Filters
total: 2687
displaying 1000 best results Help
Search results for: HANDOVER ALGORITHMS
-
Logical Interface for Soft Handover – an effective scheme of handovers in Proxy Mobile IPv6
PublicationMultimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces...
-
Performance analysis of mobility protocols and handover algorithms for IP-based networks
PublicationA rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Mobility Management Solutions for IP Networks Comparative Analysis of IP-based Mobility Protocols and Handover Algorithms Invited Paper
PublicationA rapid growth of IP-based networks and services hascreated a vast collection of resources and functionalities availableto users by means of a uniform method of access offered by the IPprotocol. At the same time, advances in the design of mobileelectronic devices allowed them to reach a utility levelcomparable to desktop computers, while still retaining theirmobility advantage. Unfortunately, the base IP protocol does notperform...
-
Algorithms
Journals -
NUMERICAL ALGORITHMS
Journals -
Analysis of IPv6 handovers in IEEE 802.16 environment
PublicationThe second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...
-
Analysis of IPv6 Handovers in IEEE 802.16 environment
PublicationZaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...
-
Simultaneous handover scheme for IEEE 802.11 WLANs with IEEE 802.21 tiggers
PublicationHandover performance in wireless networks is important, especially nowadays, when multimedia services are becoming increasingly available over the wireless devices. However, users expect uncompromised mobility when using the service. Thus, the support of multimedia services is not possible if handover is inefficient. At the same time it is clear that a strict separation between IP Layer and the Link Layer results in built-in sources...
-
A Test-Bed Analysis of Simultaneous PMIPv6 Handover in 802.11 WLANs Environment
PublicationProviding mobility in access networks is a challenge that we have to deal with. Due to networks’ convergence and migration to all-IP networks, mobility management at the network layer is required. However, there is a need for cooperation mechanisms between the network layer and lower layers to support multimedia services and make handover more efficient. This paper presents experimental research on simultaneous handover performance...
-
Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks
PublicationThe paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...
-
ACM Transactions on Algorithms
Journals -
Algorithms for Molecular Biology
Journals -
RANDOM STRUCTURES & ALGORITHMS
Journals -
Efficient handover scheme for Mobile IPv4 over IEEE 802.11 networks with IEEE 802.21 triggers.
PublicationEfektywność przełączania jest bardzo istotnym parametrem, decydującym o pracy sieci bezprzewodowych, realizujacych usługi multimedialne na wysokim poziomie jakości. Użytkownicy takich sieci oczekują ciągłej obsługi podczas procesu przemieszczania się. Okazuje się, że istotnym źródlem opóźnień są nieefektywne procedury przełączania w warstwach drugiej i trzeciej, wynikający częściowo z postulatu o separacji funkcji realizowanych...
-
Effect of Soft Handover on the Capacity of WCMDA/FDD Interfece Using MRC RAKE Receiver in Uplink
PublicationIn the paper the mechanism of soft and hard hanover in UMTS is presented. Simulation tests for different services having various performance requirements and transmission rates have beeen made. Simulation results showing effect of soft handover in comparison with hard handover on the capacity of WCMDA/FDD radio interfaceare described, when the RAKE receiver with Maximal Ratio Combining has been implemented in RNC.
-
Analysis of profitability of inter-system handovers between IEEE 802.11band UMTS
PublicationCelem pracy jest analiza opłacalności przełączenia pomiędzy sieciami IEEE 802.11b i UMTS w przypadku używania Mobile IPv4. Analiza została przeprowadzona między innymi w zależności od przepustowości kanału dostępnego w sieci UMTS, jakości połączenia radiowego, ilości użytkowników w sieci 802.11b, rodzaju generowanego ruchu oraz wymagań jakościowych (QoS) tego ruchu. Szczegółowe symulacje zostały przeprowadzone przy użyciu NS2 oraz...
-
Algorithmic Finance
Journals -
Long-term simulation of the activated sludge process at the Hanover-Gümmerwald pilot WWTP
PublicationCelem badań było uzyskanie zweryfikowanego modelu ASM3P, który mógłby być wykorzystany jako narzędzie decyzyjne do wyznaczania maksymalnych przepływów w oczyszczalniach ścieków. Symulacje przeprowadzono w oparciu o wyniki badań obciążeń hydraulicznych w pilotowej oczyszczalni ścieków Hanower-Gummerwald. Wyniki symulacji zostały porównane z wynikami pomiarów on-line w komorach osadu czynnego (N-NH4, N-NO3) oraz w odpływie z osadnika...
-
Journal of Algorithms & Computational Technology
Journals -
Discrete Mathematics Algorithms and Applications
Journals -
Algorithms, Archtectures, Arrangements and Applications
Journals -
Continuous Optimisation Algorithms
PublicationKsiążka poświęcona jest zagadnieniom optymalizacji ciągłej. Oprócz klasycznych algorytmów gradientowych omawiane są w współczesne algorytmy bezgradientowe, które stosowane są z powodzeniem w optymalizacji globalnej. Większość prezentowanych algorytmów określona może być mianem metaheurystycznych. Zaliczyć do nich można metody optymalizacji inspirowane procesami zachodzącymi w przyrodzie, które dalej można dzielić na inspirowane...
-
Subspace Algorithms for Face Verification
PublicationW rzeczywistych zastosowaniach problem weryfikacji wydaje się ważniejszy od klasyfikacji. Na ogół dysponujemy jedynie niewielkim zbiorem obrazów uczących reprezentujących daną osobę, a naszym zadaniem jest podjęcie decyzji odnośnie tego, czy nowo pozyskana fotografia jest do nich wystarczająco podobna - bez użycia oddzielnego zbioru przykładów negatywnych. W takim przypadku uzasadnione wydaje się zastosowanie metody podprzestrzeni,...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Finite-window RLS algorithms
PublicationTwo recursive least-squares (RLS) adaptive filtering algorithms are most often used in practice, the exponential and sliding (rectangular) window RLS algorithms. This popularity is mainly due to existence of low-complexity versions of these algorithms. However, these two windows are not always the best choice for identification of fast time-varying systems, when the identification performance is most important. In this paper, we...
-
A study of nighttime vehicle detection algorithms
Open Research DataThis dataset is from my master's thesis "A study of nighttime vehicle detection algorithms". It contains both raw data and preprocessed dataset ready to use. In the pictures below you can see how images were annotated.
-
Comparative Analysis of microRNA-Target Gene Interaction Prediction Algorithms - The Attempt to Compare the Results of Three Algorithms
Publication -
ACM Transactions on Spatial Algorithms and Systems
Journals -
World Research Journal of Transactions on Algorithms
Journals -
Journal of Algorithms-Cognition Informatics and Logic
Journals -
Journal of Experimental Algorithmics
Journals -
Evolutionary Algorithms in MPLS network designing
PublicationMPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....
-
Compression algorithms for multibeam sonar records
PublicationJednym z najczęściej używanych urządzeń służących do szeroko rozumianego telemonitoringu morskiego są sonary wielowiązkowe (ang. Multibeam systems MBS). Ich wysoka wydajność w tworzeniu informacji o obiektach znajdujących się pod wodą skutkuje w dużych ilościach danych pozyskiwanych podczas rejsów badawczych i pomiarowych. W tym kontekście, proces przechowywania i zarządzania takim magazynem danych staje się istotnym problemem...
-
Prototype selection algorithms for distributed learning
Publication -
New Algorithms for Adaptive Notch Smoothing
PublicationThe problem of extraction/elimination of a nonstationary complex sinusoidal signal buried in noise is considered. This problem is usually solved using adaptive notch filtering (ANF)algorithms. It is shown that accuracy of signal estimation can be increased if the results obtained from ANF are further processed using a cascade of appropriately designed filters. The resulting adaptive notch smoothing (ANS) algorithms can be employed...
-
Extinction Event Concepts for the Evolutionary Algorithms
PublicationThe main goal of this present paper is to propose a structure for a tool helping to determine how algorithm would react in a real live application, by checking it's adaptive capabilities in an extreme situation. Also a different idea of an additional genetic operator is being presented. As Genetic Algorithms are directly inspired by evolution, extinction events, which are elementary in our planet's development history, became...
-
Interoperability Constraints in Service Selection Algorithms
PublicationIn Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...
-
Iterative Algorithms for Multilayer Optimizing Control
PublicationMonografia przedstawia struktury, koncepcje i algorytmy dla wielowarstwowego sterowania optymalizującego procesami przemysłowymi będące w przeważającym stopniu wynikiem badań prowadzonych przez jej autorów. Metodologie i algorytmy sterowania są starannie ilustrowane wynikami symulacji dla wybranych przykładowych systemów. Oprócz tego przedstawione są zastosowania do realnych obiektów przemysłowych: kolumny destylacyjnej etyliny,...
-
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Marine and Cosmic Inspirations for AI Algorithms
PublicationArtificial Intelligence (AI) is a scientific area that currently sees an enormous growth. Various new algorithms and methods are developed and many of them meets practical, successful applications. Authors of new algorithms draw different inspirations. Probably the most common one is the nature. For example, Artificial Neural Networks were inspired by the structure of human brain and nervous system while the classic Genetic Algorithm...
-
Microphone placement through meta-heuristic algorithms
Publication -
Intelligent algorithms for movie sound track restoration
PublicationW artykule przedstawiono dwa algorytmy do rekonstruowania optycznych ścieżek dźwiękowych. Pierwszy z nich jest zastosowaniem miary nieprzewidywalności do obliczeń parametrów modelu psychoakustycznego stosowanego do redukowania szumów. Drugi stanowi precyzyjną procedurę oceny pasożytniczej modulacji częstotliwości, opartej na analizie składowych harmonicznych. Wyniki zastosowania obu wymienionych algorytmów są zawarte w artykule.
-
Vehicle classification based on soft computing algorithms
PublicationExperiments and results regarding vehicle type classification are presented. Three classes of vehicles are recognized: sedans, vans and trucks. The system uses a non-calibrated traffic camera, therefore no direct vehicle dimensions are used. Various vehicle descriptors are tested, including those based on vehicle mask only and those based on vehicle images. The latter ones employ Speeded Up Robust Features (SURF) and gradient images...
-
Application of genetic algorithms in graph searching problem
PublicationGraph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...
-
Algorithms of chemicals detection using raman spectra
PublicationRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Performance Evaluation of Preemption Algorithms in MPLS Networks
PublicationPreemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...
-
Comparison of satellite chlorophyll a algorithms for the Baltic Sea
Publication -
Transient detection algorithms for speech coding applications
Publication -
SEMANTIC ANALYSIS ALGORITHMS FOR KNOWLEDGE WORKERS SUPPORT
PublicationThe paper examines various aspects of text analysis application for knowledge worker’s activity realization. Conclusions are drawn about the relevance and importance of processing the non-structured textual information in order to increase knowledge worker’s efficiency, as well as their awareness in different branches of science. The paper considers the existing algorithms of texts semantic analysis as the sphere of documents topical...