Você está na página 1de 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/295531511

Using Clustering Techniques to Improve Capacity of LTE Networks

Conference Paper · October 2015


DOI: 10.1109/APCC.2015.7412593

CITATIONS READS

7 435

3 authors:

Maryam Hajjar Ghadah Aldabbagh


King Abdulaziz University Massachusetts Institute of Technology
3 PUBLICATIONS   16 CITATIONS    58 PUBLICATIONS   230 CITATIONS   

SEE PROFILE SEE PROFILE

Nikos Dimitriou
National Center for Scientific Research Demokritos
73 PUBLICATIONS   485 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

AirborNets View project

Synergistic terrestrial and satellite mobile cellular systems View project

All content following this page was uploaded by Ghadah Aldabbagh on 11 March 2016.

The user has requested enhancement of the downloaded file.


Proceedings of APCC2015 copyright © 2015 IEICE 14 SB 0087

Using Clustering Techniques to Improve Capacity of


LTE Networks
Maryam Hajjar1, Ghadah Aldabbagh2 Nikos Dimitriou
Computer Science Department Institute of Informatics and Telecommunications
Faculty of Computing and Information Technology NCSR Demokritos
King Abdulaziz University Athens, Greece
Jeddah, Kingdom of Saudi Arabia nikodim@iit.demokritos.gr
1
mhajjar004@stu.kau.edu.sa, 2 galdabbagh@kau.edu.sa

Abstract—In highly dense LTE networks, with the increased This paper aims at providing a way to create small cells
number of users requesting services in a cell, blocking will occur called clusters inside an LTE macro cell without the need of
for some users. To deal with this, techniques for increasing the additional infrastructure. Each cluster will be created based on
capacity of the cell must be adopted. Clustering nodes into small promoting a specific user as a Cluster-Head (CH) to act as a
groups with low power will enable reusing the available relay station rather than having extra infrastructure. This CH
frequency and thus expanding the capacity of the network. In will relay all other users’ data that are in the same cluster to the
this paper, clustering is implemented in a way to configure the BS. These cluster members are called slaves.
nodes into groups each having one cluster-head (CH) that
communicates directly with the Base Station (BS), while other In this manner, the specific allocation of users into different
nodes, called slaves, relay their communication through cluster- clusters is required, and therefore clustering techniques must be
head nodes. The implementation of different clustering strategies adopted. However, the allocation of users must consider
that are adapted for the LTE environment is proposed. Two of appropriate power control and resource allocation in order to
the well-known clustering algorithms, namely K-means and the mitigate interference and achieve better performance through
Hierarchical Agglomerative Clustering (HAC), are used for this efficient use of the available spectrum [3]. Therefore,
purpose. Moreover, the use of selection strategy for configuring clustering techniques must be adjusted to meet these
the nodes is also implemented and compared with the other two requirements. Clustering is a broad methodology known as the
clustering techniques. A proper frequency allocation and power “division of data into groups of similar objects. Each group,
control scheme is implemented in order to avoid excessive
called a cluster, consists of objects that are similar between
interference and get valid clustering formations in all cases.
themselves and dissimilar to objects of other groups [4].”
Keywords—LTE;K-means; agglomerative; HAC; Following a specific clustering approach, nodes are
clustered into small groups of slaves and a single CH. Only
I. INTRODUCTION CHs are directly connected to the BS and act as relay stations.
Each slave node is connected to a CH node and can use it as a
LTE, short for Long Term Evolution, has been widely
relay to send and receive information to the BS. The group of a
deployed in cellular communications to provide high-speed
CH node and its associated slaves is considered as a cluster.
data for mobile phones and smart devices. With the increased
Proper allocation of CH and slave nodes must be determined to
number of mobile users and the increased demand of high data
meet the constraint of low power clusters. Transmitting and
rates, density in LTE networks becomes a major issue
receiving in such low power clusters will enable reusing the
especially in crowded areas such as Hajj, conferences, and
frequency in other clusters without causing significant
concerts. Proper frequency allocation may not be sufficient due
interference and hence capacity is increased.
to the shortage of the spectrum. Therefore, methods to reuse
the available frequencies must be adopted.
II. RELATED WORK
In cellular systems, regions are divided into cells. Each cell
has its own Base Station (BS) that controls the communications Clustering Techniques have been used mainly in the fields
inside the cell. Frequencies are divided into sets and are reused of data mining and image processing. They have also been
in regular patterns so that adjacent cells use different widely applied in wireless communications. Two of the most
frequencies in order to keep the interference as low as possible known clustering approaches are the K-means and the
and increase usage. In the same manner, when density inside Hierarchical Agglomerative Clustering (HAC).
one cell becomes very high, one of the proposed solutions is to Implementations of these two approaches can be found in
divide the cell into a number of smaller cells with lower Wireless Sensor Networks (WSN), Ad-hoc networks and LTE
transmitting and receiving powers, such as femtocells and networks.
microcells [1]. However such solutions require additional An example of clustering in LTE is the study in [5]. This
infrastructure which means additional cost [2]. study uses two-hop relay system and forms low power usage
clusters. Communications inside the clusters is done through
another frequency band (white-space). The study uses K-means In this paper, a comparison between four different
clustering algorithm to configure the clusters. The algorithm clustering scenarios in LTE is done. At first, nodes are
assumes a threshold for the maximum number of nodes inside clustered based on two selection strategy schemes. These will
each cluster. Clustering is iterated with the objective of be compared against the use of K-means and HAC algorithms.
minimizing total power. Using the additional white-space band Algorithms will be modified to accommodate resource
has the advantage of increasing resources and eliminating the allocation and power control specifications.
need to partition the LTE band between two layers. Studies [6,
7, 8, 9, 10, 11] all addressed the use of white-space in LTE. The rest of the paper is organized as follows. Section 3
However, the use of such low frequency band (white-space) explains system model. The proposed algorithm is defined in
will cause the signal to propagate for long distances and may section 4. Simulation setup and results are given in section 5.
result in unexpected interference. Some other studies in LTE Finally, the paper is concluded in section 6.
and cellular networks [2, 12, 13, 14] use selection strategies to
enable the relaying system rather than clustering. In this III. SYSTEM MODEL
manner each node chooses its best relay (i.e. CH) from a
predefined pool of candidate relays. The selection can be based A. Components
on different criteria. Some are based on choosing the relay with The system is composed of an LTE BS and a number n of
least distance while others are based on the minimum path-loss. users that try to access the BS. Users are classified into two
Using path-loss is better than distance because it gives better layers. First layer users are directly connected to the BS.
estimation of the link quality. These techniques are less Second layer users use one of the first layer users as a relay to
complex and more applicable to distributed systems. access the BS. This kind of association forms a cluster. Each
As for WSNs, clustering techniques have been widely cluster has only one CH which is a first layer user and a
implemented to solve problems of lifetime and scalability of number of slaves that connect to this CH. Each user has a
the network by preserving energy of the sensor nodes. K-means different SINR requirement (a) depending on the type of
is one of the most used clustering algorithms in WSN [15, 16, service needed and the number of associated slaves. CHs will
17, 18]. In [15] both a centralized and a distributed approaches have an aggregated SINR requirement of all its slaves’ SINR
of K-means are given. K-means run first by defining a specific values. For simplicity, a uniform SINR threshold is assumed to
number of clusters K. Then after all clusters are formed, CHs be 10 dB for all users own data. A total of 100 Resource
are chosen from each cluster based on two factors; distance Blocks (RBs) are used throughout the cell. Each connected user
from cluster centroid and residual energy. In [16] the BPK- will be allocated a single RB in a single sub-frame. First, the
means protocol is presented where a specific number of BS will exhaust all the resources to connect to as much users.
clusters K is defined based on certain criteria, and an average Then, blocked users who were unsuccessful to connect to the
Ave is defined to be the number of nodes in each cluster as the BS, will be allocated a proper CH from the already connected
total number of nodes N divided by K. Then K-means will run ones to relay their information to the BS. This allocation will
normally with the alteration of the chosen centroids. In each be based on one of the clustering schemes. RBs from the first
iteration the centroid will be chosen as the actual node that is layer will be based on one of the clustering schemes. RBs from
nearest to the location of the cluster’s center. After the the first layer will be reused in the second layer under three
completion of K-means, load balancing will start where all conditions:
clusters will be modified in order to have a total number of A single RB cannot be reused inside one cluster.
nodes equal to Ave. At the last step, CHs are chosen from each A RB used by a CH cannot be reused in any of its slaves.
cluster at different rounds based on the same two factors as Choose least reused RB each time to ensure load balancing.
[15].
Path-loss value between a user and its CH or between a
HAC has also been used in WSNs [18, 19, 20]. This user and the BS (sender i and reciver j) will be calculated
scheme doesn’t require the number of clusters to be defined in according to the simple path-loss model:
advance as in K-means. It starts by assuming each node as a
single cluster, then successively merge pairs of clusters until all (1)
clusters have been merged into a single cluster. Clusters are
merged based on their proximity. This bottom-up approach rij is the distance between two nodes i and j. e is the path-loss
creates a dendrogram tree topology. The algorithm can also be exponent, and ξ is the shadowing value between i and j. The
applied to disjoint clustering problems by assuming a threshold least path-loss value is chosen when trying to connect a user to
for either a specific distance or a number of clusters to stop the a CH or to the BS.
process of further merging. In [20], this threshold is based on
Interference in this work is assumed to be the summation of
the transmission radius. Moreover, another threshold is defined
powers of all other signals that use the same RB as the target
in this study as the minimum number of nodes inside the
signal.
cluster (cluster size), clusters that has smaller number of nodes
than this threshold will merge with their closest cluster. CHs
are chosen based on two parameters. Lower level in the (2)
hierarchy tree and energy level. HAC approach helps to
implement a self-organization WSNs.
conditions between the sender and the receiver. It is ideal to
reduce power in such cases without affecting the target SINR
This equation is used to compute interference for user i, where of the user. Otherwise, the user will be blocked for not meeting
Ptx,k and Lkj are the transmitted power and the path-loss of user its SINR requirement. In order to insure good channel
k that use the same RB as user i. Lkj value is computed between conditions, users will connect to CHs or to the BS based on
users k and j (having j as the receiver of i), and n is the total finding the minimum path-loss. This will help reducing the
number of users using the same RB as i. power and increasing gain to the whole system. Moreover, the
number of CHs/candidate CHs in all cases is chosen to be 100
B. Power Control as this is the total number of RBs. The term CH will be used to
In order to reuse RBs from the first layer, interference indicate a first layer user in general as it is a candidate for this
should be minimized to the level that an acceptable SINR could rule. The four clustering schemes are detailed as follows:
be achieved. Thus, power control must be applied on all users
that access the same RB, i.e. minimizing their power so that A. Selection Strategy Algorithm (SS)
they cause less interference to each other while achieving their At the beginning, all first layer users are connected to the
target SINR. When trying to connect a user with a specific RB BS. A total of 100 users only are connected directly to the BS.
that has been reused a number of times, power must be After that, selection strategy will start for unallocated users.
adjusted for all nodes that use the same RB. If, however, this
affects the SINR threshold for any of them, then a different Algorithm:
association must be selected for this user. In order to evaluate
this, a system of linear equations has to be solved as follows: Phase1: connect first-layer users:

From the SINR equation, Connect 100 users with least path-loss directly to the
BS as (CHs).
Allocate each user a single RB.
(3) Phase2: connect second-layer users:
Where ai is assumed to be the SINR threshold for user i, N is For each unallocated user, select the CH that would
the noise, Ii is the interference caused to user i (equation 2), i is guarantee least path-loss.
an index used for the senders, and j is an index used for the 1. Start trying RBs based on the three conditions
receivers. In order to achieve the value of the SINR threshold listed in section III.
for all users accessing the same RB, a number of equations 2. If a RB was found such that all users of this RB
need to be solved: including the user itself can successfully adjust
their power while meeting their SINR
thresholds (based on equation 6), then allocate
the user to this RB. Otherwise, look for a
different RB.
(4)
3. If a RB was found, then allocate the user to this
CH
4. Otherwise, the allocation is not valid; check
next CH (step.1).
This is a linear equation system and can be written as: 5. If not succeeded with all CHs, the user is
considered blocked.
B. Selection Strategy with Random Initialization (SS-R)
In order to make clusters more distributed around the cell
(5) rather than located only at the edge of the cell, CHs are chosen
randomly in this scheme. It works in a very similar way as the
Selection Strategy algorithm. The only difference is in the
initialization phase:
Assuming that the matrices are A, P, and B respectively, Algorithm:
this can be solved using:
Phase1: connect first-layer users:
(6)
If a solution is not found, then we know that the system Connect 100 random users to the BS as CHs.
with the current number of users accessing the same RB is not Allocate each user a single RB.
achievable and a reduction of this number is needed. Phase2: same as SS algorithm phase 2.
C. K-means Algorithm
IV. PROPOSED ALGORITHM
K-means in this study is based mainly on the path-loss
In order to achieve capacity gain and connect more users, rather than distance, and CH selection depends on path-loss to
associations must be done based on having good channel the BS. The BS collects information about all users’ positions.
After getting this information from all users, K-means 5. Repeat (2-4) until number of cluster is reduced to 100
algorithm will start. Assume U = {u1,u2,u3,……..,un} be the set clusters.
of nodes and V = {v1,v2,…….,vk} be the set of centers.
6. From each cluster, the node that has the minimum
Algorithm: path-loss to the BS is assigned as a CH and will be
allocated a single RB.
1. To cluster the nodes into K clusters, take K
number of centroids initially at random places. 7. For all other members of clusters:
2. Calculate the path-loss from each node to all Start trying RBs based on the three
centroids. conditions listed in section III.
3. Assign each node to the cluster whose path-loss If a RB was found such that all users of this
from cluster center is minimum of all cluster RBs including the user itself can successfully
centers. adjust their power while meeting their SINR
4. Recalculate the new cluster centroid using: thresholds (based on equation 6), then
allocate the user to this RB. Otherwise, look
(7) for a different RB.
If a RB was found, then allocate the user to
where, ci represents the number of nodes the corresponding CH.
in ith cluster. 8. As a result for step 7, some users will successfully
connect to CHs while others won’t.
5. If there is change in position of any centroid then 9. For all unconnected users, run phase 2 of SS.
go to STEP 2, otherwise stop.
By this the clustering of nodes into K number of clusters is V. SIMULATION SETUP AND RESULTS
done. K will be assumed to be equal to the total number of RBs In this section, an evaluation of the performance of the four
i.e. 100. For the next step, CHs are chosen, and some algorithms is done. Also, the simulation model and results are
adjustments are made based on the following: being described and compared to an LTE cell with no relays.
1. For each cluster, choose the node with least path- The simulation environment is designed using MATLAB. The
loss to the BS as the CH and assign it a RB. parameters for the simulation study are listed in table 1 along
Having a total of 100 CHs. with the following assumptions:
2. For all other members of the cluster: 1 RB is allocated for each user’s data.
a. Start trying RBs based on the three Each user will have a single sub-frame in each frame in
conditions listed in section III. a round robin fashion.
b. If a RB was found such that all users of this VoIP service is assumed only with the requirement of
RBs including the user itself can successfully 64 Kbps, thus SINR threshold is computed as follows:
adjusted their power while meeting their
SINR thresholds (based on equation 6), then (8)
allocate the user to this RB. Otherwise, look Required SINR for each user is 10 dB.
for a different RB.
c. If a RB was found, then allocate the user to TABLE 1 PARAMETERS USED IN SIMULATION
the corresponding CH. Parameter Value
Cell radius 100 m
3. As a result for step 2, some users will successfully
Cell area 31,400 m2
connect to CHs while others won’t. Base Frequency 2 GHz
4. For all unconnected users, run phase 2 of SS Effective Bandwidth (B) 18 MHz
algorithm. Required Throughput (R) 64 Kbps
No. of Resource Blocks 100
D. Hierarchical Agglomerative algorithm (HAC) Number of nodes (n) /sub-frame 150, 200, 250, 300
HAC is also based on using path-loss as a similarity. Number of nodes (N) /frame 1500, 2000, 2500, 3000
Clusters are created based on merging least path-loss pair of Number of iterations 100
clusters. After the clusters are created, CHs will be chosen in Path-loss exponent 4 (shadowed urban)
each cluster as the node with least path-loss to the BS. Below is Shadowing 6 dB
Position of BS (x,y) (0,0)
the steps of the implemented HAC:
Noise ~-200 dBm
1. Assign each node as a cluster. SINRth 10 dB
Max Tx Power UE 0.796 Watts, 29 dBm
2. compute all pair-wise path-losses between clusters Max no. of slaves 5
3. Construct a path-loss matrix using the path-loss Duplexing FDD
values. Modulation scheme 64 QAM
Scheduling Round Robin
4. Look for the pair of clusters with least path-loss and
merge them in a single cluster.
The BS is fixed and located at the center of the cell.
The locations of user nodes are randomly distributed in
the cell area.
The BS can gather information about users.
All user nodes are mobile and have limited movement
due to density.
A maximum density of 1 person/m2 is assumed. Thus,
the maximum total population is approximately
Fig. 1. SS Fig. 2. SS-R 30,000.
Each user occupies 1 resource block (RB) for a
fraction of time: 6 mins / hour (activity 10%).
Maximum active users: 10% of 30,000 = 3000.
Simulation is done to check the resource allocation
during a single sub-frame (of duration 1ms) that is
supposed to be accessed by 10% of all users (300
users)
Having a total of 100 RBs used at a single sub-frame, and
scheduling requirements fixed to 1 RB per user, will give a
total of 100 direct connections to the BS. Each of the n-100
Fig. 3. K-means Fig. 4. HAC remaining users could be either a second layer users or blocked
users depending on the availability of resources and system
interference condition. Figures 1 to 5 show the resulting
connections for 200 nodes with same distribution in the cases
of: SS, SS-R, K-means clustering, HAC, and direct LTE,
respectively. The blue colored nodes represent users that are
either a CH or that are having standalone direct connection to
the BS, the green-colored nodes represent slaves that relay their
signal through CHs, and the red-colored nodes represent
blocked users that have requested a service but could not be
allocated. A link is represented by a black line.
Fig. 5. Direct LTE
Fig.5 shows the standard LTE cell with no relays or
clusters. In this case, a maximum of 100 users is allocated in
each sub-frame having a total capacity of 1000 users per frame.
The remaining 100 requesting users in red are blocked from
accessing the specific sub-frame. This is changed when
clustering is implemented (Fig.1, 2, 3 & 4).The number of
blocked users (red nodes) is obviously decreased in these
figures. In Fig.1, it is observed that in SS, clusters are located
at the edge of the cell while in all other cases (Fig.2, 3 & 4),
clusters are more distributed throughout the cell.
After running the simulation for different numbers of users
Fig.6. Number of connected users for proposed algorithms compared (150, 200, 250, and 300), It is observed that clustering has a
to direct LTE major effect on increasing the number of connected users. The
total number of connected users has successfully increased in
all four cases in comparison to Direct LTE (Fig.6). The four
techniques are found to have approximately close results. SS
has the least enhancement while K-means and HAC have the
best enhancement of all algorithms (Fig.6, 7). Having random
initialization of CHs in the case of SS-R appeared to be better
than the case of SS with least path-loss CHs initialization. The
maximum number of connected users achieved in the cases of
K-means and HAC is 200 users/sub-frame, resulting with a
total of 2000 successfully connected users in a frame compared
to 1000 only in the case of no clustering (direct LTE); This
means a 100% enhancement in the capacity of the cell and a
Fig.7. Blocking Rate of proposed algorithms compared to Direct decrease in blocking rate from 67% to 33% in the case of
LTE maximum population (i.e. 3000 users).
HAC and K-means found to be better used than any of the [6] N. Akkari, G. Aldabbagh, M. Nahas, B. Bawazeer, J. Cioffi, and H.
two selection strategies schemes. The selection strategies Tabrizi, "Coordinated Tethering Over Cellular Networks: Handover
schemes generates CHs randomly whilst HAC and K-means Scenarios and Signaling," IEEE 24th International Symposium on
Personal Indoor and Mobile Radio Communications (PIMRC), London,
locate them at dense areas which leads to better performance. United Kingdom, 2013.
An identical performance of both HAC and K-means is [7] N. Akkari, G. Aldabbagh, M. Nahas, and J. Cioffi, "Dynamic Clustering
observed (Fig. 6, 7). Although each works differently, they Protocol for Coordinated Tethering over Cellular Networks," Journal of
Network and Computer Applications, vol. 42, pp. 92–101, 06/2014.
both have the same objective; creating the same number of
clusters with minimized path-losses. However, K-means is [8] H. Tabrizi, G. Farhadi, J. Cioffi, and G. Aldabbagh, "Coordinated
Tethering over White-Spaces," IEEE Transactions on Vehicular
much less computationally expensive than HAC, which is an
Technology, p. 1, 03/10/2014 2014.
important factor to consider when dealing with dynamic
environments that need real time solutions such as the LTE. [9] G. Aldabbagh, S. T. Bakhsh, N. Akkari, S. Tahir, H. Tabrizi, and J.
Cioffi, "QoS-Aware Tethering in a Heterogeneous Wireless Network
using LTE and TV White Spaces," Computer Networks, 13th of
VI. CONCLUSION AND FUTURE WORK February 2015.

Four clustering approaches were adopted in order to [10] G. Aldabbagh, T. Bakhsh, N. Akkari, S. Tahir, S. Khan, and J. Cioffi,
"Distributed Dynamic Load Balancing in a Heterogeneous Network
investigate relaying through other users in an LTE cell. The using LTE and TV White Spaces," Wireless Networks, 12th of February
nodes are configured into groups each has one CH and a 2015.
number of slaves in a two layer topology. Frequency allocation [11] U. Al-Haddad, G. Aldabbagh, and N. Dimitriou, "Clustering over TV
and power control schemes have been implemented in order to White Space in Dense Wireless Areas: Dynamic Hotspot Selection and
avoid excessive interference. Results show that a clustered Resource Allocation" Mitteilungen Klosterneuburg, vol. 65, 2015.
LTE cell has capacity gains compared to the direct LTE. An [12] H. Nourizadeh, R. Tafazolli “Capacity improvement of WCDMA
increase in the number of connected users and a decrease in cellular systems through different relaying strategies”, MWCN 2005,
blockage rate have been achieved when using the proposed Marrakech, Morocco, 19 September.
clustering. K-means and HAC has superior performance than [13] V. Sreng, H. Yanikomeroglu, D. D. Falconer, "Relayer selection
the selection strategy schemes in terms of capacity strategies in cellular networks with peer-to-peer relaying," Vehicular
enhancement. The maximum number of connected users is Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th , vol.3,
no., pp.1949,1953 Vol.3, 6-9 Oct. 2003
achieved in the cases of K-means and HAC which yield a
100% enhancement in the capacity of the cell and a decrease in [14] W. Hong, J. Han, H. Wang, "UL Performance Evaluation of Relay
Enhanced FDD LTE-Advanced Networks," Wireless Communications,
blockage rate in the case of maximum population from 67% to Networking and Mobile Computing (WiCOM), 2011 7th International
33%. Future work includes the use of other clustering Conference on, pp.1,5, 23-25 Sept. 2011
techniques and the consideration of different user requirements. [15] P. Sasikumar, S. Khara, "K-Means Clustering in Wireless Sensor
Networks," Computational Intelligence and Communication Networks
ACKNOWLEDGMENT (CICN), 2012 Fourth International Conference on , vol., no.,
pp.140,144, 3-5 Nov. 2012
This paper has been funded by the National Plan for [16] L. Tan, Y. Gong, G. Chen, "A Balanced Parallel Clustering Protocol for
Science, Technology and Innovation (MAARIFAH) – King Wireless Sensor Networks Using K-Means Techniques," Sensor
Abdulaziz City for Science and Technology - the Kingdom of Technologies and Applications, 2008. SENSORCOMM '08. Second
Saudi Arabia – award number (12-INF 2743-03). The authors International Conference on , vol., no., pp.300,305, 25-31 Aug. 2008
also, acknowledge with gratitude the Science and Technology [17] G. Y. Park, H. Kim, H. W. Jeong, H. Y. Youn, "A Novel Cluster Head
Unit in King Abdulaziz University for technical support. Selection Method based on K-Means Algorithm for Energy Efficient
Wireless Sensor Network," Advanced Information Networking and
Applications Workshops (WAINA), 2013 27th International Conference
on , vol., no., pp.910,915, 25-28 March 2013
REFERENCES [18] G. Kumar, H. Mehra, A.R. Seth, P. Radhakrishnan, N. Hemavathi, S.
[1] A. Khalifah, N. Akkari, and G. Aldabbagh, "Dense Areas Femtocell Sudha, "An hybrid clustering algorithm for optimal clusters in Wireless
Deployment: Access Types and Challenges," Third International sensor networks," Electrical, Electronics and Computer Science
Conference on e-Technologies and Networks for Development (ICeND), (SCEECS), 2014 IEEE Students' Conference on ,, pp.1,6, 1-2 March
Beirut, Lebanon, 2014. 2014

[2] H. Nourizadeh, S. Nourizadeh, R. Tafazolli,"Performance Evaluation of [19] T.K. Jain, D.S. Saini, S.V. Bhooshan, "Performance analysis of
Cellular Networks with Mobile and Fixed Relay Station," Vehicular hierarchical agglomerative clustering in a wireless sensor network using
Technology Conference, 2006. VTC-2006 Fall. 2006 IEEE 64th, pp.1,5, quantitative data," Information Systems and Computer Networks
25-28 Sept. 2006. (ISCON), 2014 International Conference on, pp.99,104, 1-2 March 2014

[3] I. Ahmed, A. Mohamed, "On the joint scheduling and intra-cell [20] L. Chung-Horng, Z. Chenjuan, "Using Hierarchical Agglomerative
interference coordination in multi-relay LTE uplink," Globecom Clustering in Wireless Sensor Networks: An Energy-Efficient and
Workshops (GC Wkshps), 2012 IEEE , pp.111,115, 3-7. Flexible Approach," Global Telecommunications Conference, 2008.
IEEE GLOBECOM 2008. IEEE, pp.1,5, Nov. 30 2008-Dec. 4 2008.
[4] O. Abu Abbas, "Comparison Between Data Clustering Algorithms," the
International Arab Journal of Information Technology, Vol.5, No. 3, [21] H. Tabrizi, B. Peleato, G. Farhadi, J. M. Cioffi, and G. Aldabbagh,
July 2008. "Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization
Approach via ADMM," IEEE Transactions on Wireless
[5] H. Tabrizi, H. G. Farhadi, J.M. Cioffi, "CaSRA: An algorithm for Communications, vol. PP, p. 1, 04 August 2015.
cognitive tethering in dense wireless areas," Global Communications
Conference (GLOBECOM), 2013 IEEE , pp.3855,3860, 9-13 Dec. 2013.

View publication stats

Você também pode gostar