The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article proposes a new method for a determination of the two-dimensional distribution in systems with overflow traffic. The method proposed in the article offers a significant reduction of computational complexity as compared to two-dimensional convolution methods hitherto proposed. The proposed method is based on a determination of the two-dimensional distribution in the system with traffic...
The article analyzes and explores the performance of multicast heuristic algorithms and quality of multicast trees in ad-hoc networks. It also provides a detailed analysis and a description of the implementation of methods for the topology generation in ad-hoc networks with the application of topology control protocols. Network topology planning and performance analysis are crucial challenges for...
The idea of a network traffic oscillator (NTO) is presented for dynamically adjusting to network conditions so as to ensure the best response time for all safety critical application payloads in a network. The context of the work is airport networking where the desire for greater interconnectivity coupled with Ethernet adoption makes the delivery of real-time deterministic service extremely challenging...
The Ad Hoc On-demand Distance Vector (AODV) routing scheme is a widely used routing technique in ad hoc networks due to its low routing traffic overhead. However, the performance of the minimum hop routing used by AODV degrades significantly when the underlying system has routes that have high throughput and hop count. In this paper, we propose modifications to the routing metric and the route discovery...
This paper provides a method for forwarding email including an attached file in wireless communication terminal. In particular, in terms of a mobile communication terminal suitable for wireless communications including WiBro with a limitation in channel bandwidth between a base station and the mobile communication terminal, unnecessary channel bandwidth occupancy needs to be reduced.
We present simulation results of a wavelength conversion scheme that adds no additional phase-noise to the converted signal. The scheme uses an optical comb generator as the pump source in a wavelength converter based on nondegenerate four-wave mixing. The comb source ensures that no phase noise is transferred from the pumps to the converted signal. We underscore the ability of this conversion scheme...
Dual-polarization multi-band orthogonal frequency-division multiplexing (DP-MB-OFDM) signals are optimized at data rates up to 500 Gb/s in dispersion compensation fiber (DCF)-free long-haul links. We compare different polarization crosstalk compensation techniques and explore the DP-MB-OFDM transmission distance limitations. In addition, the impact of the OFDM subcarrier number and high-level modulation...
We investigate a carrier frequency offset (CFO) estimation algorithm for coherent optical quaternary phase-shift keying (QPSK) receivers. The algorithm utilizes the phase difference between the samples with different time-domain separations, so that the estimation accuracy can be significantly enhanced, compared with the algorithm that only compares the phase difference between adjacent samples. In...
In this paper, we propose a novel pulse carver alignment monitoring method for RZ-DPSK and RZ-DQPSK signals by using equivalent tenth symbol delay phase portrait generated by delay-tap sampling technique. The sign and value of the time mis-alignment can be distinguished and quantized by simple pattern recognition on the phase portrait. The proposed method is tested in 10-Gb/s RZ-DPSK and 50-Gb/s RZ-DQPSK...
The standard ITU-T G.729 coder uses an interframe quantization of the line spectrum frequencies (LSF) parameters which causes error propagation to the next frames. We propose the use of intraframe quantization schemes to overcome this problem. We give a performance comparison between intraframe and interframe quantization methods of LSP parameters for ITU-T G.729. Simulations results show that our...
In this paper we propose to implement direct-spread code-division multiple access (DS-CDMA) over powerline channels combined with blanking at the receiver to reduce the effect of impulsive noise (IN). Two spreading sequences are investigated in this study, namely, Walsh-Hadamard and polyphase codes. The impact of different loading scenarios, ranging from light-to full-loading, on the probability of...
Wave energy converters generally suffer from a low operating power factor due to the nature of the long wavelength water wave and the inductance of the electrical generator employed in the conversion process. A Forced Commutated Series Capacitor (FCSC) converter can be connected between the generator and the load circuit to prevent power factor degradation. This paper describes the effectiveness of...
This paper is concerned with maximum power tracking of a pneumatically-driven electric generator in a standalone small scale compressed air energy storage system (CAES). In this system, an air motor is used to drive a permanent magnet DC generator, whose output is controlled by a buck converter supplying power to a resistive load. The output power of the converter is controlled such that the air motor...
This paper presents analysis of the channel characteristics of a Medium Voltage (MV) Electrical Distribution Networks (EDN) based on predefined reference scenarios provided by the Power Utilities. Simulation results which show the influences of various parameters such as the cable (type, length, and installation), number of end users, number of inter-connections, and component outages or interruptions...
In this paper, we consider a multirate teletraffic loss model for the calculation of congestion probabilities in a Wideband Code Division Multiple Access (W-CDMA) cell that utilizes the Bandwidth Reservation (BR) policy and supports calls generated by a finite number of users. The BR policy is used particularly to equalize congestion probabilities among calls of different service-classes. In the proposed...
We consider a multirate loss model of a link that accommodates Poisson calls. Calls compete for the available link bandwidth under the combination of the Threshold (TH) and the Bandwidth Reservation (BR) policies. The TH policy limits calls of each service-class up to a threshold, which can be different for each service-class. The BR policy reserves part of the available link bandwidth to benefit...
Mobile networks are among the fastest-developing areas of ICT. The increasing number of network users and the number of services offered by the network makes it necessary to develop new methods of network modeling and analysis. These methods also need to take into account the influence of complex traffic management mechanisms on network efficiency. An important group of traffic management mechanisms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.