User Mobility Model based on Street Pattern G. Paschos E. Vagenas S. Kotsopoulos
University of Patras - Greece
Introduction This is a mobility model for cellular communications The analysis is based on the street pattern of the cell area ->urban environment
Monte Carlo simulation of vehicle movement ->statistical processing Parameter extraction ->mobility model
Design Goals
To develop a modern mobility model To incorporate the street pattern To use the model in order to calculate Sojourn Time statistics using an area map Our Model Knowledge of user behaviour
Sojourn Time Statistics
…further processing
Sojourn Time
Sojourn Time
Remaining Sojourn Time
The sojourn time statistics are very important for the teletraffic analysis
Assumptions The model is applied in an urban environment with relatively low traffic The vehicles float rather than move Velocity, Delays, Traffic etc are considered statistic values with fixed parameters The Sojourn time follows a gamma distribution*
*[1]
Hong and Rappaport, “Traffic model and performance analysis of cellular radio telephone with prioritized and nonprioritized handoff procedures” [2] R. Guerin, “Channel occupancy time distribution in a cellular radio system” [3] Bratanov and Bonek, “Mobility Model of Vehicle-Borne Terminals in Urban Cellular Systems”
systems
The gamma distribution 0.007
a −1
x f gamma (x ) = e a Γ(a )b
Sojourn Time p.d.f. for new call and handover call
0.006 0.005
Remaining Sojourn Time (new call) Sojourn Time (handover call)
0.004
⎧ a = 1.1 ⎨ ⎩b = 132
0.003 0.002 0.001 0
0
200
400
600
800
1000
Sojourn Time (sec)
1200
⎧a = 2.1 ⎨ ⎩ b = 86
−
x b
Results from the Monte Carlo Simulation -3
9
x 10
8
p.d.f.
7 6 5
Simulation data Sojourn Time Remaining Sojourn Time
4 3 2 1 0 0
200 400 600 800 1000 Sojourn Time - Remaining Sojourn Time (sec)
1200
The Model
Implementation Assumptions The pattern is firstly considered square The velocity follows a gaussian distribution The driver decides upon turning left or right or going straight ahead There is a three state delay in every crossroad.
No delay for priority road A small delay for a non priority road An average delay for a traffic light
Analysis Diagram
Parameters Selection
The traffic parameter ptr
An indicator of traffic lights percentage and/or priority crossings Usually 0.5 to
The Area of Block Ab
Ab=a^2 Relative to Cell Radius
Results 450
1.2 a values of gamma pdf for a new call
b values of gamma pdf for a new call
1.15
400
1.1
350
1.05
300
1
250
0.95
0.85 0.8 1600
200
0.2 0.3 0.4 0.5 0.6 0.7 0.8
0.9
4600
7600
10600
13600
16600
0.2 0.3 0.4 0.5 0.6 0.7 0.8
150 100 19600
Area of city Block Ab
50 1600
4600
10600
13600
16600
b values of gamma pdf for a handover call
a values of gamma pdf for a handover call
300
0.2 0.3 0.4 0.5 0.6 0.7 0.8
3
250 2.5
200
1.5
1 1600
150
0.2 0.3 0.4 0.5 0.6 0.7 0.8
2
4600
7600
10600
13600
Area of city Block Ab
16600
19600
Area of city Block Ab
350
3.5
7600
100 50
19600
0 1600
4600
7600
10600
13600
Area of city Block Ab
16600
19600
The model a nc
⎧⎪1.1034 − 0.311e −0.0001428571⋅ Ab , p tr ∈ [0.1,0.4 ) =⎨ ⎪⎩1.05374 + 0.1241525 ⋅ p tr − 0.311e −0.0001428571⋅ Ab , p tr ∈ [0.4,0.9]
Future Work The model will be extended to cover nonsquare street pattern The curve fitting will be performed using a genetic algorithm and a semantic function toolkit Measurements will take place in the case study area to validate and calibrate the model
... on the street pattern of the cell area ->urban environment ... Ab=a^2. â« Relative to Cell Radius ... Future Work. â¡ The model will be extended to cover non-.
future, wireless service providers will start to provide new, enhanced wireless data services using ... interface card) for high data-rate services. Thus, these users.
errors in learning will affect the performance of the online algorithm. .... In the theoretical computer science literature, however, the online caching problem has ...
degree of recombination between JG 62 and ICCV 2. The two solitary clusters, VIII ... As for degree of contribution of each character to divergence, the pods per.
We present a universal algorithm for the classical online problem of caching or ..... Call this the maximal suffix and let its length be Dn. 2. Take an α ..... Some Distribution-free Aspects of ... Compression Conference, 2000, 163-172. [21] J. Ziv
these data are also utilized in simulator for actuality. Fig. 1 shows the design ... flag setting, simulation data management, etc. .... Refer to an animation clip [8,9].
... Computer Science. Purdue University .... Ziv-Lempel based prefetching algorithm approaches the fault rate of the best prefetcher (which has ... In the theoretical computer science literature, however, the online caching problem has received.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. mobility model ...
Web servers register important data about the usage of a website. This in- formation generally ... Our model also generates a visualization of the site's content ...
covery in wireless ad hoc networks. It requires nodes to claim their ...... This is a great advantage in wireless communications since more message transmissions ...
anticipated that the future wireless mobile Internet ... the integration of IP and wireless technologies. ... heterogeneous wireless network mobility management.
Internal queries: These are queries submitted to a website's internal search box. Additionally, external queries that are specified by users for a partic- ular site, will be considered as internal queries for that site. For example,. Google.com queri
ation metrics such as those used for evaluating ma- chine translation systems such as BLEU (Papineni et al., 2002). These may be useful for evaluating how similar our generated candidates are to real tweets from the user or trending topic. Automated
terest preferences of users or adhere to their trip constraints. Furthermore, the massive volume of information ... personalized tours with POIs and visit duration based on POI popularity, users' interest preferences and ...... SAMAP: An user-oriente
with the âANLP-Course-Final-Reportâ tag of our ... API (with the AND operator) to search over all fields in ..... Computer Security Applications Conference, pages.
Anonymous authentication schemes on wireless environments are being widely ... the Internet, she/he can guess which access point the user connects, and she/he can also guess the ... three party structure: the authentication costs of home agent are ex
the multi-cell network, each BS with CS selects the user having the largest ... In cellular networks, users located with different distances from a base ..... 1.425 Ã 10â4. N0 (dBm). -169. P0 (W). 4.3. W (MHz). 10. R (m). 300 we are ready to obtai
whether) a candidate solution program satisfies a property. The main ... software, a natural challenge is to generate automatically correct-by-design pro- grams.