2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)最新文献

筛选
英文 中文
Dynamic TDD interference mitigation by using Soft Reconfiguration 采用软重配置的动态TDD干扰缓解
Yi-Ting Lin, Cheng-Chih Chao, Hung-Yu Wei
{"title":"Dynamic TDD interference mitigation by using Soft Reconfiguration","authors":"Yi-Ting Lin, Cheng-Chih Chao, Hung-Yu Wei","doi":"10.4108/EAI.19-8-2015.2261182","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2261182","url":null,"abstract":"Since uplink (UL) and downlink (DL) traffic loads are time-variant in femtocells, it is essential to adapt dynamic-TDD (D-TDD) to effectively adjust the UL and DL transmission resources. However, due to the cross-link interference of D-TDD, the benefits of dynamically adjusting the UL and DL resources are diminished. The currently used interference mitigation scheme, the clustering scheme, achieves interference mitigation but reduces the ability of DL and UL resource adaptation. In this research, we propose “Soft Reconfiguration” to reduce interference while allowing femtocells to dynamically adjust their UL and DL resources. In Soft Reconfiguration, the femtocells which highly interfere with each other will be categorized in the same interference group, but unlike the clustering scheme, the femtocells in the same group are allowed to choose different subframe configurations. In the simulation, we compared Soft Reconfiguration with two schemes, D-TDD without interference mitigation and the clustering scheme. The results show that the soft reconfiguration scheme outperforms the other two schemes in better throughput and effective resource utilization.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Wireless mesh router placement with constraints of gateway positions and QoS 具有网关位置和QoS约束的无线网状路由器布局
Chun-Cheng Lin, Tung-Huei Chen, Shun-Yu Jhong
{"title":"Wireless mesh router placement with constraints of gateway positions and QoS","authors":"Chun-Cheng Lin, Tung-Huei Chen, Shun-Yu Jhong","doi":"10.4108/EAI.19-8-2015.2260962","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260962","url":null,"abstract":"The past studies on router node placement for wireless mesh networks (WMNs) did not consider placement of Internet gateways. Therefore, mesh routers and mesh clients can only communicate locally. The problem in this paper is to maximize both network connectivity and client coverage for the router node placement in WMNs consisting of mesh routers, mesh clients, and Internet gateways, subject to three QoS constraints: delay, relay load, and Internet gateway capacity. By visualizing the placements in previous works, we discover two main drawbacks: overlapping and coverless. To solve them, this paper presents a novel particle swarm optimization approach. Performance of the proposed approach is verified by simulation.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124540036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Development of mobile-based intelligent surgery information system 基于移动的智能手术信息系统的开发
Shen-Yuan Tang, Chien-Liang Chen, Lun-Ping Hung
{"title":"Development of mobile-based intelligent surgery information system","authors":"Shen-Yuan Tang, Chien-Liang Chen, Lun-Ping Hung","doi":"10.4108/EAI.19-8-2015.2261093","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2261093","url":null,"abstract":"Nowadays, medical industry actively develops mobile-based information system to improve service quality. It can not only reduce writing errors caused by human negligence, but also reduce nurse's and physician's workload and elevate the quality of patient care. The study was conducted at a medical center located in northern Taiwan. Through the establishment of the proposed mobile-based information system, documents used in surgeries are eliminated and are recorded in computers. This mobile-based information system combines HIS, PACS and LIS to assist medical personnel to import patient's clinical records, imaging reports, inspection reports and other relevant information before, during and after surgery. We propose the record, re-check, report and reference, the 4R checking mechanism as the core concept of the development of the proposed mobile-based intelligent surgery information system. The checking mechanism can automatically view the completion of medical record, and maintain a high degree of integrity if the records are incomplete. After launching the system one and half year, we conduct a questionnaire survey and collect data from nurses and physicians who use this system. The survey was designed to measure the successfulness of the mobile-based information system. Questions focused on three broad areas: information quality, system quality, and users' satisfaction. The results confirmed a high degree of satisfaction among users. According to the feedback, it shows that the system should improve the function of automatic saving on regular basis.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fusion-based sensing for uncertain primary user signal in cognitive ratio networks 认知比例网络中不确定主用户信号的融合感知
T. Chin, Cheng-Chia Huang
{"title":"Fusion-based sensing for uncertain primary user signal in cognitive ratio networks","authors":"T. Chin, Cheng-Chia Huang","doi":"10.4108/EAI.19-8-2015.2260896","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260896","url":null,"abstract":"In cognitive radio networks, secondary users can use the licensed frequency bands if the primary user is idle. In order to protect the privilege of the primary user, detecting the presence of the primary user in cognitive radio networks is important. Collaborative sensing is a possible method to improve the detection performance for the presence of the primary user. The IEEE 802.22 standard provides an appropriate topology to perform collaborative sensing. This paper addresses the problem of collaborative sensing in cognitive radio networks. The proposed sensing mechanism is not based on any known signal or noise distributions. The approximations of the distributions for the signal energy measurements are first derived. The SUM fusion rule is adopted to make the final consensus about the presence of the primary user. Based on the derived measurement distributions, detection performance in terms of detection probability subject to a fixed false alarm probability is evaluated analytically. The analytic results of the measurement distributions and the detection performance are very close to the simulation results. In particular, it is found that adding more users to participate in the fusion does not improve the detection performance. In fact, it may hurt the detection performance. A better strategy is to include only a few users with the highest SNR in the fusion. In this way, the detection performance is higher while communication costs can be reduced.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126075951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RTC: Link schedule based MAC design in multi-hop wireless network 多跳无线网络中基于链路调度的MAC设计
Xuan Dong, Yinjia Huo, Chunsheng Zhu, Shaohe Lv, Wenxiang Li, Xiaodong Wang
{"title":"RTC: Link schedule based MAC design in multi-hop wireless network","authors":"Xuan Dong, Yinjia Huo, Chunsheng Zhu, Shaohe Lv, Wenxiang Li, Xiaodong Wang","doi":"10.4108/EAI.19-8-2015.2260911","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260911","url":null,"abstract":"The performance of an ad-hoc network is greatly limited by collisions due to hidden terminals. In this paper, we propose a receiver tracking contention (RTC) scheme, which achieves high throughput by allowing the receivers to assist for channel contention. In RTC, link is the basic unit for channel access contention. Specifically, transmitter is used to contend for the channel and receiver is used to announce the potential collision. Based on INT message coding scheme, transmitter and its corresponding receiver can be well coordinated. In such mechanism, hidden terminals are avoided and exposed terminals are encouraged to transmit simultaneously. Based on OFDM modulation, RTC packets several subcarriers as subcontention unit and operates channel contention over multiple subcontention units. Furthermore, each subcontention unit maintains a transmission set, where collision-free links are allowed to merged into the transmission set In this case, the transmission set of subcontention unit can be aggregated after each contention period. When the subcontention unit i is the smallest index of non-empty subcontention unit, the transmission set of unit i will win the channel contention and transmitters of unit i will start to transmit in the following data transmission period. Analysis and simulation results show that RTC achieves a notable throughput gain over Back2f as high as 190% through simulation.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy efficient dynamic network configuration in two-tier LTE/LTE-A cellular networks 两层LTE/LTE- a蜂窝网络中的节能动态网络配置
Jen-Jee Chen, Chung-Hua Hu
{"title":"Energy efficient dynamic network configuration in two-tier LTE/LTE-A cellular networks","authors":"Jen-Jee Chen, Chung-Hua Hu","doi":"10.4108/EAI.19-8-2015.2261061","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2261061","url":null,"abstract":"With the increasing demand of broadband wireless communication networks, users have an increasing need of the wireless broadband service coverage and the wireless access quality. To alleviate this problem, several novel techniques are proposed. One of these techniques is femtocells. A femtocell can be used to increase the coverage of wireless broadband service indoors or at hotspots and raise both data transmission rate and access quality. Although the use of femtocells can greatly benefit, deploying large number of femtocells consumes tremendous energy. In order to respond to the problem of global climate change, energy saving is an important issue. This paper discusses how to minimize the energy consumption of femtocells and optimize the energy efficiency of networks while still providing both the same data transmission rate and wireless broadband service coverage. In this work, considering path loss, modulation and coding schemes (MCSs), bit-error-rate (BER) and group mobility, we propose a green handover and dynamic femtocell wake up approach. In default, femtocells are stay in idle mode when no user equipment (UE) connecting to it. A femtocell transits to active mode only when detecting UEs and the efficiency of using the femtocell is better than the macrocell. By this way, not only users can benefit from the femtocells but also femtocells can reduce unnecessary power consumption. Simulation results show that our method performs better than the previous methods in power consumption, energy efficiency and throughput in both 3G/4G wireless communication networks.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"32 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To lengthen lifespan of a clustered wireless sensor network by partial coverage strategy 采用部分覆盖策略延长集群无线传感器网络的寿命
Wang Lei, Kao Peng-Hsiang, Wu Meng-ting
{"title":"To lengthen lifespan of a clustered wireless sensor network by partial coverage strategy","authors":"Wang Lei, Kao Peng-Hsiang, Wu Meng-ting","doi":"10.4108/EAI.19-8-2015.2260884","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260884","url":null,"abstract":"Most of researches about the design of the topology and the operation of a wireless sensor network are focusing on how to take advantage of all sensor nodes to collect information that covering the whole sense area. A criticism been ignored that the goal of lengthening lifespan is conflict with the complete coverage strategy due to the overlapping of sensor area among nodes result in unnecessary waste of energy. In this study, we propose another proposition from the idea of partial coverage strategy: a near perfect coverage rate can be achieved by least nodes to save the energy of the whole network. The proposed topology is constructed by clustered structure. According to the simulation results that made by comparing with the classic clustered topology, LEACH, and other related methods proposed recently, the study find that the method proposed in this paper can double the lifespan of a wireless sensor network under the same condition. Furthermore, the construction method can efficiently achieve graceful degradation to maintain the usage of a sensor network in a long period.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To random access or schedule? Optimum 3GPP licensed-assisted access for machine-to-machine communications 随机访问还是安排访问?机器对机器通信的最佳3GPP许可辅助接入
Shao-Yu Lien, Yueh Jir Wang
{"title":"To random access or schedule? Optimum 3GPP licensed-assisted access for machine-to-machine communications","authors":"Shao-Yu Lien, Yueh Jir Wang","doi":"10.4108/EAI.19-8-2015.2260365","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260365","url":null,"abstract":"To support various Internet-of-Thing (IoT) applications involving an enormous number of machine-type devices, deploying LTE/LTE-A networks on ISM bands with an extensive bandwidth has been regarded as a promising solution to enable machine-to-machine (M2M) communications. Designating as licensed-assisted access (LAA) in 3GPP Rel-13, unprecedented challenge of uncontrollable interference from collocated WiFi networks, however, obstructs the state-of-the-art scheduling based radio resource access in LTE/LTE-A. To practice LAA, in this paper, we shall derive the optimum radio access scheme for the urgent needs of 3GPP Rel-13 standardization. Observing the LAA-WiFi hidden terminal problem, we analytically derive the optimum number of LAA users randomly accessing a pool of radio resources and the optimum condition for random access, to reach a superior throughput of a LAA network as compared with that of a scheduling based scheme. Our analytic results demonstrate that the conventional scheduling based scheme in LTE/LTE-A may not always be optimal, and thus our proposition leads to the optimum radio access design for LAA networks.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125858260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discovering social relationship between city regions using human mobility 利用人口流动发现城市区域间的社会关系
Ya-Jing Xu, Chao Xue, Gong-Fu Li, Yi-Zhe Song
{"title":"Discovering social relationship between city regions using human mobility","authors":"Ya-Jing Xu, Chao Xue, Gong-Fu Li, Yi-Zhe Song","doi":"10.4108/EAI.19-8-2015.2260775","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260775","url":null,"abstract":"The development of a city gradually fosters different functional regions, and between these regions there exists different social information due to human activities. In this paper, a Region Activation Entropy Model (RAEM) is proposed to discover the social relations hidden between the regions. Specifically we segment a city into coherent regions according the base station (BS) position and detect the stay and passing regions in trajectories of mobile phone users. We regard one user's trajectory as a short document and take the stay regions in the trajectory as words, so that we can use Natural Language Processing (NLP) method to discover the relations between regions. Furthermore, the Region Activation Force (RAF) is defined to measure the intensity of relationship between regions. By measuring the Region Activation Entropy (RAE) based on RAF, we find an 88% potential predictability in regional mobility. The result generated by RAEM can benefit a variety of applications, including city planning, location choosing for a business and predicting the spread of human. We evaluated our method using a one-month-long record collected by mobile phone carriers. We believe our findings offer a new perspective on research of human mobility.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129631522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel management methodology or Ad-Hoc wireless networks to improve the routing efficiency with adaptive broadcasting range under lower transmitting energy 一种新的自适应无线网络管理方法,在较低的传输能量下提高自适应广播范围的路由效率
Yung-Fa Huang, Hsing-Wen Wang, Hui-Chao Hsu
{"title":"A novel management methodology or Ad-Hoc wireless networks to improve the routing efficiency with adaptive broadcasting range under lower transmitting energy","authors":"Yung-Fa Huang, Hsing-Wen Wang, Hui-Chao Hsu","doi":"10.4108/EAI.19-8-2015.2261139","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2261139","url":null,"abstract":"By investigating the effects of nodes distribution and broadcasting range of the route request (RREQ) control packets on the routing path establishment, in this paper, we explore the energy efficiency of AODV (Ad-hoc on-demand distance vector) routing algorithms in Ad-Hoc networks. Simulation results show that with the range adaptation to the number of nodes the highest successful rate of routing path establishment is obtained. With the adaptive broadcasting range the routing efficiency can be improved. Thus, the demand transmitting energy of RREQ control packets to establish a routing path can be reduced.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114461308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信