balakrishnan R, Chavarria-reyes. LTE-Advanced and the
Evolution to Beyond 4G (B4G) Systems. Phys Commun. 2013.
[15] Zhang R, Zheng Z, Wang M, Shen X, Xie LL. Equivalent capacity in carrier aggregation-based LTE-A
Systems: A probabilistic analysis. IEEE Trans Wirel Commun. 2014; 13(11): 6444-60.
[16] Hämälainen J. The Future of LTE: The Femtocells perspective. 2013.
[17] Networks N. OFDM Exponential Effective SIR Mapping Validation, EESM Simulation Results for
System-Level Performance Evaluations. 2004.
[18] Santos RB, Jr WCF, Stancanelli EMG, Cavalcanti FRP. Link-to-System Level Interface Solutions in
Multistate Channels for 3GPP LTE Wireless System. Simp Bras TELECOMUNICACOES. 2007.
[19] Brueninghaus K, D Astely TS. Link Performance Models for System Level Simulations of Broadband
Radio Access Systems. 16th International Symposium on Personal, Indoor and Mobile Radio
Communications. 2005: 2306-11.
[20] Fouziya SS, Nakkeeran R. Study of Downlink Scheduling Algorithms in LTE Networks. J Networks.
2014; 9(12): 3381-91.
[21] Iosif O, Ion Banica. LTE Performance Evaluation Based on two Scheduling Models LTE downlink and
uplink analysis. Int J Adv Netw Serv. 2012; 5(1): 58-68.
[22] Dikamba T. Downlink Scheduling in 3GPP Long Term Evolution (LTE). Thesis: Delft University of
Technology. 2011.
[23] Lin C, Wang Y, Sandrasegran K, Zhu X, Fei J, Kong X. Frequency and Time Domain Packet
Scheduling Based On Channel Prediction With Imperfect CQI in LTE. Int J Wirel Mob Networks.
2013; 5(4): 157-70.
[24] Dhameliya N, Bhoomarker R, Zafar S. Maximization of throughput with advanced Proportional Fair
algorithm for LTE-Advanced. IEEE Students’ Conference on Electrical, Electronics and Computer
Science. 2014.
[25] Jalali A, Padovani R, Pankaj R. Data Throughput of CDMA-HDR a High Efficiency-High Data Rate
Personal Communication Wireress System. VTC2000-Spring 2000 IEEE 51st Vehicular Technology
Conference Proceedings. 2000: 1854-8.