Search results for: HANDOVER ALGORITHMS - Bridge of Knowledge

Search

Search results for: HANDOVER ALGORITHMS

Filters

total: 2703
filtered: 2388

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: HANDOVER ALGORITHMS

  • Logical Interface for Soft Handover – an effective scheme of handovers in Proxy Mobile IPv6

    Publication

    - Year 2015

    Multimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces...

  • Performance analysis of mobility protocols and handover algorithms for IP-based networks

    Publication

    A rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...

  • Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs

    Publication

    A rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...

    Full text available to download

  • Mobility Management Solutions for IP Networks Comparative Analysis of IP-based Mobility Protocols and Handover Algorithms Invited Paper

    Publication

    - Year 2012

    A rapid growth of IP-based networks and services hascreated a vast collection of resources and functionalities availableto users by means of a uniform method of access offered by the IPprotocol. At the same time, advances in the design of mobileelectronic devices allowed them to reach a utility levelcomparable to desktop computers, while still retaining theirmobility advantage. Unfortunately, the base IP protocol does notperform...

    Full text to download in external service

  • Analysis of IPv6 Handovers in IEEE 802.16 environment

    Zaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...

    Full text available to download

  • Analysis of IPv6 handovers in IEEE 802.16 environment

    The second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...

    Full text available to download

  • Simultaneous handover scheme for IEEE 802.11 WLANs with IEEE 802.21 tiggers

    Handover performance in wireless networks is important, especially nowadays, when multimedia services are becoming increasingly available over the wireless devices. However, users expect uncompromised mobility when using the service. Thus, the support of multimedia services is not possible if handover is inefficient. At the same time it is clear that a strict separation between IP Layer and the Link Layer results in built-in sources...

    Full text available to download

  • Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks

    Publication

    The paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...

    Full text available to download

  • A Test-Bed Analysis of Simultaneous PMIPv6 Handover in 802.11 WLANs Environment

    Publication

    - Year 2013

    Providing mobility in access networks is a challenge that we have to deal with. Due to networks’ convergence and migration to all-IP networks, mobility management at the network layer is required. However, there is a need for cooperation mechanisms between the network layer and lower layers to support multimedia services and make handover more efficient. This paper presents experimental research on simultaneous handover performance...

    Full text to download in external service

  • Effect of Soft Handover on the Capacity of WCMDA/FDD Interfece Using MRC RAKE Receiver in Uplink

    In the paper the mechanism of soft and hard hanover in UMTS is presented. Simulation tests for different services having various performance requirements and transmission rates have beeen made. Simulation results showing effect of soft handover in comparison with hard handover on the capacity of WCMDA/FDD radio interfaceare described, when the RAKE receiver with Maximal Ratio Combining has been implemented in RNC.

  • Efficient handover scheme for Mobile IPv4 over IEEE 802.11 networks with IEEE 802.21 triggers.

    Publication

    - Year 2008

    Efektywność przełączania jest bardzo istotnym parametrem, decydującym o pracy sieci bezprzewodowych, realizujacych usługi multimedialne na wysokim poziomie jakości. Użytkownicy takich sieci oczekują ciągłej obsługi podczas procesu przemieszczania się. Okazuje się, że istotnym źródlem opóźnień są nieefektywne procedury przełączania w warstwach drugiej i trzeciej, wynikający częściowo z postulatu o separacji funkcji realizowanych...

  • Analysis of profitability of inter-system handovers between IEEE 802.11band UMTS

    Publication

    - Year 2003

    Celem pracy jest analiza opłacalności przełączenia pomiędzy sieciami IEEE 802.11b i UMTS w przypadku używania Mobile IPv4. Analiza została przeprowadzona między innymi w zależności od przepustowości kanału dostępnego w sieci UMTS, jakości połączenia radiowego, ilości użytkowników w sieci 802.11b, rodzaju generowanego ruchu oraz wymagań jakościowych (QoS) tego ruchu. Szczegółowe symulacje zostały przeprowadzone przy użyciu NS2 oraz...

  • Long-term simulation of the activated sludge process at the Hanover-Gümmerwald pilot WWTP

    Publication

    - Year 2005

    Celem badań było uzyskanie zweryfikowanego modelu ASM3P, który mógłby być wykorzystany jako narzędzie decyzyjne do wyznaczania maksymalnych przepływów w oczyszczalniach ścieków. Symulacje przeprowadzono w oparciu o wyniki badań obciążeń hydraulicznych w pilotowej oczyszczalni ścieków Hanower-Gummerwald. Wyniki symulacji zostały porównane z wynikami pomiarów on-line w komorach osadu czynnego (N-NH4, N-NO3) oraz w odpływie z osadnika...

  • Continuous Optimisation Algorithms

    Publication

    - Year 2016

    Książka poświęcona jest zagadnieniom optymalizacji ciągłej. Oprócz klasycznych algorytmów gradientowych omawiane są w współczesne algorytmy bezgradientowe, które stosowane są z powodzeniem w optymalizacji globalnej. Większość prezentowanych algorytmów określona może być mianem metaheurystycznych. Zaliczyć do nich można metody optymalizacji inspirowane procesami zachodzącymi w przyrodzie, które dalej można dzielić na inspirowane...

  • Subspace Algorithms for Face Verification

    Publication

    - Year 2011

    W rzeczywistych zastosowaniach problem weryfikacji wydaje się ważniejszy od klasyfikacji. Na ogół dysponujemy jedynie niewielkim zbiorem obrazów uczących reprezentujących daną osobę, a naszym zadaniem jest podjęcie decyzji odnośnie tego, czy nowo pozyskana fotografia jest do nich wystarczająco podobna - bez użycia oddzielnego zbioru przykładów negatywnych. W takim przypadku uzasadnione wydaje się zastosowanie metody podprzestrzeni,...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • Finite-window RLS algorithms

    Publication

    - SIGNAL PROCESSING - Year 2022

    Two recursive least-squares (RLS) adaptive filtering algorithms are most often used in practice, the exponential and sliding (rectangular) window RLS algorithms. This popularity is mainly due to existence of low-complexity versions of these algorithms. However, these two windows are not always the best choice for identification of fast time-varying systems, when the identification performance is most important. In this paper, we...

    Full text available to download

  • Comparative Analysis of microRNA-Target Gene Interaction Prediction Algorithms - The Attempt to Compare the Results of Three Algorithms

    Publication

    - Year 2016

    Full text to download in external service

  • New Algorithms for Adaptive Notch Smoothing

    The problem of extraction/elimination of a nonstationary complex sinusoidal signal buried in noise is considered. This problem is usually solved using adaptive notch filtering (ANF)algorithms. It is shown that accuracy of signal estimation can be increased if the results obtained from ANF are further processed using a cascade of appropriately designed filters. The resulting adaptive notch smoothing (ANS) algorithms can be employed...

    Full text available to download

  • Extinction Event Concepts for the Evolutionary Algorithms

    Publication

    - Przegląd Elektrotechniczny - Year 2012

    The main goal of this present paper is to propose a structure for a tool helping to determine how algorithm would react in a real live application, by checking it's adaptive capabilities in an extreme situation. Also a different idea of an additional genetic operator is being presented. As Genetic Algorithms are directly inspired by evolution, extinction events, which are elementary in our planet's development history, became...

    Full text available to download

  • Evolutionary Algorithms in MPLS network designing

    Publication

    - Year 2008

    MPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....

    Full text to download in external service

  • Compression algorithms for multibeam sonar records

    Publication

    - HYDROACOUSTICS - Year 2008

    Jednym z najczęściej używanych urządzeń służących do szeroko rozumianego telemonitoringu morskiego są sonary wielowiązkowe (ang. Multibeam systems MBS). Ich wysoka wydajność w tworzeniu informacji o obiektach znajdujących się pod wodą skutkuje w dużych ilościach danych pozyskiwanych podczas rejsów badawczych i pomiarowych. W tym kontekście, proces przechowywania i zarządzania takim magazynem danych staje się istotnym problemem...

    Full text available to download

  • Prototype selection algorithms for distributed learning

    Publication

    Full text to download in external service

  • Comparison and Analysis of Service Selection Algorithms

    Publication

    - Year 2013

    In Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...

  • Marine and Cosmic Inspirations for AI Algorithms

    Publication

    Artificial Intelligence (AI) is a scientific area that currently sees an enormous growth. Various new algorithms and methods are developed and many of them meets practical, successful applications. Authors of new algorithms draw different inspirations. Probably the most common one is the nature. For example, Artificial Neural Networks were inspired by the structure of human brain and nervous system while the classic Genetic Algorithm...

    Full text available to download

  • Interoperability Constraints in Service Selection Algorithms

    Publication

    - Year 2012

    In Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...

  • Iterative Algorithms for Multilayer Optimizing Control

    Publication

    - Year 2005

    Monografia przedstawia struktury, koncepcje i algorytmy dla wielowarstwowego sterowania optymalizującego procesami przemysłowymi będące w przeważającym stopniu wynikiem badań prowadzonych przez jej autorów. Metodologie i algorytmy sterowania są starannie ilustrowane wynikami symulacji dla wybranych przykładowych systemów. Oprócz tego przedstawione są zastosowania do realnych obiektów przemysłowych: kolumny destylacyjnej etyliny,...

  • Fast algorithms for identyfication of periodiccaly varying systems.

    Praca dotyczy identyfikacji obiektów o parametrach zmieniających się w sposób okresowy. Zaproponowane algorytmy śledzenia parametrów cechują się niską złożonością obliczeniową, typową dla podejścia gradientowego a zarazem wysoką jakością śledzenia typową dla złożonych algorytmów opartych na metodzie funkcji bazowych.

  • STRUCTURE AND ALGORITHMS OF A DIAGNOSTIC DEVICE IN A WHEELED TRACTOR

    Publication

    - Diagnostyka - Year 2013

    Diagnostic device monitors the tractor’s technical condition and identifies the location of damaged components during operation. The diagnostic device detects and identifies the following types of defects: functional defects (uf) which affect performance, exhaust defects (ue) which increase toxic emissions and fuel consumption, defects that jeopardize driving safety (us), defects that affect engine performance (ud). The key component...

    Full text available to download

  • Extending Service Selection Algorithms with Interoperability Analysis

    Application development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...

    Full text to download in external service

  • Comparison of satellite chlorophyll a algorithms for the Baltic Sea

    Publication

    - Journal of Applied Remote Sensing - Year 2014

    Full text to download in external service

  • Transient detection algorithms for speech coding applications

    Publication

    - Journal of the Acoustical Society of America - Year 2006

    Full text to download in external service

  • A Survey on the Datasets and Algorithms for Satellite Data Applications

    Recent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...

    Full text to download in external service

  • Performance Evaluation of Preemption Algorithms in MPLS Networks

    Preemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...

    Full text available to download

  • Vehicle classification based on soft computing algorithms

    Experiments and results regarding vehicle type classification are presented. Three classes of vehicles are recognized: sedans, vans and trucks. The system uses a non-calibrated traffic camera, therefore no direct vehicle dimensions are used. Various vehicle descriptors are tested, including those based on vehicle mask only and those based on vehicle images. The latter ones employ Speeded Up Robust Features (SURF) and gradient images...

    Full text to download in external service

  • Application of genetic algorithms in graph searching problem

    Graph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...

  • Algorithms of chemicals detection using raman spectra

    Raman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...

    Full text available to download

  • Intelligent algorithms for movie sound track restoration

    W artykule przedstawiono dwa algorytmy do rekonstruowania optycznych ścieżek dźwiękowych. Pierwszy z nich jest zastosowaniem miary nieprzewidywalności do obliczeń parametrów modelu psychoakustycznego stosowanego do redukowania szumów. Drugi stanowi precyzyjną procedurę oceny pasożytniczej modulacji częstotliwości, opartej na analizie składowych harmonicznych. Wyniki zastosowania obu wymienionych algorytmów są zawarte w artykule.

    Full text to download in external service

  • Microphone placement through meta-heuristic algorithms

    Publication

    - Year 2019

    Full text to download in external service

  • Swarm Algorithms in Modern Engineering Optimization Problems

    Publication

    Complexity of today engineering problems is constantly increasing. Scientists no longer are facing issues, for which simple, mathematical programming methods are sufficient. Issues like autonomic vehicle navigation or classification are considered to be challenging, and although there exist valid means to solve them, in some cases there still is some place for improvement. With emergence of a new type of optimization techniques...

    Full text to download in external service

  • Parallelization of video stream algorithms in kaskada platform

    Publication

    - Year 2011

    The purpose of this work is to present different techniques of video stream algorithms parallelization provided by the Kaskada platform - a novel system working in a supercomputer environment designated for multimedia streams processing. Considered parallelization methods include frame-level concurrency, multithreading and pipeline processing. Execution performance was measured on four time-consuming image recognition algorithms,...

  • On zero-error codes produced by greedy algorithms

    We present two greedy algorithms that determine zero-error codes and lower bounds on the zero-error capacity. These algorithms have many advantages, e.g., they do not store a whole product graph in a computer memory and they use the so-called distributions in all dimensions to get better approximations of the zero-error capacity. We also show an additional application of our algorithms.

    Full text available to download

  • SEMANTIC ANALYSIS ALGORITHMS FOR KNOWLEDGE WORKERS SUPPORT

    Publication

    - Year 2017

    The paper examines various aspects of text analysis application for knowledge worker’s activity realization. Conclusions are drawn about the relevance and importance of processing the non-structured textual information in order to increase knowledge worker’s efficiency, as well as their awareness in different branches of science. The paper considers the existing algorithms of texts semantic analysis as the sphere of documents topical...

    Full text available to download

  • Multi-agent graph searching and exploration algorithms

    Publication

    - Year 2020

    A team of mobile entities, which we refer to as agents or searchers interchangeably, starting from homebases needs to complete a given task in a graph.The goal is to build a strategy, which allows agents to accomplish their task. We analyze strategies for their effectiveness (e.g., the number of used agents, the total number of performed moves by the agents or the completion time).Currently, the fields of on-line (i.e., agents...

    Full text available to download

  • An experimental study of distributed algorithms for graph coloring.

    W pracy podano algorytm rozproszonego kolorowania grafówi porównano ze znanym wcześniej algorytmem.

  • Analysis of bandwidth reservation algorithms in HIPERLAN/2.

    Publication

    - Year 2004

    Zaprezentowano metody alokacji zasobów (pasma) w systemie HIPERLAN/2. Przedyskutowano efektywność funkcjonowania typowych algorytmów pracy podwarstwy MAC oraz zaproponowano modyfikację jednego z algorytmów, polegającą na wstępnej rezerwacji pasma i okresowym uaktualnianiu przydziału zasobów. Dokonano weryfikacji symulacyjnej zaproponowanych rozwiązań.

  • Intelligent algorithms for optical track audio restoration

    W referacie przedstawiono dwa algorytmy dedykowane redukcji pasożytniczych zniekształceń dźwięku spotykanych w optycznych ścieżkach dźwiękowych. Pierwszy algorytm umożliwia redukcję szerokopasmowego szumu w nagraniach fonicznych. Wykorzystano w nim psycho-akustyczny model słuchu oparty o miarę nieprzewidywalność sygnału (ang. Unpredictability Measure). Ocena jakości redukcji szumu została wykonana z wykorzystaniem metod inteligentnych....

  • Performance comparison of new modified gradient algorithm and Foy algorithm for iterative position calculation

    In the paper a new position calculation algorithm is presented. It is proposed for indoor environments and is called modified gradient algorithm. This algorithm is compared with well-known Foy algorithm. The comparative analysis is based on real distance measurements conducted in indoor environment.

    Full text to download in external service

  • Evolutional algorithm in stock control

    Publication
    • K. Jakowska-Suwalska
    • A. Sojda
    • M. Wolny

    - Year 2011

    Full text to download in external service

  • A New Heuristic Algorithm for Effective Preemption in MPLS Networks

    Publication

    - Year 2006

    W artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...