Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Size: px
Start display at page:

Download "Maneuverable Relays to Improve Energy Efficiency in Sensor Networks"

Transcription

1 Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM {eidenben, kroc, Abtract We propoe a hybrid model to alleviate the notoriou problem of premature battery depletion in enor network: in a firt tage, imple enor are deployed over an area of interet uing any traditional method, in a econd phae, more powerful relay are put in poition that allow them to off-load a much of the forwarding burden impoed on the imple enor a poible. We introduce thi model in detail, give a few theoretical reult with repect to the optimal placement of the powerful enor, propoe variou heuritic approache for their placement, and preent comparative imulation reult for thee heuritic.. Introduction It i well etablihed that while enor network promie unprecedented opportunitie for data collection in a great variety of cenario, their large-cale deployment i hindered by their thirt for energy. Coniderable reearch effort have gone into developing energy-efficient protocol on all tack layer for the enor network etting in which communication to a ingle bae tation happen in a multihop fahion with intermediate tranceiver enor being aked to forward data. While the multiple hop cheme i certainly an improvement in term of energy efficiency over older cheme that require each enor to emit a ignal trong enough to reach the bae tation in a ingle hop, it till fall hort of real-life energy efficiency requirement in many application, not to mention that the reliability of uch cheme uually decreae dratically a routing path get longer. We propoe a hybrid model that ha the potential to reduce energy requirement a claim that we upport by imulation evidence in the lat part of thi paper. In our model, there are two different type of tranceiver: Senor are equipped with a enor to meaure ome environmental variable (uch a temperature or radiation level) and with a low-cot, hort-range tranceiver that i able to receive data packet from other enor and to end data packet that it either generated itelf or received from other enor. Moreover, each enor i equipped with a GPS-like device allowing it to determine it poition relative to ome reference frame. Relay are more powerful tranceiver that are not necearily equipped with a enor. They receive data packet from enor and forward them directly to a fixed-infratructure bae tation uing their medium-range tranmiion capabilitie. Relay are alo equipped with a GPS-like capability. In the application cenario that we enviion, the enor are deployed in a firt tage, the relay are deployed in a econd tage, and actual data traffic tart being tranmitted only in a third phae. A key element of our model i that relay are maneuverable: they can be deployed to location pecified in coordinate; thi can be achieved in everal way depending on the application (e.g., by moving them manually to their poition or by equipping them with a motor and letting them drive to their poition). Figure illutrate the hierarchical architecture of the enor network. For eae of illutration, we aume a unit dik graph model (i.e., each enor ha the ame fixed tranmiion range) depite it deficiencie (generalization to more involved phyical model are feaible). In order to avoid the complication of colliion, we aume a TDMA model on the MAC layer with each tranceiver being aigned a unique time-lot. 2 A more precie meta-algorithm for the Additional energy aving may be poible by replacing tandard GPS device by a cheme where a mall number (at leat three) relay are placed on the boundary of the area in which the enor are ditributed. The relay can then end out ignal that are received by the enor; baed on the ignal trength from the different relay, the enor can then compute their poition (imilar to the way real GPS work). To eliminate the neceity for enor to be able to detect ignal trength, the relay can alo end out conecutive meage of increaing ignal trength; baed on the firt intercepted meage from each relay, a enor can compute it location fairly accurately. 2 Since not all enor are within each other tranmiion range, TDMA require global time ynchronization. Fortunately, a global clock i a feature of any GPS-like ytem, thu time ynchronization Authorized licened ue limited to: IEEE Xplore. Downloaded on February 2, 2009 at 0:35 from IEEE Xplore. Retriction apply.

2 Bae Station Relay Senor Figure. Schematic illutration of the hierarchical level of the enor network cenario i a follow:. Senor are deployed; each compute it own poition. 2. A ingle relay i placed into the center of the enor pread area. 3. The relay end out a beacon packet indicating that it i the relay by etting the hop-count field in the packet to zero. Each enor receive uch a packet, tore the ID of the ender of the packet, increae the hop count by one and forward the packet. At the end of thi flooding phae, each enor know it hop-count ditance to the relay and alo know to which neighbor it need to forward a packet when ending to the relay. 4. Each enor inform the fixed-infratructure bae tation about it poition by ending a packet with poition information along the computed hortet path through the relay. 5. From the enor poition, the bae tation compute the relay poition uing an algorithm or heuritic to find a good olution. 6. The relay are programmed with their final coordinate; they then move or are moved to their poition. 7. Each relay end out a beacon packet that i propagated by the enor a in Step 3. Each enor may receive everal of thee packet from different relay or intermediary enor, and chooe randomly among thoe on the hortet path. 8. Data traffic tart with data packet being forwarded along the computed hortet path to a relay who then end the data to the fixed bae tation. The computational work that the bae tation need to carry out in order to compute the target poition of the relay in Step 5 i key to the overall energy ue of the ytem. A i common, we aume that the bae tation ha unlimited tranmiion power and i equipped with a poweri not much of an additional burden. ful computer. Let S = {,...,n} denote the ID of the n enor; let the hop-count ditance between a enor node i and it aociated relay (i.e., it hop-count cloet relay) be d i ; finally, let f i (for i n) denote the average number of data packet that enor i generate in a time unit, and let E U denote the amount of energy that a enor need to pend to forward one data packet. With thi notation, the amount of energy E S ued by the enor in the ytem in a time unit (power) i n E S = f i d i E U, () i=0 ince each data packet that a enor node i end out need to travel d i hop before it reache it relay. Thu, we can formulate a formal optimization problem RELAY POSITION- ING:Givenn poition of enor in the plane and an integer k (and for a deciion verion, an energy threhold E T ), find k relay poition uch that the reulting energy uage E S i minimum. Alternatively, for the deciion verion, find k relay poition uch that the reulting energy uage E S i at mot E T. We will focu on thi apect of the propoed enor network, a other apect are fairly traight-forward. We tudy RELAY POSITIONING from both a theoretical point of view and from an applied point of view through imulation. We preent theoretical reult in Section 2, a few heuritic approache for olving the problem in Section 3, and imulation reult in Section 4. Pointer to related work and a brief concluion are given in Section Theoretical Reult In thi ection, we firt how that in order to find optimum olution for RELAY POSITIONING, we only need to conider a dicrete et of poition in the plane where relay can be placed. We then preent a proof that our RE- LAY POSITIONING i in fact NP-hard (depite it pecial tructure), thu forcing u to reort to approximation algorithm or heuritic to find good olution. Dicretization. We are auming a unit dik graph model among a finite et of enor node, o the et of enor node from which a relay can receive packet change only along a finite et of arc on the plane. Aume we are given the poition of the n enor node. If we draw a unit-radiu circle around each enor, we obtain a partitioning of the plane into cell whoe boundarie are circle egment. The et of enor that can reach a relay doe not change within a cell, o it doe not matter where in the interior of a cell we place a relay. A relay on the boundary of the cell i within reach of the ame et of enor a in the interior plu poible additional enor. By definition of the unit dik graph, the et of enor within reach of a relay change only along cell Authorized licened ue limited to: IEEE Xplore. Downloaded on February 2, 2009 at 0:35 from IEEE Xplore. Retriction apply.

3 boundarie, including the interection point of each pair of circle. When earching for optimum relay poition, we can limit ourelve to circle interection point becaue all point on each cell defining boundary are equivalent in thi ene, and thoe two point are guaranteed to repreent the more connected cell. Since each circle can interect each other circle at mot twice, the total number of interection point i O(n 2 ). Thu, we have: Lemma For any given intance of RELAY POSITION- ING, there exit an optimum olution in which each relay i poitioned at one of the O(n 2 ) unit circle interection point. With thi dicrete characterization, we can formulate our problem a a pecial cae of MAXIMUM k-facility LO- CATION [5] with the node et coniting of all enor poition and circle interection point, profit between enor node and potential relay poition defined a the negative of the hortet hop count ditance, other profit et to zero. A greedy heuritic achieve an approximation ratio of e e for MAXIMUM k-facility LOCATION and therefore alo for RELAY POSITIONING. However, the fact that MAXIMUM k-facility LOCATION i NP-hard doe not imply that RELAY POSITION- ING i NP-hard ince the latter i a pecial cae of the former. Hardne. We now how that the deciion verion of RELAY POSITIONING i NP-complete by propoing a polynomial-time reduction from DOMINATING SET ON PLANAR GRAPHS WITH MAXIMUM DEGREE 4, which i known to be NP-hard [6]. Thi reduction i inpired by a reduction for a imilar problem of [2]. We will alo need a graph drawing reult: Lemma 2 [7] A planar graph with maximum degree 4 can be embedded in the plane uing O( V ) area uch that it vertice V are at integer coordinate and it edge conit of (poible multiple) horizontal or vertical line egment each of which ha end point with integer coordinate. We are now ready to prove our reult: Theorem The deciion verion of RELAY POSITIONING i NP-complete. Proof: Lemma how that RELAY POSITIONING in it deciion verion i in NP: even an optimum olution can be decribed a a et of poition each of which i an interection point of two circle around input data point. Thu, a olution i of polynomial length in the input, and it validity can be verified in polynomial time. 3 3 Proving NP-memberhip i not a trivial for thi geometric problem a it i for mot combinatorial problem. We need to explicitly how that we can expre the coordinate of olution poition with a polynomial number of bit. To how that RELAY POSITIONING i NP-hard, we tranform an intance I of dominating et on planar graph with maximum degree 4. Intance I conit of a graph G(V,E) with n node V = {v,...,v n } and edge E V 2, and an integer k (for anwering the quetion whether a dominating et of at mot k node exit). We aume that we are given the input graph embedded in the plane according to Lemma 2 with node v i at integer coordinate (x i,y i ). Let l i,j denote the Euclidean length of the horizontal and vertical line egment that form edge (v i,v j ) in the embedding. By Lemma 2, l i,j i of polynomial length. We tranform intance I =(G, k) into a RELAY POSI- TIONING intance I =(S, k,e T ) that conit of a total of n = n+ (i,j) E (2l i,j 3) enor node S that are pread along the edge line in the embedding of I a follow: a enor node i i placed at the embedded poition of node v i ; on the line egment of length l i,j repreenting edge (i, j), an additional 2l i,j 3 enor S i,j = { i,j,...,i,j 2l i,j 3 } are placed conecutively at certain ditance. More preciely, enor i,j c for c 5 i placed at ditance c 0 from enor i ; imilarly, the five lat enor i,j 2l i,j 8+c for c 5 are placed at ditance c 0 from enor j. i placed at di- 2 (ditance defined a Euclidean ditance traveled when going along the line egment of the edge) from enor i for 0 c 2l i,j 8. With thi ditribution, each line egment end point of the edge i alo a enor A for the remaining enor, enor i,j 5+c tance 2 + c poition. Let i,j p,..., i,j p p be enor poition on line egment end point of edge (v i,v j ) (except for i and j ). We lightly refine the poition of enor i,j p t 2 and i,j p for t+2 t p in order to make the reduction work: i,j p i t 2 placed at ditance 2 + pt from enor i and enor i,j p t+2 i placed at ditance 2 + pt from enor i for t p. To complete the reduction, we et the unit radiu of all enor to 0, parameter k (the number of relay to be placed) of intance I to k + (i,j) E (4l i,j ) and the energy threhold E T = n. We need to how that I i a YES-intance if and only if I i a YES-intance. We firt how the if -direction: if a dominating et of cardinality k exit in graph G, there exit a olution for I with k relay and a total energy ue of exactly E T. Let the dominating et in I be S = {v,...,v k } w.l.o.g. Then the olution S for I place k relay at enor poition,..., k ; moreover, it place 4l i,j additional relay on enor poition for each edge (i, j) with i<j(to avoid double-counting on the bidirectional edge) a follow: if i S, then relay are poitioned at enor poition i,j 3c for c l i,j; if neither i nor j are in S, then the relay are poitioned at enor poition i,j 2+3c for 0 c 4l i,j 2. Thu, we have poitioned k relay in uch a way that each of the n enor can reach a relay in a ingle hop, reulting in an overall en- Authorized licened ue limited to: IEEE Xplore. Downloaded on February 2, 2009 at 0:35 from IEEE Xplore. Retriction apply.

4 j i,j j j i,j i,j i /0 /0 /0 /0 /0 /2 /2 /2 /2 /5 /0 /2 /2 i,j /0 Figure 2. Illutration of the reduction: for the only if -direction each cell need to be checked. Note that the two dahed circle do not interect. ergy ue of n, a required. In order to how the only if -direction, we aume that a olution S with total energy ue at mot E T i given a a et of relay poition. We modify the olution in uch a way that let u read off a olution S for I a follow: each relay in S that i not placed at a enor poition i moved to a enor poition from which it till hear all the enor (plu poible additional one) that it heard before the move. The contruction and the parameter choice make thi feaible. To ee thi, conider Figure 2, which how a mall part of the contruction. A cae analyi for each cell of Figure 2 how that relay can alway be moved without changing the et of enor that they hear and therefore alo without changing the total energy E S of the whole ytem, which i at mot E T = n. Obviouly each of the n enor mut ue at leat one hop to tranmit it packet to a relay (even if they are co-located), therefore no olution for I can exit with E S <n. Alo, if a enor require two or more hop to reach a relay in any olution, the olution mut ue more energy than n. Thu, our modified olution mut be a dominating et for the unit dik graph of I. Due to the way that enor poition are ditributed on the edge of the original graph G, an edge (i, j) of length l i,j will be covered by 4l i,j relay itting on internal enor poition. The contruction i uch that 4l i,j relay uffice to cover all internal enor poition i,j,...,i,j 2l but not i,j 3 i or j unle one of the two ha a relay a well. If i have a relayonthem,then4l i,j relay alway be placed uch that j i covered a well (and vice-vera). Thu, we can read off a olution for I by jut including in the dominating et S all node v i that have a relay on the correponding node i in S. j /5 /2 /0 /0 3. Heuritic Approache We conider four heuritic approache to olve the RE- LAY POSITIONING problem. Since the RELAY POSITION- ING problem can, in general, be viewed a a clutering problem, the main idea for each approach i taken from known clutering algorithm. The problem can be rendered a grouping the enor into cluter, and aigning each cluter one forwarding relay in uch a way a to minimize the cot of uch a olution. The cot function ued to meaure a quality of a olution i the um of hortet pathlength (meaured in hop-count) of enor to their correponding relay (in order to reduce parameter pace for our experiment, we aume that all enor need to deliver about the ame amount of data to the bae tation, which correpond to etting all weight f i =in Eq. ); thu, cot defined thi way correpond to the total energy ue of the network. The baic approache are decribed here, followed by detail about each algorithm. In the following, k i the number of relay we want to poition, and n i the number of enor. We remind the reader that we are only dicuing algorithm on how to compute the final relay poition; thu, when we ay that an algorithm place a relay and then update it poition, the relay will have to be phyically moved only once, namely when it final poition ha been computed (ee Step 6 of the meta-algorithm). a) k-mean: The k relay are initially placed in randomly elected POSITIONS and k cluter are created by aigning enor to the nearet (in hop-count) relay. The algorithm then iterate a follow until no change are made during an iteration: For each relay, find a poition which minimize it DIS- TANCE to the enor in it cluter. Recompute all cluter (for each enor, find the relay that i cloet in hop count). Thi may reult in ome node changing cluter they belong to. b) k-global: The k relay are again initially placed in randomly elected POSITIONS, and an iteration conit of the folowing tep that i repeated until the olution no longer change: For each relay (in random order), find the POSITION that minimize the cot of the overall olution given that all other relay poition remain unchanged (i.e. the um of length of the hortet path from all enor to their nearet relay i minimized). c) bottom-up: Thi algorithm tart by placing relay in the ame poition a the node, thu creating n relay and n one-enor cluter. It then run the following tep n k time: Authorized licened ue limited to: IEEE Xplore. Downloaded on February 2, 2009 at 0:35 from IEEE Xplore. Retriction apply.

5 Find two cluter with the mallet DISTANCE between the relay. Combine the two cluter by deleting one relay and placing the other one in a poition that minimize DIS- TANCES between the relay and enor in the combined cluter. Recompute all cluter d) greedy: Thi approach place relay one-by-one in k tep. In each tep, it find a POSITION for the new relay uch that the cot of the whole olution i minimized, given that poition of the relay already placed remain unchanged. We ue two different way to define POSITIONS and DIS- TANCE, creating ixteen implementation of the above approache. POSITIONS i a finite et generated from the location of the enor, and finding a POSITION mean earching through thi et. We ued two way to define PO- SITIONS: all poition of the enor (with a ize of n) and all poition of the enor plu all interection point of the enor radii (ize of O(n 2 )). The reaon for trying both et i that while the firt i relatively mall and widely ued by hierarchical enor network algorithm [3], uing the interection point may reult in better olution. In fact, there alway exit an optimal olution with relay placed in the econd POSITIONS et, a hown in Section 2. DISTANCE i a metric ued to compute ditance between relay and enor in certain part of the algorithm. We again ue two way to define it: a Euclidean ditance and a a hop-count ditance. In the k-mean algorithm, uing the Euclidean ditance metric reult in finding the average poition of the enor in the cluter, while the hopcount metric require a earch through a given POSITIONS et. The rationale behind trying both metric i again an apparent trade-off: while Euclidean metric i very imple to compute, it may not at all reflect the actual hop-count ditance of two enor. We have choen eight of the 6 algorithm are (the naming cheme i <approach>-<metric>-<whether radii interection point were conidered>) for experiment; we lit them including their theoretical running time, where n i the number of enor, k i the number of relay, and D i the average degree of the enor (i.e., a enor ha D other enor a neighbor on average): kmean-euk with a running time of O(kn) per iteration kmean-hop-no with a running time of O(n 2 D + knd) per iteration kmean-hop-ye with a running time of O(n 3 D + knd) per iteration kglobal- hop-no with a running time of O(kn 2 D) per iteration e e kglobal-hop-ye with a running time of O(kn 3 D) per iteration bottomup-euk with a running time of O((n 2 + nd)(n k)) greedy-hop-no with a running time of O(kn 2 D) greedy-hop-ye with a running time of O(kn 3 D) Note that greedy-hop-ye i guaranteed to find a olution that i at mot a factor =.58 off the optimum olution, thu we can only expect relatively mall improvement over thi algorithm. The running time are obtained by traight-forward analyi; for kmean and kglobal, we can give an upper bound of O(n 2 ) on the number of iteration, ince the wort poible olution will have at mot n path (one from each enor) of length O(n) and we only proceed to the next iteration if the algorithm find a better olution. Thee upper bound will clearly never be reached in reality, but they prove that our algorithm have polynomial running time. 4. Simulation Reult The cenario we ue to compare the eight algorithm in imulation all have 024 enor pread on a quare field. The tranmiion range are the ame for all enor and are et to value that reult in expected average degree of 6, 2, 8 and 24 in the connectivity network. The number of relay to be ued i, 2, 4, 8, 6, 32, 64 and 28. When the algorithm tart, the enor are placed uniformly at random on the field firt. Then a relay i placed in the middle of the field and only enor that are able to connect to the relay are conidered for the actual run of the algorithm (if le than 90% of the enor are connected, the enor are poitioned again). Thi correpond to Step through 4 of the meta-algorithm in ection. Conequently, the k-mean and k-global algorithm only place the remaining k relay randomly. For each cenario, we ran the algorithm and collected the cot of the reulting olution and running time of the algorithm. We ran each cenario multiple time with different random eed until the tandard deviation of the cot wa about 0% of it mean. The reult are hown in the following figure. Figure 3 how the reulting cot of a olution for different number of relay and average network degree of 6. The figure how that the cot found by the algorithm are remarkably imilar (the wort i within 5% of the bet). The difference decreae with increaing number of relay, and almot diappear when the number of relay get to 28, where nearoptimal olution i found by all algorithm (majority of enor are connected directly to relay). The bet algorithm i, nonethele, the kglobal-hop-ye. Authorized licened ue limited to: IEEE Xplore. Downloaded on February 2, 2009 at 0:35 from IEEE Xplore. Retriction apply.

6 Cot Average Degree = 6 bottomup euk greedy hop no greedy hop ye kglobal hop no kglobal hop ye kmean euk ye kmean hop no kmean hop ye Cot Algorithm kmean hop no Average Degree=6 Average Degree=2 Average Degree=8 Average Degree= Number of Relay Number of Relay Figure 3. Cot of a olution for variou number of relay (on log cale) and all algorithm for a topology with an average degree of 6. Figure 5. Cot of a olution for variou number of relay (on log cale) and different average degree for the kmean-hop-no algorithm. Time e+00 e+02 e+04 e+06 bottomup euk greedy hop no greedy hop ye kglobal hop no kglobal hop ye kmean euk ye kmean hop no kmean hop ye Average Degree = Number of Relay Figure 4. Running time (in [] on log cale) for variou number of relay (on log cale) and all algorithm for a topology with an average degree of 6. Figure 4 again how the cenario with average degree of 6 and all algorithm, but now the y-axi i the time taken for one run to be completed (notice the log cale of y-axi). Thi figure how two very different behavior clae with repect to running time of the algorithm. One cale a a power-law: for greedy and kglobal, thi finding i conitent with the theoretical running time for thee algorithm, which depend linearly on k. Similarly, kmean-euk-ye exhibit power-law behavior, which again i conitent with it theoretical runing time; relative to greedy and kglobal, the lope eem to be maller, which can be explained through the different number of iteration that thi algorithm mut make to converge. The running time of the econd cla of algorithm Time Algorithm greedy hop no and kmean hop no Average Degree=6 Average Degree=2 Average Degree=8 Average Degree=24 greedy hop no kmean hop no Number of Relay Figure 6. Running time (in [] on log cale) for variou number of relay (on log cale) and different average degree for the kmean-hop-no and greedy-hop-no algorithm. i inenitive to or even decline with the number of relay. In the cae of kmean-hop-ye and kmean-hop-no, it eem that the low-order term containing k in the theoretical running time i outweighed by the fewer iteration that the algorithm ha to go through with a larger number of relay, thu reulting in a mall time decreae for larger number of relay. Thu, kmean-hop eem to converge fater when we have relatively mall cluter. Finally, bottomup-euk running time alo very lightly decreae with an increaing number of relay, which again i conitent with it theoretical running time. The kglobal-hop-ye algorithm i Authorized licened ue limited to: IEEE Xplore. Downloaded on February 2, 2009 at 0:35 from IEEE Xplore. Retriction apply.

7 clearly the wort in running time. The kmean-hop-no, though till very competitive in the cot of olution found, ha a much maller running time. Figure 5 how how the cot of olution varie with average node degree of the connectivity network. The higher the connectivity, the lower the cot, a expected. The curve meet for 28 relay again, confirming that for 8 enor per relay on average, a near-optimal olution i found. The other algorithm behave very imilarly. Again, thee finding are conitent with the theoretical running time of all algorithm, where average degree D i a linear factor. Finally, Figure 6 how how the running time evolve with connectivity for elected repreentation of both clae (greedy-hop-no and kmean-hop-no). The key learning from the imulation can be ummarized a follow: uing more time-intene algorithm yield reult that are a few percentage point better than very fat algorithm. We believe that in mot application the olution quality improvement gained by uing more computational power i probably offet by the cot of uch additional computational power. In particular, allowing relay to be placed on interection point allow algorithm to find lightly better olution at coniderable additional computation time. [2] A.D. Ami, R. Prakah, T.H.P. Vuong, D.T. Hyunh; Max- Min D-Cluter Formation in Wirele Ad Hoc Network; Proceeding INFOCOM 2000 [3] Suman Banerjee and Samir Khuller; A Clutering Scheme for Hierarchical Routing in Wirele Network; INFOCOM 200 [4] Y. P. Chen, A. L. Leitman, and J. Liu; Clutering Algorithm for Ad Hoc Wirele Network; in Ad Hoc and Senor Network, Edited by Y. Xiao and Y. Pan, Nova Science Publiher, 2004 [5] Cornuejol, G., Fiher, M., and Nemhauer, G.; Location of bank account to optimize float: An analytic tudy of exact and approximate algorithm; Management Sci. 23, , 977 [6] Garey, M. R. and Johnon, D. S.; Computer and Intractability: A Guide to the Theory of NP-Completene; Freeman, San Francico, 979 [7] L. Valiant; Univerality Conideration in VLSI Circuit; IEEE Tranaction on Computer, Related Work and Concluion Hierarchical approache and related clutering approache for wirele network have been tudied intenely in the pat, ee [4] for a urvey. See [] for an introduction to baic concept in enor network. In contrat to previou work, our approach call for two different type of tranceiver, one of which can be moved to pecific location. Our cheme allow for truly imple enor that never need to erve a cluter-head with high emiion radii and computing power, uch a in the cheme of [3], in which it i not known a priori which enor may have to act a cluter-head and all enor mut therefore be trong enough to potentially act a cluter-head. We believe that our two-phaed approach ha potential for future reearch. We are working on a ytem where the relay find their poition in a elf-organizing manner by moving to high traffic volume location and changing their poition a the network load change. Other future work include a variation of our approach in which load i ditributed fairly and maximum energy ue per node i minimized intead of overall network energy ue. Reference [] Ian F. Akyildiz, Weilian Su, Yogeh Sankaraubramaniam, Erdal Cayirci; A Survey on Senor Network; IEEE Communication Magazine, Augut Authorized licened ue limited to: IEEE Xplore. Downloaded on February 2, 2009 at 0:35 from IEEE Xplore. Retriction apply.

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Growing Networks Through Random Walks Without Restarts

Growing Networks Through Random Walks Without Restarts Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

Performance of Energy-Efficient TDMA Schemes in Data-Gathering Scenarios with Periodic Sources

Performance of Energy-Efficient TDMA Schemes in Data-Gathering Scenarios with Periodic Sources Performance of Energy-Efficient TDMA Scheme in Data-Gathering Scenario with Periodic Source Chritian Renner, Volker Turau, and Chritoph Weyer Abtract Energy-efficient tranportation of periodical enor reading

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Shortest-Path Routing in Arbitrary Networks

Shortest-Path Routing in Arbitrary Networks Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Exploring Simple Grid Polygons

Exploring Simple Grid Polygons Exploring Simple Grid Polygon Chritian Icking 1, Tom Kamphan 2, Rolf Klein 2, and Elmar Langetepe 2 1 Univerity of Hagen, Praktiche Informatik VI, 58084 Hagen, Germany. 2 Univerity of Bonn, Computer Science

More information

Distance Optimal Formation Control on Graphs with a Tight Convergence Time Guarantee

Distance Optimal Formation Control on Graphs with a Tight Convergence Time Guarantee Ditance Optimal Formation Control on Graph with a Tight Convergence Time Guarantee Jingjin Yu Steven M. LaValle Abtract For the tak of moving a et of inditinguihable agent on a connected graph with unit

More information