Maximum Possibility Of Spectrum Access In Cognitive Radio Using Fuzzy Logic System
|
|
- Christopher Lucas
- 7 years ago
- Views:
Transcription
1 Maimum Possibiity Of Spectrum Access In Cognitive Radio Using Fuzzy Logic System K.Gowrishankar, Dr.C.Chandrasekar 2, R.Kaniezhi 3 Research Schoar, Department of Computer Science, Periyar University, Saem. 2 Associate Professor, Department of Computer Science, Periyar University, Saem. 3 Ph.D Research Schoar, Department of Computer Science, Periyar University, Saem. ABSTRACT Many spectrum methods have been proposed to use spectrum effectivey, the opportunistic spectrum access has become the most viabe approach to achieve near-optima spectrum utiization by aowing secondary users to sense and access avaiabe spectrum opportunisticay. However, a naive spectrum access for secondary users can make spectrum utiization inefficient and increase interference to adjacent users. In this paper, we propose a nove approach using Fuzzy Logic System (FLS) to contro the spectrum access. We have to minimize the ca bocking and interference. The inguistic knowedge of spectrum access are based on three descriptors namey spectrum utiization efficiency of the secondary user, its degree of mobiity, and its distance to the primary user. The spectrum is chosen for accessing based on the maimum possibiity for better utiization of the spectrum Keywords CR, FLS, Interference, Spectrum users, Spectrum Utiization. I. INTRODUCTION In recent studies, the spectrum aocated by the traditiona approach shows that the spectrum aocated to the primary user is under-utiized and the demand for accessing the imited spectrum is growing increasingy. Spectrum is no onger sufficienty avaiabe, because it has been assigned to primary users that own the privieges to their assigned spectrum. However, it is not used efficienty most of the time. In order to use the spectrum in an opportunistic manner and to the increase spectrum avaiabiity, the unicensed users can be aowed to utiize icensed bands of icensed users, without causing any interference with the assigned service. The reason for aowing the unicensed users to utiize icensed bands of icensed users if they woud not cause any interference with the assigned service. This paradigm for wireess communication is known as opportunistic spectrum access and this is considered to be a feature of Cognitive Radio (CR). Cognitive radio is an emerging wireess communication paradigm. The main chaenge to opportunistic radio spectrum access ies in finding baance in conficting goas of satisfying performance requirements for secondary user (SU) whie minimizing interference to the active primary users (PU) and other secondary users. Secondary user shoud not degrade performance statistics of icensed primary users. In order to achieve these tasks, secondary user is required to recognize primary users, determine environment characteristics and quicky adapt its system parameters corresponding to the operating environment. Main abiities of cognitive radio (CR) with opportunistic radio spectrum access capabiities are spectrum sensing, dynamic frequency seection and adaptive transmit power contro. This paper presents a nove approach using Fuzzy ogic system to utiize the avaiabe spectrum by the secondary users without interfering the primary user. The paper is organized as foows; Section 2 and 3 defines cognitive radio and fuzzy ogic system for its impementation. In section 4, opportunistic spectrum access by Fuzzy ogic system to improve the spectrum efficiency. Section 5 and 6 presents the Knowedge Processing with Opportunistic Spectrum Access and simuation resuts. Finay, concusions are presented in Section 7. II. COGNITIVE RADIO The idea of cognitive radio was first presented officiay in an artice by Joseph Mitoa III and Gerad Q. Maguire, Jr in 999. Reguatory bodies in various countries found that most of the radio frequency spectrum was inefficienty utiized. For eampe, ceuar network bands are overoaded in most parts of the word, but amateur radio and paging frequencies are not. This can be eradicated using the dynamic spectrum access. The key enabing technoogy of dynamic spectrum access techniques is cognitive radio (CR) technoogy, which provides the capabiity to share the wireess channe with icensed users in an opportunistic manner. From this definition, two main characteristics of the cognitive radio can be defined as foows: Cognitive capabiity: It refers to the abiity of the radio technoogy to capture or sense the information from its radio environment. Through this capabiity, the portions of the
2 spectrum that are unused at a specific time or ocation can be identified. Consequenty, the best spectrum and appropriate operating parameters can be seected. Reconfigurabiity: The cognitive capabiity provides spectrum awareness whereas reconfigurabiity enabes the radio to be dynamicay programmed according to the radio environment. A CR "monitors its own performance continuousy", in addition to "reading the radio's outputs"; it then uses this information to "determine the RF environment, channe conditions, ink performance, etc.", and adjusts the "radio's settings to deiver the required quaity of service subject to an appropriate combination of user requirements, operationa imitations, and reguatory constraints". Independent studies performed in some countries confirmed that observation and concuded that spectrum utiization depends strongy on time and pace. Moreover, fied spectrum aocation prevents rarey used frequencies (those assigned to specific services) from being used by unicensed users, even when their transmissions woud not interfere at a with the assigned service. More specificay, the cognitive radio technoogy wi enabe the users to ()determine which portions of the spectrum is avaiabe and detect the presence of icensed users when a user operates in a icensed band (spectrum sensing), (2) seect the best avaiabe channe (spectrum management), (3) coordinate access to this channe with other users (spectrum sharing), and (4) vacate the channe when a icensed user is detected (spectrum mobiity). III. FUZZY LOGIC SYSTEM A fuzzy ogic system (FLS) is unique in that it is abe to simutaneousy hande numerica data and inguistic knowedge. It is a noninear mapping of an input data (feature) vector into a scaar output, i.e., it maps numbers into numbers. Fuzzy sets theory is an eceent mathematica too to hande the uncertainty arising due to vagueness. Figure shows the structure of a fuzzy ogic system. Fig.. The Structure of the Fuzzy Logic System Since there is a need to fuzzify the fuzzy resuts we generate through a fuzzy system anaysis i.e., we may eventuay find a need to convert the fuzzy resuts to crisp resuts. Here, we may want to transform a fuzzy partition or pattern into a crisp partition or pattern; in contro we may want to give a singe-vaued input instead of a fuzzy input command. The dufuzzification has the resut of reducing a fuzzy set to a crisp singe-vaued quantity, or to a crisp set. Consider a fuzzy ogic system with a rue base of M rues, and et the th rue be denoted by R. Let each rue have p antecedents and one consequent (as is we known, a rue with q consequents can be decomposed into rues, each having the same antecedents and one different consequent), i.e., it is of the genera form p F R : IF u is, THEN v is F and u2 is G. 2 F and and u p is u,k,...p where k and v are the input and output F inguistic variabes, respectivey. Each k and G are subsets of possiby different universes of F U discourse. Let k k and G V. Each rue can R be viewed as a fuzzy reation from U to a set V U U,...,U where U is the Cartesian product p R. itsef is a subset of the Cartesian product U X V= (, y ) : U, y V (,,..., ), where 2 p and k and y are the points in the universes of U discourse k u and V of k and v. Whie appying a singeton fuzzification, when an ' ' ' ' ' X input, 2, 3,... p is appied, the degree of firing corresponding to the th rue is given by n i. (i ) n (i ) () Where denotes a T-norm, n represents the number of eements, i ( ) s are the eements and i is its membership function. There are many kinds of dufuzzification methods, but we have chosen the centre of sets method for iustrative purpose. It computes a crisp output for the FLS by first C computing the centroid, G of every consequent set G and, then computing weighted average of these centroids. The weight corresponding to the th rue consequent centroid is the degree of firing associated p ' T ( ) with the th F rue,, so that
3 y ' cos( ) M p ' C T ( ) G F M p ' T ( F ) where M is the number of rues in the FLS. (2) secondary users from the primary user. IV. OPPORTUNISTIC SPECTRUM ACCESS We design the fuzzy ogic for opportunistic spectrum access using cognitive radio. In this paper, we are seecting the best suitabe secondary users to access the avaiabe users without any interference with the primary users. This is coected based on the foowing three antecedents i.e., descriptors. They are Antecedent : Spectrum Utiization Efficiency Antecedent 2: Degree of Mobiity Antecedent 3: Distance of Secondary user to the PU. Fuzzy ogic is used because it is a mutivaued ogic and many input parameters can be considered to take the decision. Generay, the secondary user with the furthest distance to the primary user or the secondary user with maimum spectrum utiization efficiency can be chosen to access spectrum under the constraint that no interference is created for the primary user. In our approach, we combine the three antecedents to aocate spectrum opportunisticay inorder to find out the optima soutions using the fuzzy ogic system. Mobiity of the secondary user pays a vita roe in the proposed work. Wireess systems aso differ in the amount of mobiity that they have to aow for the users. Spectrum Mobiity is defined as the process when a cognitive radio user echanges its frequency of operation. The movement of the secondary user eads to a shift of the received frequency, caed the Dopper shift. Detecting signa from the primary user can be reduced using the Mobiity. The secondary user shoud detect the primary signa which determines the spectrum that is unused. If the secondary user fais to detect the primary signa, then it wi not determine eacty the spectrum that is unused. Thereby it eads to interference to the adjacent users. This is referred as the hidden node probem. Besides, we consider the distance between the primary user and the secondary users. Distance between the primary user and the secondary users were cacuated using the formua di Di 20 ma di (3) 2 2 di ( i p ) ( yi y p ) where users and p y and p i (4) are the distances of the primary y and i are the distances of the Fig. 2a. Membership Function(MF) used to represent the antecedent We appy different avaiabe spectrum inorder to find out the spectrum efficiency which is the main purpose of the opportunistic spectrum access strategy. Hence, we cacuate the spectrum efficiency as the ratio of average busy spectrum over tota avaiabe spectrum owned by secondary users. Fig. 2b. Membership Function(MF) used to represent the other antecedents Linguistic variabes are used to represent the spectrum utiization efficiency, distance and degree of mobiity are divided into three eves: ow, moderate, and high. whie we use 3 eves, i.e., near, moderate, and far to represent the distance. Fig. 2c. Membership Function(MF) used to represent the consequence The consequence, i.e., the possibiity that the secondary user is chosen to access the spectrum is
4 divided into five eves which are very ow, ow, medium, high and very high. We use trapezoida membership functions (MFs) to represent near, ow, far, high, very ow and very high, and triange MFs to represent moderate, ow, medium and high. MFs are shown in Fig. 2a, 2b, 2c. Since we have 3 antecedents and fuzzy subsets, we need setup rues for this FLS. V. KNOWLEDGE PROCESSING USING OPPORTUNISTIC SPECTRUM ACCESS Tabe summaries the various vaues based on the three antecedents and its consequence. cavg 5 i wi c 5 w i (5) wi is the number of choosing inguistic abe i which i for the consequence of rue and c is the centroid of the i th consequence set (i: ; 2;...; 5; : ; 2;...; 27). i Tabe 2 provides c for each rue. For every input (, 2, 3 ), the output y(, 2, 3 ) of the designed FLS is computed as y(, 2, 3 ) 27 F ( ) 27 i F ( ) F2 ( 2 ) F2 ( 2 ) c F ( avg 3 3 ) F3 ( 3 ) (6) Since we chose a singe consequent for each rue to form a rue base, we averaged the centroids of a the responses for each rue and used this average in pace of the rue consequent centroid. Doing this eads to rues that have the foowing form: R ' : If Degree of mobiity ( F ) is ; and its distance between primary user and the secondary users ( 2 F 2 ) is ; and the spectrum utiization efficiency of the secondary user ( 3 F 3 ) is, then the Possibiity (y) choosing the avaiabe spectrum is c avg, where =,2,..27 and foows: c avg is defined as which gives the possibiity that a secondary user is seected to access the avaiabe spectrum. The weighted average vaue for each rue is given in the Tabe 2. Tabe 3 gives the three Descriptors and Possibiity for four Secondary users. As isted in Tabe 3, at a particuar time, vaues of three descriptors and possibiity for four secondary user i.e., the secondary user chosen to the access the avaiabe spectrum is (SU4), the secondary user with the highest spectrum utiization is (SU2), the secondary user having the furthest distance to the
5 primary user is (SU3), and the secondary user with the owest mobiity is (SU4). Tabe 3. Three Descriptors and Possibiity for Four Secondary users Paramete SU SU2 SU3 SU4 rs Distance from Primary user to secondary users Degree of Mobiity 7 Spectrum Utiization Efficiency Possibiity From tabe 3, we see that SU has 6%, SU4 has 90% of Spectrum utiization efficiency, SU3 ony achieves 70.89% and SU4 achieves 90% of spectrum Utiization. Simiary, if we consider the Distance of primary user to the secondary users, SU has 8.0, SU2 has 2.6, SU3 has the furthest distance from the primary user 2.80and SU4 has Even though, if SU3 has furthest distance from the primary user but it has owest spectrum utiization (70.89%) and owest degree of mobiity. Thus, the secondary user wi seect the spectrum for accessing based on the highest possibiity rather than the highest spectrum utiization and the furthest distance from the primary user. VI. SIMULATION RESULTS In this section, we present simuation resuts on the performance of our proposed work based on Fuzzy ogic System. In the proposed work, we are choosing the avaiabe channe with the high possibiity and high spectrum utiization efficiency. To vaidate our approach, we randomy generated 20 secondary users over an area of 00 X 00 meters. The primary user was paced randomy in this area. Three descriptors were randomy generated for each secondary user. More specificay, the spectrum utiization efficiency of each secondary user was a random vaue in the interva [0,00] and its mobiity degree in [0,0]. Distances to the primary users were normaized to [0,0]. Fig. 3: Mean Arriva VS Ca bocking rate Fig. 3 shows the ca bocking of the service provider using the Fuzzy ogic system. As the ca arriva rate increases the bocking rate gets decreased. Traffic rate increases aong with the ca bocking rate. Fig. 4: Mean Arriva VS Interference using FLS When interference increases spectrum utiization wi decrease. The Fig. 4 shows that there is a decrease in the interference which provides an increase spectrum utiization using FLS. This eads to an efficient spectrum utiization.
6 Fig. 5: Distance of Secondary Users to the Primary users using FLS As iustrated in the Fig. 5, the distance from primary user to the secondary users is shown. The distance between primary user and the secondary users heps us for cacuating the possibiity for accessing the spectrum opportunisticay. Fig. 7: The opportunistic spectrum access decision surface for the cognitive user with a fied distance to the primary user: when the distance to the PU 3 = 7. Since it is impossibe to pot visuay, we fi one of three variabes of y(, 2, 3 ).More specificay, we fied the distance to the primary user 3. Two cases, i.e., 3 = and 3 =7, were considered. Figure 6 & 7 represents the opportunistic spectrum access decision surface for the cognitive user for these two cases. From Fig. 6&7, we see ceary that, at the same spectrum utiization efficiency and mobiity degree, secondary users further from the primary user have higher chance to access the spectrum. Fig. 6: The opportunistic spectrum access decision surface for the cognitive user with a fied distance to the primary user: when the distance to the PU 3 =. Fig. 8: An opportunistic spectrum access scenario in a specific space and a particuar time. The Fig. 8 iustrates that opportunistic spectrum access in a specific time and a particuar time. Here, SU, SU2, SU3 and SU4 are denoted by
7 using the symbos,,,. Here the Primary user is denoted by the symbo P. Fig. 9: Secondary Users with their corresponding parameters In Fig. 9 shows that the Spectrum user (SU4) having the highest possibiity of accessing the spectrum than the other users. Even though the other secondary users have the furthest distance from primary user to the secondary users, highest spectrum utiization and highest mobiity but we prefer SU4 to access the spectrum because it has the highest possibiity i.e., Fig. 0: Mean Arriva VS Channe Utiization using FLS The Spectrum Efficiency (Channe Utiization) is defined as the ratio of average busy channes over tota channes owned by service providers. The Fig. 0 shows that there is an increase in channe utiization with decrease in the ca arriva rate. Our designed FLS is used to contro the spectrum assignment and access procedures in order to prevent mutipe users from coiding in overapping spectrum portions. Therefore, the secondary user with the highest possibiity is guaranteed to access the spectrum. VII. CONCLUSION This papers shows an efficient way to utiize the unused spectrum of the icensed users and it aows aso other net generation mobie network users to benefit from avaiabe radio spectrum, eading to the improvement of overa spectrum utiization and maimizing overa PU and SU networks capacity. We proposed an approach using a Fuzzy Logic System to detect the maimum possibiity of spectrum access for secondary users via cognitive radio. The secondary users are seected on the basis of spectrum utiization, degree of mobiity and distance from secondary users to the primary user. By using the above antecedents, we have cacuated the highest possibiity of accessing the spectrum band for secondary users and we have minimized the ca bocking and interference. So that we can have better and efficient spectrum utiization. REFERENCES [] H.J. Zimmermann, Fuzzy Set Theory and its Appications, ISBN , Fourth Edition, Springer Internationa Edition,2006. [2] Timothy J. Ross, Fuzzy Logic with Engineering Appications, ISBN , Second Edition, Wiey Student Edition, [3] James J. Buckey, Esfandiar Esami, An Introduction to Fuzzy Logic and Fuzzy Sets, ISBN , Physica Verag, [4] Andreas F. Moisch, Wireess Communications, ISBN: , Second Edition, John Wiey & Sons Ltd, 20. [5] R. Kaniezhi, Dr. C. Chandrasekar, S. Nithya Rekha, Dynamic Spectrum Sharing for Heterogeneous Wireess Network via Cognitive Radio, Proceedings of the Internationa Conference on Pattern Recognition, Informatics and Medica Engineering, March 2-23, 202, pp [6] R. Kaniezhi, Dr. C. Chandrasekar, Mutipe Service providers sharing Spectrum using Cognitive Radio in Wireess Communication Networks, Internationa
8 Journa of Scientific & Engineering Research, Voume 3, Issue 6, June 202. [7] R. Kaniezhi, Dr. C. Chandrasekar, Mutipe service providers sharing Spectrum dynamicay via Cognitive Radio in a Heterogeneous Wireess Networks, Internationa Journa of Computationa Inteigence and Informatics, Vo. : No. 2, Juy - September 20, pp [8] R. Kaniezhi, Dr. C Chandrasekar, S. Nithya Rekha, Channe seection for Seective Sensing using Cognitive Radio Nodes, Internationa Journa of Computer Appications(IJCA), , Voume 39 No.3, pp , February 202. [9] R. Kaniezhi, Dr. C. Chandrasekar, Spectrum Sharing in a Long Term Spectrum Strategy via Cognitive Radio for Heterogeneous Wireess Networks, Internationa Journa on Computer Science and Engineering (IJCSE), Vo. 4, No. 06, June 202, pp [0] Spectrum poicy task force report, Technica report 02-35, Federa communications commission, Nov [] Jerry M. Mende, Fuzzy Logic Systems for engineering: A Tutoria, IEEE Proc., vo. 83, no. 2, pp , March 995. [2] Marja Matinmikko, Tapio Rauma, Miia Mustonen, Ikka Harjua, Hei Sarvanko, Aarne Mammea, Appication of Fuzzy Logic to Cognitive Radio Systems, IEICE Trans. Communication, vo. E92-B, no.2, December 2009, pp [3] George C. Mouzouris and Jerry M. Mende, Nonsingeton Fuzzy Logic Systems: Theory and appication, IEEE Transactions on Fuzzy Systems, vo. 5, no., February 997, pp [4] Partha Pratim Bhattacharya, A Nove Opportunistic Spectrum Access for Appications in Cognitive Radio. [5] Hong-Sam T. Le, Hung D. Ly, Qiian Liang, Opportunistic Spectrum Access Using Fuzzy Logic for Cognitive Radio Networks, Int J Wireess Inf Networks (20), pp [6] K. Gowrishankar, Dr. C. Chandrasekar, R. Kaniezhi, Efficient spectrum utiization for Cognitive Radio using Fuzzy Logic System, Internationa Conference on Computationa Inteigence and Communication, Juy 4-6, 202. [Accepted] [7] R. Kaniezhi, Dr. C. Chandrasekar, Comparing Spectrum Utiization using Fuzzy Logic System for Heterogeneous Wireess Networks via Cognitive Radio, Internationa Journa of Scientific & Engineering Research, Voume 3, Issue 7, Juy-202. [Accepted]
SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci
SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise
More informationSecure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
More informationSimultaneous Routing and Power Allocation in CDMA Wireless Data Networks
Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,
More informationVendor Performance Measurement Using Fuzzy Logic Controller
The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer
More informationWith the arrival of Java 2 Micro Edition (J2ME) and its industry
Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting
More informationPricing Internet Services With Multiple Providers
Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu
More informationCONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS
Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,
More informationIterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks
terative Water-fiing for Load-baancing in Wireess LAN or Microceuar Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Veciana Wireess Networking and Communications Group (WNCG), be University of
More informationTeamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
More informationA Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements
A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,
More informationTERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.
This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate
More informationMapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis
Mapping of Secondary Virtua Networks onto Wireess Substrate based on Cognitive Radio: muti-obective formuation and anaysis Andson Marreiros Baieiro 1 and Kevin Lopes Dias Center of Informatics (CIn) Federa
More informationMICROSOFT DYNAMICS CRM
biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency
More informationDynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud
Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,
More informationSABRe B2.1: Design & Development. Supplier Briefing Pack.
SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used
More information(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006
(19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE
More informationRicoh Healthcare. Process Optimized. Healthcare Simplified.
Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove
More informationVirtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
More informationAn Integrated Data Management Framework of Wireless Sensor Network
An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan
More informationAustralian Bureau of Statistics Management of Business Providers
Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad
More informationLADDER SAFETY Table of Contents
Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3
More informationFast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.
Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services
More informationIntegrating Risk into your Plant Lifecycle A next generation software architecture for risk based
Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV
More informationThe eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without
More informationBest Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1
SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for
More informationHuman Capital & Human Resources Certificate Programs
MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J
More informationWHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization
Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the
More informationAPPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC
Appendix 10.1: substantive audit programme for production wages: Troston pc 389 APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC The detaied audit programme production wages
More informationAn FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332
More informationScheduling in Multi-Channel Wireless Networks
Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona
More informationAccreditation: Supporting the Delivery of Health and Social Care
Accreditation: Supporting the Deivery of Heath and Socia Care PHARMACY E F P T O L P E D P E C M F D T G L E F R Accreditation: Supporting the Deivery of Heath and Socia Care June 9, 2015 marks Word Accreditation
More informationNetwork/Communicational Vulnerability
Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security
More informationCUSTOM. Putting Your Benefits to Work. COMMUNICATIONS. Employee Communications Benefits Administration Benefits Outsourcing
CUSTOM COMMUNICATIONS Putting Your Benefits to Work. Empoyee Communications Benefits Administration Benefits Outsourcing Recruiting and retaining top taent is a major chaenge facing HR departments today.
More informationApplication-Aware Data Collection in Wireless Sensor Networks
Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,
More informationOracle Project Financial Planning. User's Guide Release 11.1.2.2
Orace Project Financia Panning User's Guide Reease 11.1.2.2 Project Financia Panning User's Guide, 11.1.2.2 Copyright 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment
More informationMessage. The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries.
Message The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries. With the weight of our economy shifting towards knowedge-based and
More informationUS 20080120174A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2008/0120174 A1 L1 (43) Pub. Date: May 22, 2008
US 20080120174A1 (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2008/0120174 A1 L1 (43) Pub. Date: May 22, 2008 (54) METHOD AND SYSTEM FOR FLEXIBLE Pubication Cassi?cation PRODUCT
More informationCooperative Content Distribution and Traffic Engineering in an ISP Network
Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering
More informationSTRATEGIC PLAN 2012-2016
STRATEGIC PLAN 2012-2016 CIT Bishopstown CIT Cork Schoo of Music CIT Crawford Coege of Art & Design Nationa Maritime Coege of Ireand Our Institute STRATEGIC PLAN 2012-2016 Cork Institute of Technoogy (CIT)
More informationThe growth of online Internet services during the past decade has
IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet
More informationIntroduction the pressure for efficiency the Estates opportunity
Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary
More informationWIRELESS Mesh Networks (WMNs) have recently attracted
3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing
More informationMulti-Robot Task Scheduling
Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in
More informationAvaya Remote Feature Activation (RFA) User Guide
Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document
More informationLeadership & Management Certificate Programs
MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J
More informationA train dispatching model based on fuzzy passenger demand forecasting during holidays
Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand
More informationProgram Management Seminar
Program Management Seminar Program Management Seminar The word s best management schoos are noted for their superior program execution, high eves of customer satisfaction, and continuous program improvements.
More informationGas turbine air intake media
Gas turbine air intake media Gas turbine air intake fiter media soutions High energy cost and demand wordwide have increased the focus on energy efficiency in many industries and market sectors. Specificay,
More information3.3 SOFTWARE RISK MANAGEMENT (SRM)
93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce
More informationStrengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India
Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Technica Brief October 2012 Context India faces critica human resources (HR) chaenges in the heath sector,
More informationArt of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0
IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks
More informationComparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time
Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen
More informationInformatica PowerCenter
Brochure Informatica PowerCenter Benefits Support better business decisions with the right information at the right time Acceerate projects in days vs. months with improved staff productivity and coaboration
More informationLecture 7 Datalink Ethernet, Home. Datalink Layer Architectures
Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
More informationSpatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction
Spatio-Tempora Asynchronous Co-Occurrence Pattern for Big Cimate Data towards Long-Lead Food Prediction Chung-Hsien Yu, Dong Luo, Wei Ding, Joseph Cohen, David Sma and Shafiqu Isam Department of Computer
More informationMARKETING INFORMATION SYSTEM (MIS)
LESSON 4 MARKETING INFORMATION SYSTEM (MIS) CONTENTS 4.0 Aims and Objectives 4.1 Introduction 4.2 MIS 4.2.1 Database 4.2.2 Interna Records 4.2.3 Externa Sources 4.3 Computer Networks and Internet 4.4 Data
More informationWINMAG Graphics Management System
SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic
More informationChapter 2 Developing a Sustainable Supply Chain Strategy
Chapter 2 Deveoping a Sustainabe Suppy Chain Strategy Bakan Cetinkaya Learning Goas. By reading this chapter you wi: Know the basics of competitive strategy and suppy chain strategy and understand their
More informationWe are XMA and Viglen.
alearn with Microsoft 16pp 21.07_Layout 1 22/12/2014 10:49 Page 1 FRONT COVER alearn with Microsoft We are XMA and Vigen. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow
More informationAdvanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger
Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server
More informationDOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS
DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS TABLE OF CONTENTS INTRODUCTION... 1 GOVERNANCE... 1 COMMONLY PURCHASED GOODS AND SERVICES... 1 HOW TO REGISTER YOUR COMPANY...
More informationManagement Accounting
Management Accounting Course Text Professiona, Practica, Proven www.accountingtechniciansireand.ie Tabe of Contents FOREWORD...v SYLLABUS: MANAGEMENT ACCOUNTING...vii PART 1 INTRODUCTION Chapter 1: Introduction
More informationNon-orthogonal Direct Access for Small Data Transmission in Cellular MTC Networks
Non-orthogona Direct Access for Sma Data Transmission in Ceuar MTC Networks Keng-Te Liao, Chia-Han Lee, Tzu-Ming Lin, Chien-Min Lee, and Wen-Tsuen Chen Academia Sinica, Taipei, Taiwan Industria Technoogy
More informationMaintenance activities planning and grouping for complex structure systems
Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe
More informationHow To Get Acedo With Microsoft.Com
alearn with Microsoft We are XMA. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow us @WeareXMA Introduction Use our 'steps to alearn' framework to ensure you cover a bases...
More informationZ-ZIP-250z. Innowacje w technice. Innovations in Technology
MODULE DESCRIPTION Modue code Z-ZIP-250z Modue name Innowacje w technice Modue name in Engish Innovations in Technoogy Vaid from academic year 2016/2017 A. MODULE PLACEMENT IN THE SYLLABUS Subject Leve
More informationVisual impairment and physiotherapy
Visua impairment and physiotherapy The best of both: working together to support chidren with visua impairment and additiona compex needs A series of eafets exporing ways that the QTVI (Quaified Teacher
More informationWide-Area Traffic Management for. Cloud Services
Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance
More informationLearning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning
Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations
More informationeg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No
More informationSAP Business Analytics. Services & Solutions for the Metals and Mining Industry
SAP Business Anaytics Services & Soutions for the Metas and Mining Industry Niche Business Anaytics Soutions & Services SAP Soutions SAP Business Inteigence Enterprise Data warehousing Reporting & Dashboards
More informationThe width of single glazing. The warmth of double glazing.
Therma Insuation CI/SfB (31) Ro5 (M5) September 2012 The width of singe gazing. The warmth of doube gazing. Pikington Spacia Revoutionary vacuum gazing. Image courtesy of Lumen Roofight Ltd. Pikington
More informationA Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation
More informationL I C E N S I N G G U I D E
O R A C L E H Y P E R I O N E N T E R P R I S E P E R F O R M A N C E M A N A G E M E N T S Y S T E M L I C E N S I N G G U I D E EPM System Licensing Guide Copyright 2009, Orace and/or its affiiates.
More informationOracle Hyperion Tax Provision. User's Guide Release 11.1.2.2
Orace Hyperion Tax Provision User's Guide Reease 11.1.2.2 Tax Provision User's Guide, 11.1.2.2 Copyright 2013, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment Team Orace
More informationDriving Accountability Through Disciplined Planning with Hyperion Planning and Essbase
THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP summer 2012 Driving Accountabiity Through Discipined Panning with Hyperion Panning and Essbase Introduction to Master Data and Master Data
More informationRisk Assessment Methods and Application in the Construction Projects
Internationa Journa of Modern Engineering Research (IJMER) Vo.2, Issue.3, May-June 2012 pp-1081-1085 ISS: 2249-6645 Risk Assessment Methods and Appication in the Construction Projects DR. R. K. KASAL,
More informationFixed income managers: evolution or revolution
Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate
More informationendorsed programmes With our expertise and unique flexible approach NOCN will work with you to develop a product that achieves results.
endorsed programmes With our expertise and unique fexibe approach NOCN wi work with you to deveop a product that achieves resuts. NOCN is a eading reguated UK awarding organisation that has been creating
More informationChapter 3: e-business Integration Patterns
Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?
More informationCERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society
CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision
More informationIT Governance Principles & Key Metrics
IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves
More informationICAP CREDIT RISK SERVICES. Your Business Partner
ICAP CREDIT RISK SERVICES Your Business Partner ABOUT ICAP GROUP ICAP Group with 56 miion revenues for 2008 and 1,000 empoyees- is the argest Business Services Group in Greece. In addition to its Greek
More informationInternal Control. Guidance for Directors on the Combined Code
Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London
More informationRicoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense.
Ricoh Lega ediscovery and Document Soutions Powerfu document services provide your best defense. Our peope have aways been at the heart of our vaue proposition: our experience in your industry, commitment
More informationADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES
ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES Product Features 1. System 2. Saes Ledger Unimited companies with password protection User security Muti-user system: 1 user comes as standard, up to
More informationThe Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers
he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder
More informationMeasuring operational risk in financial institutions
Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and
More informationLink Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes
Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic casses Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science
More informationTHERMAL REMOTE SENSING: CONCEPTS, ISSUES AND APPLICATIONS
THERMAL REMOTE SENSING: CONCEPTS, ISSUES AND APPLICATIONS Anupma PRAKASH ITC, Geoogica Survey Division prakash@itc.n Working Group WG VII / 3 KEY WORDS: Therma infrared, radiant temperature, emissivity,
More informationUniversity of Southern California
Master of Science in Financia Engineering Viterbi Schoo of Engineering University of Southern Caifornia Dia 1-866-469-3239 (Meeting number 924 898 113) to hear the audio portion, or isten through your
More informationAssigning Tasks in a 24-Hour Software Development Model
Assigning Tasks in a -Hour Software Deveopent Mode Pankaj Jaote, Gourav Jain Departent of Coputer Science & Engineering Indian Institute of Technoogy, Kanpur, INDIA 006 Eai:{jaote, gauravj}@iitk.ac.in
More informationExample of Credit Card Agreement for FIA Card Services Platinum Plus and Preferred MasterCard and Visa accounts
Exampe of Credit Card Agreement for FIA Card Services Patinum Pus and Preferred MasterCard and Visa accounts This information is accurate as of June 30, 2014. This credit card program is issued and administered
More informationA Latent Variable Pairwise Classification Model of a Clustering Ensemble
A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.
More informationCOMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION
COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This
More informationOrder-to-Cash Processes
TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes
More informationBite-Size Steps to ITIL Success
7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can
More informationSQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems
CSE 532 Theory of Database Systems Lecture 03 SQL Ichu Yoon Assistant Professor State University of New York, Korea Adapted from book authors sides SQL Language for describing database schema & operations
More informationNCH Software FlexiServer
NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before
More informationOnline Media Information
Onine Media Information www.sciencedirect.com The vita daiy source for 16 miion researchers and scientists around the gobe 70 miion pageviews each month Broad advertising product portfoio SciVerse ScienceDirect:
More information