• 沒有找到結果。

A Multi-Group Priority Based Cooperative MAC Protocol for Multi-Packet Reception Channels

N/A
N/A
Protected

Academic year: 2021

Share "A Multi-Group Priority Based Cooperative MAC Protocol for Multi-Packet Reception Channels"

Copied!
5
0
0

加載中.... (立即查看全文)

全文

(1)

A Multi-Group Priority Based Cooperative MAC

Protocol for Multi-Packet Reception Channels

Wen-Fang Yang, Jwo-Yuh Wu, Li-Chun Wang, and Ta-Sung Lee

Department of Communication Engineering

National Chiao Tung University Hsinchu, Taiwan

E-mail: {elvanyang.cm91g@, jywu@cc., lichun@cc., tslee@mail.}nctu.edu.tw

Abstract—Medium access control (MAC) protocol design for

cooperative networks over multi-packet reception (MPR) channels is a challenging topic, but has not been addressed in the literature yet. In this paper, we propose a MAC protocol to exploit the cooperation diversity for throughput enhancement over MPR channels. The proposed approach can efficiently utilize the idle periods for packet relaying, and can thus effectively limit the throughput loss resulting from the relay phase. By means of a Markov chain model, the worst-case throughput analysis is conducted. Specifically, we derive (i) a closed-form upper bound for the throughput penalty of the direct link that is caused by the interference of concurrent packet relay transmission; (ii) a closed-form lower bound for the throughput gain that a user with packet transmission failure can benefit thanks to cooperative packet relaying. The results allow us to investigate the throughput performance of the proposed protocol directly in terms of the MPR channel coefficients. Simulation results confirm the system-wide throughput advantage achieved by the proposed scheme, and also validate the analytic results.

Keywords—Multi-Packet Reception; Medium Access Control; Cross-Layer Design; Cooperative Communications.1

I. INTRODUCTION

Effective medium access control (MAC) mechanisms are crucial for achieving high throughput, low delay, and quality-of-service (QoS) provisioning. Most of conventional MAC protocol designs are based on the collision channel model, which however ignores the multi-packet reception (MPR) capability at the physical (PHY) layer. Recent works that exploit a realistic MPR channel model [1] for MAC protocol design can be found in [2]-[4]. All of these proposals require dynamic adaptation of the active user set for exploiting the MPR advantage, either through exhaustive search over the network traffic conditions or resorting to certain channel reservation mechanisms. Cooperative communication is known as an important technique for exploiting the multi-user diversity for system performance improvement. In the MAC layer, different types of cooperative MACs [5-7] are proposed, all of which are however devised only for the single packet reception scenario.

MAC protocol design for cooperative systems over MPR channels is more challenging, and is typically subject to the following concerns. Firstly, the central controller (CC) may require the knowledge of the MPR channels of all links, as well as the traffic conditions of all users, to determine the access set. However, this calls for extra communication

1This work is sponsored jointly by the National Science Council under

grant NSC-97-2221-E-009-001-MY3, by the Ministry of Education of Taiwan under the MoE ATU Program, by the Academia-Research Cooperation Program of MoEA under grant 98-EC-17-A-02-S2-0050, and by MediaTek Research Center at National Chiao Tung University, Taiwan.

overhead, and will degrade the system-wide throughput, especially in a large-scale mobile network. Secondly, when packet reception failure occurs due to collision, a certain portion of the users may have to serve as the relay for data retransmission. Without properly designed MAC protocols for realizing the cooperative advantage, this may again lead to overall throughput degradation. To the farthest of our knowledge, MAC protocol designs for cooperative MPR channels have not been found in the literature yet.

Recently, relying on a simple flag-assisted mechanism and an associated multi-group priority (MGP) scheduling strategy, a new MPR MAC protocol was proposed in [8]. The MGP scheme has several distinctive features that make it a potential candidate for cooperative MPR MAC designs. Firstly, in the MGP scheme the users are allowed to access the channel according to some prescribed service priority. There is no need for active user selection through exhaustive search based on the channel knowledge and local traffic conditions. This will thus considerably reduce the communication overhead in dense cooperative networks. Secondly, the flag-bit can provide the CC with the knowledge of each user’s buffer status. Combined with the multi-group service priority, channel access can then be reserved for both direct data transmission and packet relaying in a more balanced fashion. Hence, in a high collision environment, the throughput penalty incurred by the relay period can be largely reduced. To realize the aforesaid advantages, we extend the MGP scheme and propose a MAC protocol for cooperative networks over MPR channels. Specific contributions of this paper can be summarized as follows.

1) The proposed protocol, hereafter termed as the cooperative MGP (CMGP), is to our best knowledge the first cooperative MPR MAC scheme. It is free from any assumptions on the channel and is applicable to the general heterogeneous environment [9].

2) The number of users permitted for channel access is deterministically set to attain the MPR channel capacity. This prevents the channel from being over-loaded, thereby avoiding irrecoverable packet failure due to collisions.

3) Based on the Markov chain analysis, the closed-form formulae of the average throughput penalty and gain from cooperation are derived. The results allow us to investiage such throughput impact based on various PHY and MAC performance indeces. In particular, it can be shown that, under a slight traffic condition, the throughput degradtion due to packet relaying tends to diminish if the MPR capability of the PHY layer is strong enough.

4) Even though the direct-link users may suffer certain throughput loss, the proposed CMGP protocal exploits the cooperative diversity and does result in a system-wide

(2)

throughput advantage. This will be verified through numerical simulation.

II. PRELIMINARY A. System Scenario

We consider the uplink transmission of a centralized cooperative wireless network, in which the CC and the user terminals are equipped with the MPR capability. We assume that the transmission is slotted, and the CC controls the user access to a common wireless channel. At the beginning of each time slot the CC determines an access set according to some user scheduling rule to be specified later, and broadcasts this message to initialize data transmission. Due to the broadcast nature of the wireless channel, the CC and all the inactive users can receive the transmitted packets. Depending on whether or not the packet is successfully received at the CC, an ACK or NAK is sent by the CC over the wireless channel and will be received by all users. When the packet reception failure occurs, one of the inactive users who successfully decode the packet will serve as the relay during some future channel access period.

B. MPR Matrix

In this paper we extend the so-called MPR channel matrix [2] to specify the MPR capability at the receiver. Assume that the total number of users is M. Let U be a permutation of the index set

{

1, 2, ,M"

}

that represents a particular order of the user service schedule. Then the MPR matrix for a given U is described as

( )

( )

( )

( )

( )

( )

( )

( )

( )

( )

1,0 1,1 2,0 2,1 2,2 ,0 ,1 ,2 , M M M M M C U C U C U C U C U U C U C U C U C U ⎡ ⎤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ ⎦  # # # " C , (1) where

( )

, n k

C U = Pr{k packets correctly received | npackets from first nusers in U are transmitted}

for 1 n≤ ≤M and 0 k≤ ≤ . We note that, according to n the setting (1), different permutation index sets U in general result in different MPR matrices. Denotes

( )

,

( )

1 n n n k k C U kC U =

 the expected number of correctly received packets when n packets are concurrently transmitted. The capacity of an MPR channel for the particular U is defined as

( )

( )

1, , max n n M U C U η = = " . Note that

the numbers of simultaneously transmitted packets to achieve the channel capacity may not be unique. Let

( )

{

( )

}

0 min arg maxn 1, ,M n

n U C U

= "

 (2)

be the minimum amount of capacity-achieving packets. Hence the maximal number of users permitted to access the channel should be n U , since there will be no further 0

( )

improvement in system capacity if more than n U users 0

( )

Figure 1. Packet formats.

are simultaneously served. Note that the MPR matrix (1) can be determined via the physical layer performance metric such as bit error rate; an illustrative example based on CDMA communication can be found in [2].

C. Highlight of the MGP Protocol [8]

As in [2] it is assumed that each user has a buffer of size two for storing two data packets. The central idea behind the MGP scheme is to append a flag-bit at the tail of the transmitted packet to inform the CC with the next buffer status (see Figure 1 for a schematic description). The flag will be set ON if there is a packet in the buffer, and is set OFF when otherwise. By exploiting such an on-off flag signature, the MGP scheme classifies the users into three groups with different service priorities: the ACTIVE group consisting of the users with flag-bit ON, the STANDBY group consisting of those with flag-bit OFF, and the PRe-Emptive (PREM) group accommodating those who have stayed in the STANDBY or the ACTIVE group for longer than a certain waiting period S . The inclusion of the complementary PREM group is to avoid unfair scheduling that can occur in a binary grouping strategy: Without the PREM mechanism, users in the STANDBY group would suffer an unlimited service delay since the channels could be constantly reserved for some ACTIVE links with heavy traffic. Based on the tri-group user classification scheme, the channel access priority (from high to low, respectively) is PREM, ACTIVE, and STANDBY. According to such a service strategy, at the beginning of each time slot a total number of n users are selected for data transmission, 0

where n is the minimal number of users that achieves the 0 capacity of the MPR channel. In case that the CC fails to successfully received the packet sent from, say, user i, the CC schedules the service priority of user i according to the previous flag record. We shall note the followings:

a) In the MGP scheme the number of users permitted for channel access is deterministically set to attain the MPR channel capacity. This prevents the channel from being overloaded, thereby avoiding irrecoverable packet failure due to collision.

b) Under light or moderate traffic environments, a significant portion of the users could be in the idle phase (i.e., no data packets to send). If packet reception failure occurs, the idle periods can then be exploited for packet relaying to reduce the possible throughput loss. This can be effectively accomplished via a natural extension of the MGP protocol, as discussed next.

III. COOPERATIVE MULTI-GROUP PRIORITY PROTOCOL The flag-bit is the instrumental mechanism for facilitating the multi-group priority based user service in the MGP protocol. The central idea of the proposed CMGP scheme is to exploit the flag-bit message for distinguishing

Data

Buffer 2 Buffer 1

(3)

the direct links from the relay ones. By assigning different service priority to different types of links, the throughput degradation due to packet relaying can be limited, and an increase in the network-wide throughput can be achieved. A. Operation of the Proposed CMGP Protocol

If user i is permitted to access the channel, as in the MGP scheme a flag-bit b is appended at the tail of the i packet upon transmission. The flag signature is ON (bi= ) 1 only if the second buffer is non-empty and contains a data packet also of user i. The flag signature is instead OFF (bi= ) when either one of the following cases is true: i) 0 the second buffer is empty, ii) the second buffer is nonempty but the packet therein is received from user j≠ . i Upon successful packet reception, the CC decodes the flag-bit message and then schedules the user access according to the MGP protocol. If packet reception failure occurs at the CC and user k ( ki ), who has empty second buffer, successfully decodes this packet, user k can serve as the relay in some upcoming channel access period. If none of the users can serve as the relay, which happens when all other users’ buffers are non-empty or none of the users can successfully received the packet, user i then re-transmit this packet during his/her next channel access. We note the following key features regarding the proposed protocol:

1) The adoption of the flag-bit provides an inbuilt mechanism for CC to dintinguish between the direct and relay-or-idle links for service scheduling. Users with flag-bits ON for direct data transmission will be arranged into either the ACTIVE or the PREM group, and thus enjoy potentially higher channel access priority. This prevents possibly frequent data relaying when collision occurs, thereby reducing the throughput penalty.

2) Thanks to the PREM mechanism, users who are not permitted to access the channel over a time duration longer than the threshold S will be granted with the highest service priority. This can limit the processing delay of the relay links, and maintain the QoS requirement.

3) In the proposed protocol, each user takes his/her turn to access the channel according to the prescribed service priority. There is no need for active user identification, and the protocol complexity can be substantially reduced. B. An Illustrative Example

This subsection uses an example to demonstrate the proposed CMGP protocol. We consider a network of

4

M= users, and assume for simplicity that i) the MPR channel capacity is n U0

( )

= irrespective of the index set, 2 and ii) the time slot threshold for being promoted into the PREM group is S= . The traffic status of user 3 i is summarized in a tag shown in Figure 2 (a), in which the first field represents the user ID, second field is the counts of waiting slots, forth field marks the status of the flag-bit, third and fifth fields represent the content of the two buffers. Figure 2 (b) depicts the operation of the proposed protocol during three consecutive time slots, and is also explained below.

- At the end phase of slot t-1:

The PREM group is empty; user 1 is in the ACTIVE group, users 2, 3, 4, are in the STANDBY group.

Figure 2. An illustrative example.

- At the start phase of slot t:

User 1 (with b1=1) and user 2 (with b2 =0) are allowed for channel access.

- At the end phase of slot t:

(i) The packet of user 1 is successfully received by CC; user 1 remains ACTIVE but the flag is updated to b1=0 since its second buffer is empty.

(ii) The packet of user 2 is not successfully received by CC; user 2 is put into the bottom of the STANDBY group (assumes current b2=0 at CC).

(iii) User 3 successfully decodes the packet of user 2 and will serve as the relay.

- At the start phase of slot t+1:

User 1 (with b1=0) and user 3 (with b3=0) are allowed for channel access.

- At the end phase of slot t+1:

(i) User 3 successfully relays the packet of user 2 to CC, and is then put to the STANDBY group since b3=0.

(ii) The CC fails to successfully receive the packet of user 1, and thus does not correctly decode the current bit message. User 1 remains ACTIVE since the latest flag message available to the CC is the previous setting b1= . 1

(iii) User 2 successfully received the packet of user 1 and will serve as the relay.

(iv) User 4 (with b4 =0) has not been allowed to access the channel for more than S=3 time slots, and is moved into the PREM group. - At the start phase of slot t+2:

User 1 (with b1=0) and user 4 (with b4=0) access the channel.

IV. ANALYSIS OF THE PROPOSED PROTOCOL

Recall that the proposed CMGP protocol exploits the idle periods of the MGP scheme for packet relaying. Hence, during each time slot there are in general more concurrently transmitted packets as compared with the MGP method. Even though packet relying can compensate for the throughput loss due to packet reception failure, the increase in the number of active relay links, however, will introduce stronger interference toward direct data transmissions. The throughput loss caused by the relay-induced interference is thus one major limiting factor for the overall system performance. By regarding the achievable throughput of the MGP scheme as a benchmark, this section aims to characterize the throughput performance of the proposed

(4)

CMGP protocol. We shall note that the exact analysis for the general case, however, is quite difficult. In this section we will focus on the interference-limited worst case, in which there is only one direct link, and the other n U0

( )

−1

users serve as the relay. Although the performance evaluation based on such a worst-case scenario could be conservative, our analyses are quite appealing in that the problem formulation becomes tractable. As will be shown below, we can derive a closed-form upper bound for the throughput penalty incurred by the relay interference, as well as a closed-form lower bound for the throughput gain benefiting from user cooperation, directly in terms of the MPR matrix coefficients. This allows us to deduce several interesting features regarding the proposed CMGP protocol. We shall note that the effective relay candidates are those users with a good link condition and low packet generating probability (or, low packet blocking probability). Based on this observation, we can derive a closed-form upper bound for the worst-case throughput penalty suffered by the direct-link user in terms of the MPR matrix coefficients in (1); the result allows us to further analyze the throughput results under various direct-link channel conditions. In the sequel we let

{

( )

}

0

1, , n U

u "u be the index set for the active users; without lose of generality we assume that u1 denotes the direct-link user.

To proceed, we resort to the Markov chain based analysis. A reasonable model for the evolution of the buffer status is the birth-and-death process with a finite number of states [10]. With the aid of this model, we have the following theorems (the proofs are omitted for limited space).

Theorem 4.1: Assume that, without user cooperation, the packet blocking probability B1

u

p of user u1 is smaller than some positive δ , i.e., B1

u

p ≤ . Then the throughput penalty δ

1

p u

Δ of the direct-link user u1 in the CMGP protocol is upper bounded by

(

1 1

)

1 1 1 1 u u p u u u u A B A B δ δ + Δ ≤ Δ + + , (3) where Δ =u1 C1

(

{ }

u1

)

Cn U0( )

( )

U +Cn U0( )−1

(

U \

{ }

u1

)

, (4)

and A and u1 B are some constants which depend on the u1

packet generating probability and the successful packet

transmission probability. □

The upper bound in (3) splits into a sum of two terms: the first term Δ is completely characterized by the PHY-u1 layer signal separation capability in terms of the MPR matrix, whereas the second term

(

1 1

)

1 1 u u u u A B A B δ δ + + depends also on the MAC traffic condition. In the extreme case that

1

0 (or B 0) u p

δ→ → , the throughput upper bound (3) is entirely determined by the MPR channel quality as

{ }

(

)

( )

( )

( )

(

{ }

)

1 1 1 1 0 0 1 \ 1 p u u C u Cn U U Cn UU u Δ ≤ Δ = − + . (5)

In the considered worst-case scenario, we can also specify a lower bound for the throughput gain that a user with packet transmission failure can benefit owing to

cooperative packet relaying. More specifically, we have the following theorem.

Theorem 4.2: Suppose that the user uj , where

( )

{

2 0

}

\ , ,

j n U

uU u "u , suffers from the packet transmission failure. Then, due to cooperative packet relay from some other user uk

{

u2, ,"un U0( )

}

, the user u can j enjoy at least a throughput gain gj

u Δ : ( )

( )

{ } ( )

(

{ }

)

0 0 2 0 1 , , min \ j k n g u p Cn U U u u u Cn UU uk ∈ ⎛ ⎞⎟ Δ ≥ ⎜⎜⎝ ⎠ " , (6)

where p is the packet generating probability. □ We emphasize that, even though there could be a throughput penalty for the direct-link users, the proposed CMGP protocol does exploit the cooperative diversity: This will enhance the throughput of users with poor channel conditions (i.e., the users subject to frequent packet reception failure can benefit from data relaying through cooperation with other strong MPR links), and therefore can result in a network-wide throughput gain, as will be seen in the simulation section.

V. SIMULATION RESULTS

We consider a CDMA network with randomly generated spreading codes. The packet length, spreading gain, and number of correctable errors in each packet are, respectively, 200, 6, and 2. We assume that there are a total number of

8

M = users square deployed in the network, among which users 2, 4, 5, and 7 are nearby the CC and users 1, 3, 6, and 8 are located far away from the CC. The MPR matrix of the considered system scenario can be derived in an analogue way as in [2].

A. Throughput and Delay for Near- and Far-End Users

We investigate the throughput results for near-end and far-end users in both cooperative and non-cooperative environments. The results are depicted in Figure 3. As we can see, due to poor channel conditions the average throughput of the far-end users is almost zero without cooperation. However, when cooperation with near-end users is allowed, throughput up to about 0.4 for the far-end users can be achieved when the packet generating probability p is not large. Also, there is a significant increase in the overall throughput when compared with the non-cooperative case. For the near-end users, it is important to see that the throughput penalty is almost zero even though a certain portion of the channel access will be dedicated to packet relaying. This is mainly because, in the proposed CMGP protocol, only the idle periods are exploited for the relay phase, and the service priority of the relay users are potentially lower than the direct data transmission links. Figure 4 further shows the resultant average delay performance. It can be seen that, without cooperation, even a small packet generating probability ( p ≈0.1) results in severe delay penalty. However, if cooperation is allowed, the delay performance become more robust against the increase in p . Fig. 5 compares the simulated average throughput gain (per user) with the theoretical lower bound (6). As we can see, the analytic result shows close agreement with the simulated outcome

(5)

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

Packet generating probability

T h roughput ( P ac k e t/ S lo t)

All users (w/ cooperation) Near users (w/ cooperation) Far users (w/ cooperation) All users (w/o cooperation) Near users (w/o cooperation) Far users (w/o cooperation)

Figure 3. Average throughput of near, far and all users.

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 100 200 300 400 500 600 700 800

Packet generating probability p

D e la y ( S lo t/ P a cke t)

All users (w/o cooperation) Near users (w/o cooperation) Far users (w/o cooperation) All users (w/ cooperation) Near users (w/ cooperation) Far users (w/ cooperation)

Figure 4. Average delay of near, far and all users.

in a low traffic scenario (p≤0.15). However, there is a large discrepancy as the traffic load becomes heavy. This is reasonable since the lower bound (6) is derived specifically for the low traffic environment, in which idle periods are available and can be exploited for packet relaying. Fig. 6 further compares the simulated throughput penalty (per user) with the theoretical upper bound (3). The result shows that the upper bound (3) tends to be conservative. Actually, the throughput loss due to packet-relaying interference is pretty small (<0.02) in the proposed CMGP protocol.

B. Throughput Results in a Dense Environment

Figure 7 further illustrates the throughput performance as the total number of users increases; the aggregate traffic load is set to be 80% of the channel capacity, i.e., 1.2 packets per slot. The proposed CMGP method is seen to achieve the maximal throughput of 1.18 when the number of users equals 48; this yields about a 140% throughout gain as compared with the MGP. As the number of users increases, both methods are subject to throughput floors, but the CMGP still results in a 34% gain as compared with the MGP.

VI. CONCLUSION

This paper proposes a cooperative MAC protocol for MPR channels. As far as we know, our scheme is the first proposal which integrates the user cooperation facility and the PHY-layer MPR advantage for MAC protocol designs. Simulation results confirm the throughput advantage achieved by the proposed method, and validate the presented analytical results.

REFERENCES

[1] S. Ghez, S. Verdu and S. C. Schwartz, “Optimal decentralised control in the random access multipacket channel,” IEEE Trans. on

Automatic Cont., vol. 34, NO. 11, Nov. 1989.

[2] Q. Zhao and L. Tong, “A dynamic queue protocol for multiaccess wireless networks with multipacket reception,” IEEE Trans. Wireless

Commun., vol. 3, no. 6, pp. 2221-2231, Nov. 2004.

0 0.1 0.2 0.3 0.4 0.5 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4

Packet generating probability p

T h ro u ghput gai n Simulation Lower bound (6)

Figure 5. Lower bound of throughput gain derived from Theorem 4.2.

0 0.1 0.2 0.3 0.4 0.5 0 0.02 0.04 0.06 0.08 0.1 0.12

Packet generating probability p

T h roughput penal ty Upper bound (3) Simulation

Figure 6. Upper bound of throughput penalty derived from Theorem 4.1.

0 50 100 150 200 250 300 0.4 0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 Number of Users T h roughput ( P ac k e t/ S lot ) Proposed solution MGP [8]

Figure 7. Average throughput in a dense environment. [3] M. Realp, A. I. Pérez-Neira, “PHY-MAC dialogue with multi-packet

reception,” ETSI Workshop on Broadband Wireless Ad-Hoc Networks

and Services, 2002.

[4] X. Wang and J. K. Tugnait, “A bit-map-assisted dynamic queue protocol for multi-access wireless networks with multiple packet reception,” IEEE Trans. Signal Processing, vol. SP-51, pp. 2068-2081, Aug. 2003.

[5] A. K. Sadek, K. J. R. Liu, A. Ephremides,, “Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis,” 40th Annual Conference on Information Sciences and

Systems, 22-24 March 2006.

[6] P. Liu, Z. Tao, S. Narayanan, T. Korakis, S. S. Panwar, “CoopMAC: A Cooperative MAC for Wireless LANs,” IEEE J. Select. Areas

Commun., vol. 7, pp.340–354, Feb. 2007.

[7] R. Lin and A.P. Petropulu, “A New Wireless Medium Access Protocol Based On Cooperation,” IEEE Trans. on Signal Processing, vol. 53, no. 12, pp. 4675-4684, December 2005..

[8] W. F. Yang, J. Y. Wu, L. C. Wang, and T. S. Lee, “A Multigroup Priority Queueing MAC Protocol for Wireless Networks with Multipacket Reception,” EURASIP Journal on Wireless

Communications and Networking, vol. 2008, July 2008.

[9] J. Yu and A. P. Petropulu, "Cooperative Transmissions for Random Access Wireless Networks with MPR Channels," Conference on

Information Sciences and Systems, The Johns Hopkins University,

2005.

[10] Z. Wang and X. Yang, Birth and Death Processes and Markov

數據

Figure 1.  Packet formats.
Figure 2.  An illustrative example.
Figure 7.  Average throughput in a dense environment.  [3]  M. Realp, A. I. Pérez-Neira, “PHY-MAC dialogue with multi-packet

參考文獻

相關文件

Teacher 2 and Classroom Assistant work with the whole class while Teacher 1 assesses individuals in a small group on a focus Reading Skill or Strategy.. Assessing

We explicitly saw the dimensional reason for the occurrence of the magnetic catalysis on the basis of the scaling argument. However, the precise form of gap depends

We propose a primal-dual continuation approach for the capacitated multi- facility Weber problem (CMFWP) based on its nonlinear second-order cone program (SOCP) reformulation.. The

Unlike the case of optimizing the micro-average F-measure, where cyclic optimization does not help, here the exact match ratio is slightly improved for most data sets.. 5.5

In this thesis, we have proposed a new and simple feedforward sampling time offset (STO) estimation scheme for an OFDM-based IEEE 802.11a WLAN that uses an interpolator to recover

For Experimental Group 1 and Control Group 1, the learning environment was adaptive based on each student’s learning ability, and difficulty level of a new subject unit was

[23] Tiantong You, Hossam Hassanein and Chi-Hsiang Yeh, “PIDC - Towards an Ideal MAC Protocol for Multi-hop Wireless LANs,” Proceedings of the IEEE International Conference

A decision scheme based on OWA operator for an evaluation programme: an approximate reasoning approach. A decision scheme based on OWA operator for an evaluation programme: