scholarly journals Framework Enhancement for Common Public Radio Interface in SBTS

2018 ◽  
Vol 7 (3.12) ◽  
pp. 38
Author(s):  
Anuradha V ◽  
Shankar R

There is a rapid growth of mobile users so there are developing more number of features by a service provider to support more number of mobile users. The Common Public Radio Interface (CPRI) is an interface between the Radio Equipment Controller (REC) and Radio Equipment (RE) to support more number of users. This simplifies the overall architecture of radio base station. The radio base station is centralized and the radio heads are distributed in the environment. This radio heads supports the more number of users. The main aim of CPRI is to divide the packets into number of frames. The radio frame is divided into the hyper frames and this hyper frame is divided into the number of basic frame in which each basic frame is supported up to 16 words totally it supports up to 6,144 megabytes per second.  

2021 ◽  
Author(s):  
Ali Alnoman

With the growing popularity of smart applications that contain computing-intensive tasks, the provision of radio and computing resources with high quality is becoming more and more challenging. Moreover, supporting network scalability is crucial to accommodate the massive numbers of connected devices. In this thesis, we present effective energy saving strategies that consider the utilization of network elements such as base stations and virtual machines, and implement on/off mechanisms taking into account the quality of service (QoS) required by mobile users. Moreover, we investigate the performance of a NOMA-based resource allocation scheme in the context of Internet of Things aiming to improve network scalability and reduce the energy consumption of mobile users. The system model is mainly built upon the M/M/k queueing system that has been widely used in most relevant works. First, the energy saving mechanism is formulated as a 0-1 knapsack problem where the weight and value of each small base station is determined by the utilization and proportion of computing tasks at that base station, respectively. The problem is then solved using the dynamic programming approach which showed significant energy saving performance while maintaining the cloud response time at desired levels. Afterwards, the energy saving mechanism is applied on edge computing to reduce the amount of under-utilized virtual machines in edge devices. Herein, the square-root staffing rule and the Halfin-Whitt function are used to determine the minimum number of virtual machines required to maintain the queueing probability below a threshold value. On the user level, reducing energy consumption can be achieved by maximizing data rate provision to reduce the task completion time, and hence, the transmission energy. Herein, a NOMA-based scheme is introduced, particularly, the sparse code multiple access (SCMA) technique that allows subcarriers to be shared by multiple users. Not only does SCMA help provide higher data rates but also increase the number of accommodated users. In this context, a power optimization and codebook allocation problems are formulated and solved using the water-filling and heuristic approaches, respectively. Results show that SCMA can significantly improve data rate provision and accommodate more mobile users with improved user satisfaction.


FACETS ◽  
2019 ◽  
Vol 4 (1) ◽  
pp. 105-110 ◽  
Author(s):  
Benoit Talbot ◽  
Nusha Keyghobadi ◽  
Brock Fenton

Cimicid insects, bed bugs and their allies, include about 100 species of blood-feeding ectoparasites. Among them, a few have become widespread and abundant pests of humans. Cimicids vary in their degree of specialization to hosts. Whereas most species specialize on insectivorous birds or bats, the common bed bug can feed on a range of distantly related host species, such as bats, humans, and chickens. We suggest that association with humans and generalism in bed bugs led to fundamentally different living conditions that fostered rapid growth and expansion of their populations. We propose that the evolutionary and ecological success of common bed bugs reflected exploitation of large homeothermic hosts (humans) that sheltered in buildings. This was a departure from congeners whose hosts are much smaller and often heterothermic. We argue that interesting insights into the biology of pest species may be obtained using an integrated view of their ecology and evolution.


2013 ◽  
Vol 392 ◽  
pp. 867-871
Author(s):  
Ming Xia Lv ◽  
Yan Kun Lai ◽  
Dong Tang

The total throughput of the communication system can be maximized by allocating the common radio resource to the user or the user group having the best channel quality at a given time and the multiuser diversity gain can be obtained when multiple users share the same channel at one time. The object to select the users is to select the users with the maximum sum capacity. As for a scheduling algorithm, exhaustive algorithm can get the largest capability of the system by multi-user scheduling. However, this algorithm is quite complex hence the cost of operation to a base station has substantial increased. We compare the multiuser performance of two fast user selection algorithms with low complexity in MIMO-MRC systems with co-channel interferences. From the simulation results, these two algorithms not only decrease the computational complexity of the scheduling algorithm but also retain large capability of the MIMO system.


Author(s):  
Edmond Boulle

This chapter outlines certain core legal topics that arise in connection with the delivery of a separated payload into or beyond Earth orbit. The first part deals with some of the established approaches to procuring launch services, as well as some of the common features of launch service agreements that balance the interests of the launch service provider and its customer. The second part of the chapter looks at governmental authorization required to carry out a launch. While safety standards and success rates continually improve, launching a space object is still the riskiest part of most space missions and is therefore a carefully regulated aspect of space activity, with participants having to obtain prior authorization from a competent national authority. Finally, the third part explores some of the legal consequences in international law of launching a space object, including the maintenance of a register of space objects launched, and the burden of liability that is placed on “launching states.”


2016 ◽  
Vol 6 (3) ◽  
pp. 15-31 ◽  
Author(s):  
Usha Divakarla ◽  
K. Chandrasekaran

Trust is the common factor of any network security. In cloud, trust is the major factor as this trust develops a relation between the user and resource of the service provider. To develop a strong trust there has to be a strong trust path between two entities. The model proposed builds a strong trust path between two important entities in cloud namely user and resources of the service provider. The trust path thus built strengthens the security of the resources as well as the authentication of the user. The implementation proved that trust model developed is more efficient in terms of computation time.


2020 ◽  
pp. 545-550
Author(s):  
Zaid Mujaiyid Putra Bin Ahmad Baidowi ◽  
◽  
Xiaoli Chu

In this paper, we propose to maximize the Energy Efficiency (EE) of a two-tier network by jointly optimizing the number of active small cell base stations (SBSs) and the user-cell association. We apply the concept of signaling and data separation where a macro cell base station (MBS) provides full coverage while the SBSs provide high data transmission. First, we model the spatial distributions of the SBSs and mobile users following two independent Poisson Point Processes (PPP) and derive the expressions for the Signal-to-Interference Ratio (SIR), user cell associations, power consumption and energy efficiency of the Heterogeneous Network (HetNet). Then, we formulate the EE maximization problem and solve it by proposing the Switching off Decision and User Association (SODUA) algorithm. The algorithm associates a mobile user to an SBS that offers the highest SIR and calculates the load of each SBS. The algorithm, then, decides to switch off the SBSs that have fewer mobile users than a threshold value, where the mobile users will be offloaded to a nearby SBS that offers the highest SIR. Finally, we calculate the EE of the HetNet. We compare the EE achieved by the proposed algorithm (i.e. after offloading) and that "without offloading". The results show that the proposed algorithm improves the EE of the HetNet and that the EE cannot be further improved by switching off more SBSs than a certain number.


2018 ◽  
Vol 1 (2) ◽  
pp. 38
Author(s):  
Jingbo Yan

In recent years, the rapid growth of the number of private cars has greatly increased the traffc pressure, so the quality of roads and bridges should be further improved. The paper expounds the related matters of road and bridge engineering from three aspects. Firstly, it expounds the construction principles of road and bridge engineering, which are regarded as the theoretical basis of follow-up research. Secondly, it analyzes the common diseases of road and bridge engineering, including bridgehead damage, reinforcement corrosion, and subgrade uneven settlement, etc. Finally, it puts forward the construction treatment technology of road and bridge engineering on the basis of the construction principles and taking the common diseases as reference.


2021 ◽  
Author(s):  
S. Sweetline Shamini ◽  
A.P. Anuja ◽  
B. Archana ◽  
P. Premalakshmi

The communication network is one of the major assistances for disaster management purposes. At each disaster phase, the information flow between the disaster management departments and the population is critical, as it destroys the whole communication infrastructure where the base station to Mobile Switching Centre (MSC) connectivity is broken, power generators are exhausted, and the network may suffer from congestion. Even when radio equipment works, police officers, rescue teams, medical teams cannot communicate with each other because of incompatible radios. To analyze the characteristics of the geological environment in the disaster region and to alert the Disaster Management Department, this solution based on LoRa has been proposed. The penultimate goal of this paper is to fasten the rescue operations.


Sign in / Sign up

Export Citation Format

Share Document