PERFORMANCE EVALUATION OF A RESERVATION RANDOM ACCESS SCHEME FOR PACKETIZED WIRELESS SYSTEMS WITH CALL CONTROL DR. IZHAK RUBIN and SHERVIN SHAMBAYATI Electrical Engineering Department, 58-115 ENGR IV University of California, Los Angeles, CA 90024-1594 ABSTRACT In this paper, we present a method for design and analysis of wireless cells using Reservation Random Access (RRA) schemes as a method for packet access control integrated with a call admission control procedure. We model the state process of the system as a vector Markov chain. We then derive the transition probability function for this process and subsequently compute its steady state distribution. Using this result, we calculate the packet dropping probability and the call blocking probability. By setting limits on the maximum attained levels of the call blocking probability and the packet dropping probability, we derive the Erlang capacity of the system. For a specific RRA scheme presented in this paper, the Erlang capacity of the system was about twice the Erlang capacity attained by a comparable fixed assigned TDMA scheme. We also show that an optimal level for the call admission threshold can be selected to yield the highest call throughput level.

1

assumed lost. (No queuing or capture assumptions are made). The cell’s controller broadcasts, at the start of each frame, the identity of the slots which are reserved and the identity of the calls which have reserved them. The performance of various RRA schemes have been examined by a number of researchers (see [l],[3], [4]), when the total number of calk in the system does not vary over time. In such studies, the packet dropping probability for the system is obtained as the key measure of performance of the system. By contrast, under the scheme considered here, the number of users in the system varies over time. Thus, we are not only concerned with the performance at the packet level ( i.e. the packet dropping probability) but we must also consider the performance of the system at the call level (i.e. the call throughput). In this paper, we model and analyze the performance of such a multiple-access network. The system state is described as a vector Markov chain. We derive the transition probability matrix for the process and subsequently calculate the steady state distribution of the system state. Using this result, we compute the packet dropping probability and the system’s call throughput performance. By setting limitations on the maximum acceptable call blocking probability (and thus, the call throughput) and the packet dropping probability (and hence, the voice quality level), we obtain the throughput capacity of the system under selected call threshold levels ( m ) . From these performance curves, we conclude the value to be selected for the optimal call threshold level ( m ) . The latter yields the maximum attainable call throughput capacity, under the prescribed packet and call blocking probability levels. The presented model and the performance analysis approach provide a tool for the analysis and design of such systems. In addition, it demonstrates the key effects induced by a call admission mechanism on the performance of such wireless networks. To demonstrate the integrated call-packet performance characteristics of the system we select an illustrative case. For this illustrative example we show that the joint call admission/ packet random access procedure studied here has about twice the value of the Erlang capacity attained by a comparable fixed assigned TDMA scheme.

Introduction

We consider a wireless cell whose radio channel is shared among multiple users ( mobiles) for transmission of voice messages. A station wishing to engage in a voice session must first establish a connection. For that purpose, a signaling channel is provided. Such a user communicates with the cell’s controller ( located at the base station) over the signaling channel to request call setup. If the number of users in the cell is less than a threshold, m , the call is admitted into the system. Otherwise, the call is blocked and discarded. Once the call is admitted into the system, the call is allowed to transmit its voice messages over the information bearing channel of the cell. An admitted call switches randomly between active and silent states (see Figure 1). Once in the active state, the call generates packetized voice. The information bearing channel is divided into time frames of s slots each. The length of each slot is equal to the transmission duration of single packet. An active call generates one packet per frame, and transmits it according to a reservation random access (RRA) algorithm. Such multiple access algorithm may assume the form of a Packet Reservation Multiple Access (PRMA) scheme (see [l]). Under the RRA algorithm under consideration in this paper, an active call transmits its packet in the following manner: If the calI has a reserved slot in the frame, it transmits the packet over that time slot. Otherwise, the call tries to reserve a time slot by first “flipping a coin” to see whether or not it will transmit its packet. Once the call decides to transmit its packet, it will choose at random an unreserved slot in the frame and transmits its packet over it. If no other calls select this time slot for their transmission, the transmission is successful and the call is deemed to have reserved this time slot for as long as it generates packets continuously. If two or more calls transmit over the same time slot, the transmissions are unsuccessful and associated packets are ‘This workis supported by the NSF Grant NCR8914690, and by the University of California MICRO and Pacific-Bell Grant NO. 91-134. 0-7803-0608-2/92/$3.000 1992 IEEE

2

Derivation of the Markov Chain

We analyze the performance of the system based on the following assumptions: 1. Calls arrive into the system according to a Poisson process with the intensity of X [calls per second]. 2. Call durations are exponentially distributed with a mean of ~ 1 - l [sec.]. 3. The time spent by a call in the active state is exponentially distributed with a mean of y-’ [sec.].

4. The time spent by a call in the silent state is exponentially distributed with a mean of e-’ [sec.]. 5. The calls admitted into the system start their service while they are in the active state. 6. No capture phenomenon occurs in the system. 16

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:29 from IEEE Xplore. Restrictions apply.

We write the state of the system during the kt 1st frame in terms of the above parameters and the state of the system during the kth frame as follows:

7. The frame duration is equal to 7 seconds. The following probabilities are derived using the assumptions presented above:

+

- DLc) Ak; Nk+l = Nk - DLR) N(R) = NiR) + Rk - Dip' - s ( R ) .

The probability that, given there are i customers in the system at the start of the frame, w customers are admitted into the system at the end of the frame, is given by:

N@

otherwise.

1

-

3. Transition.

(2)

4. Arrival.

We calculate the transition probability function across a frame, by assuming that these four phases occur in a mutually exclusive fashion (for the simplification of the presentation process). During the reservation phase, calls in contention try to obtain reservations. During this period no calls arrive into the system or depart from the system and no transitions from silent to active or active to silent takes place. During the departure phase, those calls which have finkshed their service depart from the system. This phase occurs after the reservation phase. Therefore no reservations are made during this period. Furthermore, no transitions in the state of the calls in the system are permitted to take place. During the transition phase certain active calls become d e n t and certain silent calls become active. The calculations related to this phase follow those carried out for the departure phase. Subsequently, during the arrival phase, new calls arrive into the system. Through successive computations involving the transition probability functions corresponding to each phase, we have derived the transition probability matrix.

(3)

The probability that a silent call becomes active during a frame, is given by:

= 1 -e-er.

(4)

The state of the system is completely described by three random variables: Nk: The total number of admitted (active or silent)calls in the system during the kth frame.

NiR): The number of calls (admitted and active) with a reserved time slot during the kth frame. NLc): The number of calls in contention, that is active (admitted) calls without reservations, during the kth frame. To describe the dynamics of the state process ( N , N ( R ) , f f ( c ) )= {(Nk, NiR),NLc), k 2 l } , the following variables are introduced:

3

Rk: Number of contending calls which successfully acquire reservation during the kth frame.

Calculation of the Steady State Distribution

As we can see from the equations presented in the previous section, the size of the state space for this system becomes extremely large, for any reasonable application case. We need to devise a method to efficiently calculate (or approximate) the steady state distribution of the system without having to first compute the full transition matrix. We first note that, for a typical application case, the total number of calls in the system remains constant over a large number of frames. This is due to the fact that the time between changes in the number of calls in the system is of the order of tens of seconds whereas the frame duration is of the order of tens of milliseconds. (Note, however, that for a more heavily loaded system, i.e. when the time between the changes in the total number of calls system is of the order of seconds, this may not be true). result, we assume that the number of calls with reservations and the number of calls in contention between any two changes in the total number of calls in the system can be described by the underlying steady state distribution. We thus approximate the steady state distribution of the system by expressing it is the product of the marginal steady state distribution of the number of calls in the system and the joint steady state distribution of the number of contending calls and the number of calls with reservation, given that the number of calls in the system is constant.

D(P): Number of calls with reservation which depart the system (i.e. end session) at the end of the kth frame, including calls which obtained reservation during the kth frame.

Dit): Number of calls in contention which departed the system at the end of the kth frame, excluding those calls which obtained reservations.

D(,S): Number of silent calls which depart the system at the end of the kth frame.

A Y ) : Number of silent calls which become active at the end of the kth frame, excluding those calls which departed at the end of the kth frame.

S(,R):

Number of calls with reservation which become silent at the end of the kth frame, excluding those calls which departed at the end of the frame.

s(,c): Number of calls in contention which become silent at the end of the frame, excluding those calls which obtained reservation or departed at the end of the frame. Ak:

(5)

2. Departure.

The probability that an active call becomes silent during a frame, is given by:

qo

,

Nit) - Rk - D F ) - s(,c)+ A V ) + Ak.

1. Reservation.

The probability that an admitted call departs the system (i.e. terminates its service) during a frame, is given by:

=

=

LFrom these recurrence equations, and the assumptions made concerning call arrivals, and the call holding times, we conclude that the state process (N, N ( R ) , N ( c ) ) is a Markov chain. To effectively derive the transition probability function of the Markovian state process, we identify the following four phases:

i=O

Qd

k

ktl

Number of arrivals into the system at the end of the kth frame. 17

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:29 from IEEE Xplore. Restrictions apply.

to represent the probability that out of n contending calls over r unreserved slots over the frame, I are successful in obtaining reservation. We set p a to denote the probability that a contending call transmit its packet over the frame. (This parameter may depend on the number of available slots and the total number of calls in the system.) We also set p ( w , r , l ) to denote the probability that out of w transmitting calls contending over r unreserved slots, I are successful in obtaining reservations. Finally, g ( z , k,i , j)denotes the probability that if there are i calls in the system and j calls have reservations after the reservation phase, the number of contending calls changes from k to z and is given by:

That is, at the steady state we set:

= i , N ( ~=) j,N(') = k) n ( i , j ,k) = P ~ { N - P { N ( R )= j,N(') = kl N = i).

P{N =i }

(6)

where we approximate

P{

= j,N(') = kJN = i }

N

p R , C , i ( j ,k)

(7)

and P ~ , ~ , i ( j ,isk the ) steady state probability distribution for a system in which the number of admitted calls in the system remains at a constant, i .

3.1

Calculation of the Marginal Steady State Distribution of the Total Number of Calls in the System

min(z,i-j-k)

Recall that under our assumptions, the calls arrive in accordance to a Poisson process and call durations are exponentially distributed. Let the arrival rate be X[calls/sec.], and the mean call duration be p = l/p[sec.]. Then, the system's offered load (measured in Erlangs) is given by: p

=

The transition probability function, computed using equation

xp.

(9), is used to calculate the joint steady state distribution of

the number of calls with reservations and the number of calls in contention, given a constant number of calls in the system, PR,c,i(j,k). We use this result along with the marginal steady state distribution of the total number of calls in the system to approximate the steady state distribution of the system by:

Since all calls are served immediately upon their arrival into the system and the maximum number of calls allowed into the system is m, the system call process is modeled as a M/M/y/m queue. The steady state distribution of the number of admitted calls in this queue is given by Erlang's loss formula ( [ 2 ] ) :

PT(i) =

3.3 j=O

Note that due to the memoryless nature of the process this call state distribution holds for any observation time, including the start of a frame.

Calculation of the Joint Steady State Distribution of the Number of Calls with Reservations and the Number of Calls in Contention, Given the Total Number of Calls in the System is Constant

where E[R] represents the average number of contending calls which obtain reservations per frame. This equation represents the ratio of the average number of packets dropped per frame to the average number of packets generated (by active calls) per frame. Now let E,[N(')], Ei[N(R)]and &[RI be the steady state mean, given that the number of calls in the system is a constant, i, of the number of calls in contention, the number of calls with reservation, and the number of successful reservations by contending calls per frame, respectively. and Ei[R]using the We readily calculate Ei[N(')], steady state distribution, P R , ~(j, , , I C ) , by the following relations:

We consider now the dynamics of the state process (fdR)N(')) , = {(NIR), N i R ) , k 2 1) under the assumptions that the number of admitted calls in the system remains constant (N = i ) . We note that this state process is Markovian, and in this section we compute its transition probability function. We find the transition probability function for this conditioned Markov chain to be given by: PR,C,i(Y, Z b ,

k) =

(12)

Having obtained the steady state distribution of the system we are now able to calculate the packet dropping probability. The latter is given by:

otherwise.

3.2

n(i,j,k) = PR,c,I(~, k) . W i ) . Calculation of the Packet Dropping Probability

(9)

j=O

k=l

18

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:29 from IEEE Xplore. Restrictions apply.

may not be by itself a sufficient measure of voice quality performance and, thus, of the system. This is due to the fact that occurences of congestion events can lead to the system staying congested for a long period of time (tens of seconds). This leads to the dropping of a large number of consecutive packets and, thus, to a severe degradation of the voice quality for a notice able period of time. Hence, while a system may have an average packet dropping probability level less than 0.01, the underlying voice messages may still experience unacceptable degradation levels. Therefore, the 99-percentile or 85-percentile packet dropping probabilities serve as better measures of voice quality performance. Figure 2 shows the conditional packet dropping probability, pdrops, versus the total number of calls in the system. T his figure shows that if the total number calls admitted into the system is greater than or equal to 32, the conditional packet dropping probability is greater than 0.01. This means that in order for the r-percentile packet dropping probability to be less than 0.01 we require:

Using equations (15) through (17) we obtain: m

E[RI = z~T(i) *E~[RI

(18)

i=O m

E [ N ( ~ ) I=

P T ( ~ )E ~ [ N ' ~ ' I

(19)

PT(i) Ei[N'C'].

(20)

9

i=O m

E[N(C)] = i=O

Using equations (14) and (18) through (20), Pdrop is computed. Now define pdropi to be the probability that, given the total number of calls in the system remains a constant, i , a packet is dropped. This probability is given by:

P { N < 32) 5 r/100 < P{N < 33)

We use this probability to obtain the 99-percentile and the 85-percentile iacket drppping probabilities. We define the rpercentile pac et droppmg probabhty as:

4

k

k+l

j=O

j=O

where N is the total number of calls in the system at steady state.

4.2 Traffic Capacity of The System Figures 3 through 5 show the performance of the system under the criteria described in the previous section. iFrom Figure 3 we see that under criterion 1, the call throughput capacity for the system is 28.59 Erlangs. This is obtained when the threshold level, m, is set equal to 38. Figure 4 shows that under criterion 2 the call throughput ca,pacity for the system is 22.37 Erlangs. This is obtained when the call threshold level, m, is set equal to 31. Figure 5 shows that under criterion 3 the call throughput capacity is 25.44 Erlangs. This is achieved under a call threshold level, m, of 35. For a fixed assigned TDMA scheme with 20 slots per frame and a maximum call blocking probability set to be less than 0.02, the value of the Erlang capacity obtained from the M/M/m/m queuing system computations is 13.18. Compared to this TDMA system, the Erlang capacity of this RRA system (under the d e scribed call admission control mechanism) is 2.21 times greater under criterion 1, 1.73 times greater under criterion 2, and 1.97 times greater under criterion 3. As we can see from Figures 3 through 5, each throughput curve has two distinct parts: an increasing linear part and a decreasing exponential part. The linear part of the curve involves the use of threshold levels (m) for which the maximum call blocking probability is achieved before the packet dropping criterion is reached. The exponential part of the curve reflects those values of m for which the reverse is true. Finally, we note that for large m, under Criteria 2 and 3, the call throughput capacity of the system is 19.531 and 25.28 Erlangs respectively. This shows that if we require the call blocking probability to be zero, the system capacity is equal to 19.531 Erlangs (2.84 Erlangs less than that obtained under a prescribed call blocking probability of 0.02) for criterion 2 and 25.28 Erlangs (0.16 Erlangs less than that attained when the maximum call blocking probability level is set equal to 0.02) for criterion 3.

Numerical Results

The voice model which we have considered is similar to that presented in [3]. In this model both the time spent in active state and the time spent in silent state are exponentially distributed. The parameters for the system under considerations are as follows: 1. Frame duration is set equal to 0.04 seconds. 2. Number of slots per frame is 20. 3. Mean time spent in the active state by a call is 1.00 seconds. This leads to an active to silent transition probability, qs, of 0.04. 4. Mean time spent in the silent state by a call is 1.35 seconds. This leads to a silent to active transition probability , qa, of 0.03. Note that the rate of transmission does not need to be explicitly specified. Its impact is reflected in the specified frame duration.

4.1 Performance Criteria We consider three different prescribed performance criteria: 1. Call blocking probability less than 0.02. Packet dropping probability (i.e. its average) less than 0.01. 2. Call blocking probability less than 0.02. 99-percentile packet dropping probability less than 0.01. 3. Call blocking probability less than 0.02. 85-percentile packet dropping probability less than 0.01 We use the prescribed 0.02 call blocking probability criterion in order to compare the performance of the system with that of other proposed wireless multiple access schemes which use the same criterion (see [5] for example). The 0.01 (average) packet dropping probability requirement reflects the common assumption that an acceptable voice quality level is experienced with an average packet dropping probability of no higher than 0.01 (see [l]). We use the 99-percentile and 85-percentile packet dropping probabilities as alternate measures of the voice quality performance for the system. The average packet dropping probability

5

Conclusions

In this paper we have derived an approach for design and analysis of wireless cells which use Reservation Random Access (RRA) scheme to service packetized voice calls combined with a call admission control procedure. By modeling the state process of the system as a vector Markov chain we have been able to derive the transition probability function of the state process and calculate its steady state distribution. Using this result we calculated 19

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:29 from IEEE Xplore. Restrictions apply.

the packet dropping probability levels as well as the call d r o p ping probability of the system under various loading conditions and call threshold levels. By setting limitations on the levels of packet dropping probability and call dropping probability of the process, we have computed the Erlang capacity of the system and obtained its performance characteristics. We have observed that there exist an optimal call threshold level for which the call throughput of the system is maximized. Furthermore we have observed, that for a specific illustrative example, the Erlang capacity of our proposed protocol is roughly twice that of a domparable fixed assigned TDMA system.

30-

I

m-

References [l] D. J. Goodman, R.A. Valenzuela, K.T. Gayliard, and B. Ramamurthi “Packet Reservation Multiple Access for Local Wireless Communications,” IEEE Transactions on Communications, vol. 37, no. 8, pp. 885-890,August 1989. [2] D. Gross and C.M. Harris Fundamentals of Queueing Theory, 2nd Edition New York , NY: John Wiey & Sons, 1985, ch.2, pp. 101-102 [3J S. Jan$ and L. Merakos UPerformance Analysis of Reservation Random Access Protocols For Cellular Packet Communications,n Proc. Globecom ’91, pp. 26.4.1- 26.4.6 [4] S. Nanda “Analysis of Packet Reservation Multiple Access: Voice-Data Integration for Wireless Networks,” Proc. Globecorn ’90, pp. 1984-1988 [5] A.J.Viterbi “Erlang capacity of Multiple Access Wireless Systems,” Proc. of 1992 UCLA Research Symposium in Electrical Engineering, Los Angeles, California, February 1992

m

-

10 i

i

F n m DUaUm I0.04 20 400 p r kun p .I 0.3. qa-0.W. qcO.04

-

Flpura 4.: Call Throughput Capaclly va. Call Thrashold. 99 Percentlla Pack01 Dropplnp Probsblllly Lass Than 0.01. Call Blocklnp Probablllly Lsas Than 0.02

24,

A

c-qa 12

4

10

active

20

30

i

50

40

F n m .$warn I0.04 usord.. 20 abls PI *un

silent

p-03. qa-0.01. qs-O.04

Figurel:

Call Model for the System

Flpure 5. : Call Throughpul Capaclly versus Call Threshold 05-percentlle Packet Dropplnp Probablllly less than 0.01 Call Blocklng Probablllty less than 0.02 1

w

w

w h

=

I

-5?

n

Figure 2.: Log of Packet Dropping Probability vs. The Number of Calls In the System

.

. 0

.

. 10

-

, 20 Numbet of Gllr

,

.

,

30

6

/ .

f r w duntbn-0.04

20

Sbl.

I

50

40

wcdr

pa frame.

~ 0 . 3q+0.03. . q%-0.04

20

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:29 from IEEE Xplore. Restrictions apply.

Call Threshold

Performance evaluation of a reservation random ...

key measure of performance of the system. By contrast, under ... a multiple-access network. ... the packet dropping probability and the system's call throughput.

520KB Sizes 1 Downloads 219 Views

Recommend Documents

Performance evaluation of a reservation random access scheme for ...
We compute the steady state distribution of the Markov chain. This result is used to ... This work is supported by a University of California MICRO and Pacific-Bell ...

Experimental Performance Evaluation of a ...
packets among SW MAC, HW MAC, and Host-PC. The HW. MAC writes the packets received from the PHY into the shared-memory using Direct Memory Access ...

TEACHER PROFESSIONAL PERFORMANCE EVALUATION
Apr 12, 2016 - Principals are required to complete teacher evaluations in keeping with ... Certification of Teachers Regulation 3/99 (Amended A.R. 206/2001).

CDOT Performance Plan Annual Performance Evaluation 2017 ...
48 minutes Feb.: 61 minutes March: 25 minutes April: 44 minutes May: 45 minutes June: 128 minutes 147 minutes 130 minutes. Page 4 of 5. CDOT Performance Plan Annual Performance Evaluation 2017- FINAL.pdf. CDOT Performance Plan Annual Performance Eval

Design and performance evaluation of a parallel ...
The host eacecutes the sequential part of the BM proce- dure and drives the ... provide good quality solutions, but have the disadvan- tage of a very high ...

The performance evaluation of a local rabbit population
*Corresponding author e-mail: [email protected]. Abstract. The aim of ... gain (g), average daily gain (g/d), feed intake (g.w.w), feed conversion rate (g.w.w/l.w) and carcass characteristics ... growing period of about 30 days, a deterioration o

Performance Evaluation of Grid Scheduling Strategies: A Case ... - IJRIT
tasks are needed to identify galaxy clusters within the Sloan Digital Sky Survey [3]. Because of large amounts of computation and data involved, these workflows ...

Performance evaluation of a subscriber database ... - Semantic Scholar
Jun 30, 2003 - The thesis studies the performance of one of the services of the subscriber database on three different ..... Memory is an example of such resource where the limiting factor is the resource contention alone. ...... clude single-thread

Modeling and performance evaluation of a flexure ...
analytical models are helpful for both a reliable architecture optimization and .... FEA simulation carried out in Section 5 via the ANSYS software package reveals ...

PERFORMANCE EVALUATION OF CURLED TEXTLINE ... - CiteSeerX
2German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany ... Curled textline segmentation is an active research field in camera-based ...

Performance Evaluation of Equalization Techniques under ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue ... Introduction of wireless and 3G mobile technology has made it possible to ...

Performance Evaluation of Parallel Opportunistic Multihop ... - CiteSeerX
of the IEEE International Conference on Communications, Seattle,. WA, pp. 331-335 ... From August 2008 to April 2009, he was with Lumicomm Inc.,. Daejeon ...

Performance Evaluation of Equalization Techniques under ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue ... Introduction of wireless and 3G mobile technology has made it possible to ...

CDOT Performance Plan Annual Performance Evaluation 2017 ...
84% 159% 160% 30% 61% 81%. 113%. (YTD) 100% 100%. Whoops! There was a problem loading this page. Retrying... Whoops! There was a problem loading this page. Retrying... CDOT Performance Plan Annual Performance Evaluation 2017- FINAL.pdf. CDOT Performa

Performance Evaluation of a Hybrid Algorithm for Collision Detection ...
are also approaches other than spatial partitioning data structures. ... from GPU memory is usually a very slow operation, making buffer ... data structures: grids and octrees. Finally, in ... partitioning the cells in a new grid when required (with.

Performance evaluation of a subscriber database with queuing networks
Jun 30, 2003 - The thesis studies the performance of one of the services of the subscriber database on three different hardware platforms using ..... Examples. Service time with limited capacity. Limited. Limited. CPU and disk. Service time with infi

Modeling and performance evaluation of a flexure ...
Modeling and performance evaluation of a flexure-based XY ... works of the authors, a simple XY stage is proposed in [17] for the nanomanipulation application. ... of the CPM, which is validated by both the finite element analysis (FEA) and ...

Performance Evaluation of Grid Scheduling Strategies: A Case ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, ... problems that are characterized by having high degree of parallelism.

Performance Evaluation of a QoS-Aware Framework for ...
good response times, by selecting different replicas to service different clients concurrently ... and responsiveness of the replicas by monitoring them at run- time.

Performance evaluation of a PVT/ORC
these systems, compared to PV and solar heating alone [4,24e27]. .... K. Tourkov, L. Schaefer / Energy xxx (2015) 1e11. 2. Please cite this article in press as: Tourkov K, Schaefer L, ...... using low-temperature geothermal heat sources. Energy ...

Performance Evaluation of a Hybrid Algorithm for Collision Detection ...
Extensive tests were conducted and the ... that this approach is recommendable for applications ..... performance in the previous tests for the broad phase.

Performance Evaluation of A PHEV Parking Station Using Particle ...
Performance Evaluation of A PHEV Parking Station Using Particle Swarm Optimization.pdf. Performance Evaluation of A PHEV Parking Station Using Particle ...

Performance Evaluation of a Hybrid Algorithm for Collision Detection ...
and the performance of the algorithm was evaluated in terms of output ..... (c). Figure 1. The object's geometry and the object's spherical octree with 4 and 5 levels are shown in ..... [15] G. Rowe, Computer Graphics with Java, Palgrave,. 2001.

Performance Evaluation of Parallel Opportunistic ...
Department of Computer Science and Engineering, Dankook University, 152 ... Second, computer simulations are performed to verify the performance of the ...