Spelling suggestions: "subject:"coequality off service"" "subject:"coequality oof service""
51 |
noneHUANG, CHIN-MIEN 23 August 2006 (has links)
Abstract
Reading has been the focused program continuously promoted by Ministry of Education and Council of Cultural Affairs; it has been also the core program of each public library. Being seen in every administrative district of Kaohsiung City, the branches of Kaohsiung City Library is the most convenient access channel of the information of books for citizens and most influential on cultivating citizens¡¦ reading habit. The Kaohsiung City Library has actively promoted the City Reading for the past few years. The library has received people¡¦s applause due to its user-friendly measures, reading for different ages, many reading promotional activities and the marketing campaign for the importance of reading. However, whether the readers¡¦ and librarians¡¦ cognition and satisfaction at library service quality increase while the library practices the measures of the above, what are the suggestions for the library, and what are the key factors of readers¡¦ reading behavior that affecting their cognition and satisfaction with reading service quality are the emphasis of this study to explore.
Based on the PZB model, this study examined the gap between the readers and the librarians of Kaohsiung City Library in the perception and satisfaction of library¡¦s reading service quality, and surveyed readers¡¦ suggestions for library service and the factors influencing their reading behavior via questionnaires.¡ª
. The results of this study are concluded as follows:
1. A significant difference between the readers and the librarians in the cognition and satisfaction of library¡¦s reading service quality exists only on the answers regarding recognizable entrance, well air-conditioning, convenient opening hours, adequate loan limits, and convenient book reservation process.
2. There is a significant difference between the readers and the librarians in service personnel and service quality.
3. Readers care more about the reader¡¦s rights such as the frequent new book arrival, an increase of loan limits and an extension of opening hours; beside the frequency of new book arrival, librarians are concerned with professional librarian training and the adequacy of personnel
4. The factors affecting the reading behavior of interviewees are motive, living style, subject, best-seller, and specific author. Motive is the most influential one. Most of the reading motives are for fun, personal interest, experience enriching and knowledge broadening. That finding shows that obtaining the feeling of happiness from reading is the motive for interviewees to continue to read.
The changing cognition of reading service quality is consequent on readers¡¦ experience and communication. Therefore, it is a continuously hard-working process. The administrators of the library should be kept informed frequently about readers¡¦ needs by conducting surveys, studies and communicating with the personnel in service. And, in order to meet readers¡¦ demands, the library should transform the needs to services measures to raise the level of readers¡¦ satisfaction and increase their interest in reading.
|
52 |
Sectorized Bandwidth Reservation Scheme for Multimedia Wireless NetworksYen, Yu-Lin 06 September 2002 (has links)
Because of the advancement of wireless networks, it is important to provide quality-of-service (QoS) guarantees as they are expected to support multimedia applications. In this paper we propose a new bandwidth reservation scheme based on the characteristic of the cell equipped with sector antenna. According to this information, the proposed scheme can predict the next location of each connection and precisely reserve bandwidth in appropriate neighboring cells, not all of its neighboring cells. Besides, the proposed scheme uses bandwidth borrowing mechanism to be our call admission control strategy. The combination of bandwidth reservation and bandwidth borrowing provides network users with QoS in terms of guaranteed bandwidth, call blocking and call dropping probabilities.
|
53 |
Dynamic Bandwidth Borrowing and Adjustment for VBR Traffic in WiMAX NetworkChen, Chun-Chu 04 September 2008 (has links)
In a WiMAX network, four traffic types with different priorities are defined.
They are Unsolicited Grant Service (UGS), real-time Polling Service (rtPS),
non-real-time Polling Service (nrtPS), and Best Effort (BE). In this thesis, we propose
a Dynamic Bandwidth Allocation (DBA) scheme for BS to schedule the four
above-mentioned traffic types. By adopting Deficit Round Robin (DRR) scheduling,
DBA first assigns minimum quantum to each traffic type for transmission. When rtPS
packets exceed their delay constraints, without sacrificing the minimum requirements
of nrtPS and BE traffic, DBA borrows some quantum from nrtPS and BE to satisfy
the delay requirements of rtPS traffic. When nrtPS packets can not reach the
minimum transmission rate, without starving the BE traffic, DBA borrows some
quantum from BE to support the required throughput of nrtPS traffic. According to
the history record of borrowed quantum, DBA dynamically adjusts the assigned
quantum for the three traffic types. For the purpose of evaluation, we use NS-2 to
simulate the proposed DBA. We adjust the traffic load to analyze the performance in
terms of average packet delay, average throughput, and average packet loss ratio. The
simulation results show that the DBA, in comparison to a previous work, can promise
the delay constraints of rtPS, maintain the average throughput of nrtPS, and avoid the
starvation of BE, when the traffic load is high.
|
54 |
QoS Provisioning in Mobile Wireless Networks with Improved Handover and Service MigrationShieh, Chin-shiuh 04 February 2009 (has links)
With increased popularity and pervasiveness, mobile networking had become a definite trend for future networks. Users strongly demand the retaining of the connectivity and the QoS (Quality of Service) of ongoing services while roaming across different points of attachment. Efficient handover schemes and service paradigms are essential to the above vision. We will contribute to the QoS provisioning in mobile wireless networks from two complementary perspectives: one is the improved handover schemes at the client end for shorter latency and less packet loss, and the other is the service migration at server end for improved QoS.
There are time-consuming procedures involved in the handover process. Various research works had devoted to the acceleration of movement detection and registration. However, a time-consuming operation, duplicate address detection, was overlooked by most studies. A novel scheme featuring anycast / multicast technique is developed and presented in this dissertation. The proposed approach switches to anycast / multicast addressing during handover and switches back to normal unicast addressing after all required operations are completed. By switching to anycast / multicast addressing, a mobile node can continue the reception of packets from its corresponding node before its new care-of address is actually validated. As a result, transmission disruption can be effectively minimized. In addition, simple but effective buffer control schemes are designed to reduce possible packet loss and to prevent the out-of-order problem. Analytical study reveals that improved performance can be guaranteed, as reflected in the simulation results.
The establishment of mobility-supported Internet protocols, such as IPv4 and IPv6, had made it possible that an ongoing service can be retained while a mobile node is roaming across different access domains. However, limited efforts had been paid to server sides if we consider the topological change due to node mobility. In the global network environment, the weighted network distance between a client and its server could change dramatically for reasons of topology change or node mobility. A new network service framework highlighting the concept of service migration is presented in this dissertation. The proposed framework take into account essential service quality factors, such as server loading, bandwidth, delay, and so on, and then dynamically migrates an ongoing service from a distant server to a new server with shorter ¡§weighted network distance¡¨ to the client. As a result, the individual service connection, as well as the global network environment, will benefit from the service migration, in terms of improved service quality and bandwidth utilization.
This dissertation explains the general architecture of the proposed framework and focuses on the technical details of the core component - service migration module. Our experiences on the functional prototypes for service migration are also reported. The success of the prototyping system is an indication of the feasibility and effectiveness of the proposed scheme.
|
55 |
Quality of Service i IP-nätverk / Quality of Service in IP NetworksAhlin, Karl January 2003 (has links)
<p>The original promise behind the Internet Protocol was to deliver data from a sender to the receiver using a best-effort approach. This means that the protocol makes no guarantees except that it will try to deliver the data to the destination. If some problem occurs the packet may be discarded by the network without any notice. No guarantees are made regarding the time it takes to deliver the data, the rate at which data will be delivered or if data is delivered in the same order it was sent. The best-effort approach is arguably the reason behind the success of the Internet Protocol and is what makes IP scalable to networks the size of the Internet. However, this approach is also a problem for network operators who want to offer better quality of service to some of their customers. This master thesis will discuss some of the theories behind the implementation of quality of service schemes in an IP network and also provide an example of how to implement it in an existing network.</p>
|
56 |
Dynamische Bandbreitenbeschränkung mit QoSHorbach, Jan 29 November 2001 (has links) (PDF)
Diese Diplomarbeit beschäftigt sich mit der
"schleichenden Abschaltung" begrenzter
Netzzugänge bei Überschreitung eines vorgegebenen
Datenvolumens und der Anwendung dieser Technologie
im Chemnitzer Studentennetz. Nutzer, die bestimmte
Transfervolumina überschreiten, werden
schrittweise einer immer schlechter bewerteten
Verkehrsklasse zugeordnet, wo ihnen weniger
Bandbreite zur Verfügung steht. Dazu werden die
Möglichkeiten, die der Linux-Kern hinsichtlich
Quality of Service bietet, genutzt.
|
57 |
Precise positioning in real-time using GPS-RTK signal for visually impaired people navigation systemAl-Salihi, Nawzad Kameran January 2010 (has links)
This thesis presents the research carried out to investigate and achieve highly reliable and accurate navigation system of guidance for visually impaired pedestrians. The main aim with this PhD project has been to identify the limits and insufficiencies in utilising Network Real-Time Kinematic Global Navigation Satellite Systems (NRTK GNSS) and its augmentation techniques within the frame of pedestrian applications in a variety of environments and circumstances. Moreover, the system can be used in many other applications, including unmanned vehicles, military applications, police, etc. NRTK GNSS positioning is considered to be a superior solution in comparison to the conventional standalone Global Positioning System (GPS) technique whose accuracy is highly affected by the distance dependent errors such as satellite orbital and atmospheric biases. Nevertheless, NRTK GNSS positioning is particularly constrained by wireless data link coverage, delays of correction and transmission and completeness, GPS and GLONASS signal availability, etc., which could downgrade the positioning quality of the NRTK results. This research is based on the dual frequency NRTK GNSS (GPS and GLONASS). Additionally, it is incorporated into several positioning and communication methods responsible for data correction while providing the position solutions, in which all identified contextual factors and application requirements are accounted. The positioning model operates through client-server based architecture consisted of a Navigation Service Centre (NSC) and a Mobile Navigation Unit (MNU). Hybrid functional approaches were consisting of several processing procedures allowing the positioning model to operate in position determination modes. NRTK GNSS and augmentation service is used if enough navigation information was available at the MNU using its local positioning device (GPS/GLONASS receiver).The positioning model at MNU was experimentally evaluated and centimetric accuracy was generally attained during both static and kinematic tests in various environments (urban, suburban and rural). This high accuracy was merely affected by some level of unavailability mainly caused by GPS and GLONASS signal blockage. Additionally, the influence of the number of satellites in view, dilution of precision (DOP) and age corrections (AoC) over the accuracy and stability of the NRTK GNSS solution was also investigated during this research and presented in the thesis. This positioning performance has outperformed the existing GPS service. In addition, utilising a simulation evaluation facility the positioning model at MNU performance was quantified with reference to a hybrid positioning service that will be offered by future Galileo Open Service (OS) along with GPS. However, a significant difference in terms of the service availability for the advantage of the hybrid system was experienced in all remaining scenarios and environments more especially the urban areas due to surrounding obstacles and conditions. As an outcome of this research a new and precise positioning model was proposed. The adaptive framework is understood as approaching an integration of the available positioning technology into the context of surrounding wireless communication for a maintainable performance. The positioning model has the capability of delivering indeed accurate, precise and consistent position solutions, and thus is fulfilling the requirements of visually impaired people navigation application, as identified in the adaptive framework.
|
58 |
Performance and Security Provisioning for Mobile Telecom CloudVaezpour, Seyed Yahya 27 August 2015 (has links)
Mobile Telecom Cloud (MTC) refers to cloud services provided by mobile telecommunication companies. Since mobile network operators support the last-mile Internet access to users, they have advantages over other cloud providers by providing users with better mobile connectivity and required quality of service (QoS). The dilemma in meeting higher QoS demands while saving cost poses a big challenge to MTC providers. We tackle this challenge by strategically placing users' data in distributed switching centres to minimize the total system cost and maximize users' satisfaction. We formulate and solve the optimization problems using linear programming (LP) based branch-and-bound and LP with rounding.
Furthermore, we discuss MTC brokerage which allows MTC providers to act as a brokerage to broker third-party cloud providers' (TPC) cloud resources and integrate the resources reserved from TPC with those of their own MTC. We address the technical challenges of optimally allocating users' cloud requests to MTC and TPC data centres to meet users' QoS requirement with minimum cost. We also study the price range that can be profitable to a MTC brokerage. We then investigate the resource reservation problem with dynamic request changes. We evaluate our solution using real Google traces collected over a 29-day period from a Google cluster.
We also address security provisioning in MTC. Mobile cloud allows users to offload computational intensive applications to a mobile phone's agent in the cloud, which could be implemented as a thin virtual machine (VM), also termed as phone clone. Due to shared hardware components among co-resident VMs, a VM is subject to covert channel attacks and may potentially leak information to other VMs located in the same physical host. We design SWAP: a security aware provisioning and migration scheme for phone clones. We evaluate our solution using the Reality Mining and the Nodobo dataset. Experimental results indicate that our algorithms are nearly optimal for phone clone allocation and are effective in maintaining low risk and minimizing the number of phone clone migrations. / Graduate / 0984
|
59 |
Βελτιστοποίηση της παρεχόμενης υπηρεσίας (QoS) δικτύου κινητής τηλεφωνίας τρίτης γενεάς, τεχνολογίας WCDMAΓκανιάτσος, Παναγιώτης 21 January 2009 (has links)
Στόχος της διπλωματικής αυτής είναι η παρουσίαση τεχνικών στα πλαίσια της Διαχείρισης Ραδιοπόρων με σκοπό την βελτιστοποίηση της παρεχόμενης υπηρεσίας (QoS), σε δίκτυα κινητής τηλεφωνίας 3ης γενιάς. Στο πρώτο κεφάλαιο γίνεται μια εισαγωγή στα δίκτυα κινητών επικοινωνιών και μια ιστορική αναδρομή. Στη συνέχεια παρουσιάζεται μια επισκόπηση της τεχνολογίας του CDMA και γίνεται καταγραφή και ανάλυση τεχνικών RRM. Στο σύστημα UMTS είναι αφιερωμένο ολόκληρο το δεύτερο κεφάλαιο. Το UMTS εξετάζεται από πλευράς αρχιτεκτονικής και πρωτοκόλλων. Το handover ως βασικό στοιχείο της Διαχείρισης Ραδιοπόρων μελετάται στο τρίτο κεφάλαιο. Ιδιαίτερη αναφορά και μελέτη γίνεται για το Soft Handover, ως το βασικό Handover του συστήματος WCDMA, που χρησιμοποιείται προκειμένου να διασφαλιστεί η απαιτούμενη υπηρεσία. Στο τέταρτο κεφάλαιο περνάμε στην multicast μετάδοση. Σε αυτή την περίπτωση εξετάζουμε την αποδοτική επιλογή καναλιού (Efficient Channel Selection), με στόχο την διασφάλιση του ίδιου QoS για όσο το δυνατόν περισσότερους χρήστες κάνοντας την καλύτερη δυνατή διαχείριση των πόρων του συστήματος. Τέλος το πέμπτο κεφάλαιο αφιερώνεται στην συνολική παρουσίαση των συμπερασμάτων που έχουν εξαχθεί στα προηγούμενα κεφάλαια. / -
|
60 |
Κρυπτογράφηση και ποιότητα υπηρεσιών (Qos) σε ad-hoc ασύρματα δίκτυαΑμπατζόγλου, Παντελής 03 August 2009 (has links)
Τα ασύρματα δίκτυα έχουν αρχίσει να κατακλύζουν την παγκόσμια αγορά υψηλής
τεχνολογίας. Αυτό μπορεί να αποδοθεί στα πολλά πλεονεκτήματα που προσφέρουν καθώς και στο ότι πλέον τα περισσότερα προβλήματα που είχαν στο παρελθόν έχουν αντιμετωπιστεί σε πολύ
μεγάλο βαθμό. Ακόμα προσφέρουν ιδιαίτερη ευκολία στην ανάπτυξη λύσεων σε ειδικά προβλήματα. Ωστόσο, όλα τα ασύρματα δίκτυα υιοθετούν κάποια μέθοδο ασφάλειας, η οποία έχει κάποιον αντίκτυπο στις επιδόσεις του δικτύου. Σκοπός της παρούσης εργασίας είναι να μελετηθεί η
επιβάρυνση που επέρχεται σε ένα ασύρματο δίκτυο με τη χρήση διαφόρων επιπέδων ασφάλειας. Η μέθοδος και το μέγεθος της ασφάλειας αυτής πρέπει να είναι ισορροπημένη, προκειμένου όπως θα αναλυθεί και στη συνέχεια, και να διασφαλιστεί και η καλή συμπεριφορά του δικτύου αλλά και η ακεραιότητα των προσωπικών δεδομένων. Τα προβλήματα που εμπλέκονται είναι αυτή της δρομολόγησης με χρήση κόμβων
περιορισμένης μνήμης και υπολογιστικής ισχύος. Δηλαδή, συσκευές οι οποίες δεν έχουν πλεονασμό υπολογιστικής ισχύος αλλά ούτε και μνήμης, καλούνται να κρυπτογραφήσουν, να
αποκρυπτογραφήσουν ή να αναμεταδώσουν πακέτα προς τον προορισμό τους. Η μεθοδολογία
αντιμετώπισης του προβλήματος που ακλουθείται είναι αυτή των εξομοιώσεων. Ο λόγος για αυτήν
την επιλογή είναι ότι μας προσφέρει τη δυνατότητα να μελετήσουμε πληθώρα περιπτώσεων και στη συνέχεια με χρήση αναλυτικών μεθόδων μας δίνεται η δυνατότητα να αναλύσουμε τα αποτελέσματα που προκύπτουν. / -
|
Page generated in 0.0822 seconds