Multi-server scheduling of traffic flows over heterogeneous wireless channels affix fresh concerns of inter-packet delay variations
and associated problems of out-of-sequence reception, buffer management complexity, packet drops and re-ordering overhead.
In this paper, we have presented an exclusive multi-server scheduling algorithm that is specifically tuned for mobile routers
equipped with multiple wireless interfaces and has attained multiple care-of-address registrations with its home agent (HA).
The proposed adaptive, Self-clocked, Multi-server (ASM) scheduling algorithm is based on predetermined transmission deadlines
for each arrived packet at the mobile router. The mobile flows receive desired service levels in accordance with their negotiated
service rates and are only constraint by the cumulative capacity of all active links. The major challenge lies in the handling
of asymmetric channels to stitch into a unified virtual channel of higher capacity with reliable service guarantees during
mobility. The sorted list of transmission schedules is used to assign physical channels in increasing order of their availability.
This approach specifically encapsulates the physical layer disconnections during the handovers and ensures continuous service
to ongoing flows. The proposed scheduling scheme is supplemented by an analytical model and simulations to verify its efficacy.
The simulation results demonstrate higher degree of reliability and scalability of service provisioning to flows during mobility. 相似文献
Wireless Networks - This paper discusses a framework for algorithm-architecture synergy for (1) performance evaluation and (2) FPGA implementation complexity analysis of linear massive MIMO... 相似文献
Using full 3D TCAD, an evaluation of process parameter space of bulk FinFET is presented from the point of view of DRAM, SRAM and I/O applications. Process and device simulations are performed with varying uniform fin doping, anti-punch implant dose and energy, fin width, fin height and gate oxide thickness. Bulk FinFET architecture with anti-punch implant is introduced beneath the channel region to reduce the punch-through and junction leakage. For 30 nm bulk FinFET, anti-punch implant with low energy of 15 to 25 keV and dose of 5.0 × 1013 to 1.0 × 1014 cm−2 is beneficial to effectively suppress the punch-through leakage with reduced GIDL and short channel effects. Our simulations show that bulk FinFETs are approximately independent of back bias effect. With identical fin geometry, bulk FinFETs with anti-punch implant show same ION-IOFF behavior and approximately equal short channel effects like SOI FinFETs. 相似文献
This paper presents a Vivaldi antenna. The antenna incorporates a slot-line feed, and is designed to operate in a wideband mode, along with four narrowband modes. The wideband mode extends from 1 to 3 GHz. A series of PIN diode switches is employed to reconfigure between the five different operating modes. Wideband-to-multiband reconfigurations are achieved by adjusting the antenna loading internally, and also by the incorporation of band-stop filters. To obtain the wideband mode, wideband matches load is used. On the other hand, to obtain the narrowband modes, two rectangular slits with narrowband matches load are used. The proposed Vivaldi antenna provides wideband operation. It is also supports operation within the LTE, GSM (L-band), GPS, and WiMAX bands. 相似文献
The incredible growth of telecom data and fierce competition among telecommunication operators for customer retention demand continues improvements, both strategically and analytically, in the current customer relationship management (CRM) systems. One of the key objectives of a typical CRM system is to classify and predict a group of potential churners form a large set of customers to devise profitable and targeted retention campaigns for keeping a long-term relationship with valued customers. For achieving the aforementioned objective, several churn prediction models have been proposed in the past for the accurate identification of the customers who are prone to churn. However, these previously proposed models suffer from a number of limitations which place strong barriers towards the direct applicability of such models for accurate prediction. Firstly, the feature selection methods adopted in majority of the past work neglected the information rich variables present in call details record for model development. Secondly, selection of important features was done through statistical methods only. Although statistical methods have been applied successfully in diverse domains, however, these methods alone without the augmentation of domain knowledge have the tendency to yield erroneous results. Thirdly, the previous models have been validated mainly with benchmark datasets which do not provide a true representation of real world telecom data consisting of noise and large number of missing values. Fourthly, the evaluation measures used in the past neglected the True Positive (TP) rate, which actually highlights the ability of a model to correctly classify the percentage of churners as compared to non-churners. Finally, the classifiers used in the previous models completely neglected the use of fuzzy classification methods which perform reasonably well for data sets with noise. In this paper, a fuzzy based churn prediction model has been proposed and validated using a real data from a telecom company in South Asia. A number of predominant classifiers namely, Neural Network, Linear regression, C4.5, SVM, AdaBoost, Gradient Boosting and Random Forest have been compared with fuzzy classifiers to highlight the superiority of fuzzy classifiers in predicting the accurate set of churners. 相似文献
In road network, the decision accuracy of event message under location privacy-enhanced scheme, fast forwarding falsification message, and collusion attacks are all knotty problems that arise in event trust management. In this paper, we proposed protocol verification to check vehicles activity in privacy manner. We proposed a new method to adjusted vehicles speed which reduces the vehicle delay suffers from network gap problem. We established privacy preserving authentication protocol to verify vehicle activities in the term of privacy preserving manner. Vehicles moving trend, velocity differences, and distance differences are taken into consideration so, to maintain as many common users as possible to reduce the cost. The cost analysis and performance evaluation indicate that our frame-work can reduced cost factor and achieve good performance. The proposed model achieved reliably and efficiently with packet rate information. The evaluation experiments based on NS-3 to our improve user’s authenticated key establishment protocol has comparatively shorter time response, reduce cost, less packet lost information and enhanced privacy preservation compared with existing methods. 相似文献
Ion migration induced interfacial degradation is a detrimental factor for the stability of perovskite solar cells (PSCs) and hence requires special attention to address this issue for the development of efficient PSCs with improved stability. Here, an “S‐shaped, hook‐like” organic small molecule, naphthalene diimide derivative (NDI‐BN), is employed as a cathode interface layer (CIL) to tailor the [6,6]‐phenylC61‐butyric acid methylester (PCBM)/Ag interface in inverted PSCs. By realizing enhanced electron extraction capability via the incorporation of NDI‐BN, a peak power conversion efficiency of 21.32% is achieved. Capacitance–voltage measurements and X‐ray photoelectron spectroscopy analysis confirmed an obvious role of this new organic CIL in successfully blocking ionic diffusion pathways toward the Ag cathode, thereby preventing interfacial degradation and improving device stability. The molecular packing motif of NDI‐BN further unveils its densely packed structure with π–π stacking force which has the ability to effectually hinder ion migration. Furthermore, theoretical calculations reveal that intercalation of decomposed perovskite species into the NDI clusters is considerably more difficult compared with the PCBM counterparts. This substantial contrast between NDI‐BN and PCBM molecules in terms of their structures and packing fashion determines the different tendencies of ion migration and unveils the superior potential of NDI‐BN in curtailing interfacial degradation. 相似文献
Conductive polymeric blends (CPBs) of polystyrene and polyaniline (PS/PANI) were prepared by solution casting method in various compositions. Film thickness of CPBs was achieved?~?250 micron. PS/PANI blend films were analyzed for electromagnetic interference (EMI) shielding characteristics in microwave and near-infrared (NIR) regions. PS/PANI blends showed remarkable features. Most mobile telecommunications use GHz frequency range and shielding effectiveness was observed in 9 GHz to 18 GHz. In 9 GHz to 18 GHz frequency range, 45 dB shielding effectiveness was measured. CPBs were also analyzed in the NIR region and showed transmittance of <1%. Microwaves and NIR radiation are the most abundant in the environment and cause damage to human health. Both types of radiation causes serious damage to electronic devices as well.
In general, online signature capturing devices provide outputs in the form of shape and velocity signals. In the past, strokes have been extracted while tracking velocity signal minimas. However, the resulting strokes are larger and complicated in shape and thus make the subsequent job of generating a discriminative template difficult. We propose a new stroke-based algorithm that splits velocity signal into various bands. Based on these bands, strokes are extracted which are smaller and more simpler in nature. Training of our proposed system revealed that low- and high-velocity bands of the signal are unstable, whereas the medium-velocity band can be used for discrimination purposes. Euclidean distances of strokes extracted on the basis of medium velocity band are used for verification purpose. The experiments conducted show improvement in discriminative capability of the proposed stroke-based system. 相似文献
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that use pairwise symmetric keys computed non-interactively by the nodes which reduces communication overhead. We allow nodes to generate their broadcast keys for different groups and propose a collision-free method for computing such keys. We use identity-based keys that do not require certificates which simplifies key management. Our key escrow free scheme also uses identity-based keys but eliminates inherent key escrow in identity-based keys. Our system requires a minimum number of keys to be generated by the third party as compared to conventional pairwise schemes. We also propose an authenticated broadcast scheme based on symmetric keys and a corresponding signature scheme. 相似文献