SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
1
Optimization of Base Station Location in 3G Networks using
Mads and Fuzzy C-means
A. O. Onim1*
P. K. Kihato2
S. Musyoki3
1. Jomo Kenyatta University of Agriculture and Technology, Department of Telecommunication and
Information Engineering, PO box 62000-00200, Nairobi, Kenya
2. Jomo Kenyatta University of Agriculture and Technology, Department of Electrical and Electronic
Engineering, PO box 62000-00200, Nairobi, Kenya
3. Jomo Kenyatta University of Agriculture and Technology, Department of Telecommunication and
Information Engineering, PO box 62000-00200, Nairobi, Kenya
* E-mail of the corresponding author: onim.antony@gmail.com
Abstract
Distribution of Base Transceiver Stations (BTS) with an aim of maintaining high Quality of Service and
coverage is important to mobile operators. Rapid expansion of telecommunication industry results in stiff
competition among service providers which in turn leads to greater focus on quality of services delivered.
Increase in number of mobile phone usage has also led to unprecedented network expansion. Coupled to these
challenges is rapid change in telecommunication technology from 2G to 4G in a short space of time. A
combination of MADS and FUZZY C- MEANS is used to aid in planning Base Station Transceivers (BTS)
location efficiently in order to curb capital and maintenance costs.
Keywords: BTS placement, MADS, Fuzzy C-Means
1. Introduction
In 2003 mobile penetration in Kenya was 5%, 42% in 2008 and over 78% in 2012. There are 5 mobile operators
in Kenya with Safaricom and Airtel dominating the sector. Local mobile traffic according to CCK is estimated to
amount to 7.3 billion minutes. Mobile internet/data penetration is 41.1% and increasing especially since most of
the new mobile phone models support internet access. Mobile internet data subscription accounts for about 99%
of total internet subscription in the country. (Communication Commission of Kenya, 2012)
These rapid increases in mobile subscriptions in a short space of time create expansion challenges for operators
and regulators as well. One result of rapid expansion is multiplication of BTS towers which litter the sky. In
some areas towers are many and close together due to unanticipated growth shifts in population. Another reason
is that mobile operators don’t share equipment such as towers or other equipment due to sabotage mistrust.
Mobile operators have had to contend with changing technology and equipment ranging from 2G to 2.5G to
2.75G and now 3G with 4G around the corner in a space of about 12 year (Motorola, 2008). These changes occur
faster than mobile operators can capitalize and profit from existing equipment. Consequently small mobile
operators may not be able to cope with such costs in the long term. (Waburi, 2009)
Mobile operators face two types of costs.
1. Capital – Initial expenditure in acquiring and deploying equipment and licenses for rolling out new
technologies. These are one off expenditures.
2. Operational costs – These are costs of maintenance and replacement which are spread out over the life
of the technology and equipment.
For an operator to be profitable he must have enough time to realize sales that offset both types of cost. If
technology changes too fast, capital costs will mount very high and drive the operator out of business.
Since the rate of change of technology is not completely in the hands of a mobile operator, then it is paramount
to fully utilize whatever resources available to him. Operators must try to achieve more with less. This calls for
proper distribution of resources in order to maximize on equipment productivity and minimize operational costs.
A program built on MADS and FUZZY c-means is used to aid in network dimensioning. This program is fully
automated and takes Mobile Station distribution as its only input. The aim is to keep path loss low and therefore
reduce amount of power used in transmission while keeping Quality of Service high to avoid dropped calls.
2. Mathematical formulation to arrive at HATA distance Link budget
2.1 A link budget equation is given below: (Radio-Electronics.com)
PRX = PTX + GTX + GRX - LTX - LFS - LFM - LRX (2)
Where:
PRX= received power (dBm)
PTX = transmitter output power (dBm)
GTX = transmitter antenna gain (dBi)
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
2
GRX = receiver antenna gain (dBi)
LTX = transmit feeder and associated losses (feeder, connectors, etc.) (dB)
LFS = free space loss or path loss (dB)
LFM = many-sided signal propagation losses due to the transmission medium(dB)
LRX = receiver feeder losses (dB)
Free space loss is given by:
LFreePathloss = 32 + 20 · Log (f ) + 20oLg (d) (3)
Where: d = Distance in meters
Downlink power should be equal or less than uplink power. When downlink power is greater than the uplink
power, the range cells increase. Calls at the edge of the cell are dropped because BTS will be out of range of MS
transmitter.
2.1.2 Uplink budget:
Transmission from MS to BTS
EIRP = PTX + LAF + GME (4)
Where:
EIRP = Effective Isotropic Radiated Power
PTX = Power transmitted by the MS
LAF = Antenna feeder and connector losses
GME = MS antenna gain
2.1.2 Receiver side: BTS is receiver
RS = EIRP – LP-IM – FM -LC +GBTS (5)
Where:
RS = Receiver sensitivity
LP = Path loss
IM = Interference
FM = Fast fade margin
LC = Connector losses
GBTS = BTS antenna gain
2.2 Path loss calculation
Path loss can be calculated from the above equation by making LP subject..
From Hata model path loss equation: (Directorate-General for Communications Networks,Content and
Technology,European Commission, 1999)
LP = 69.55 + 26.16Log10 (fMHz) -13.82Log10 (hb) – a(hm) + [44.9-6.55Log10 (hb)]Log10 (dkm) – K (6)
To get maximum cell size, make distance d subject of Hata path loss equation to yield Hata maximum distance
equation:
d = antiLog10 {[Pt + Gtot - R - 69.55 - 26.16Log10 (fMHz) + 13.82Log10 (hb) + a(hm) + K] / [44.9 –
6.55Log10(hb)]} (7)
Where:
Gtot = Total gain
hb = Base antenna height over street level in meters
hm = Mobile station antenna height in meters
hB = Nominal height of building roofs in meters
TABLE 1. List of constants in Hata path loss equation
Minimizing distance d between the BTS and MS while keeping path loss less than 140 dB has the following
advantages:
AREA a(hm) K
Open [1.1Log10(fMHz)-0.7]hm - [1.56Log10(fMhz)-0.8] 4.78[Log10(fMHz)]2 – 18.33Log10(fMHz)
+ 40.94
Suburban [1.1Log10(fMHz)-0.7]hm - [1.56Log10(fMhz)-0.8] 2[Log10(fMHz/28)]2 + 5.4
Small city [1.1Log10(fMHz)-0.7]hm - [1.56Log10(fMhz)-0.8] 0
Large city 3.2[Log10(11.75hm)]2 – 4.97 0
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
3
• Number of BTS is reduced to a minimum
• Power required to run BTS and MS reduces
• Number of calls dropped due to high path loss values reduces.
The problem of BS location is approached in three stages:
First, allocate an initial number of BS locations which can be minimized.
Second, minimize distance of BTS to the furthest MS while keeping the path loss below 140 dB. This distance,
is used to determine how many BTS are necessary to cover an area. Minimization is done using Mesh Adaptive
Direct Search (MADS).
Third, BTS are distributed among the population using fuzzy c-means (FCM) which is a highly efficient method
of clustering data. Clusters are assigned based on distance between data points and clusters.
3. BS allocation procedure
There are two components of BS location problem i.e.
3.1 Assignment of initial BTS number
This is achieved by in three steps:
Calculate area of interest and allocate initial number of BS based on the maximum area that a single BS covers.
E.g. if we take maximum radius covered by BS = 1.5 Km, and the area of interest = 100 Km2
Initial number of required BS in this case is 15.
Determine total number of subscribers in the area and allocate BS based on maximum subscribers each BS can
serve. One E1 has 32 channels at a speed of 64 kbps. E1 supports 30 users after subtracting channels used for
maintenance. E.g. number of users = 1000,
Initial number of required BS in this case is 34.
Once initial BS numbers are calculated using both area and subscriber density, we allocate the larger of the two
numbers to be used and an initial BS number.
Fuzzy C-Means is then used to distribute initial BS in the MS population. Objective function being minimized in
FCM is (Algorithms, 2012)
(8)
Where,
||xi – vj|| is the Euclidean distance between ith data and jth cluster center.
n = number of data points.
vj = jth cluster center
m = fuzziness index m € [1, ∞]
c = number of cluster center.
uij = membership of ith data to jth cluster center.
U = (uij)n*c is the fuzzy membership matrix.
J = objective function.
Algorithmic steps for Fuzzy c-means clustering (James C. Bezdek, 1999) (JAMES C. BEZDEK, 1984)
If X = {x1, x2, x3 ..., xn} is set of data points and V = {v1, v2, v3 ..., vc} the set of centers.
1) Select c cluster centers randomly.
2) Calculate the fuzzy membership uij using:
(9)
Where:
k = iteration step.
dij = Euclidean distance between ith data and jth cluster center.
3) Compute the fuzzy centers vj using:
(10)
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
4
4) Repeat step 2) and 3) until the minimum J value is achieved or ||U(k+1)
- U(k)
|| < β.
Where:
β = termination criterion between [0, 1].
Advantages of Fuzzy-C-Means
1. Gives best result for overlapped data set and comparatively better then k-means algorithm.
2. Unlike k-means where data point must exclusively belong to one cluster center here data point is
assigned membership to each cluster center as a result of which data point may belong to more then one
cluster center.
3.2. Choice of minimum number of BTS required
Pattern search algorithm: Mesh Adaptive Direct Search (MADS) is used to perform this minimization task.
MADS works by selecting a random starting point and calculates objective function at that point. It then polls
mesh points by computing the objective function at those points in a bid to find one that is lower than the current
one. If the poll is successful, mesh size is increased by an expansion factor. Otherwise, mesh size is reduced by a
contraction factor. (Mathworks, 2004–2012)
MADS calculates optimum path loss or distance and if it goes beyond threshold 140 dB, the number of BS is
increased otherwise it is decreased if too low. The processes of site placement and site selection are repeated
until an optimum number of BS is found which limits number of BS while guaranteeing necessary quality of
service.
Figure 1. Felow diagram of algorithm
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
5
4. Results
Typical operating conditions are:
Table 2. List of operating conditions
Figure 2. Randomly distributed users. Mobile Stations: 1000 Base Stations: 34
PARAMETER VALUE
Max power by BTS 30 W
Max power by Mobile Station 1 W
Spreading Factor 128
Target Path loss 140 dB
Mobile station antenna height 1.5
Mobile station antenna height 30
Noise power 2 x 10-14
W
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
6
Figure 3 Gaussian distributed users around one centers. Mobile Stations: 1000 Base Stations: 34
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
7
Figure 4 Gaussian distributed users around two centers. Mobile Stations: 1000 Base Stations: 34
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
8
Figure 5 Gaussian distributed users around four centers. Mobile Stations: 1000 Base Stations: 34
5. Explanation of results
Results from simulations are consistent when population distribution is changed. Each BTS is to serve about 30
mobile stations and a radius of 1.5 km. Red asterisks are present BTS locations while black dots are mobile
stations. This approach has certain advantages:
• There are very few settings on the part of the user. Simulations only require MS population distribution
as input.
• Combining the optimization and clustering methods allows us to overcome disadvantages of both
strategies if they were used alone while enhancing advantages. Optimization methods are not designed
for clustering and therefore one has to write their own clustering functions which may not be very
efficient. Clustering methods such as Fuzzy C-Means, K-Means etc have a big weakness in that they
cannot determine optimum number of cluster centers themselves.
• Optimization method takes input from clustering method and determines if number of BTS allocated
minimizes distance between BTS and furthest MS in cells. Output of the optimization is fed to cluster
method in order re-cluster. This loop continues until an optimum number of BTS which minimizes
distance is arrived at.
In doing this, the number of optimum BTS required is found automatically rather than being entered by the user
through trial and error.
6. Acknowledgments:
I would like to thank my supervisors, Dr. P. K. Kihato and Dr. S. Musyoki, for their support and helpful re-
marks. I also wish to thank Patrick Abonyo who helped me with project ideas.
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.4, 2013
9
References
Algorithms, D. C. .(2012). Fuzzy c-means clustering algorithm. Data Clustering Algorithms. [Online] Available:
https://sites.google.com/site/dataclusteringalgorithms/fuzzy-c-means-clustering-algorithm
Communication Commission of Kenya. (2012). Quaterly Sector Statistics Report Second Quater of the Financial
Year 2012/2013. Communication Commission of Kenya Report. 33-34
Directorate-General for Communications Networks. (1999). Content and Technology,European Commission.
Digital Mobile Radio Towards Future Generation Systems-COST 231 Final Report. 15-18
James C. Bezdek, J. K. (1999). Fuzzy Models and Algorithms for Pattern Recognition and Image Processing.
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing, Kluwer Academic Publishers.
JAMES C. BEZDEK, R. E. (1984), FCM: The Fuzzy C-means clustering algorithm. Computers & Geosciences ,
10 (2-3), 191-203.
Mathworks. (2004–2012). Global Optimization Toolbox User’s Guide. The MathWorks, Inc.
Motorola. (2008). 2G and 3G cellular networks: Their impact on today’s enterprise mobility solutions and future
mobility strategies. Motorola report.
Radio-Electronics.com. (2000). Radio wave propagation and signal loss.[Online] Available: http://www.radio-
electronics.com/info/propagation/path-loss/rf-signal-loss-tutorial.php.
Waburi, N. (2009). The Contribution of mobile phones to the Kenyan Economy. Market & Social Research,
Nairobi.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Más contenido relacionado

La actualidad más candente

Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...IRJET Journal
 
Modelling power consumption femtocell
Modelling power consumption femtocellModelling power consumption femtocell
Modelling power consumption femtocellYoumni Ziadé
 
Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...
Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...
Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...IJERD Editor
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on singlecsandit
 
Transmitting audio via fiber optics under nonlinear effects and optimized tun...
Transmitting audio via fiber optics under nonlinear effects and optimized tun...Transmitting audio via fiber optics under nonlinear effects and optimized tun...
Transmitting audio via fiber optics under nonlinear effects and optimized tun...IJECEIAES
 
Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...IJECEIAES
 
Review on Massive MIMO (Multiple Input Multiple Output)
Review on Massive MIMO (Multiple Input Multiple Output)Review on Massive MIMO (Multiple Input Multiple Output)
Review on Massive MIMO (Multiple Input Multiple Output)IRJET Journal
 
Green Communication
Green CommunicationGreen Communication
Green CommunicationVARUN KUMAR
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...TELKOMNIKA JOURNAL
 
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...IJECEIAES
 
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...IJECEIAES
 
IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...
IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...
IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...IRJET Journal
 
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKSNETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKSMadhav Thekkedath
 
Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...
Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...
Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...IJECEIAES
 
Mmse partially connected hybrid beam forming in mimo ofdm
Mmse partially connected hybrid beam forming in mimo ofdmMmse partially connected hybrid beam forming in mimo ofdm
Mmse partially connected hybrid beam forming in mimo ofdmTamilarasan N
 
IRJET- Study of MIMO Precoding Techniques and their Application using Joi...
IRJET-  	  Study of MIMO Precoding Techniques and their Application using Joi...IRJET-  	  Study of MIMO Precoding Techniques and their Application using Joi...
IRJET- Study of MIMO Precoding Techniques and their Application using Joi...IRJET Journal
 

La actualidad más candente (19)

Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
 
Modelling power consumption femtocell
Modelling power consumption femtocellModelling power consumption femtocell
Modelling power consumption femtocell
 
Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...
Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...
Comparatively analysis of FBG optical fiber in 25 & 35 Gbps DCDM based Commun...
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on single
 
ICICCE0301
ICICCE0301ICICCE0301
ICICCE0301
 
D010512126
D010512126D010512126
D010512126
 
J010436069
J010436069J010436069
J010436069
 
Transmitting audio via fiber optics under nonlinear effects and optimized tun...
Transmitting audio via fiber optics under nonlinear effects and optimized tun...Transmitting audio via fiber optics under nonlinear effects and optimized tun...
Transmitting audio via fiber optics under nonlinear effects and optimized tun...
 
Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...Integrated approach for efficient power consumption and resource allocation i...
Integrated approach for efficient power consumption and resource allocation i...
 
Review on Massive MIMO (Multiple Input Multiple Output)
Review on Massive MIMO (Multiple Input Multiple Output)Review on Massive MIMO (Multiple Input Multiple Output)
Review on Massive MIMO (Multiple Input Multiple Output)
 
Green Communication
Green CommunicationGreen Communication
Green Communication
 
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...Enabling full-duplex in multiple access technique for 5G wireless networks ov...
Enabling full-duplex in multiple access technique for 5G wireless networks ov...
 
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
 
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
 
IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...
IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...
IRJET- A Computational Study on Fracture Process Zone for Single Edged Notche...
 
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKSNETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
 
Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...
Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...
Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massiv...
 
Mmse partially connected hybrid beam forming in mimo ofdm
Mmse partially connected hybrid beam forming in mimo ofdmMmse partially connected hybrid beam forming in mimo ofdm
Mmse partially connected hybrid beam forming in mimo ofdm
 
IRJET- Study of MIMO Precoding Techniques and their Application using Joi...
IRJET-  	  Study of MIMO Precoding Techniques and their Application using Joi...IRJET-  	  Study of MIMO Precoding Techniques and their Application using Joi...
IRJET- Study of MIMO Precoding Techniques and their Application using Joi...
 

Similar a Optimization of base station location in 3 g networks using mads and fuzzy c means

Performance enhancement of maximum ratio transmission in 5G system with multi...
Performance enhancement of maximum ratio transmission in 5G system with multi...Performance enhancement of maximum ratio transmission in 5G system with multi...
Performance enhancement of maximum ratio transmission in 5G system with multi...IJECEIAES
 
System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...ijtsrd
 
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...Onyebuchi nosiri
 
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...Onyebuchi nosiri
 
Evaluation of massive multiple-input multiple-output communication performanc...
Evaluation of massive multiple-input multiple-output communication performanc...Evaluation of massive multiple-input multiple-output communication performanc...
Evaluation of massive multiple-input multiple-output communication performanc...IAESIJAI
 
Multi user-MIMO Broadcast Channel techniques
Multi user-MIMO Broadcast Channel techniquesMulti user-MIMO Broadcast Channel techniques
Multi user-MIMO Broadcast Channel techniquesIRJET Journal
 
Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...
Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...
Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...Onyebuchi nosiri
 
Linear Transmit-Receive Strategies for Multi-User MIMO Wireless Communication
Linear Transmit-Receive Strategies for Multi-User MIMO Wireless CommunicationLinear Transmit-Receive Strategies for Multi-User MIMO Wireless Communication
Linear Transmit-Receive Strategies for Multi-User MIMO Wireless CommunicationIRJET Journal
 
Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...
Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...
Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...Onyebuchi nosiri
 
A Review on Transmit Antenna Selection for Massive MIMO Systems
A Review on Transmit Antenna Selection for Massive MIMO SystemsA Review on Transmit Antenna Selection for Massive MIMO Systems
A Review on Transmit Antenna Selection for Massive MIMO SystemsIRJET Journal
 
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...
IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...IRJET Journal
 
IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...
IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...
IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...IRJET Journal
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 
IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...
IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...
IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...IRJET Journal
 
Performance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO techniquePerformance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO techniqueTELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...Onyebuchi nosiri
 
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...Onyebuchi nosiri
 
PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...
PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...
PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...IJCNCJournal
 

Similar a Optimization of base station location in 3 g networks using mads and fuzzy c means (20)

Performance enhancement of maximum ratio transmission in 5G system with multi...
Performance enhancement of maximum ratio transmission in 5G system with multi...Performance enhancement of maximum ratio transmission in 5G system with multi...
Performance enhancement of maximum ratio transmission in 5G system with multi...
 
System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...System Consideration, Design and Implementation of Point To Point Microwave L...
System Consideration, Design and Implementation of Point To Point Microwave L...
 
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
 
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
BBPF Technique for Transmitter Noise Reduction in a Site-Shared Wireless Netw...
 
Evaluation of massive multiple-input multiple-output communication performanc...
Evaluation of massive multiple-input multiple-output communication performanc...Evaluation of massive multiple-input multiple-output communication performanc...
Evaluation of massive multiple-input multiple-output communication performanc...
 
Multi user-MIMO Broadcast Channel techniques
Multi user-MIMO Broadcast Channel techniquesMulti user-MIMO Broadcast Channel techniques
Multi user-MIMO Broadcast Channel techniques
 
Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...
Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...
Sideband noise mitigation in a co-located network involving CDMA2000 and WCDM...
 
Linear Transmit-Receive Strategies for Multi-User MIMO Wireless Communication
Linear Transmit-Receive Strategies for Multi-User MIMO Wireless CommunicationLinear Transmit-Receive Strategies for Multi-User MIMO Wireless Communication
Linear Transmit-Receive Strategies for Multi-User MIMO Wireless Communication
 
Ijetcas14 398
Ijetcas14 398Ijetcas14 398
Ijetcas14 398
 
Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...
Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...
Implementation of Particle Swarm Optimization Technique for Enhanced Outdoor ...
 
A Review on Transmit Antenna Selection for Massive MIMO Systems
A Review on Transmit Antenna Selection for Massive MIMO SystemsA Review on Transmit Antenna Selection for Massive MIMO Systems
A Review on Transmit Antenna Selection for Massive MIMO Systems
 
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...
IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...
 
IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...
IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...
IRJET- BER Reduction of Distributed Spatial Modulation in Cooperative Relay N...
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 
IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...
IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...
IRJET- Statistical Tuning of Hata Model for 3G Communication Networks at 1.85...
 
Performance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO techniquePerformance analysis of negative group delay network using MIMO technique
Performance analysis of negative group delay network using MIMO technique
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
 
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
Coverage and Capacity Performance Degradation on a Co-Located Network Involvi...
 
PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...
PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...
PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTE...
 

Más de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Más de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Optimization of base station location in 3 g networks using mads and fuzzy c means

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 1 Optimization of Base Station Location in 3G Networks using Mads and Fuzzy C-means A. O. Onim1* P. K. Kihato2 S. Musyoki3 1. Jomo Kenyatta University of Agriculture and Technology, Department of Telecommunication and Information Engineering, PO box 62000-00200, Nairobi, Kenya 2. Jomo Kenyatta University of Agriculture and Technology, Department of Electrical and Electronic Engineering, PO box 62000-00200, Nairobi, Kenya 3. Jomo Kenyatta University of Agriculture and Technology, Department of Telecommunication and Information Engineering, PO box 62000-00200, Nairobi, Kenya * E-mail of the corresponding author: onim.antony@gmail.com Abstract Distribution of Base Transceiver Stations (BTS) with an aim of maintaining high Quality of Service and coverage is important to mobile operators. Rapid expansion of telecommunication industry results in stiff competition among service providers which in turn leads to greater focus on quality of services delivered. Increase in number of mobile phone usage has also led to unprecedented network expansion. Coupled to these challenges is rapid change in telecommunication technology from 2G to 4G in a short space of time. A combination of MADS and FUZZY C- MEANS is used to aid in planning Base Station Transceivers (BTS) location efficiently in order to curb capital and maintenance costs. Keywords: BTS placement, MADS, Fuzzy C-Means 1. Introduction In 2003 mobile penetration in Kenya was 5%, 42% in 2008 and over 78% in 2012. There are 5 mobile operators in Kenya with Safaricom and Airtel dominating the sector. Local mobile traffic according to CCK is estimated to amount to 7.3 billion minutes. Mobile internet/data penetration is 41.1% and increasing especially since most of the new mobile phone models support internet access. Mobile internet data subscription accounts for about 99% of total internet subscription in the country. (Communication Commission of Kenya, 2012) These rapid increases in mobile subscriptions in a short space of time create expansion challenges for operators and regulators as well. One result of rapid expansion is multiplication of BTS towers which litter the sky. In some areas towers are many and close together due to unanticipated growth shifts in population. Another reason is that mobile operators don’t share equipment such as towers or other equipment due to sabotage mistrust. Mobile operators have had to contend with changing technology and equipment ranging from 2G to 2.5G to 2.75G and now 3G with 4G around the corner in a space of about 12 year (Motorola, 2008). These changes occur faster than mobile operators can capitalize and profit from existing equipment. Consequently small mobile operators may not be able to cope with such costs in the long term. (Waburi, 2009) Mobile operators face two types of costs. 1. Capital – Initial expenditure in acquiring and deploying equipment and licenses for rolling out new technologies. These are one off expenditures. 2. Operational costs – These are costs of maintenance and replacement which are spread out over the life of the technology and equipment. For an operator to be profitable he must have enough time to realize sales that offset both types of cost. If technology changes too fast, capital costs will mount very high and drive the operator out of business. Since the rate of change of technology is not completely in the hands of a mobile operator, then it is paramount to fully utilize whatever resources available to him. Operators must try to achieve more with less. This calls for proper distribution of resources in order to maximize on equipment productivity and minimize operational costs. A program built on MADS and FUZZY c-means is used to aid in network dimensioning. This program is fully automated and takes Mobile Station distribution as its only input. The aim is to keep path loss low and therefore reduce amount of power used in transmission while keeping Quality of Service high to avoid dropped calls. 2. Mathematical formulation to arrive at HATA distance Link budget 2.1 A link budget equation is given below: (Radio-Electronics.com) PRX = PTX + GTX + GRX - LTX - LFS - LFM - LRX (2) Where: PRX= received power (dBm) PTX = transmitter output power (dBm) GTX = transmitter antenna gain (dBi)
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 2 GRX = receiver antenna gain (dBi) LTX = transmit feeder and associated losses (feeder, connectors, etc.) (dB) LFS = free space loss or path loss (dB) LFM = many-sided signal propagation losses due to the transmission medium(dB) LRX = receiver feeder losses (dB) Free space loss is given by: LFreePathloss = 32 + 20 · Log (f ) + 20oLg (d) (3) Where: d = Distance in meters Downlink power should be equal or less than uplink power. When downlink power is greater than the uplink power, the range cells increase. Calls at the edge of the cell are dropped because BTS will be out of range of MS transmitter. 2.1.2 Uplink budget: Transmission from MS to BTS EIRP = PTX + LAF + GME (4) Where: EIRP = Effective Isotropic Radiated Power PTX = Power transmitted by the MS LAF = Antenna feeder and connector losses GME = MS antenna gain 2.1.2 Receiver side: BTS is receiver RS = EIRP – LP-IM – FM -LC +GBTS (5) Where: RS = Receiver sensitivity LP = Path loss IM = Interference FM = Fast fade margin LC = Connector losses GBTS = BTS antenna gain 2.2 Path loss calculation Path loss can be calculated from the above equation by making LP subject.. From Hata model path loss equation: (Directorate-General for Communications Networks,Content and Technology,European Commission, 1999) LP = 69.55 + 26.16Log10 (fMHz) -13.82Log10 (hb) – a(hm) + [44.9-6.55Log10 (hb)]Log10 (dkm) – K (6) To get maximum cell size, make distance d subject of Hata path loss equation to yield Hata maximum distance equation: d = antiLog10 {[Pt + Gtot - R - 69.55 - 26.16Log10 (fMHz) + 13.82Log10 (hb) + a(hm) + K] / [44.9 – 6.55Log10(hb)]} (7) Where: Gtot = Total gain hb = Base antenna height over street level in meters hm = Mobile station antenna height in meters hB = Nominal height of building roofs in meters TABLE 1. List of constants in Hata path loss equation Minimizing distance d between the BTS and MS while keeping path loss less than 140 dB has the following advantages: AREA a(hm) K Open [1.1Log10(fMHz)-0.7]hm - [1.56Log10(fMhz)-0.8] 4.78[Log10(fMHz)]2 – 18.33Log10(fMHz) + 40.94 Suburban [1.1Log10(fMHz)-0.7]hm - [1.56Log10(fMhz)-0.8] 2[Log10(fMHz/28)]2 + 5.4 Small city [1.1Log10(fMHz)-0.7]hm - [1.56Log10(fMhz)-0.8] 0 Large city 3.2[Log10(11.75hm)]2 – 4.97 0
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 3 • Number of BTS is reduced to a minimum • Power required to run BTS and MS reduces • Number of calls dropped due to high path loss values reduces. The problem of BS location is approached in three stages: First, allocate an initial number of BS locations which can be minimized. Second, minimize distance of BTS to the furthest MS while keeping the path loss below 140 dB. This distance, is used to determine how many BTS are necessary to cover an area. Minimization is done using Mesh Adaptive Direct Search (MADS). Third, BTS are distributed among the population using fuzzy c-means (FCM) which is a highly efficient method of clustering data. Clusters are assigned based on distance between data points and clusters. 3. BS allocation procedure There are two components of BS location problem i.e. 3.1 Assignment of initial BTS number This is achieved by in three steps: Calculate area of interest and allocate initial number of BS based on the maximum area that a single BS covers. E.g. if we take maximum radius covered by BS = 1.5 Km, and the area of interest = 100 Km2 Initial number of required BS in this case is 15. Determine total number of subscribers in the area and allocate BS based on maximum subscribers each BS can serve. One E1 has 32 channels at a speed of 64 kbps. E1 supports 30 users after subtracting channels used for maintenance. E.g. number of users = 1000, Initial number of required BS in this case is 34. Once initial BS numbers are calculated using both area and subscriber density, we allocate the larger of the two numbers to be used and an initial BS number. Fuzzy C-Means is then used to distribute initial BS in the MS population. Objective function being minimized in FCM is (Algorithms, 2012) (8) Where, ||xi – vj|| is the Euclidean distance between ith data and jth cluster center. n = number of data points. vj = jth cluster center m = fuzziness index m € [1, ∞] c = number of cluster center. uij = membership of ith data to jth cluster center. U = (uij)n*c is the fuzzy membership matrix. J = objective function. Algorithmic steps for Fuzzy c-means clustering (James C. Bezdek, 1999) (JAMES C. BEZDEK, 1984) If X = {x1, x2, x3 ..., xn} is set of data points and V = {v1, v2, v3 ..., vc} the set of centers. 1) Select c cluster centers randomly. 2) Calculate the fuzzy membership uij using: (9) Where: k = iteration step. dij = Euclidean distance between ith data and jth cluster center. 3) Compute the fuzzy centers vj using: (10)
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 4 4) Repeat step 2) and 3) until the minimum J value is achieved or ||U(k+1) - U(k) || < β. Where: β = termination criterion between [0, 1]. Advantages of Fuzzy-C-Means 1. Gives best result for overlapped data set and comparatively better then k-means algorithm. 2. Unlike k-means where data point must exclusively belong to one cluster center here data point is assigned membership to each cluster center as a result of which data point may belong to more then one cluster center. 3.2. Choice of minimum number of BTS required Pattern search algorithm: Mesh Adaptive Direct Search (MADS) is used to perform this minimization task. MADS works by selecting a random starting point and calculates objective function at that point. It then polls mesh points by computing the objective function at those points in a bid to find one that is lower than the current one. If the poll is successful, mesh size is increased by an expansion factor. Otherwise, mesh size is reduced by a contraction factor. (Mathworks, 2004–2012) MADS calculates optimum path loss or distance and if it goes beyond threshold 140 dB, the number of BS is increased otherwise it is decreased if too low. The processes of site placement and site selection are repeated until an optimum number of BS is found which limits number of BS while guaranteeing necessary quality of service. Figure 1. Felow diagram of algorithm
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 5 4. Results Typical operating conditions are: Table 2. List of operating conditions Figure 2. Randomly distributed users. Mobile Stations: 1000 Base Stations: 34 PARAMETER VALUE Max power by BTS 30 W Max power by Mobile Station 1 W Spreading Factor 128 Target Path loss 140 dB Mobile station antenna height 1.5 Mobile station antenna height 30 Noise power 2 x 10-14 W
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 6 Figure 3 Gaussian distributed users around one centers. Mobile Stations: 1000 Base Stations: 34
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 7 Figure 4 Gaussian distributed users around two centers. Mobile Stations: 1000 Base Stations: 34
  • 8. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 8 Figure 5 Gaussian distributed users around four centers. Mobile Stations: 1000 Base Stations: 34 5. Explanation of results Results from simulations are consistent when population distribution is changed. Each BTS is to serve about 30 mobile stations and a radius of 1.5 km. Red asterisks are present BTS locations while black dots are mobile stations. This approach has certain advantages: • There are very few settings on the part of the user. Simulations only require MS population distribution as input. • Combining the optimization and clustering methods allows us to overcome disadvantages of both strategies if they were used alone while enhancing advantages. Optimization methods are not designed for clustering and therefore one has to write their own clustering functions which may not be very efficient. Clustering methods such as Fuzzy C-Means, K-Means etc have a big weakness in that they cannot determine optimum number of cluster centers themselves. • Optimization method takes input from clustering method and determines if number of BTS allocated minimizes distance between BTS and furthest MS in cells. Output of the optimization is fed to cluster method in order re-cluster. This loop continues until an optimum number of BTS which minimizes distance is arrived at. In doing this, the number of optimum BTS required is found automatically rather than being entered by the user through trial and error. 6. Acknowledgments: I would like to thank my supervisors, Dr. P. K. Kihato and Dr. S. Musyoki, for their support and helpful re- marks. I also wish to thank Patrick Abonyo who helped me with project ideas.
  • 9. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.4, 2013 9 References Algorithms, D. C. .(2012). Fuzzy c-means clustering algorithm. Data Clustering Algorithms. [Online] Available: https://sites.google.com/site/dataclusteringalgorithms/fuzzy-c-means-clustering-algorithm Communication Commission of Kenya. (2012). Quaterly Sector Statistics Report Second Quater of the Financial Year 2012/2013. Communication Commission of Kenya Report. 33-34 Directorate-General for Communications Networks. (1999). Content and Technology,European Commission. Digital Mobile Radio Towards Future Generation Systems-COST 231 Final Report. 15-18 James C. Bezdek, J. K. (1999). Fuzzy Models and Algorithms for Pattern Recognition and Image Processing. Fuzzy Models and Algorithms for Pattern Recognition and Image Processing, Kluwer Academic Publishers. JAMES C. BEZDEK, R. E. (1984), FCM: The Fuzzy C-means clustering algorithm. Computers & Geosciences , 10 (2-3), 191-203. Mathworks. (2004–2012). Global Optimization Toolbox User’s Guide. The MathWorks, Inc. Motorola. (2008). 2G and 3G cellular networks: Their impact on today’s enterprise mobility solutions and future mobility strategies. Motorola report. Radio-Electronics.com. (2000). Radio wave propagation and signal loss.[Online] Available: http://www.radio- electronics.com/info/propagation/path-loss/rf-signal-loss-tutorial.php. Waburi, N. (2009). The Contribution of mobile phones to the Kenyan Economy. Market & Social Research, Nairobi.
  • 10. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar