{"id":1245,"date":"2007-04-19T19:25:52","date_gmt":"2007-04-20T03:25:52","guid":{"rendered":"http:\/\/www.horace.org\/blog\/research\/"},"modified":"2012-02-24T15:32:33","modified_gmt":"2012-02-24T23:32:33","slug":"mengproject","status":"publish","type":"page","link":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/","title":{"rendered":"Master of Engineering"},"content":{"rendered":"<p><strong>Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks <\/strong>In <em>Proceeding of the 2006 international Conference on Communications and Mobile Computing<\/em> (Vancouver, British Columbia, Canada, July 03 &#8211; 06, 2006). IWCMC &#8217;06. ACM Press<\/p>\n<p><em>Abstract:<\/em><br \/>\nThe evolution of 3G Code Division Multiple Access (CDMA) network towards higher data rates is through the introduction of High Speed Downlink Packet Access (HSDPA) enhancement to the existing 3rd Generation Partnership Project (3GPP)  standards.  In this paper, an access control protocol is proposed for an integrated voice, video and non real-time data traffic on the forward link (cell-site to mobile).  The protocol involves predicting the residual capacity available for the HSDPA traffic.  This paper evaluates the performance of three video traffic models in predicting the number of data packets that could be scheduled at the next time slot.  All three video traffic models exploit the frame properties of Motion Picture Experts Group (MPEG) traffic.  The traffic models are based on Markovian, Autogressive (AR) and two-sided Markov Renewal Model (TSMR) processes.  The performances of the proposed estimation schemes are compared with estimation scheme using static guard margin.  Findings of this paper can be used to improve the downlink performance of non-real time data traffic in the presence of MPEG video traffic in 3G CDMA networks.<\/p>\n<p>Full Text: <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/pdf_logo.gif?w=474\" alt=\"pdf\"\/> <a title=\"iwcmc paper\" href=\"http:\/\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/iwcmc_paper_v2.pdf\">pdf<\/a> (337kb)<\/p>\n<hr \/>\n<p><strong>Forward Error Control in Wireless Local Area Networks<\/strong><\/p>\n<p><em>Abstract:<\/em><br \/>\nIn this project, we investigate the performance improvement of applying the Forward Error Control (FEC) to the IEEE 802.11b Wireless LAN standard.  In the IEEE 802.11b standard, bit error introduced by the channel noise is protected by Cyclic Redundancy Check (CRC) and results in packet loss. Reliable end-to-end connection is provided by higher layer protocols such as TCP, whose performance is severely degraded by the bit error rate in the channel.  We evaluate the performance of two different approaches of FEC implementation, Reed Solomon code, and Turbo code over TCP Wireless LAN.  From the OPNET simulations, we concluded that both implementations reduce the packet loss and the congestion in the network.<\/p>\n<p>Full Text: <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/pdf_logo.gif?w=474\" alt=\"pdf\"\/> <a href=\"http:\/\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/wifi_fec_paper.pdf\">pdf<\/a> (271kb)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks In Proceeding of the 2006 international Conference on Communications and Mobile Computing (Vancouver, British Columbia, Canada, July 03 &#8211; 06, 2006). IWCMC &#8217;06. ACM Press Abstract: The evolution of 3G Code Division Multiple Access (CDMA) network towards higher &hellip; <a href=\"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Master of Engineering<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1147,"menu_order":1,"comment_status":"open","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"lc_iscn_info":[],"footnotes":""},"class_list":["post-1245","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Master of Engineering - \u54f2\u5b50\u6232 Philosophist\u2019s Camp<\/title>\n<meta name=\"description\" content=\"Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks In Proceeding of the 2006 international\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Master of Engineering - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"og:description\" content=\"Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks In Proceeding of the 2006 international\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/\" \/>\n<meta property=\"og:site_name\" content=\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/horace.org\" \/>\n<meta property=\"article:modified_time\" content=\"2012-02-24T23:32:33+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/pdf_logo.gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@horaceorg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/\",\"name\":\"Master of Engineering - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2007\\\/04\\\/pdf_logo.gif\",\"datePublished\":\"2007-04-20T03:25:52+00:00\",\"dateModified\":\"2012-02-24T23:32:33+00:00\",\"description\":\"Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks In Proceeding of the 2006 international\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2007\\\/04\\\/pdf_logo.gif\",\"contentUrl\":\"http:\\\/\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2007\\\/04\\\/pdf_logo.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/mengproject\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"My Research\",\"item\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/myresearch\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Master of Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\",\"name\":\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"description\":\"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\",\"name\":\"hevangel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"width\":1313,\"height\":1259,\"caption\":\"hevangel\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.horace.org\",\"https:\\\/\\\/www.facebook.com\\\/horace.org\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Master of Engineering - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks In Proceeding of the 2006 international","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/","og_locale":"en_US","og_type":"article","og_title":"Master of Engineering - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","og_description":"Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks In Proceeding of the 2006 international","og_url":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/","og_site_name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","article_publisher":"https:\/\/www.facebook.com\/horace.org","article_modified_time":"2012-02-24T23:32:33+00:00","og_image":[{"url":"http:\/\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/pdf_logo.gif","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@horaceorg","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/","url":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/","name":"Master of Engineering - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","isPartOf":{"@id":"https:\/\/www.horace.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/#primaryimage"},"image":{"@id":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/#primaryimage"},"thumbnailUrl":"http:\/\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/pdf_logo.gif","datePublished":"2007-04-20T03:25:52+00:00","dateModified":"2012-02-24T23:32:33+00:00","description":"Traffic Prediction Based Access Control Using Different Video Traffic Models in 3G CDMA High Speed Data Newtworks In Proceeding of the 2006 international","breadcrumb":{"@id":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/#primaryimage","url":"http:\/\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/pdf_logo.gif","contentUrl":"http:\/\/www.horace.org\/blog\/wp-content\/uploads\/2007\/04\/pdf_logo.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/www.horace.org\/blog\/myresearch\/mengproject\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.horace.org\/blog\/"},{"@type":"ListItem","position":2,"name":"My Research","item":"https:\/\/www.horace.org\/blog\/myresearch\/"},{"@type":"ListItem","position":3,"name":"Master of Engineering"}]},{"@type":"WebSite","@id":"https:\/\/www.horace.org\/blog\/#website","url":"https:\/\/www.horace.org\/blog\/","name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18","publisher":{"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.horace.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":["Person","Organization"],"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c","name":"hevangel","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","url":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","width":1313,"height":1259,"caption":"hevangel"},"logo":{"@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1"},"sameAs":["http:\/\/www.horace.org","https:\/\/www.facebook.com\/horace.org"]}]}},"jetpack_shortlink":"https:\/\/wp.me\/Pwn21-k5","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6229,"url":"https:\/\/www.horace.org\/blog\/myresearch\/verification\/","url_meta":{"origin":1245,"position":0},"title":"Verification","author":"hevangel","date":"February 24, 2012","format":false,"excerpt":"https:\/\/github.com\/hevangel\/publications SW\/FW Automated Test Framework and Debug Toolkit for System Testing In Design\/IP Track Presentation of the 53rd Design Automation Conference (DAC 2016, Austin TX, Jun 4 - Jun 9, 2016) Abstract: This presentation outlines a novel SW\/FW automated test framework and debug toolkit for system testing that supports automated\u2026","rel":"","context":"In \"verification\"","block_context":{"text":"verification","link":"https:\/\/www.horace.org\/blog\/tag\/verification\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":833,"url":"https:\/\/www.horace.org\/blog\/mylibrary\/software\/","url_meta":{"origin":1245,"position":1},"title":"Software","author":"hevangel","date":"December 23, 2006","format":false,"excerpt":"Windows: Installed: Mozilla Firefox Nod32 Microsoft IntelliType Pro Microsoft IntelliMouse Pro Synergy Winzip Alcohol 120% Java Gvim Nero Njstar Filezilla Filezilla Server Real Player VLC Player Winrar Skype Mozilla Thunderbird Mozilla Sunbird MySQL Tools Microsoft Word Microsoft Excel Microsoft Powerpoint Microsoft Publisher Microsoft Project Microsoft Access Microsoft Visio Microsoft Onenote\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15179,"url":"https:\/\/www.horace.org\/blog\/privacy-policy\/","url_meta":{"origin":1245,"position":2},"title":"Privacy Policy","author":"hevangel","date":"June 29, 2022","format":false,"excerpt":"Who we are Suggested text: Our website address is: https:\/\/www.horace.org\/blog. Comments Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor\u2019s IP address and browser user agent string to help spam detection. An anonymized string created from your\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":false,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/pages\/1245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/comments?post=1245"}],"version-history":[{"count":9,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/pages\/1245\/revisions"}],"predecessor-version":[{"id":6233,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/pages\/1245\/revisions\/6233"}],"up":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/pages\/1147"}],"wp:attachment":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/media?parent=1245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}