Data mining approach can be used to discover knowledge by analyzing the patterns or correlations among of fields in large databases. Data mining approach was used to find the patterns of the data from Tanzania Ministr...
详细信息
ISBN:
(纸本)9781509034772
Data mining approach can be used to discover knowledge by analyzing the patterns or correlations among of fields in large databases. Data mining approach was used to find the patterns of the data from Tanzania Ministry of Water. It is used to predict current and future status of water pumps in Tanzania. The data mining method proposed is XGBoost (eXtreme Gradient Boosting). XGBoost implement the concept of Gradient tree Boosting which designed to be highly fast, accurate, efficient, flexible, and portable. In addition, Recursive Feature Elimination (RFE) is also proposed to select the important features of the data to obtain an accurate model. The best accuracy achieved with using 27 input factors selected by RFE and XGBoost as a learning model. The achieved result show 80.38% in accuracy. The information or knowledge which is discovered from data mining approach can be used by the government to improve the inspection planning, maintenance, and identify which factor that can cause damage to the water pumps to ensure the availability of potable water in Tanzania. Using data mining approach is cost-effective, less time consuming and faster than manual inspection.
This paper introduces physical layer network coding into multiple access system and then proposes a physical layer network coded MAC strategy (PNC-MAC). The detail steps of the PNC-MAC are presented. To show the perfo...
详细信息
ISBN:
(纸本)9781510802704
This paper introduces physical layer network coding into multiple access system and then proposes a physical layer network coded MAC strategy (PNC-MAC). The detail steps of the PNC-MAC are presented. To show the performance of the algorithm, we compare the throughput and average delay induced by the new algorithm with that by modified ALOHA strategy and tree algorithm via simulations. The results showed that when operated with our proposed PNC-MAC, multiple access system can achieve a larger throughput while the frames bear shorter average delay. Besides, in many users case, the throughput increases slightly while the average delay ascends drastically.
This paper presents the performance comparison of eight collision resolution algorithms. It can be systematically applied for random access protocols under different feedback information which includes binary, ternary...
详细信息
ISBN:
(纸本)9781479921850
This paper presents the performance comparison of eight collision resolution algorithms. It can be systematically applied for random access protocols under different feedback information which includes binary, ternary and feedback of the number of accessing packets. Each algorithm is derived from the combination of uniform selection algorithm and three effective strategies, including splitting, adaptive frame size, and skipped slot. This paper aims to investigate which one strategy in these three strategies is the best effective to improve the system performance. Based on simulation results, when the information about number of accessing packets is available, significant improvement in mean access delay can be achieved. We found that the splitting strategy is the most effective strategy, following by adaptive frame size and skipped slot.
tree algorithms are a well studied class of collision resolution algorithms for solving multiple access control problems. Successive interference cancellation, which allows one to recover additional information from o...
详细信息
tree algorithms are a well studied class of collision resolution algorithms for solving multiple access control problems. Successive interference cancellation, which allows one to recover additional information from otherwise lost collision signals, has recently been combined with tree algorithms with blocked access [Y. Yu, G.B. Giannakis, SICTA: A 0.693 contention tree algorithm using successive interference cancellation, in: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, USA, 2005, pp. 1908-1916], providing a substantially higher maximum stable throughput (MST): 0.693 for Poisson arrivals, given an infinite number of memory locations for storing signals. We propose a novel tree algorithm for a similar problem, but with two relaxed model assumptions: free access is supported and a single signal memory location suffices. A study of the maximal stable throughput of this algorithm is provided using matrix analytical methods;as a result, an MST of 0.5698 for Poisson arrivals is achieved. Our methodology also allows us to investigate the MST when the multiple access channel is subject to Markovian arrival processes. (c) 2007 Published by Elsevier B.V.
A novel random access protocol combining a tree algorithm (TA) with successive interference cancellation (SIC) has been introduced recently. To mitigate the deadlock problem of SICTA arising in error-prone wireless ne...
详细信息
A novel random access protocol combining a tree algorithm (TA) with successive interference cancellation (SIC) has been introduced recently. To mitigate the deadlock problem of SICTA arising in error-prone wireless networks, we put forth a SICTA with first success (SICTA/FS) protocol, which is capable of high throughput while requiring limited-sensing and gaining robustness to errors relative to SICTA.
We consider random access in wireless networks under a physical interference model, wherein a receiver is capable of power-based capture, i. e., a packet can be correctly decoded in the presence of multiple transmissi...
详细信息
We consider random access in wireless networks under a physical interference model, wherein a receiver is capable of power-based capture, i. e., a packet can be correctly decoded in the presence of multiple transmissions if the received signal-to-interference- plus-noise ratio (SINR) exceeds a threshold. We propose a splitting algorithm that varies the transmission power of users on the basis of quaternary channel feedback (idle, success, capture, and collision). We show that our algorithm achieves a maximum stable throughput of 0.5518. Simulation results demonstrate that our algorithm achieves higher throughput and lower delay than those of first-come-first-serve and residual-energy-based splitting algorithms with uniform transmission power
General-purpose computation on graphics processing units(GPGPU) has become a popular field of *** to its high computing capacity and relatively low price,GPU has been an ideal processing unit for many scientific appli...
详细信息
General-purpose computation on graphics processing units(GPGPU) has become a popular field of *** to its high computing capacity and relatively low price,GPU has been an ideal processing unit for many scientific applications,among which is N-body *** to the published papers,a simple O(N 2) algorithm of N-body simulation has achieved some enhancements,but tree-algorithm doesn't work well on GPU. This paper proposes a new implementation of tree-algorithm on GPU using CUDA,which has obtained more than 100X speedup when computing forces between *** paper also rises up a new method to build tree in this algorithm,making the performance even better.
Recently, general-purpose computation on graphics processing units (GPGPU) has become an increasingly popular field of study as graphics processing units (GPUs) continue to be proposed as high performance and relative...
详细信息
Recently, general-purpose computation on graphics processing units (GPGPU) has become an increasingly popular field of study as graphics processing units (GPUs) continue to be proposed as high performance and relatively low cost implementation platforms for scientific computing applications. Among these applications figure astrophysical N-body simulations, which form one of the most challenging problems in computational science. However, in most reported studies, a simple O(N-2) algorithm was used for GPGPUs, and the resulting performances were not observed to be better than those of conventional CPUs that were based on more optimized O(N log N) algorithms such as the tree algorithm or the particle-particle particle-mesh algorithm. Because of the difficulty in getting efficient implementations of such algorithms on GPUs, a GPU cluster had no practical advantage over general-purpose PC clusters for N-body simulations. In this paper, we report a new method for efficient parallel implementation of the tree algorithm on GPUs. Our novel tree code allows the realization of an N-body simulation on a GPU cluster at a much higher performance than that on general PC clusters. We practically performed a cosmological simulation with 562 million particles on a GPU cluster using 128 NVIDIA GeForce 8800GTS GPUs at an overall cost of 168 172 $. We obtained a sustained performance of 20.1 Tflops, which when normalized against a general-purpose CPU implementation leads to a performance of 8.50 Tflops. The achieved cost/performance was hence a mere $19.8 /Gflops which shows the high competitiveness of GPGPUs.
In this paper, we develop a random access scheme which combines the widely used binary exponential backoff (BEB) algorithm with a cross-layer tree algorithm (TA) that relies on successive interference cancellation (SI...
详细信息
In this paper, we develop a random access scheme which combines the widely used binary exponential backoff (BEB) algorithm with a cross-layer tree algorithm (TA) that relies on successive interference cancellation (SIC) with first success (FS). BEB and SICTA/FS complement each other nicely in enabling the novel protocol to attain a maximum stable throughput (MST) as high as 0.6 without packet loss. Although BEB-SICTA/FS avoids the deadlock problem caused by the error propagation commonly present in successive interference cancellation (SIC) algorithms, it may still suffer from deadlock effects induced by the "level skipping" caused by harsh wireless fading effects. We further develop a novel BEB-SICTAXI protocol, which is a modified version of BEB-SICTA/FS. Analysis and simulations demonstrate that this simple modification leads to high-throughput random access while completely avoiding deadlock problems.
暂无评论