Loading...
  • Home
  • Search Results
2267-2268 of 4327 Papers

RESOURCE ALLOCATION BASED GAME THEORY IN A CONVERGED MACRO/FEMTO LTE NETWORKS

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): DERYA YILTAS-KAPLAN , MAURICIO ITURRALDE , PINAR KIRCI , TARA ALI YAHIYA

Abstract: In this article, we propose two levels of resource allocation method in a converged scenario for Macro and Femtocells LTE system. We use a Soft Frequency Reuse for guaranteeing the Quality of Service (QoS) for different Service Data Flows (SDFs) in the converged wireless networks. The first level of our method includes the use of bandwidth allocation between macro and femtocells and admission control based on bankruptcy game which is a special type of a cooperative game. A coalition among the converged scenario is formed to offer bandwidth to a new connection. Then, the second level will be coordinating the allocation among different SDFs in both networks. Our scheme for resource blocks allocation balances between maximizing the overall throughput of the system while guaranteeing the QoS requirements for a mixture of real-time and non-real-time SDFs. We present simulations to demonstrate the various degrees of macro/femtocell coordination and to take advantages of multiuser diversity.

  • Publication Date: 11-Oct-2015
  • DOI: 10.15224/978-1-63248-064-4-14
  • Views: 0
  • Downloads: 0

COLLISION EVASION METHOD USING AUXILIARY HASH

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): JAEMIN HWANG , SANGGIL KANG , JOOHYEONG SONG , JONGSIK LEE

Abstract: In this paper, we develop a conflict-free index generator to increase performance in a big data environment. There are several problems with the conventional hash functions, such as Minimal Perfect Hash Function (MPHF) on dynamic systems like big data. The collision-free problem occurs with an increase in the amount of data and the overhead in securing additional space to solve this problem. To solve this problem, we propose a collision evasion method using an auxiliary hash. In this paper, we divide the data into two categories by constructing a double hash to solve the problem.

  • Publication Date: 11-Oct-2015
  • DOI: 10.15224/978-1-63248-064-4-15
  • Views: 0
  • Downloads: 0