Reduction of the operational effort and cost is a key driver for RAN LTE (Long Term Evolution or E-UTRAN). Self-configuring and self-optimizing mechanisms are introduced as a part of Self Organizing Network (SON) to maximize the integrated performance of LTE/LTE-Advanced by improving the efficient of operation and maintenance. Optimization of handover is one of the optimization aspects of Self Organizing Network in LTE-Advanced. High velocity environment, especially multi-service environment usually needs extensively investigation to optimize. Using layer3 filter, hysteresis, and time-to-trigger mechanisms is standardized for LTE Hard handover. In this paper, an interacting self-optimizing handover mechanism based on cell ID information is proposed. We have shown that significant gain can be achieved by the use of optimization mechanism while maintaining low handover rates and ping-pong handover rate.
{"title":"A Self-Optimizing Mobility Management Scheme Based on Cell ID Information in High Velocity Environment","authors":"Dongming Su, X. Wen, Haijun Zhang, Wei Zheng","doi":"10.1109/ICCNT.2010.64","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.64","url":null,"abstract":"Reduction of the operational effort and cost is a key driver for RAN LTE (Long Term Evolution or E-UTRAN). Self-configuring and self-optimizing mechanisms are introduced as a part of Self Organizing Network (SON) to maximize the integrated performance of LTE/LTE-Advanced by improving the efficient of operation and maintenance. Optimization of handover is one of the optimization aspects of Self Organizing Network in LTE-Advanced. High velocity environment, especially multi-service environment usually needs extensively investigation to optimize. Using layer3 filter, hysteresis, and time-to-trigger mechanisms is standardized for LTE Hard handover. In this paper, an interacting self-optimizing handover mechanism based on cell ID information is proposed. We have shown that significant gain can be achieved by the use of optimization mechanism while maintaining low handover rates and ping-pong handover rate.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134406582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To listed companies, cash holdings governance is very important and there are many factors may affect cash holdings, like financial leverage, debt structure, enterprise scale and so on. So in this paper, through the establishment of models and using regression analysis method, we analyze their relationship with cash holdings.
{"title":"Trait Factors Analysis Based on Cash Flow of Listed Companies","authors":"Na Liu, Chen Xiao","doi":"10.1109/ICCNT.2010.112","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.112","url":null,"abstract":"To listed companies, cash holdings governance is very important and there are many factors may affect cash holdings, like financial leverage, debt structure, enterprise scale and so on. So in this paper, through the establishment of models and using regression analysis method, we analyze their relationship with cash holdings.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes software architecture of using GPRS technique to provide wireless data communication for a traffic data collection system. The development of the communication software was based on two scenarios: Centralized Database Management (CDM) and Distributed Data Management (DDM) systems. They were used effectively to improve the current “download on demand” and post event analysis working mode. A “close to the real time” data transmission was achieved. As the essential requirement of an Intelligent Traffic System (ITS), the application of the GPRS technique enabled the user to access the real time traffic data uploaded from multiple road side traffic data collection units. In this study, the authors have successfully developed and tested the communication software of a proposed CDM system and the software architecture of the DDM system was also discussed. For the DDM system, the interface and communication software were designed using Unified Modeling Language and developed as an Object-oriented system based on the .NET platform. The database part was developed using Microsoft SQL. The reliability and the performance of the DDM system were evaluated against proposed hardware configurations.
{"title":"Application of GPRS Technique for Traffic Data Collection System Communication Software Development and System Evluation","authors":"Wei Xu, M. Phillips","doi":"10.1109/ICCNT.2010.76","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.76","url":null,"abstract":"This paper describes software architecture of using GPRS technique to provide wireless data communication for a traffic data collection system. The development of the communication software was based on two scenarios: Centralized Database Management (CDM) and Distributed Data Management (DDM) systems. They were used effectively to improve the current “download on demand” and post event analysis working mode. A “close to the real time” data transmission was achieved. As the essential requirement of an Intelligent Traffic System (ITS), the application of the GPRS technique enabled the user to access the real time traffic data uploaded from multiple road side traffic data collection units. In this study, the authors have successfully developed and tested the communication software of a proposed CDM system and the software architecture of the DDM system was also discussed. For the DDM system, the interface and communication software were designed using Unified Modeling Language and developed as an Object-oriented system based on the .NET platform. The database part was developed using Microsoft SQL. The reliability and the performance of the DDM system were evaluated against proposed hardware configurations.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents investigations into the implementation of input shaping schemes for anti-sway control of a gantry crane system. A lab-scale gantry crane is considered in the experimental work. An unshaped bang-bang input voltage is used to determine the characteristic parameters of the system for design and evaluation of the input shaping schemes. The input shaping schemes with different derivatives were designed based on the properties of the system. Implementation results of the response of the gantry crane with the input shaping schemes are presented in time and frequency domains. The performances of the input shaping are examined in terms of level of swing angle reduction, and time response specifications. Finally a comparative assessment of the input shaping schemes with different derivatives is discussed and presented.
{"title":"Experimental Investigations of Input Shaping Schemes for Sway Control of a Gantry Crane System","authors":"M. Ahmad, Z. Zulkifely, M. Zawawi","doi":"10.1109/ICCNT.2010.131","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.131","url":null,"abstract":"This paper presents investigations into the implementation of input shaping schemes for anti-sway control of a gantry crane system. A lab-scale gantry crane is considered in the experimental work. An unshaped bang-bang input voltage is used to determine the characteristic parameters of the system for design and evaluation of the input shaping schemes. The input shaping schemes with different derivatives were designed based on the properties of the system. Implementation results of the response of the gantry crane with the input shaping schemes are presented in time and frequency domains. The performances of the input shaping are examined in terms of level of swing angle reduction, and time response specifications. Finally a comparative assessment of the input shaping schemes with different derivatives is discussed and presented.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124228654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
this research proposed the fingerprint recognition by euclidean distance method. the system uses a technique of image processing, which consists of 3 major components, which are: 1) preprocessing component, the module that reduces the noise of the original images and adjusts the sharpness of the lined pattern that is the components of the fingerprint, 2) feature extraction component, the module that defines the position of the core point used as a reference point and finds out the position of the bifurcation points, and 3) fingerprint recognition component, the module to compare the shape context of training and testing data sets. based on the experimental results, the system has acceptable accuracy with average access time of around 19.68 seconds per image.
{"title":"Fingerprint Recognition by Euclidean Distance","authors":"C. Pornpanomchai, Apiradee Phaisitkulwiwat","doi":"10.1109/ICCNT.2010.100","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.100","url":null,"abstract":"this research proposed the fingerprint recognition by euclidean distance method. the system uses a technique of image processing, which consists of 3 major components, which are: 1) preprocessing component, the module that reduces the noise of the original images and adjusts the sharpness of the lined pattern that is the components of the fingerprint, 2) feature extraction component, the module that defines the position of the core point used as a reference point and finds out the position of the bifurcation points, and 3) fingerprint recognition component, the module to compare the shape context of training and testing data sets. based on the experimental results, the system has acceptable accuracy with average access time of around 19.68 seconds per image.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Supercontinuum is said to have generated when several nonlinear effects like self – phase modulation, cross –phase modulation, four – wave mixing, stimulated Raman scattering etc. lead to extreme spectral broadening of ultrashort optical pulses. In this paper, we have numerically demonstrated the effect of variation in the wavelength of optical pulses on the supercontinuum generation in SC – 5.0 – 1040TM, a highly nonlinear PCF.
{"title":"Supercontinuum Generation and Optimisation in Nonlinear Photonic Crystal Fibres","authors":"M. Tiwari, V. Janyani","doi":"10.1109/ICCNT.2010.124","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.124","url":null,"abstract":"Supercontinuum is said to have generated when several nonlinear effects like self – phase modulation, cross –phase modulation, four – wave mixing, stimulated Raman scattering etc. lead to extreme spectral broadening of ultrashort optical pulses. In this paper, we have numerically demonstrated the effect of variation in the wavelength of optical pulses on the supercontinuum generation in SC – 5.0 – 1040TM, a highly nonlinear PCF.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A lot of semantic information is lost due to keyword centric approach of information indexing. Web search should be based on ‘context’ of the query and not only on the keywords in query. It is only possible when a context from a query as well as document is sensed and which requires a context based indexing approach. A model for contextual indexing has been proposed which will try to find direct and indirect associations between keywords/concepts in a document and their related contexts with respect to query, thereby helping web searching become more relevant and precise.
{"title":"Contextual Indexing Algorithm","authors":"L. Sankpal, S. Patil, Dhanashri K. Joshi","doi":"10.1109/ICCNT.2010.22","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.22","url":null,"abstract":"A lot of semantic information is lost due to keyword centric approach of information indexing. Web search should be based on ‘context’ of the query and not only on the keywords in query. It is only possible when a context from a query as well as document is sensed and which requires a context based indexing approach. A model for contextual indexing has been proposed which will try to find direct and indirect associations between keywords/concepts in a document and their related contexts with respect to query, thereby helping web searching become more relevant and precise.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shim6 is a host-centric multihoming solution for IPv6 networks which has been chosen by the IETF as a multihoming solution for the future Internet. Shim6 employs REAchability Protocol (REAP) for failure detection and recovery. REAP enables multi-addressed hosts which are involved in a communication to detect and recover path failures without breaking the transport layer sessions. One concern about deploying shim6 is the performance of REAP in large networks like campus or enterprise networks. We modeled and simulated this protocol by using stochastic activity networks (SAN) and performed an analysis of its performance. This paper presents the results of the simulation. We also investigated the effect of send timer and initial probes on the performance.
{"title":"A Performance Study on REAchability Protocol in Large Scale IPv6 Networks","authors":"H. Naderi, B. Carpenter","doi":"10.1109/ICCNT.2010.18","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.18","url":null,"abstract":"Shim6 is a host-centric multihoming solution for IPv6 networks which has been chosen by the IETF as a multihoming solution for the future Internet. Shim6 employs REAchability Protocol (REAP) for failure detection and recovery. REAP enables multi-addressed hosts which are involved in a communication to detect and recover path failures without breaking the transport layer sessions. One concern about deploying shim6 is the performance of REAP in large networks like campus or enterprise networks. We modeled and simulated this protocol by using stochastic activity networks (SAN) and performed an analysis of its performance. This paper presents the results of the simulation. We also investigated the effect of send timer and initial probes on the performance.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
one of the differences of freight modeling to passenger modeling is its complex pattern in supply chain process. Probability of tour is a function of network and impedances among destinations and fleet constraints. It is obvious that in network with passage restrictions (in residential streets and collectors) for heavy vehicles, the number of destinations in each tour (tour length) will increase and instead it may increase the cost of the users. This paper discusses about activities of major agents, in freight movement, in our case study which is the second major city in Iran. Cost of shippers and number of destinations in tour, will be compared in two states. The first state is no restriction and the second state is passage restriction in some residential streets.
{"title":"Effects of Passage Restrictions for Heavy Vehicles on Tour Trips in Urban Networks","authors":"E. Irannezhad, A. S. Mohaymany, S. H. Mousavi","doi":"10.1109/ICCNT.2010.80","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.80","url":null,"abstract":"one of the differences of freight modeling to passenger modeling is its complex pattern in supply chain process. Probability of tour is a function of network and impedances among destinations and fleet constraints. It is obvious that in network with passage restrictions (in residential streets and collectors) for heavy vehicles, the number of destinations in each tour (tour length) will increase and instead it may increase the cost of the users. This paper discusses about activities of major agents, in freight movement, in our case study which is the second major city in Iran. Cost of shippers and number of destinations in tour, will be compared in two states. The first state is no restriction and the second state is passage restriction in some residential streets.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121362627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of this research is to propose a new data conjugate sub carrier mapping technique that combines ICI self cancellation method using data allocation in space-time-frequency block codes (STFBC) MIMO-OFDM system. It aims to achieve maximum diversity order and to compensate integrated effect of FO for ICI reduction in the system. Using theoretical derivation of the Common Phase Error (CPE), ICI and Carrier to Interference Ratio (CIR), a simulation model is then being used to compare with data conjugate adjacent method. The results show that the ICI contained in the received signals can be effectively reduced using the propose data conjugate method. Thus, the proposed method outperforms the adjacent method by approximately reducing the ICI at high signal to noise ratio (SNR) and CIR.
{"title":"A New Data-Conjugate Intercarrier (ICI) Self-Cancellation for ICI Reduction in Space Time Frequency Block Codes MIMO-OFDM System","authors":"A. Idris, K. Dimyati, S. Yusof","doi":"10.1109/ICCNT.2010.89","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.89","url":null,"abstract":"The objective of this research is to propose a new data conjugate sub carrier mapping technique that combines ICI self cancellation method using data allocation in space-time-frequency block codes (STFBC) MIMO-OFDM system. It aims to achieve maximum diversity order and to compensate integrated effect of FO for ICI reduction in the system. Using theoretical derivation of the Common Phase Error (CPE), ICI and Carrier to Interference Ratio (CIR), a simulation model is then being used to compare with data conjugate adjacent method. The results show that the ICI contained in the received signals can be effectively reduced using the propose data conjugate method. Thus, the proposed method outperforms the adjacent method by approximately reducing the ICI at high signal to noise ratio (SNR) and CIR.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}