-
RAN Enablers for 5G Radio Resource Management
Authors:
D. M. Gutierrez-Estevez,
Ö. Bulakci,
M. Ericson,
A. Prasad,
E. Pateromichelakis,
J. Belschner,
P. Arnold,
G. Calochira
Abstract:
This paper presents the description of several key RAN enablers for the radio resource management (RRM) framework of the fifth generation (5G) radio access network (RAN), referred to as building blocks of the 5G RRM. In particular, the following key RAN enablers are discussed: i) interference management techniques for dense and dynamic deployments, focusing on cell-edge performance enhancement; ii…
▽ More
This paper presents the description of several key RAN enablers for the radio resource management (RRM) framework of the fifth generation (5G) radio access network (RAN), referred to as building blocks of the 5G RRM. In particular, the following key RAN enablers are discussed: i) interference management techniques for dense and dynamic deployments, focusing on cell-edge performance enhancement; ii) dynamic traffic steering mechanisms that aim to attain the optimum map** of 5G services to any available resources when and where needed by considering the peculiarities of different air interface variants (AIVs); iii) resource management strategies that deal with network slices; and iv) tight interworking between novel 5G AIVs and evolved legacy AIVs such as Long-term Evolution (LTE). Evaluation results for each of these key RAN enablers are also presented.
△ Less
Submitted 8 March, 2018;
originally announced March 2018.
-
Towards a More Complete Object-Orientation in Design Grammars
Authors:
Samuel Vogel,
Peter Arnold
Abstract:
The ongoing digital transformation in industry applies to all product life cycle's stages. The design decisions and dimensioning carried out in the early conceptual design stages determine a huge part of the product's life cycle costs (LCC). The automation of the conceptual design phase promises therefore huge gains in terms of LCC. Design grammars encode design processes in production systems mad…
▽ More
The ongoing digital transformation in industry applies to all product life cycle's stages. The design decisions and dimensioning carried out in the early conceptual design stages determine a huge part of the product's life cycle costs (LCC). The automation of the conceptual design phase promises therefore huge gains in terms of LCC. Design grammars encode design processes in production systems made up of rule sequences which automatically create an abstract central product model (central data model) from given requirements. Graph-based design languages use the Unified-Modeling-Language (UML) to define the product entities (classes) supporting object-oriented inheritance. Graphical rules instantiate the classes and iteratively assemble the central model. This paper proposes to extend the design languages by introducing methods (operations). This allows the use of object-oriented design patterns and interface mechanisms as object-oriented principles are then fully implemented. A graphical mechanism to model the method calls is presented which integrates seamlessly into the graph-based design language's graphical rule specification. The object oriented design grammar enables modularization and reusability of engineering knowledge. The integration of engineering domains is enhanced and multistakeholder collaboration with access control (information security) becomes feasible.
△ Less
Submitted 18 March, 2020; v1 submitted 19 December, 2017;
originally announced December 2017.
-
Semi-automatic identification of counterfeit offers in online shop** platforms
Authors:
Christian Wartner,
Patrick Arnold,
Erhard Rahm
Abstract:
Product counterfeiting is a serious problem causing the industry estimated losses of billions of dollars every year. With the increasing spread of e-commerce, the number of counterfeit products sold online increased substantially. We propose the adoption of a semi-automatic workflow to identify likely counterfeit offers in online platforms and to present these offers to a domain expert for manual…
▽ More
Product counterfeiting is a serious problem causing the industry estimated losses of billions of dollars every year. With the increasing spread of e-commerce, the number of counterfeit products sold online increased substantially. We propose the adoption of a semi-automatic workflow to identify likely counterfeit offers in online platforms and to present these offers to a domain expert for manual verification. The workflow includes steps to generate search queries for relevant product offers, to match and cluster similar product offers, and to assess the counterfeit suspiciousness based on different criteria. The goal is to support the periodic identification of many counterfeit offers with a limited amount of manual effort. We explain how the proposed approach can be realized. We also present a preliminary evaluation of its most important steps on a case study using the eBay platform.
△ Less
Submitted 2 April, 2015;
originally announced April 2015.