J4 ›› 2009, Vol. 44 ›› Issue (9): 32-34.

• Articles • Previous Articles     Next Articles

Research on the method of viral mobile communication cross entropy based on video service

 SHU Zhi-Jiang, HU An-Yin, HU Lin, LIAN Jian   

  1. 1. Department of Electrical Engineering and Information Technology of SUST, Jinan  250031, Shandong, China; 2. College of Information and Electrical Engineering of SUST, Qingdao 266510, Shandong, China
  • Received:2009-06-20 Online:2009-09-16 Published:2009-11-05

Abstract:

Aiming at the multimedia service in a broadband CDMA mobile communication system, the  method of the link capacity equation of a viral communication networkbased on cross entropy is proposed. This method transforms video service data into voice service data by defining the concept of viral mobile communication. The  construction of the link capacity equation of viral communication network   of  multimedia service, and  the concept of cross entropy are introduced. The impact of the probability that mobile users carrying on video service in microcell with viral mobile communication on network performance are simulated and analyzed. The simulation result shows that the possibility of mobile users carrying on video service in microcell with viral mobile commucation can reach to 40 percent.The analysis results supply a method when applying the concept of viral mobile communication to 3G and 4G CDMA mobile communication systems with multimedia service.

Key words: viral mobile communication; cross entropy; video service

CLC Number: 

  • TP393
[1] LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35.
[2] GUO Xiao-dong, JIAO Liang, QIU Yi-hong, GE Lian-sheng. Design and implementation of a multi-path inter-domain
routing simulator based on Click and NS2
[J]. J4, 2013, 48(11): 36-43.
[3] LIU Ai-Wen, LIU Fang-Ai. Research on a RP(k)based resource awareness model [J]. J4, 2009, 44(11): 57-62.
[4] ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor  network nodes localization method [J]. J4, 2009, 44(9): 52-55.
[5] LIU Ying-Hui, WANG Yang-Long, GUO Jiang, LI Dong-Yue. Channel sampling strategy of PTF with minimum time [J]. J4, 2009, 44(9): 56-59.
[6] DONG Yuan1, XU Ya-bin1,2*, LI Zhuo1,2, LI Yan-ping1. Research on spam identification based on social computing and machine learning [J]. J4, 2013, 48(7): 72-78.
[7] DU Xiao-jun, LIN Bo-gang, LIN Zhi-yuan, LI Ying. Research on multiple population genetic algorithm in security software fuzzy test [J]. J4, 2013, 48(7): 79-84.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!