Xuerong Gou's research while affiliated with Beijing University of Posts and Telecommunications and other places

Publications (21)

Conference Paper
An improved probability positioning algorithm is proposed to enhance the accuracy of location estimation for outdoors under cellular network. The traditional probability algorithm models the received signal strength (RSS) by the standard Gaussian model from a base station. However, the propagation of the radio signal is based on a log-loss propagat...
Conference Paper
TD-LTE technology put up some new challenge to network optimization and configuration. In this paper, we grouped the parameters and KPIs(Key Performance Index) into 9 kind of dimensions according to scenarios in TD-LTE, they are basic information of RAN, basic physical/logical resources allocated to network elements, time interval/event scenarios,...
Conference Paper
This paper introduces a mobile real-time video system which is different from other existing real-time video system that is mainly based on wired computers. The system proposed in paper is basically designed to enable users under wireless circumstances to publish what they are capturing with their mobile devices and also watch what others are captu...
Conference Paper
Location estimation has become one of the most popular research areas for the wide application of Location Based Services (LBS). K nearest neighbors (KNN) algorithm is commonly used in fingerprinting approach, and it has been widely used for decades due to its simplicity and effectiveness. However, the main drawback of KNN algorithm is obvious. The...
Article
Today telecom network are growing complex. Although the amount of network performance data increased dramatically, telecom network operators require better performance on network performance data collection and analysis. Database is the important component in modern network management model. Since main memory database (MMDB) store data in main phys...
Chapter
Most current methods of GSM frequency planning evaluate interference and assign frequencies based on the measurement reports. The same or adjacent frequencies are assigned to cells close to each other which cause co-channel and adjacent channel interference, and reduce the network performance. The traditional method to check and allocate the new fr...
Article
Most current Global System for Mobile Communications (GSM) frequency planning methods evaluate the interference and assign frequencies based on measurement reports. Assigning the same or adjacent frequencies to cells close to each other will introduce co-channel and adjacent channel interference which will reduce network performance. Traditionally,...
Article
In mobile network, a deviation of cell coverage area influences many network performance indexes. Cell coverage analyses are vital to network optimization. The traditional check method is DT (Drive Test) or FSP (Field Strength Prediction) by manpower which costs much time and resources. This paper presents an intelligent multiple factors analysis m...
Conference Paper
Using traditional file system to manage the massive resources in network teaching system there is availability, scalability, reliability of data transmission and file read and write performance and other issues. According to the research of several distributed file system (MFS, GFS, etc.) which is currently used by a relatively high frequency, in c...
Conference Paper
Data service traffic model is playing more and more important role in many fields of 3G (Third Generation) mobile networks such as traffic forecasting, resource allocation, network optimization and so on. QQ as one of the most popular Internet service in China also developed very rapidly in mobile networks. By analyzing the communication mechanism...
Conference Paper
With computer and network technology developing, the educational resources on the Internet are also growing exponentially. To locate useful resources from the mass and diverse information is crucial. When using general search engine to search information in a specific field, the results usually cover all fields which can't provide accurate retrieva...
Article
Social Network Service (SNS) is an emerging Internet communication model. It has unique advantages in communication and interaction. This article analyzes the existing communication models in network education platform and discusses how to use SNS communication model. It presents a design of roles and activities of SNS communication model in networ...
Conference Paper
With the development of education informatization, educational resources on the network increasingly rich, for an effective retrieval of educational resources, to retrieve more targeted results, by studying the Chinese word segmentation module based on lucene and the existing Chinese word segmentation algorithm for educational resources features, p...
Conference Paper
With the data services have grown rapidly recent years, it has obtained any achievements for the research of data service QoS (Quality of Service) .But there is less research for the quality of user experience (QoE). In this paper, we emphasize on why quality of experience (QoE) in data service is so important and adopt UMTS classes which divide da...
Conference Paper
In the CDMA cellular mobile communication system, the order of neighbor cell list (NCL) determines whether the mobile station can make a success handoff to the best neighbor in time. Therefore, the success rate of handoff depends on the suitability of the NCL's management, which directly affects network performance. Traditional NCL algorithm used t...
Article
Cognitive radio (CR) has been widely recognized as a promising paradigm to achieve efficient use of the spectrum resource. While a lot of attention has been paid to the hierarchical access model of CR, the spectrum leasing model in which PUs can actively lease their spectrum to SUs for certain reward has not been studied thoroughly. In this paper,...
Article
Under the background of large-scale addition of new base stations in CDMA networks, co-PN-offset interferences and adjacent PN-offset interferences are much prone to happen. In this paper, the great significance of PN offset optimization are discussed, three existing methods are described, and a new automatically implemented strategy of PN offset o...
Conference Paper
Lifelong education is a tendency with the fast progress of society and technologies, and traditional educational forms including correspondence have some limits to meet the new requirements arisen from the tendency. P2P is one of contents distributed ways, in which all the hosts are treated equally and can access and make use of each other's resour...
Conference Paper
During the process of mobile network planning and optimization, capacity predication is one of the important contents. Accurate capacity results will not only improve the running quality of the network, but also will improve the satisfaction of the users. Traditionally, Erlang B formula was used to forecast the capacity of network. The forecasted r...
Conference Paper
With the development of P2P, there are some new applications such as P2PSIP and intercommunication of heterogeneous DHTs (Distributed Hash Table). In the scenario of P2PSIP, there needs some nodes acting as all kinds of proxies of SIP; and as to intercommunication of heterogeneous DHT, there need some nodes to be the gateway roles to complete the i...
Conference Paper
With the rapid development of P2P, there are some new applications such as P2PSIP and intercommunication of heterogeneous DHTs (Distributed Hash Table). In those scenarios, there need some nodes acting as proxies and gateways. Such nodes as proxies or gateways in P2P overlays were called Supernodes. The problem of which nodes would be the supernode...

Citations

... It efficiently integrated relevant digital resources based on subjects and formed a set of resources covering various materials, which greatly improved the utilization rate of dance learning resources and realized "3D" dance teaching. Considering the problems in use of the traditional file system to manage the massive resources in e-teaching systems, such as the availability, scalability of the file system, reliability of data transmission and file read and write performance, Chen et al. [25] studied several distributed file systems that are frequently applied at present, and proposed a new storage architecture model based on distributed file system by taking into account the characteristics of teaching resources, which proved able to improve the performance and reliability of e-teaching systems. In view of the current distributed resource search in the education field, Jin et al. [26] proposed the concept of personalized search based on consumers' interests and designed a model for personalized interest analysis and personalized resource search. ...
... They introduced how SEO work and what are the impacts of keywords in web search. Samedin Krrabaj et al [9] have studied the On-page and Off-page optimization SEO factors for page ranking. The algorithms are discussed for the page ranking. ...
... Lee et al. in [9] used variance method to estimate Hurst parameter. Different with Lee, Lu et al. in [11] provides three methods for predicting the value of Hurst parameter; i.e variance method, R/S method, and Whittle method. ...
... The memory effect which a user can experience is discussed in [9], i.e. the same performance of a call can be percieved in a different way dependent on the performance history, i.e. whether the service was previously better or worse.Investigations for video streaming can be found e.g. in [3] and [4] where parametric packet-layer models are given which measure the existing traffic to determine the QoE. For data based applications such as web browsing, the model presented in [5] is based on the different waiting times that a user experiences when download a page whereas [7] is a packet-layer model. The memory effect mentioned above can also appear in case of web browsing [8]. ...
... Although several efforts have been made to improve the standard k-NN algorithm in terms of accuracy [4]- [6] and efficiency [7], [8], new improved versions of k-NN -including the weighted k-NN variant-have emerged with no disruptive alterations with respect to the original algorithm. ...
... In addition, it facilitates users and rescuers to understand the location and complex situation when the flame becomes dangerous. This research uses a real-time messaging protocol (RTMP) for streaming [16]. Macromedia originally developed RTMP for streaming audio, video, and data between a flash player and a server via the Internet. ...
... This method is made possible by the use of a driving test and walks test and other software. The objective of this is to measure the quality of service that reaches the users in any particular area in terms of signal strength compared to receiver sensitivity [4]. The interference can be defined as the effect of unwanted wireless signals as a result of one or several factors affecting the received signal, which results in signal strength attenuation [5]. ...
... Zhang et al. [33] propose two PU F(1) and one SU F(2) functionalities, namely, determination of PUs' and SUs' channel access time (F1.2), relay selection (F1.3), and SUs' packet transmission (F2.3) in order to enhance the network performance of PUs (A1.2) and to provide dedicated channel access to SUs (A2.1) in distributed (C1.2) SU networks. ...
... Unless there is some reward, such as marks for evaluation, students lack the desire to interact online [162]. Additionally, as Bowers-Campbell [163] quoted, a system of virtual gifts can be used as a rewarding method for recognizing students' efforts in participating online. ...
... The P. Effat and N. Yazdani et al. [33], have to revise the outdated ring algorithm that is already mentioned, in relations of requirement and authentication of more than a few distributed protocols or algorithm for leader, they are using the Temporal Ordering Specification Language (TOSL) and toolbox is Analysis of Distributed Processes (ADP). The extensive variations are required in the existing algorithm of leader such as: bully algorithm [34] and ring [33], [32] algorithms that are grounded on a tree structure and compare with the complexity of the message. ...