On Channel Allocation for Heterogeneous Data Broadcasting
#1

We explore in this paper the problem of generating broadcast programs in a heterogeneous data broadcasting environment, in which disseminated data items can be of different sizes. Given the broadcast database and the number of channels, we first derive the analytical model of the heterogeneous data broadcasting to obtain the average waiting time of mobile users, and prove the allocation problem as an NP-complete problem. In order to solve such problem, we propose a two-phase architecture to perform channel allocation. Algorithm DRP (Dimension Reduction Partitioning) is employed to perform rough allocation to derive the satisfactory solutions, whereas mechanism CDMS (Cost-Diminishing Movement Selection) is used for fine allocation to achieve local optimum solutions. In addition, we also propose algorithm GA-CDMS according to the concept of hybrid genetic algorithm for comparison purposes. GA-CDMS can perform global search more accurately and efficiently than conventional genetic algorithm GA and the suboptimum that GA-CDMS achieves will be very close to the optimal solution. In the experiments, we consider the important issues such as accuracy, scalability, diversity and the efficiency. From the experimental results, we show that the proposed two-phase channel allocation is very practical in performing an effective channel allocation with high efficiency in a heterogeneous broadcasting environment.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: channel 4, channel allocation in cellular system, joint power and channel allocation for cognitive radios, multiple channel data acquesition ppt, channel allocation for umts, ns2 code for broadcasting, heterogeneous data sources,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,568 17-10-2017, 02:48 PM
Last Post: jaseela123d
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,081 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic To 1 765 14-02-2017, 04:15 PM
Last Post: jaseela123d
  Energy-Aware Autonomic Resource Allocation in Multi tier Virtualized Environments 1 749 14-02-2017, 02:13 PM
Last Post: jaseela123d
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,845 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,663 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,833 06-11-2015, 02:27 PM
Last Post: seminar report asees
  DATA LEAKAGE DETECTION project topics 16 13,090 31-07-2015, 02:59 PM
Last Post: seminar report asees
  Privacy Preservation in Data Mining sajidpk123 3 2,971 13-11-2014, 10:48 PM
Last Post: jaseela123d
  projects on data mining? shakir_ali 2 2,046 05-11-2014, 09:30 PM
Last Post: jaseela123d

Forum Jump: