Separability and Topology Control of Quasi Unit Disk Graphs

Size: px
Start display at page:

Download "Separability and Topology Control of Quasi Unit Disk Graphs"

Transcription

1 Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX {chen, ajiang, School of CTI, DePaul Univesity, 4 S. Wabash Avenue, Chicago, IL 664. ikanj@cs.depaul.edu. Depatment of Compute Science, Lafayette College, Easton, PA 184. gexia@cs.lafayette.edu. Abstact A deep undestanding of the stuctual popeties of wieless netwoks is citical fo evaluating the pefomance of netwok potocols and impoving thei designs. Many potocols fo wieless netwoks outing, topology contol, infomation stoage/etieval and numeous othe applications have been based on the idealized unit-disk gaph (UDG) netwok model. The significant deviation of the UDG model fom many eal wieless netwoks is substantially limiting the applicability of such potocols. A moe geneal netwok model, the quasi unitdisk gaph (quasi-udg) model, captues much bette the chaacteistics of wieless netwoks. Howeve, the undestanding on the popeties of geneal quasi-udgs has been vey limited, which is impeding the designs of key netwok potocols and algoithms. In this pape, we pesent esults on two impotant popeties of quasi-udgs: sepaability and the existence of powe efficient spannes. Netwok sepaability is a fundamental popety leading to efficient netwok algoithms and fast paallel computation. We pove that evey quasi-udg has a coesponding gid gaph with small balanced sepaatos that captues its connectivity popeties. We also study the constuction of wieless backbones though topology contol fo efficient communication and pesent a distibuted localized algoithm that builds a nealy plana backbone in any quasi-udg with low constant stetch facto and degee. We demonstate the excellent pefomance of these popeties though simulations and show, among many applications, thei application in efficient outing. I. INTRODUCTION The connectivity stuctues of wieless netwoks exhibit stong coelations with the physical envionment due to the signal tansmission model of wieless nodes. A deep undestanding of the stuctual popeties of wieless netwoks is citical fo evaluating the pefomance of netwok potocols and impoving thei designs. So fa, many potocols have been based on the idealized unit-disk gaph (UDG) netwok model, whee two wieless nodes can diectly communicate if and only if thei physical distance is within a fixed paamete R. Examples of these potocols include outing [], [9], topology contol [1], distibuted infomation stoage/etieval [4] and a geat vaiety of othe applications. In pactice, howeve, the UDG model significantly deviates fom many eal wieless netwoks, due to easons including multi-path fading [6], [1], antenna design issues, inaccuate node position estimation, etc. It is not uncommon to obseve stable links that ae five times longe than unstable shot links [1]. The significant deviation of the UDG model fom pactice is substantially limiting the applicability of potocols based on UDGs. To combat the poblem, a much moe geneal netwok model, the quasi unit-disk gaph (quasi-udg) model, has been poposed in ecent yeas to captue the non-unifomity chaacteistic of most wieless netwoks. Fomally, it is defined as follows. Definition 1: A quasi-udg model is chaacteized by two positive paametes R and (R ). Fo any two nodes u, v in a quasi-udg netwok deployed in a plane, let d(u, v) denote thei Euclidean distance. Then, if d(u, v), an edge (link) exists between u and v; if d(u, v) > R, the edge does not exist; if < d(u, v) R, the edge may o may not exist. The undestanding on the popeties of geneal quasi-udgs, howeve, has been vey limited. That is in shap contast to UDG, whose popeties have been well undestood [1], [9]. Among the limited knowledge about quasi-udg, a notable esult is the link-cossing popety discoveed fo quasi- UDGs whee R []. The seious lack of undestanding on the popeties of geneal quasi-udgs is impeding the designs of key netwok potocols and algoithms. In this pape, we pesent esults on two impotant popeties of quasi-udgs: sepaability and the existence of powe efficient spannes. Netwok sepaability is a fundamental popety leading to efficient netwok algoithms and fast paallel computation [11]. A (vetex) sepaato of a gaph G is a set of vetices whose emoval splits the gaph into two non-adjacent pats of simila sizes. We call a gaph G well sepaable if any subgaph of G has elatively small sepaatos. A well sepaable gaph has stong locality popeties. As a esult, the pefomance of potocols fo outing, infomation etieval, netwok monitoing, etc., can be significantly impoved fo such gaphs. We fist constuct a gid gaph that is an abstaction of the given quasi-udg G and show that the gid gaph is well sepaable. The sepaato we obtain is of size O( N) and can split the gaph into two pats of size oughly N, whee N is the numbe of nodes of the gid gaph. In addition, both the degees of the gid nodes and the numbe of edges cossing any edge ae uppe bounded by constants. Among many applications of the sepaatos, we pesent, as an example, a compact outing potocol based on the gid gaph constuction and distance labelling. We pove that the outing table size of each node in ou potocol is bounded by O( N log N), which is much bette than the tight bound poved fo geneal gaphs and close to the lowe bound of Ω( N) fo degee bounded gaphs in [7]. The atio of the outing path length to the shotest path length is uppe bounded by + ǫ whee ǫ is a small constant. Moe extensions of the

2 esults ae also included. In the second pat of the pape we study the existence and the constuction of enegy efficient backbones fo quasi-udgs. A backbone is a spanning subgaph of the wieless netwok fo efficient communication, obtained though puning a set of edges. By using only those edges in the backbone fo communication, signal intefeence, outing table size and powe usage can be substantially educed. A majo equiement fo backbone constuction is to peseve the shotest path distances between vetices as much as possible. Fo a backbone B of a gaph G = (V, E), the stetch facto is defined as s(b) = max{ fb(u,v) f u, v V }, whee f G(u,v) B(u, v) and f G (u, v) ae the distances between vetices u, v in B and G, espectively. The stetch facto eflects the quality of the backbone. Thee have been esults showing that fo UDGs, bounded degee and plana spannes can be constucted when the distance function f(u, v) is defined as the minimum powe needed to send a message fom u to v [8][14]. In this pape, we pesent a distibuted algoithm that constucts a backbone B fo any quasi-udg G with a constant powe stetch facto. The node degees of the backbone B ae uppe bounded by a constant. In addition, although it is in geneal impossible to constuct plana backbones with constant stetch factos fo quasi-udg, we show that B is nealy plana, specifically, B has a constant uppe bound on the aveage numbe of edges cossing an edge. The latte popety is useful fo geogaphic outing algoithms based on coss link detection [1]. We evaluate the pefomance of the sepaatos, the outing potocol and the backbone constuction though extensive simulations. Thei pefomance is much bette compaed to the theoetical analysis of the wost cases. This shows that although the quasi-udg model is quite diffeent fom the UDG model, efficient algoithms can still be developed by exploiting the locality in the model. The est of the pape is oganized as follows. In section II, we pesent the gid gaph constuction and pove its sepaability esult. In section III, we pesent the backbone constuction though topology contol. In Section IV, we pesent the compact outing potocol based on the gid gaph and distance labelling, as well as the simulation esults. We conclude the pape in section V. II. GRID GRAPH OF QUASI-UDGS In this section, we pesent a distibuted algoithm fo constucting a gid gaph fo any quasi-udg, and pove that the gid gaph is well sepaable. The gid gaph, whose node density and edge density ae both uppe bounded by constants, is an abstaction of the quasi-udg. A quasi-udg may have highly vaiable node and edge densities, which pevent it fom having small sepaatos. The gid gaph is a spasified vesion of the quasi-udg, which etains the distance infomation fo vetices and well epesents the deployment egion of the quasi-udg. As a esult, the connectivity-elated esults fo the gid gaph can be easily mapped to esults fo the quasi-udg. An example of a quasi-udg and its coesponding gid gaph is shown in Fig. 1(a), (b). In the following, we pesent details on the gid gaph. (a) (c) Fig. 1. Gid Gaph Example. (a) A quasi-udg G with 1 vetices and R/ =.5; (b) The gid gaph coesponding to G; (c) The auxiliay gaph used to find the top level sepaato of G; (d) The backbone of G. A. Constuction of the gid gaph H To obtain a gid gaph H fo a quasi-udg G, we impose a gid on the plane and view each non-empty cell as a vetex. The constuction is shown in Fig.. Algoithm GidGaph INPUT: G = (V G, E G ): a quasi-udg with paametes R and OUTPUT: H = (V H, E H ): the gid gaph fo G 1. Impose a gid of cell size on the plane;. Fo each cell that has at least one vetex of G, H has a coesponding vetex, whose position is set at the cente of the cell;. Thee is an edge between two vetices of H if and only if thee is at least one edge connecting two vetices of G that ae, espectively, in the two coesponding cells. Fig.. (b) (d) Constucting gid gaph fo quasi-udg All the vetices of G in the same gid cell ae adjacent. The algoithm GidGaph can be easily implemented in a distibuted manne. The following theoem poves the constant uppe bounds fo the node density, edge density and the numbe of edges cossing any edge in the gid gaph H. Theoem 1: The algoithm GidGaph constucts a gid gaph H fo given quasi-udg G such that: (1) inside any disk of adius y, thee ae at most O( y ) vetices; () the degee of each vetex is uppe bounded by O( R );() the numbe of edges cossing any edge is uppe bounded by O( R4 ). 4 Poof: By the algoithm, the Euclidean distance between any two vetices of H is at least. Hence if we place an

3 open disk of adius centeed at evey vetex, no two disks will intesect. Theefoe given any disk of adius y, the numbe of such open disks intesecting it is uppe bounded by O( y ). So is the numbe of vetices of H inside the disk. Conside a vetex U of H, denote by v(u) the set of nodes of G inside the cell epesented by U. The numbe of vetices of H within distance R + to U is bounded by O( R ). No node of G in v(u) can be adjacent to w v(v ) whee V is moe than distance R + fom U. Hence the degee of U is uppe bounded by O( R ). Similaly, fo an edge {U, V } of H, the numbe of gid vetices within distance R + to any point in the line segment connecting U and V is also uppe bounded by O( R ). Theefoe, the total numbe of edges cossing {U, V } is uppe bounded by O( R4 4 ). If two vetices of H ae h hops away fom each othe, then two vetices of G in the two coesponding cells ae at most h + 1 hops away fom each othe. Note that the above method fo constucting gid gaphs, and the above esults, can be easily extended to thee and highe dimensional spaces. B. Sepaability of the gid gaph H Netwok sepaability is a fundamental popety that leads to efficient netwok algoithms (in paticula, those algoithms based on the divide and conque paadigms), fast paallel computation, and impovements in the study of computational complexity [11]. Many applications in wieless ad hoc netwoks (outing, infomation etieval, etc.), as well as quite a numbe of had theoetical poblems, have moe efficient solutions if the undelying gaph is well sepaable. Fo example, shotest path outing can be ealized with small outing tables when the gaph has small sepaatos, as in the case of plana gaphs o gaphs with bounded tee width [7]. Also, NP had poblems such as vetex cove and independent set ae solvable in polynomial time if the input gaph and all its subgaphs have bounded sepaatos. In this subsection, we study the sepaability of the gid gaph obtained above. We begin with a fomal definition of the sepaability of gaphs. Definition : Given a gaph G of n vetices, a b-sepaato of G is a set of vetices whose emoval splits G into two nonadjacent subgaphs, each of which contains at most bn vetices. We call a gaph G (f(n ), b)-sepaable if evey subgaph of G has a b-sepaato of at most O(f(n )) vetices, whee f(n ) is a function of the numbe of vetices n in that subgaph. In ode to compute a small sepaato fo the gid gaph H, we use the help of a plana auxiliay gaph T. Fist, we impose a lage gid on the plane and map the gid gaph H to an auxiliay gaph that is nealy plana. Then, we planaize it by adding a vitual vetex at the middle of each diagonal edge, eliminating all edge cossings. (Note that we see all the edges as being staight.) The detailed constuction of the auxiliay gaph T is pesented in Fig.. All the vitual vetices in T ae denoted by ed vetices and the othes which epesent cells ae denoted by black vetices. Each ed vetex has weight zeo, while each black vetex has a weight that equals the numbe of vetices of H in the coesponding cell. Algoithm AuxiliayGaph INPUT: H = (V H, E H ): a gid gaph with paametes R and OUTPUT: T = (V T, E T ): the auxiliay gaph fo H 1. Impose a gid of cell-size (R + ) (R + ) on the plane;. Fo each cell that has at least one vetex of H, T has a coesponding black vetex v, whose position is set at the cente of the cell; we assign to v a weight that equals the numbe of vetices of H in that cell;. Add an edge between two black vetices u, v of T if and only if thee is at least one edge connecting two vetices of H that ae, espectively, in the two coesponding cells; 4. Fo each pai of cossing edges {u, v}, {w, x}, add a ed vetex at the intesection of the two edges and eplace those two oiginal edges with fou new edges that connect the ed vetex, espectively, to the fou black vetices u, v, w and x; let the weight of the ed vetex to be ; 5. Fo each diagonal edge between two black vetices, we add a ed vetex of weight at the middle of the edge and eplace that oiginal diagonal edge with two new edges that connect the ed vetex, espectively, to those two black vetices. Fig.. AuxiliayGaph(H) Fig. 1(c) shows an example of the auxiliay gaph. The longest edge in the auxiliay gaph has length R +, and ed vetices ae eithe of degee o 4. Since the cell we apply in this algoithm is lage enough (of side length R + ) and all black vetices ae placed at the centes of thei coesponding cells, any black vetex may only connect to the eight black vetices aound it befoe the ed vetices wee added. Theefoe, aound each black vetex, thee can be at most fou ed vetices; and no two ed vetices ae adjacent to each othe. Fomally, we have the following lemma. Lemma 1: Let N T,b be the numbe of black vetices in the auxiliay gaph T. Then T is a plana gaph of at most N T,b vetices, and no two ed vetices ae adjacent. Lipton and Tajan poved in thei celebated Sepaation Theoem [11] that fo any vetex-weighted plana gaph of n vetices, thee exists a set of O( n) vetices that sepaates the gaph into two non-adjacent subgaphs, each of which weighs at most of the total weight of the gaph. The sepaato algoithm pesented in [11], howeve, is elatively complex. Fo the plana auxiliay gaph T, which has a constained stuctue, we pesent a simple and pactically moe efficient algoithm fo finding such a small sepaato. Based on that, the algoithm also finds a small sepaato fo the gid gaph H. The details of the algoithm ae pesented in Fig. 4. We now pove that the algoithm Sepaato constucts small balanced sepaatos fo H and T. We stat with a lemma. Lemma : Let ˆT be any subgaph of the auxiliay gaph T. If its oute face has k vetices, then the numbe of inne vetices (the vetices not on the oute face) is at most k π. Poof: The oute face of the plana gaph T is a closed cuve (o closed cuves, if ˆT is disconnected) on the plane. Let x = R + / be the side length of the cells in the constuction of the auxiliay gaph T. Fo each inne vetex of ˆT, we place a x x squae centeed at it, then otate

4 Algoithm Sepaato INPUT: H: a gid gaph with paametes R and OUTPUT: S H : a sepaato fo H. S T : a sepaato fo T. (T is the auxiliay gaph of H.) 1. Let T be the auxiliay gaph of H. Let T be a copy of T.. Build a beadth-fist seach (BFS) tee fo a dynamically changing gaph T (T changes because new edges ae added to it duing the BFS pocedue) in the following way: (1) pick a vetex v on the oute face of T to be the oot and stat the BFS; () duing the BFS pocess, when a vetex u is dicoveed (put into the BFS tee), fo evey face containing u, add edges fom u to as many othe vetices in the face as possible so long as T emains a simple plana gaph; if afte adding those edges, thee ae still faces containing u that ae not tiangulated, add edges to tiangulate them abitaily. Duing the BFS, a vetex s undiscoveed neighbos ae visited in the clockwise ode (stating with the vetex s paent in the BFS tee as the efeence point);. Check evey fundamental cycle (a cycle fomed by a non-tee edge and some tee edges) in the BFS tee. Let S T be a fundamental cycle that sepaates T (theefoe also T ) in the most balanced way, i.e. the diffeence between the summation of the weights of vetices in the two sepaated subgaphs A 1, B 1 is minimized. 4. Conside the gaph T. Let S T be a copy of S T. Fo each ed vetex u in S T with the set of neighboing vetices N(u), we distinguish two cases: Case (1) All vetices in N(u) belong to A 1 (espectively, B 1 ) except those in S T. Then, we move u fom S T to A 1(espectively, B 1 ); Case () Both A 1 and B 1 contain vetices of N(u). Then, we put all vetices in N(u) into S T and move u fom S T to A Let S H be the set of vetices of H in those cells coesponding to the black vetices of T in S T. Let A, B be the two sets of vetices of H in those cells coesponding to the black vetices of T in A 1 and B 1. Clealy, S H sepaates H into A and B. Fig. 4. Sepaato the squae by 45 degees. It is simple to see that now these (diamond shaped) squaes centeed at the inne vetices do not ovelap each othe. The aea of each squae is x. Fist conside the case when the oute face is connected, i.e. ˆT is connected. The oute face of ˆT consists of seveal (at least one) simple cycles. Suppose thee ae i such simple cycles of size k 1, k,..., k i in the oute face. i j=1 k j can be geate than k, the numbe of vetices in the oute face, because in the summation a vetex can be counted moe than once. The simple cycles fom the oute face of a plana gaph, so the numbe of times vetices ae ove-counted is exactly i 1. Thus i j=1 k j = k + i 1. [( i Fist we have k = j=1 k j ( i ) i j=1 k j l j k l i j=1 (i 1)k j+(i 1) i [ ( i i )] j=1 k j l j k l (i 1) ) ] i i + 1 = j=1 k j + j=1 k j + i j=1 k j. The last inequality holds because k j and l j k l contains exactly i 1 tems. The equality holds when i = 1. Each simple cycle of k j vetices has k j edges, thus the peimete of the cycle is at most k j x. Theefoe the aea of the egion inside the cycle k j is at most k j x 4π and the total aea of the egions inside the oute face is bounded by i j=1 k j x 4π k x 4π. Now if thee ae seveal disconnected cycles in the oute face, each connected pat say, of k vetices suounds a egion of aea no moe than k x 4π, since k ( k ) = k, the total aea of the egions suounded by the oute face is also bounded by k x 4π of inne vetices is bounded by k x 4π Thus, in all cases, the total numbe x / = k π. Define the depth of a tee to be the maximum numbe of edges in a path fom the oot to a leaf. We have: Lemma : Let N T be the numbe of vetices in the auxiliay gaph T. The BFS tee constucted in Step of the algoithm Sepaato is of depth at most N T. Poof: Let d be the depth of the BFS tee. Because of the tiangulation opeation enfoced on the gaph T duing the BFS pocess, fo i = 1,,, d 1, the vetices at level i (if i = 1, include the oot as well) of the BFS tee actually contain all the vetices on the oute face of the subgaph induced by the vetices at levels i, i + 1,, d. So it suffices to show that if we peel off one oute face fom T at each step, T becomes an empty gaph afte t N T steps. Let n x be the numbe of vetices emaining in the gaph T afte x steps. (By convention, define n = N T.) By Lemma, we know that in the x-th step we have peeled off at least πn x vetices. So n t 1 1, n i n i+1 + πn i+1 fo i = t, t,,. Now let us pove that n t j j by induction: when j = 1, we have n t 1 1 and when j =, we have n t 4; suppose ou claim is tue fo j i; conside the case j = i + 1, whee n t (i+1) n t i + πn t i i + π i i + i + 1 = (i + 1). We have N T = n = n t t t. So t N T. By Lemma in [11], if a vetex-weighted plana gaph has a spanning tee of depth h, then thee exists a fundamental cycle of size at most h + 1 that sepaates the gaph into two non-adjacent subgaphs each of which weighs no moe than / of the total weight of the gaph. As the BFS tee obtained in Step of Algoithm Sepaato is of depth at most N T, we have the following theoem immediately. Theoem : Let N T be the numbe of vetices in the auxiliay gaph T, and let N H be the numbe of vetices in H. Then, the total weight of the vetices of T is N H, and the set S T obtained in Algoithm Sepaato contains at most N T + 1 vetices and sepaates T into two non-adjacent subgaphs each of which weighs no moe than NH. We now pove that the algoithm Sepaato also finds a small balanced sepaato fo the gid gaph H. Theoem : Let N H be the numbe of vetices in the gid gaph H. Then, the algoithm Sepaato constucts a sepaato S H of size O( N H ) that sepaates H into two non-adjacent subgaphs each of which has no moe than NH vetices. Moeove, the gid gaph H is ( n, )-sepaable when the weights of all the vetices of H ae set to be 1. Poof: Let N be the numbe of black nodes in T. Clealy N N H ; and it is staightfowad that each cell coesponding to a black vetex of T contains at most (R+ /) vetices of H. Hence we have N = Θ(N H ). Fom lemma 1 we know that the numbe of ed vetices is no moe than N, and the total weight of vetices in T is N H. Hence the sepaato S T fo T contains no moe than N +1 vetices

5 whose weights sum up to O( N H ), and sepaates T into two pats each of which weighs no moe than NH. Now we show that afte Step 4 of Algoithm Sepaato, S T is still a sepaato fo T of size O( N ), and A 1 and B 1 ae still of weight no moe than NH. Conside any ed vetex u S T in Step 4, in the case whee all of u s neighbos ae eithe in S T o A 1 (espectively, B 1 ), S T \{u} can sepaate T into A 1 {u} and B 1 (espectively, A 1 and B 1 {u}). Note that u has weight, so moving u fom S T to A 1 (o, B 1 ) does not change thei weights. In the complimentay case, the algoithm moves all u s neighbos into S T and moves u into A 1 ; clealy S T still sepaates A 1 and B 1. And by doing that, we decease the weights of both A 1 and B 1. The size of S T inceases by at most fo each ed vetex. Hence afte Step 4, we have eplaced all ed vetices in S T by black ones, inceasing the size of S T by at most thee times, not inceasing the weights of A 1 and B 1. Most impotantly, S T still sepaates A 1 and B 1. Theefoe S T is still of size O( N ) = O( N H ), and the weights of A 1 and B 1 ae no moe than NH. Each cell coesponding to a black vetex of T contains a bounded numbe of vetices of H, so S H is of size O( N H ). Also, the numbe of vetices in A (esp., B ) equals the weight of A 1 (esp., B 1 ) (at most NH ). By the constuction of the auxiliay gaph T, if no two black vetices ae joined by an edge o two edges with a ed vetex in the middle, thee is no edge connecting vetices of H in those two coesponding cells. A 1 and B 1 ae not adjacent in T, and S T has no ed vetex. So A and B obtained in Step 5 ae not adjacent in H, and S H sepaates A and B in H. It is simple to see that any subgaph of H can be used as the input of Algoithm Sepaato, and the above aguments still hold. Hence H is ( n, )-sepaable. Fo some applications, a pefectly balanced sepaato is desiable. By using the same technique descibed in [11], we can constuct a sepaato of size O( N H ) that sepaates H into two pats each of which has no moe than NH vetices. The idea is to sepaate the lage pat of the outcome of the algoithm ecusively. Hence we have Coollay 1: Let N H be the numbe of vetices in the gid gaph H. H is ( n,.5)-sepaable. Fo the gid gaph, we can develop a shotest path outing scheme based on its sepaatos, using the idea of distance labelling [7]. We can then tansfom it into a compact outing scheme fo the undelying quasi-udg G with a small stetch facto. The following theoem summaizes the esult. We leave the details of the outing algoithm, the poof of Theoem 4 and the extended esults to section IV. Theoem 4: Fo any quasi-udg G of N G vetices, let h(u, v) be the minimum hop distance between vetices u, v. Thee is a outing potocol that guaantees the outing path fom u to v to have at most h(u, v) + 1 hops, fo any two vetices u and v. The size of the outing table at each node and the message ovehead ae both O( N G log N G ). III. BACKBONE WITH CONSTANT STRETCH FACTOR We denote by backbone of a given gaph a subgaph that contains the same set of vetices but fewe edges. One example of backbones ae spanning tees. Backbones, paticulaly those with small stetch factos and degees, have vey impotant applications in wieless communication because they can help educe signal intefeences and simplify algoithms. In this section, we pesent a distibuted constuction of a backbone with constant stetch facto, constant node degee and a small numbe of edge cosses fo quasi-udgs. It is also an extension of the gid method descibed in Section II. We will show in Section IV that these backbones can also help educe the outing table size in ou outing scheme. A. Algoithm constucting the backbone Enegy is a majo limitation in wieless netwoks. Accodingly, the stetch facto of backbones is often defined based on enegy consumption. We stat with its fomal definition. Definition : Let u = u 1 u u k = v be a path fom u to v in the gaph G. Denote by ab G the Euclidian distance between any two vetices a and b. The communication cost between u, v following the given path is defined as: c G (u, v) = k 1 i=1 α u iu i+1 β G, whee β is the path loss exponent, β 5, and α is a scaling facto linea in the numbe of sent bits. If thee is no path fom u to v, c G (u, v) is defined as +. Definition 4: Given a gaph G = (V, E) and a backbone B of G, the stetch facto of B is defined as: { } cb,min (u, v) max, u,v V c G,min (u, v) whee c B,min (u, v) and c G,min (u, v) denote the minimum communication cost (ove all the paths) between u, v in gaph B and G, espectively. The stetch facto defined above is also called the powe stetch facto. We say that a backbone is enegy efficient if its powe stetch facto is bounded by a constant. We next pesent a distibuted localized algoithm that, when given a quasi-udg G, constucts a backbone whee the maximum degee of a node is bounded by O( R ), the aveage numbe of cossings of an edge is bounded by O( R4 ) and the 4 powe stetch facto is bounded by +ǫ, whee ǫ is a constant that can be made abitaily small. To un the algoithm, we classify the edges in the quasi-udg G into two types: shot edges whose lengths ae no geate than ; and long edges whose lengths ae stictly lage than. In ou algoithm, we fist educe the numbe of shot edges in the gaph by applying an opeation simila to Gabiel Planaization [5] to make the subgaph induced by all shot edges of G a plana gaph. In the second step, we apply an opeation descibed in [8] to bound the numbe of shot edges incident to any node. Finally, we apply a gid opeation to educe the numbe of long edges in the gaph. Figue 5 contains the details fo ou algoithm.

6 Algoithm QuasiUDG-Backbone INPUT: G: a quasi-udg with paametes R and OUTPUT: B: a backbone of G 1. Planaize the subgaph induced by shot edges of G The subgaph B will contain the same vetex set as G. Initially, the edge set of B is set to empty. Fo each edge e{u, v} in G, if thee is no common neighbo of u and v in G esiding in the disk whose diamete is the edge e{u, v}, we add e{u, v} into B. Simila to the Algoithm 1 descibed in [14], this pocess can be done in a distibuted manne by exchanging no moe than O(m) messages whee m is the numbe of edges in G.. Reduce the numbe of shot edges incident to each vetex Let G be the subgaph of B that includes all the vetices and shot edges of B. Note that hee G is in fact the Gabiel gaph constucted fom a UDG (with communication ange ); so G is plana. We apply the algoithm descibed in [8] on G. Hee is a bief desciption of the algoithm that is pefomed by each vetex: Diect the edges in G (using the classical acyclic oientation of a plana gaph) so that evey vetex in G has at most 5 incoming edges; Pefom a standad Yao step [8] on the set of outgoing edges; Select cetain edges that fom lage angles with consecutive edges (see [8] fo details); Finally, communicate with all the neighbos of the vetex and keep edges that have been selected by least one of thei ends. When the above algoithm ends, we emove fom B those edges that have been emoved by the algoithm fom G. This step will educe the numbe of shot edges incident to evey vetex to a constant k + 5, whee k is a selectable paamete, and it can be done locally. Compaed to the subgaph of G that contains all the shot edges of G, B inceases the minimum communication cost between any two vetices by a facto of at most 1+( sin(π/k)) β, whee k is a paamete, and β is the path loss exponent.. Reduce the numbe of long edges incident to each vetex Add all the long edges of G to B. We impose a gid of cell-size on the plane. Clealy, any long edge must be connecting vetices in two diffeent cells. Fo each pai of cells, we emove fom B all the long edges between them except fo the shotest one. Fig. 5. Constuct a backbone fo a given quasi-udg Theoem 5: The algoithm QuasiUDG-Backbone constucts a backbone of the given quasi-udg G such that its maximum degee is O( R ), the aveage numbe of edges cossing an edge is O( R4 ), and the powe stetch facto is 4 +ǫ (whee ǫ is a constant that can be made abitaily small). Poof: Let G be the subgaph of G that includes all the vetices and shot edges of G. It is easy to see that G is a UDG. Theefoe afte Step 1 and Step of the algoithm, we have emoved the cossings between shotest edges, and educed the numbe of shot edges incident to any vetex to no moe than k + 5, whee k > 8 is the paamete to the algoithm [8]. Note that in Step, we keep at most one edge between any two cells, and the numbe of cells eachable fom any vetex is bounded by O( R ). The total numbe of long edges incident to any vetex is then bounded by the same constant. Thus in the final backbone, the degee of a node is bounded by O( R ). On the othe hand, any edge cossing in the final backbone has to involve a long edge since the subgaph induced by shot edges is plana. Fo an abitay edge e, we will bound the numbe of long edges that can coss it. Any long edge that cosses e must connect one cell at one side of e to anothe cell on the othe side. We can veify that the numbe of cells on one side of e that can connect to a cell on the othe side is ω = O( R ). Theefoe, the numbe of long edges that can coss e is at most ω = O( R4 ). Suppose that the total numbe 4 of edges in the final backbone is m. Then the total numbe of edge cossings is bounded by O( R4 )m. Theefoe the aveage 4 numbe of edges cossing an edge is bounded by O( R4 ). 4 Afte Step 1 and, we have constucted a plana powe spanne fo G of stetch facto bounded by 1+ β sin β (π/k) [8]. In Step, by emoving all the edges between any two cells C 1 and C except the shotest among them, the stetch facto is inceased but still bounded by + β+1 sin β (π/k). To pove this bound, we only need to pove that fo any edge {x, y} of G that is emoved, thee is a path fom u to v in the final backbone such that the atio of the communication cost of the path and that of the edge {u, v} is at most + β+1 sin β (π/k). If the edge {u, v} is emoved in the Step 1, we know that the communication cost between u, v did not change (because β ). Othewise we distinguish two cases: Case 1, the edge {u, v} is emoved in step. In this case, [8] guaantees that by the end of step, thee is a path fom u to v consisting of edges of length at most and the stetch facto of the path is bounded by 1+ β sin β (π/k). Since step only emoves edges of length geate than, the above path fom u to v is peseved in the backbone and the stetch of the path is bounded by 1 + β sin β (π/k) < + β+1 sin β (π/k). Case, the edge {u, v} is emoved in Step. In this case, the length of {u, v} is geate than and thee is anothe edge {u, v } in the final backbone such that u and u belong to the same cell, v and v belong to the same cell, and d(u, v ) d(u, v). By an agument simila to that in case 1, thee must exit a path between u and u in the final backbone whose communication cost is at most (1 + β sin β (π/k))d(u, u ) β (1 + β sin β (π/k)) β < (1+ β sin β (π/k))d(u, v) β. Similaly, thee is a path between v and v in the final backbone whose communication cost is at most (1 + β sin β (π/k))d(u, v) β. Since d(u, v ) d(u, v), the stetch facto of the path (u, u, v, v) is at most (1 + β sin β (π/k)) + 1 = + β+1 sin β (π/k). Note that β+1 sin β (π/k) can be made abitaily small by choosing a sufficiently lage paamete k. This completes the poof. IV. APPLICATIONS AND PERFORMANCE EVALUATION In this section, we fist pesent out outing algoithm based on the sepaatos, then pove the bound fo the path stetch facto of ou outing potocol. As the second pat of the section, we show the simulation esults of the backbone constuctions and the outing pefomance of ou outing algoithms to veify the theoetical bounds we pove. A. A outing scheme based on the sepaatos As one of the applications of the small sepaatos of the gid gaphs, we pesent a outing scheme fo quasi-udg based on the gid gaph and analyze its pefomance. Ou outing scheme is suitable fo systems in which the size of the messages itself is elatively lage. We will give the simulation esults late in this section.

7 Ou outing scheme is based on the distance labelling scheme descibed in [7]. The basic idea of distance labelling is to give each vetex a label such that the distance between two vetices can be computed using only thei labels. A staightfowad labelling scheme is to stoe in each node a full table of the distances to all the othe vetices. The goal of the distance labelling scheme in [7] is to find the labels of minimum length. The sepaability of the undelying gaph is a key facto of how good a distance labelling scheme is available fo the netwok. In [7] the authos poved that fo a gaph which has a sepaato of size k, thee is a distance labelling scheme of label size O(k log n + log n), and the distance between two nodes can be computed in time O(log n), whee n is the numbe of nodes in the netwok. Although a quasi-udg G may not possess a small sepaato, we have poved that the gid gaph H with n vetices constucted fo G does have a balanced sepaato of size O( n). Conceptually, ou outing potocol utilizes two-level outing: vitually, the message is sent in the gid gaph fom the cell containing the souce to the cell containing the destination, via the shotest path in the gid gaph; in eality, the outing is implemented in the undelying quasi-udg to oute fom cell to cell. (Note that in each cell, the quasi-udg vetices ae fully connected, so outing fom one cell to the next takes at most two hops.) The basic idea to achieve shotest path outing in the gid gaph is to split H into two non-adjacent pats using the small sepaato. Each vetex of H emembes the distance to all sepaato vetices. Thus, two vetices in the two pats (o the sepaato) can compute thei shotest path distance using that infomation, because thei shotest path must go though a sepaato vetex. We ecusively apply the same pocess to patition each pat into small pats, to enable any two vetices to compute thei shotest path distance using thei stoed infomation (thei labels). We stop patitioning a pat when its size is below a cetain constant. (We call such a pat a basic block.) Since we use balanced sepaatos, the pocess ends afte O(log n) levels of patitioning. Fo a vetex W of H, let v(w) be the set of quasi-udg vetices of G that eside in the cell coesponding to W. The following list contains the infomation that each vetex u v(w) in G stoes in ou potocol. the minimum distances (in H) to all the sepaato vetices that ae on the boundaies of all the patitions W is in; the neighboing quasi-udg vetex though which it can get to othe cells adjacent to W in H; a shotest path outing table fo the vetices of H in the basic block whee u esides. The outing potocol assumes that the souce knows the label of the destination. This piece of infomation can be obtained fom location sevice. Since location sevice is not diectly elated to ou topic, we skip the details hee. If the destination is not in the same cell as the souce, the message will follow a shotest path in H fom the souce cell to the destination cell. By utilizing the second pat of the list (label), a vetex can send a message to any of its neighboing cell in two hops. Within a basic block, the thid pat of the outing table points out the shotest path between cells diectly. Ou outing potocol compaes favoably with shotest path outing algoithms and compact outing algoithms fo geneal netwoks fo its significantly smalle outing table size and maintained constant stetch facto. Poof of Theoem 4 Poof: In the outing potocol descibed above, the fist pat of a node s outing table is of size O( N log N). The second and thid pats of the outing table both consist of a constant numbe of enties because the numbe of neighboing cells and the numbe of cells in each basic block ae both constants. The size of the outing table is then O( N log N). Inside each message we need only to cay the label of the destination vetex, so the ovehead in the message size is also bounded by O( N log N). Given a path p fom u to v, let d(p) denote its numbe of hops, and let c(p) denote the numbe of times the path p tavels fom one cell to anothe. Let p opt be the shotest path fom u to v, and let p be the outing path of ou potocol. Clealy, c(p opt ) d(p opt ), and c(p ) c(p opt ) because ou potocol uses shotest path outing in the gid gaph. p tavels fom one cell to the next in at most two hops, so d(p ) c(p ) + 1. So d(p ) d(p opt ) + 1. Sometimes we ae moe concened about the enegy consumption than the hop distance if the wieless nodes ae able to adjust thei communication ange to save powe. Let the communication cost be as defined in Section III. In eality, it is infeasible fo a node to educe its communication ange to infinitely small. Thee is always a constant ange δ below which the wieless node cannot educe its communication ange. With this assumption, we pove the following theoem. Theoem 6: Let the communication cost be as defined in Section III, and assume that the minimum communication ange is δ. (Theefoe, the communication cost of an edge of Euclidean length d is α (max{d, δ}) β.) Then, the communication cost of a outing path fom u to v geneated by ou outing potocol is uppe bounded by a constant times the minimum communication cost ove all the paths fom u to v. Poof: Let p opt be the optimal path fom u to v with the minimum communication cost C opt, and let p be the outing path of ou algoithm with cost C. If u, v ae in the same cell of the gid gaph H, then C opt αδ β, and C α β since vetices in the same cell fom a clique. So C ( β /δ β )αδ β ( β /δ β )C opt = C opt O(1). Now assume that u, v ae in diffeent cells of H. Let l opt and l denote, espectively, the numbe of hops in p opt and p. By Theoem 4, l l opt +1. So C l αr β (l opt +1)αR β l opt+1 l opt Rβ δ β B. Simulations l opt αδ β Rβ δ β C opt = C opt O(1). We conducted extensive simulations to evaluate the pefomance of ou backbone constuction algoithm and outing potocol. The pefomance has been stable and consistent. In the following expeiment, we andomly deploy N quasi-udg nodes in a -D space of size We incease the numbe of nodes, N, in the system fom 1, 15 to

8 to veify the effects of density change on the pefomance. We also incease the value R/ fom 1, 1.5,, to 1 to see the pefomance of ou algoithms fo diffeent wieless connectivity models. To mimic nontivial netwok topologies, we andomly geneate a big hole of adius andomly picked in the ange [R, R] and five small andom holes of adius picked in the ange [, R]. The centes of the holes ae unifomly andomly chosen in the plane. If the distance between two nodes is in the ange (, R], we put a diect link between them pobabilistically. Fo each configuation, we un the simulation times and take the aveage of the pefomance metics. We would like to point out that the pefomances of ou outing algoithm and backbone constuction method ae elatively independent of the size of the netwok. Ou theoetical bounds and the simulation esults both show that the quality of the backbone constucted and the stetch of the outing paths ae closely elated to the atio of to R. 1) Backbone constuction: In the backbone constuction simulations, we measue the powe stetch facto, maximum degee, the aveage degee and the aveage numbe of edge cossings on an edge in the backbone constucted and compae them to the oiginal gaph. Fo node pais whose distances ae between and R, we adjust the pobability of thei being connected to ensue an expected aveage degee of 1 in ode to compae the esults between diffeent densities and values of R/. The esults shown in Table I and Fig. 6 ae fo backbones constucted by only pefoming the fist step and the last step in Algoithm Backbone. We eliminated the esults fo the case when R = since thee the backbones ae known to be plana with powe stetch facto being 1 because of the Gabiel opeation in the fist step of the algoithm. Ou esults showed that fo all configuations the backbones have vey small powe stetch factos, much smalle maximum degee and in most cases, we can bing the aveage degee to below 6 (which is the uppe bound of the aveage degee fo plana gaphs). Even when R/ = 1, the aveage degee of ou backbones is no moe than 8. As fo the numbe of cossings, ou algoithm educed it by at least 6% in all cases. TABLE I POWER STRETCH FACTOR FOR THE BACKBONES(β = ) Stetch Facto N R/=1 R/= R/= R/= Fom the thee ba gaphs in Fig. 6, the eduction in the metics is quite unifom. It implies that the pefomance of ou algoithm is stable fo diffeent sizes of the netwok. ) Routing pefomance: We apply ou outing potocol not only to the oiginal quasi-udgs but also to the backbones we obtain. To study the pefomance, we measue the maximum label size, aveage label size and the stetch facto of outing path that is defined as the distance in the actual outing path ove the shotest path between the souce and the destination. 4 1/1 1/ 1/ / /R 6 4 N=1 1/1 1/ 1/ / /R 4 N=15 1/1 1/ 1/ / /R N= Fig. 6. The Maximum degee, the aveage degee, and the aveage numbe of edges cossing an edge fo quasi-udgs and thei backbones. The 6 bas in each goup ae, fom left to ight (1) maximum degee in quasi-udg; () maximum degee in backbone; () aveage degee in quasi-udg; (4) aveage degee in backbone; (5) aveage numbe of cossings pe edge in quasi-udg; (6) aveage numbe of cossings pe edge in backbone. Note that in some goups, the last ba is not shown, because the aveage numbe of cossings pe edge in backbones equals thee. The length of the path fo outing in the oiginal gaphs is defined as the hop distance between two nodes, while in the backbones, we use the communication cost with β = as the length of the path. In both cases we andomly pick 1 souce-destination pais in the gaph, simulate the outing pocess and compae the length of the path with the shotest. Due to the page limit we only pesent the esults on the quasi- UDG with expected degee 1 and emak that the esults ae consistent fo gaphs with othe edge densities. Table II shows the aveage values of the maximum label size and the aveage label size (with a node ID as a unit) ove the expeiments fo two cases. We obseve that the label sizes with the algoithm applied to the backbones ae smalle than those to the oiginal gaphs. This is mainly because the backbones ae spase than the oiginal quasi-udgs, hence the gid gaphs we get ae also spase and have smalle sepaatos. We will see late that this advantage comes at a cost of slightly lage stetch factos. Fig. 7(a) shows the aveage hop distance stetch factos of the outing path fo the outing algoithm applied to the oiginal gaphs diectly. In all cases we have the path stetch

9 TABLE II LABEL SIZES OF ROUTING SCHEME BASED ON SEPARATORS On oiginal On backbone N R/ Max Size Avg Size Max Size Avg Size Stetch Facto Stetch Facto Path Hop distance Stetch Factos.5 N=1 N=15 N= /1 1/ 1/ / 1 /R (a) based on G Powe Stetch Factos 1/1 1/ 1/ / 1 /R (c) based on B N=1 N=15 N= Stetch Facto Stetch Facto Path Hop distance Stetch Factos.5 N=1 N=15.5 N= /1 1/ 1/ / 1 /R (b) based on B Geedy+flooding Stetch Factos N=1 N=15 N= 1/1 1/ 1/ / 1 /R (d) Geedy+flooding Fig. 7. Stetch factos fo outing algoithms. G is the oiginal gaph, and B is the backbone. factos no lage than 1.. Fig. 7(c) shows the powe stetch factos and Fig. 7(b) shows the hop distance stetch factos of the outing paths when the algoithm is applied to the backbones. The hop stetch factos shown in Fig. 7(b) ae modeately lage than the ones shown in Fig. 7(a). It is the pice we paid fo the eduction in the size of the outing tables. It looks inteesting fom the figues that when R/ is lage(1), the algoithm geneally pefoms bette than the othe cases. This is because to maintain the same aveage node degee of the gaphs we have to decease the value of. In that case a gid gaph actually descibes the oiginal gaph moe accuately and with moe details. Hence the sizes of the labels ae lage(see Table II), but the paths we discoveed ae close to the shotest ones. We have also implemented the well known geedyfowading plus local-flooding (expanding ing seach with doubling adius) outing algoithm, and pefomed the same numbe of expeiments on the same set of gaphs. The aveage stetch factos ae shown in Figue 7(d). Ou esults indicate that compaed to that algoithm, the outing potocol based on sepaatos has a much bette stetch facto because of its obustness to the existence of holes. V. CONCLUSION In this pape, we have studied two stuctual popeties of quasi-udgs: sepaability and the existence of powe efficient spannes. Such esults lead to a deepe undestanding of the locality popeties of quasi-udg netwoks and an impovement in the development of netwoking potocols. As the futue wok, we will exploe the sepaability of quasi-udgs deployed in D space, othe popeties of quasi-udgs, and thei netwok applications. REFERENCES [1] K. ALZOUBI, X. LI, Y. WANG, P. WAN AND O. FRIEDER, Geometic spannes fo wieless ad hoc netwoks, IEEE Tans. Paallel and Distibuted Systems, vol. 14, no. 4, pp ,. [] L. BARRIÈRE, P. FRAIGNIAUD AND L. NARAYANAN, Robust positionbased outing in wieless ad hoc netwoks with unstable tansmission anges, Poc. of the 5th intenational wokshop on Discete algoithms and methods fo mobile computing and commnunications(dialm 1), pp. 19-7, (1). [] P. BOSE, P. MORIN, I. STOJMENOVIC, AND J. URRUTIA, Routing with guaanteed delivey in ad hoc wieless netwoks, Poc. of the d intenational wokshop on Discete algoithms and methods fo mobile computing and commnunications(dialm 99), pp , [4] Q. FANG, J. GAO AND L. J. GUIBAS, Landmak-based infomation stoage and etieval in senso netwoks, Poc. of INFOCOM 6, 6. [5] K. GABRIEL, AND R. SOKAL, A new statistical appoach to geogaphic vaiation analysis. Systematic Zoology, 18:59-78, [6] D. GANESAN, B. KRISHNAMACHARI, A. WOO, D. CULLER, D. ES- TRIN, AND S. WICKER, Complex behavio at scale: an expeimental study of low-powe wieless senso netwoks. Technical Repot UCLA/CSD-TR -1, UCLA,. [7] C. GAVOILLE, D. PELEG, S. PÈRENNES, AND R. RAZ, Distance labeling in gaphs, Jounal of Algoithms 5(1), pp.85-11, 4. [8] I. A. KANJ AND L. PERKOVIC, Impoved stetch facto fo boundeddegee plana powe spannes of wieless ad-hoc netwoks. To appea in the poceedings of ALGOSENSOR 6. [9] B. KARP AND H. T. KUNG, GPSR: Geedy peimete stateless outing fo wieless netwoks, Poc. of the 6th annual intenational confeence on Mobile computing and netwoking, (), pp [1] Y. KIM, R. GOVINDAN, B. KARP AND S. SHENKER, Geogaphic outing made pactical, Poc. of the nd USENIX/ACM Symposium on Netwoked System Design and Implementation (NSDI 5), Boston, MA, (May, 5) [11] R. J. LIPTON AND R. E. TARJAN, A sepaato theoem fo plana gaphs, SIAM Jounal on Applied Mathematics, Vol. 6, No., (1979), pp [1] F. KUHN AND A. ZOLLINGER, Ad-hoc netwoks beyond unit disk gaphs. Poc. joint wokshop on Foundations of mobile computing, pages 69 78,. [1] K. SOHRABI, B. MANRIQUEZ AND G. POTTIE, Nea gound wideband channel measuement. IEEE Vehicula Technology Confeence, vol. 1, pp , [14] W.-Z. SONG, X.-Y. LI, Y. WANG, AND O. FRIEDER, Localized algoithms fo enegy efficient topology in wieless ad hoc netwoks, Mobile Netwoks and Applications, 1(6):911-9,5.

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Efficient Maximal Poisson-Disk Sampling

Efficient Maximal Poisson-Disk Sampling Efficient Maximal Poisson-Disk Sampling Mohamed S. Ebeida Sandia National Laboatoies Andew A. Davidson Univesity of Califonia, Davis Anjul Patney Univesity of Califonia, Davis Patick M. Knupp Sandia National

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

2. PROPELLER GEOMETRY

2. PROPELLER GEOMETRY a) Fames of Refeence 2. PROPELLER GEOMETRY 10 th Intenational Towing Tank Committee (ITTC) initiated the pepaation of a dictionay and nomenclatue of ship hydodynamic tems and this wok was completed in

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION Intenational Achives of the Photogammety Remote Sensing and Spatial Infomation Sciences Volume XXXIX-B3 2012 XXII ISPRS Congess 25 August 01 Septembe 2012 Melboune Austalia MULTI-TEMPORAL AND MULTI-SENSOR

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics TESSELLATIONS This is a sample (daft) chapte fom: MATHEMATICAL OUTPOURINGS Newslettes and Musings fom the St. Mak s Institute of Mathematics James Tanton www.jamestanton.com This mateial was and can still

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Modeling Spatially Correlated Data in Sensor Networks

Modeling Spatially Correlated Data in Sensor Networks Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,

More information

Class 21. N -body Techniques, Part 4

Class 21. N -body Techniques, Part 4 Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Topic 7 Random Variables and Distribution Functions

Topic 7 Random Variables and Distribution Functions Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch 0 th Intenational Confeence on ITS Telecommunications Image Registation among UAV Image Sequence and Google Satellite Image Unde Quality Mismatch Shih-Ming Huang and Ching-Chun Huang Depatment of Electical

More information

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS COMPDYN 009 ECCOMAS Thematic Confeence on Computational Methods in Stuctual Dynamics and Eathquake Engineeing M. Papadakakis, N.D. Lagaos, M. Fagiadakis (eds.) Rhodes, Geece, 4 June 009 FINITE ELEMENT

More information

GTOC 9, Multiple Space Debris Rendezvous Trajectory Design in the J2 environment

GTOC 9, Multiple Space Debris Rendezvous Trajectory Design in the J2 environment GTOC 9, Multiple Space Debis Rendezvous Tajectoy Design in the J envionment Macus Hallmann, Makus Schlottee, Ansga Heidecke, Maco Sagliano Fedeico Fumenti, Volke Maiwald, René Schwaz Institute of Space

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Improved Fourier-transform profilometry

Improved Fourier-transform profilometry Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity alams@pudue.edu Sonia Fahmy Pudue Univesity fahmy@cs.pudue.edu Abstact Assessing the tustwothiness

More information

Survey of Various Image Enhancement Techniques in Spatial Domain Using MATLAB

Survey of Various Image Enhancement Techniques in Spatial Domain Using MATLAB Suvey of Vaious Image Enhancement Techniques in Spatial Domain Using MATLAB Shailenda Singh Negi M.Tech Schola G. B. Pant Engineeing College, Paui Gahwal Uttaahand, India- 46194 ABSTRACT Image Enhancement

More information

EYE DIRECTION BY STEREO IMAGE PROCESSING USING CORNEAL REFLECTION ON AN IRIS

EYE DIRECTION BY STEREO IMAGE PROCESSING USING CORNEAL REFLECTION ON AN IRIS EYE DIRECTION BY STEREO IMAGE PROCESSING USING CORNEAL REFLECTION ON AN IRIS Kumiko Tsuji Fukuoka Medical technology Teikyo Univesity 4-3-14 Shin-Katsutachi-Machi Ohmuta Fukuoka 836 Japan email: c746g@wisdomcckyushu-uacjp

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design Vol.2, Issue.3, May-June 2012 pp-1253-1259 ISSN: 2249-6645 Dag Optimization on Rea Box of a Simplified Ca Model by Robust Paamete Design Sajjad Beigmoadi 1, Asgha Ramezani 2 *(Automotive Engineeing Depatment,

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information