|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
August 2012 | Vol. 42 No.2 |
Title: |
OPTIMIZING SPARSE MATRIX-VECTOR MULTIPLICATION BASED ON GPU |
Author: |
MENGJIA YIN, TAO ZHANG, XIANBIN XU, JIN HU, SHUIBING HE |
Source: |
Journal of Theoretical and Applied Information Technology
pp 156 - 165 Vol. 42. No. 2 -- 2012 |
Abstract |
In recent years, Graphics Processing Units(GPUs) have attracted the attention of
many application developers as powerful massively parallel system. Computer
Unified Device Architecture (CUDA) as a general purpose parallel computing
architecture makes GPUs an appealing choice to solve many complex computational
problems in a more efficient way. Sparse Matrix-vector Multiplication(SpMV)
algorithm is one of the most important scientific computing kernel algorithms.
In this paper, we proposed new parallelization algorithms that CSR-M based on
CSR format and ELLPACK-R based on ELLPACK format, which are realized the
parallelism kernel on GPU with CUDA. We discussed implementing optimizing SpMV
on GPUs using CUDA programming model, the optimization strategies including:
mapping thread, mergering access, reusing data, avoiding branch, optimization
thread block. The experiment results showed the proposed optimization strategies
can improve performance, memory bandwidth and reduce the execution time of
kernel. |
Keywords |
Sparse Matrix-vector Multiplication, Computer Unified Device Architecture,
Graphics Processing Unit |
Full
Text |
|
Title: |
A ROUTING ATTACK DETECTION METHOD FOR CLUSTER WIRELESS SENSOR NETWORKS |
Author: |
SHEN ZIHAO, LIU SHUFEN |
Source: |
Journal of Theoretical and Applied Information Technology
pp 166 - 170 Vol. 42. No. 2 -- 2012 |
Abstract |
Wireless sensor networks have been widely used in many applications such as
military monitoring, target tracking and surveillance. Security issue is need to
more concern. Routing protocol is the core technology of the network layer in
wireless sensor networks. Many attackers disrupt the network with routing
attack, which will do serious damage to wireless sensor networks. Consider the
scare energy and limitation computation capability of sensors, traditional
security detection method is not fit for wireless sensor networks. In this
paper, we focus on malicious attacks on routing and detection method in wireless
sensor networks. We analyze most kinds of attacks and threats on routing, and
then propose a routing attack detection method for cluster wireless sensor
networks. |
Keywords |
Wireless Sensor Networks (WSNs), Routing Attack, Detection Method, Cluster
Networks |
Full
Text |
|
Title: |
EVOLUTIONARY DISTANCE MODEL BASED ON DIFFERENTIAL EQUATION AND MARKOV PROCESS |
Author: |
XIAOFENG WANG |
Source: |
Journal of Theoretical and Applied Information Technology
pp 171- 175 Vol. 42. No. 2 -- 2012 |
Abstract |
Evolutionary distance is a measure of evolutionary divergence time between two
homologous sequences. It is fundamental for the study of molecular evolution. In
this paper, we exploit one-parameter model and two-substitution model using the
differential equation and the Markov process in stochastic process. Through
them, we can acquire the evolutionary distance between two sequences as
estimated number of changes that have occurred per site. Experimental results
are evaluated through Monte Carlo experiments demonstrating the usefulness of
one-parameter model and two-substitution model, and comparing two models, the
two-substitution model may get better accuracy than one-parameter model. |
Keywords |
Evolutionary Distance, Differential Equation, Two-substitution Model, Markov
Process |
Full
Text |
|
Title: |
CLOUD APPLICATION AUTOMATION – A REVIEW OF VARIOUS CLOUD AUTOMATION TOOLS |
Author: |
SHRIVATHSAN.A.D, PRAKASH.V |
Source: |
Journal of Theoretical and Applied Information Technology
pp 176 - 181 Vol. 42. No. 2 -- 2012 |
Abstract |
Virtualization of applications, desktops and servers has taken off in the past
few years because of the convenience and cost savings. Organizations are rolling
these virtual servers out in the form of private cloud, public cloud, or hybrid
cloud services. Many experts say automated application deployment tools are a
requirement when hosting an application in the cloud. In this paper we reviewed
the benefits of cloud application automation and the readers will learn what
they need to consider and which tools they need when automating applications in
the cloud. Not too many studies are conducted in this area of comparing various
cloud automation tools. This paper helps organizations in choosing an
appropriate automation tool. |
Keywords |
Cloud Computing, Cloud application automation, Private Cloud, Public Cloud |
Full
Text |
|
Title: |
FUZZY CONTROL FOR HEAT RECOVERY SYSTEMS OF CEMENT CLINKER COOLER |
Author: |
XIANG ZHANG, JIDONG LU |
Source: |
Journal of Theoretical and Applied Information Technology
pp 182 - 190 Vol. 42. No. 2 -- 2012 |
Abstract |
A fuzzy logic controller of the heat recovery systems of cement clinker grate
cooler is presented in this paper. The development and tests of the proposed
fuzzy controller have been implemented in a cement plant in Guangdong, China.
Cooling is performed by blowing fresh air underneath the grate cooler plate and
heat recovery is obtained by outlet pipe extracting the hot air. However,
continuous fluctuation of both the clinker inlet temperature and flow rate, in
conjunction with the practical unfeasibility of direct measurements of such
parameters, makes it difficult to extract air at constant temperature, this
being the only parameter that can be monitored for process control. In this
situation, fuzzy logic control offers an advantage over conventional control
techniques in implementing the control rules. Drawing on a previously developed
unsteady-state real-time heat exchange model of cement clinker grate cooler
operation, the paper describes the development and optimization of the control
system along with tests of its performance. |
Keywords |
Fuzzy Control, Heat Recovery, Cement Clinker Cooler |
Full
Text |
|
Title: |
HIGH RATE COMPRESSION BASED ON LUMINANCE & CHROMINANCE OF THE IMAGE USING BINARY
PLANE TECHNIQUE |
Author: |
MOHAMMED ISMAIL.B, Dr.MAHABOOB BASHA SHAIK, Dr. B. ESWARA REDDY |
Source: |
Journal of Theoretical and Applied Information Technology
pp 191 - 195 Vol. 42. No. 2 -- 2012 |
Abstract |
When working with color images, many processing algorithms and procedures can
perform separation of pixel values into their luminance and chrominance
components .This paper presents a new approach to compress the luminance and
chrominance components using lossy and lossless Binary Plane Techniques
respectively. The results are compared with the compression applied directly on
RGB image using lossy and lossless Binary Plane Technique. |
Keywords |
Lossy and Loss less Binary Plane Techniques, luminance, chrominance, Mean Square
Error (MSE), Peak Signal to Noise Ratio (PSNR) |
Full
Text |
|
Title: |
ONE FAIR SCHEDULING ALGORITHM OF INPUT BUFFER SWITCH |
Author: |
DAIYUN WENG, LI YANG |
Source: |
Journal of Theoretical and Applied Information Technology
pp 196 - 202 Vol. 42. No. 2 -- 2012 |
Abstract |
As functional components like switch structure and cache do not need
acceleration, the input buffer program becomes the mainstream structure of
high-performance devices. Fair resource allocation is a necessary condition for
achieving service quality control. The switch scheduling should take both
scheduling efficiency and fair resource allocation into account. An iterative
matching scheduling algorithm iPFQ for input buffer switch was brought out based
on iSLIP. Simulation experiments were used to verify average delay, throughput
as well as link bandwidth allocation fairness under different loads when it is
uniform distribution and non-uniform Bernoulli arriving probability. The
experimental results show that iPFQ can achieve high scheduling efficiency under
fair resource allocation. |
Keywords |
Input Buffer, Service Quality, Iterative Scheduling Algorithm, Fair Scheduling |
Full
Text |
|
Title: |
CHARACTERIZATION OF TUNNEL FET FOR ULTRA LOW POWER ANALOG APPLICATIONS |
Author: |
BRINDsA.A, K. CHAKRAPANI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 203 - 208 Vol. 42. No. 2 -- 2012 |
Abstract |
In modern portable devices, the supply voltage is decreased to reduce the power
dissipation. However as the supply voltage is scaled down below 0.4V, the normal
MOSFET devices cannot be used due to lower ION/ IOFF ratio which will reduce the
static power dissipation. Hence for low power applications, Tunnel FET is used
as alternatives due to their higher sub threshold swing, extremely low off state
current (IOFF) and excellent sub threshold characteristics. Hence Tunnel FET
transistor has attracted a lot of attention for analog and RF applications. In
Tunnel FET, the dynamic power dissipation will be decreased since the operating
voltage is very low (0.4).
The power consumption becomes a major bottleneck for further scaling. The
continued reduction of MOSFET size is leading to increased leakage current due
to short channel effects. A promising alternative for MOSFET which does not
suffer from these limitations is Tunneling FET.
In this work, characterizing the various parameters of Tunnel FET such as on
current, off current, Transconductance generation factor for ultra low power
analog applications. |
Keywords |
MOSFET (Metal Oxide Semiconductor Field Effect Transistor), Tunnel FET. |
Full
Text |
|
Title: |
A METHOD FOR DIAGNOSIS OF LARGE AIRCRAFT ENGINE FAULT BASED ON PARTICLE SWARM
ROUGH SET REDUCTION |
Author: |
ZHUANG WU |
Source: |
Journal of Theoretical and Applied Information Technology
pp 209 - 216 Vol. 42. No. 2 -- 2012 |
Abstract |
The large aircraft engine fault diagnosis in the problem of accurate. General
components with different, large aircraft engine structure and its complex, the
work in higher frequency failure, failure appear in a relatively short time, and
it is difficult to retrieval, leading to establish the connection between the
fault occurs when the connection breaks. The traditional fault detection method
is based on the relationship between the fault information fault mining, once
the fault can't reiteration, will lead to mining failure, reduce the detection
accuracy. Put forward the particle group of rough intensive Jane's fault
diagnosis method, and applied to the plane engine, through fault knowledge
acquisition, rules optimization, using the fault prediction method, set up the
relevance of fracture. Complete fault recognition. The experimental results show
that this method is good for improving fault diagnosis accuracy. |
Keywords |
Particle Swarm, Rough Set, Fault Diagnosis |
Full
Text |
|
Title: |
LOW COST MEDICAL DATA ACQUISITION SYSTEM USING AVR-MCU AND PC |
Author: |
BASHAR S. MOHAMAD-ALI, ABDULRAFA H. MAREE |
Source: |
Journal of Theoretical and Applied Information Technology
pp 217 - 220 Vol. 42. No. 2 -- 2012 |
Abstract |
A low cost multi-channels data acquisition system for medical signals has been
designed and implemented, using personal computer (PC) and AVR-MCU ATmega16L.
The system is capable of displaying bioelectric signals such as
electrocardiography (ECG) signal for a patient. Temperature, blood pressure,
hart rate . ..etc, can also be displayed as (text) together with the bioelectric
signal on PC monitor in real time. The implemented system can be used near the
patient in an emergency room or at home. The patient data can be processed and
or relayed to physician via internet to monitor the patient status. |
Keywords |
Acquisition, ECG monitoring, AVR. |
Full
Text |
|
Title: |
MODIFIED DYNAMIC SUBCARRIER BANDWIDTH (MDSB) OFDM SYSTEMS FOR ENERGY EFFICIENT
TRANSMISSION IN HIGH MOBILITY APPLICATIONS |
Author: |
K.VINOTH BABU, Dr.G.RAMACHANDRA REDDY, M.ARTHI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 221 - 226 Vol. 42. No. 2 -- 2012 |
Abstract |
Orthogonal Frequency Division Multiplexing (OFDM) is a fast growing technology
which is frequently used in all high data rate applications. The standards like
Long Term Evaluation (LTE) promise to offer a good data rate at high mobility.
But the high mobility destroys the orthogonality of OFDM systems and also
reduces the transmission energy efficiency. The transmit power is a very
important resource in the OFDM based communication systems which determines the
reliability, data rate and energy consumption of the system. Energy minimization
is a very critical component in wireless OFDM applications. Minimization of
energy and Inter Carrier Interference (ICI) is mainly concentrated in this work.
In this paper we propose a new algorithm, Modified Dynamic Subcarrier Bandwidth
(MDSB), which is a combination of Simple Bit Loading (SBL) algorithm with
Dynamic Subcarrier Bandwidth (DSB) to minimize energy consumption and ICI. The
results show that MDSB algorithm optimally minimizes ICI and Energy when
compared to the other algorithms. |
Keywords |
Simple Bit Loading (SBL), Dynamic Subcarrier Bandwidth (DSB), Modified Dynamic
Subcarrier Bandwidth (MDSB), Carrier Frequency Offset (CFO) |
Full
Text |
|
Title: |
THROUGHPUT UTILITY ENHANCEMENT OF COGNITIVE WIMAX WITH FEMTO-CELLS |
Author: |
A. KARTHIKEYAN, ARUNKUMAR. K, V.SRIVIDHYA, T.SHANKAR |
Source: |
Journal of Theoretical and Applied Information Technology
pp 227 - 236 Vol. 42. No. 2 -- 2012 |
Abstract |
WiMAX with femto-cells is a cost effective and spectrally efficient next
generation broadband wireless communication systems. Femtocells are perceived as
having a strong potential to provide high data-rate services with increased
coverage at low cost. Femtocells will allow new services and business models to
be offered to indoor users. Almost parallely, the WiMAX standard has emerged as
a potential candidate technology for the future wireless networks. WiMAX
femtocells are currently under development and will therefore play an important
role in the world of indoor broadband wireless access. However, several aspects
of this new technology, such as the access method and interference avoidance
techniques play a crucial role in the amount of interference caused to
co-channel deployed macrocells. Cognitive radio is a recent technology which
enhances spectrum efficiency by dynamic spectrum sensing. So by the integration
of WiMAX with femto-cells and cognitive radio further enhances the spectrum
efficiency. The integration faces certain challenges in terms of frequency
reuse, power control, interference, complexity etc. So it is required to find
the optimum power that is to be transmitted from the base station and also the
optimum routes with optimum channel allocation, so that the interference is
reduced and frequency reuse is possible. Also by implementing multi-hop
cooperative communication, complexity of the problem further increases. The
constraints are mathematically modeled using stochastic network model. Three
resource allocation policies are introduced and it is proved using Lyapunov
theory that these policies leads to the throughput enhancement. It is showed
that how relaying and co-operative relaying affect the throughput. At-last an
algorithm is presented for resource allocation satisfying the objectives of the
policies. |
Keywords |
Macro-Base Station (MBS), Femto-Base Station (FBS), Lyaunov Function, Multi-Hop
Cooperative Communication, Hungarian Algorithm, Maximum Bipartite Matching |
Full
Text |
|
Title: |
COMMUNICATION AMONG HARDWARE AND SOFTWARE ENGINEERS BY TECHNICAL NOTATIONS |
Author: |
ALI MOHAMMADALIZADEH GHAZIJAHANI, RODZIAH ATAN, NOR FAZLIDA M. SANI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 237 - 244 Vol. 42. No. 2 -- 2012 |
Abstract |
Hardware and software engineers need to cooperate with each other in developing
and building hardware/software systems. Any cooperation among engineers requires
a convenient and efficient communication. There is a gap between hardware and
software engineers that makes the communication difficult among them. They have
difficulty in understanding each other’s language because they are different in
the field of study and profession. If good communication is not established
between these two groups, then hardware/software systems will encounter
tremendous number of serious problems and defects which may increase the
expenses of system in terms of time and resources. Hardware and software
engineers need communication mostly for developing hardware-software interfaces
and for clarification of type and format of the data that will be transferred
among hardware and software components. In this paper, three different notations
are proposed to help software and hardware engineers communicate with each
other. By using these notations which are understandable by hardware and
software engineers, the requirements relating to the data types and data formats
will be depicted in uniform, detailed and accurate forms of documents. |
Keywords |
Engineers Communication, Communication Notation, Requirements, HW/SW Systems,
Hardware/Software Engineers |
Full
Text |
|
Title: |
A DECISION BASED UNSYMMETRICAL TRIMMED MIDPOINT ALGORITHM FOR THE REMOVAL OF
HIGH DENSITY SALT AND PEPPER NOISE |
Author: |
K.VASANTH1, V.JAWAHAR SENTHILKUMAR |
Source: |
Journal of Theoretical and Applied Information Technology
pp 245 - 251 Vol. 42. No. 2 -- 2012 |
Abstract |
A New Decision based Unsymmetrical Trimmed Midpoint algorithm, which uses
asymmetric trimmed midpoint rather than median for the restoration of gray scale
and color images that are heavily corrupted by salt and pepper noise is
proposed. The processed pixel is checked for 0 or 255; if examined pixel is
equal to 0 or 255, then it is considered as noisy pixel else not noisy. The
noisy pixel is replaced by midpoint of the asymmetric trimmed array. The non
noisy pixel is left unaltered. Under high noise densities, the proposed
algorithm fairs well by preserving fine details of the image. The Rank ordering
is done by using a modified snake like algorithm with reduced number of
comparators. The proposed algorithm shows excellent results quantitatively and
qualitatively when compared to existing and recent filters. The proposed
algorithm is tested against different grayscale and color images which gives
higher Peak Signal-to-Noise Ratio (PSNR) and good Image Enhancement Factor (IEF)
with edge preservation capabilities even at very high noise densities. |
Keywords |
Decision Based Filter, Unsymmetrical Elimination Filter, Salt And Pepper Noise,
Mean Filter |
Full
Text |
|
Title: |
MULTIUSER DETECTION BASED TIMING OFFSET ESTIMATION FOR UPLINK MOBILE WIMAX |
Author: |
LAKSHMANAN. M, P. S. MALLICK, L. NITHYANANDAN |
Source: |
Journal of Theoretical and Applied Information Technology
pp 252 - 259 Vol. 42. No. 2 -- 2012 |
Abstract |
The approval of the new mobile WiMAX helps in realizing the real time wireless
broadband networks with large coverage area and high data rate. In mobile WiMAX
whenever a subscriber comes into the cell radius of base station (BS), it has to
get synchronized; this process in mobile WiMAX is termed as initial ranging.
This paper proposes a novel Multiuser Detection for uplink mobile WiMAX with
better timing offset estimation and reduces the multiple access interference
(MAI) at the base station |
Keywords |
Initial Ranging, Timing Offset estimation, Multiple Access Interference (MAI),
Round trip Transit Delay |
Full
Text |
|
Title: |
A NEW GENERIC TAXONOMY OF MALWARE BEHAVIOURAL DETECTION AND REMOVAL TECHNIQUES |
Author: |
LEE LING CHUAN, MAHAMOD ISMAIL, CHAN LEE YEE, KASMIRAN JUMARI |
Source: |
Journal of Theoretical and Applied Information Technology
pp 260 - 270 Vol. 42. No. 2 -- 2012 |
Abstract |
Modern malware has become a major threat to today’s Internet communications. The
threat can infiltrate hosts using a variety of methods, such as attacks against
known software vulnerabilities, hidden functionality in regular programs,
drive-by download from unsafe web sites, and so forth. Matching a file stream
against a known virus pattern is a fundamental technique for detecting viruses.
With the popularity and variety of malware attack over the Internet, computer
virus protection companies need to constantly update new virus signatures in
their virus definition databases. However, the increasing size of the signature
database can only detect known virus but cannot defend against new variants of
malware. In this paper, we present an overview of the detection of modern
malware focuses on suspect behavioural patterns. Contrary to classical heuristic
engines which focus on the detection of encrypted malware samples, we integrate
a known packer detector as well as unpacking routines to circumvent the
protection techniques used by most of the modern malware. We believe that many
obfuscated techniques used by malware authors are available on the Internet.
More precisely, the use of known packer removals would strip out the packer
protection with our dedicated decryption routines. Our apprehensive program is
based on the integration of both static heuristic and emulator approaches;
however, they do not necessarily have to serve as a complement for each other.
Static heuristic scanner involves static extraction, which is relying on byte
signature to identify a dedicated viral signature. Emulator can execute the
arbitrary code from the instance and would trace the instance’s body code in a
virtual environment. It can be used to combat any protection code, regardless of
the complexity of the protection algorithm. Fragments of virus body could be
detected while the execution is in a decrypted virus body. Lastly, we present
experimental results that indicate our proposed technique can provide good
performance against obfuscated malware. Through this study, we hope to help
security researchers understand our defence approach and give some directions
for future research. |
Keywords |
Static Analysis, Dynamic Analysis, Heuristic, Emulator, Malware |
Full
Text |
|
Title: |
OPTIMAL DESIGN OF SVC-PI CONTROLLER FOR DAMPING IMPROVEMENT USING NEW
COMPUTATIONAL INTELLIGENCE APPROACH |
Author: |
N. A. M. KAMARI, I. MUSIRIN, Z. A. HAMID, M. N. A. RAHIM |
Source: |
Journal of Theoretical and Applied Information Technology
pp 271 - 280 Vol. 42. No. 2 -- 2012 |
Abstract |
This paper presents an optimal design of a Static Var Compensator (SVC) for
damping improvement of a Single Machine Infinite Bus (SMIB) system. In this
study, SVC is installed to improve the angle stability of a synchronous
generator. A new computational intelligence approach using Mutated Particle
Swarm Optimization (MPSO) technique is implemented. The study involves the
optimization of the proportional gain, KP and interval gain, KI parameters of PI
controller. Results are based on damping ratio as an objective function. Results
based on MPSO technique are compared with other widely used optimization
techniques. From the results, it is found that the proposed technique is very
effective to reduce the damping problem which indicates that stability has been
achieved. |
Keywords |
Small Signal Stability, Damping Ratio, Particle Swarm Optimization, Evolutionary
Programming, Artificial Immune System |
Full
Text |
|
Title: |
A REAL-TIME REGISTRATION METHOD OF AUGMENTED REALITY BASED ON SURF AND OPTICAL
FLOW |
Author: |
HONGBO LI, MING QI, YU WU |
Source: |
Journal of Theoretical and Applied Information Technology
pp 281 - 286 Vol. 42. No. 2 -- 2012 |
Abstract |
To solve the time-consuming and errors in traditional 3D registration that
restrict the application of augmented reality technology, a real-time
registration method of augmented reality based on natural features is presented.
It includes two procedures, the image feature detecting and tracing for
registration. Firstly, to improve arithmetic speed, SURF (Speeded up Robust
Features) algorithm is adopted to replace traditional SIFT (Scale-invariant
Feature Transform) algorithm. Since detecting image features from every frame
reduces efficiency of 3D registration, a L-K (Lucas-Kanade) optical flow
algorithm based on image pyramid is used to trace the detected features in the
second procedure. Accumulation of registration error is avoided by adopting
feature redetection strategy which maintains 3D registration stability.
Experiments demonstrate that our approach improves the accuracy and real time
capabilities of 3D registration. |
Keywords |
Image Feature, Homography, Optical Flow, 3D Registration, Augmented Reality |
Full
Text |
|
Title: |
A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY |
Author: |
LINTAO LV, HUA FAN, JINFENG WANG, YUXIANG YANG |
Source: |
Journal of Theoretical and Applied Information Technology
pp 287 - 291 Vol. 42. No. 2 -- 2012 |
Abstract |
A novel semi-fragile watermarking scheme for Image tamper localization and
recovery is proposed. The Logistic map is used to encrypt the feature extracted
from the original image, then the generated watermark is embedded into the
middle-frequency DCT coefficients of each block after being ordered in zigzag
manner based on invariance properties of DCT coefficients before and after JPEG
compressions. As for authentication, firstly, the feature information is
extracted after decryption, and compared it with reconstructed feature
information, then, the tamper matrix is generated. Finally, recover the invalid
blocks by using bicubic interpolation. Experimental results illustrate that the
watermarked image has good imperceptibility and can tolerate the common
content-preserving image processing. It is also sensitive to malicious
manipulations and can localize and recover tampered regions approximately. |
Keywords |
Image authentication; Semi-fragile; Tamper localization; Recovery |
Full
Text |
|
Title: |
DELAY ANALYSIS OF THREE ARQ PROTOCOLS IN GEOM/G/1 QUEUE MODEL |
Author: |
YONGQIANG ZHOU, SUOPING LI, YONG ZHOU |
Source: |
Journal of Theoretical and Applied Information Technology
pp 292 - 296 Vol. 42. No. 2 -- 2012 |
Abstract |
In this paper, we study the performance of the classical SW-ARQ, multichannel
SW-ARQ and GBN-ARQ in discrete-time Geom./G/1 queue with setup mechanism. Based
on the method of embedded Markov chain, the expressions of the packet average
waiting delay, system average delay and channel utilization are respectively
obtained. Finally, by numerical examples, we analyze the influences of packet
length, the successful transmission probability and packet arrival rate on
system average delay. The numerical simulation results show that the system
delay could be lower by choosing an appropriate ARQ protocol. |
Keywords |
Geom./G/1 Queue Model, Packet Average Waiting Delay, System Average Delay,
Channel Utilization |
Full
Text |
|
|
|