On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

Size: px
Start display at page:

Download "On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation"

Transcription

1 On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member Department of Informatics an Telecommunications Engineering University of Western Maceonia Kozani, 000, Greece {psarigianniis, Abstract One of the most valuable esign issues of the Worlwie Interoperability for Microwave Access (WiMAX) stanar is its flexibility. It allows multiple ownlink-to-uplink uration efinitions concerning the with of the corresponing sub-frames, thus, the telecommunication companies an businesses are able to efine the ownlink-to-uplink with from : to : respectively to meet the traffic emans of the connecte subscribers. However, the ecision on efining the most appropriate ratio is not yet solve, since current efforts on eveloping scheuling an mapping schemes consier it as fixe. In this work, a novel aaptive mapping approach base on cubic spline extrapolation - is propose in orer to ynamically etermine the most appropriate ownlink-touplink with ratio in accorance to the ownlink an uplink traffic emans. The metho propose is evaluate through realistic simulation scenarios, whereas its performance is compare with static approaches maintaining a fixe ratio. The results inicate that the approach suggeste succees noticeable improvements in terms of network service capabilities an banwith utilization. Keywors-Extrapolation, IEEE 0., mapping, OFDMA, splines, WiMAX I. INTRODUCTION Wireless broaban communications have attracte the attention of inustry an acaemic community in the recent years. The Worlwie Interoperability for Microwave Access (WiMAX) solution efine by the IEEE 0. group in has been a promising technology for point to multipoint broaban wireless access. The current 0.e stanar known as mobile WiMAX supports subscribers mobility exploiting the Orthogonal Frequency Division Meium Access (OFDMA) multi-carrier moulation scheme for communication. Communication in an 0.e access network is carrie out between a Base Station (BS) an a number of connecte Mobile Stations (MS). The BS establishes a full-uplex communication link with each MS. Information is transmitte in frames incorporating ata exchange from the BS to MSs (ownlink irection) an from MSs to BS (uplink irection). Respectively, each frame consists of an uplink an a ownlink sub-frame, the with of which varies from : to :. WIMAX supports both Time Division Duplexing Angelos Michalas Department of Informatics an Computer Technology Technological Eucational Institute of Western Maceonia Kastoria, 00, Greece amichalas@kastoria.teikoz.gr (TDD) an Frequency Division Duplexing (FDD) to provie biirectional communication. In TDD the ownlink subframe precees the uplink sub frame in the time omain with a small guar interval in between whereas in the FDD both sub frames are transmitte in parallel over ifferent carriers. The majority of WIMAX implementations use TDD ue to its simple esign an flexible frame partitioning []. TDD technique is also aopte in this work. The BS allocates MS requests in the uplink an ownlink sub-frames. Banwith requests are structure in a rectangular shape of two imensions. The vertical imension associates with frequency whereas the horizontal associates with time. OFDMA allows subscribers to use ifferent banwith regions in both time an frequency omains consisting of contiguous series of slots. A slot is the minimum timefrequency resource allocate to a single subscriber. Moreover, each ownlink request (or a set of requests that share common PHY characteristics referre to as a burst) must follow the rectangular shape. This rule oes not apply for uplink requests, simplifying, thus, the uplink allocations. Recent scheuling an mapping approaches presente by the research community try to allocate bursts of various sizes to ownlink an uplink sub frames. However, they consier a fixe banwith size in each sub frame without taking avantage of the ynamic aaptation scheme propose by the stanar. In this work, a novel approach is propose that ajusts the capacity of the ownlink an uplink sub frames of the OFDMA framework to accommoate emaning traffic loa an new incoming requests. The etermination of the most suitable ownlink-touplink with ratio is aresse by applying an extrapolation metho. In this way the well-known cubic spline interpolation technique is applie in a set of scattere ata, obtaine by previous transmissions. More specifically, the applie extrapolation metho, calle Extrapolate Ratio Determination (), attempts to estimate the most appropriate ratio base on the most recent previous observations. The estimate ratio is given as an input for the next transmission, hence efining the with of the ownlink an the uplink sub-frames. The rest of the paper is structure as follows. Section II escribes briefly the OFDMA technique while Section III outlines recent allocation proposals from the relate research literature. In section IV the propose mapping approach is

2 Frequency Domain (Subcarriers) Preamble FCH UL-MAP DL-MAP DL-Burst # Allocation DL-Burst # Allocation DL-Burst # Allocation DL-Burst # Allocation DL-Burst # Allocation Downlink Sub-Frame Guar Time Domain (Symbols) Figure. A Mobile WiMAX TDD frame. UL-Burst # Allocation UL-Burst # Allocation UL-Burst # Allocation UL-Burst # Allocation UL-Burst # Allocation Ranging Uplink Sub-Frame presente. Section V provies a set of inicative results of the efficiency of the propose moel. Finally, conclusions are given in Section VI. II. BACKGROUND The IEEE 0. OFDMA technique provies a multiple access mechanism to subscribers. Its TDD frame is epicte in Fig.. The TDD frame is structure in time an frequency omains compose by a ownlink sub frame an an uplink sub frame with a small guar interval between them. Subframes with uration coul be configure varying from : to :. This functionality reners the stanar ajustable to ynamic traffic profiles allowing the moification of the ownlink-to-uplink ratio even on a frame-by-frame basis. The ownlink sub-frame begins with a preamble that is use to achieve time an frequency synchronization, followe by a frame control heaer (FCH) an two MAP messages. The FCH inclues information concerning the MAP fiels such as message length, coing an moulation information. Downlink an uplink MAP fiels efine transmission instructions for each MS, incluing burst allocations in each sub frame. III. RECENT MAPPING SCHEMES In this section, we briefly present the most recent mapping schemes for Mobile WiMAX. Most research efforts [-] concentrate on ownlink mapping ue to the restriction for rectangular allocation in the ownlink sub frames. The authors in [] formalize the two imensional mapping problem an propose heuristic algorithms which coul also support QoS constraints. In [] a binary-tree full search approach is use for optimal placement of rectangular bursts in a time-frequency frame. Accoringly, the authors limit the user requests to eight per frame ue to the high search complexity. Efforts in [-] inclue an initial sorting of the incoming requests in escening orer followe by the mapping proceure. The authors in [, ] follow an approach where the requests with common transmission characteristics are groupe into buckets. In the sequel, buckets are mappe in a column by column basis of the rectangular bin. The Guar mapping proceure in [] involves allocation of resources from right to left an from bottom to top. In our previous work, the AHBM algorithm was propose for accommoating ownlink requests []. The iea introuce applies an initial creation of horizons, which constitutes the basis of the forthcoming requests. Hence, initial requests efine horizons an then the forthcoming requests are mappe accoring to horizons. Large requests are accommoate first, leaving minimum remaining ile space, while horizons are forme in a right to left an bottom to top manner. In the sequel, the remaining requests are mappe base on the horizons. Accoring to the performance evaluation results, the AHBM scheme seems to present consierable improvements compare to other leaing schemes [, ]. Therefore, we employ the AHBM scheme as the main ownlink mapping tool for our stuy. The uplink mapping is straightforwar since there is no restriction on the allocation of bursts in the uplink sub-frame. The simplest scheme use for resource allocation in the uplink sub-frame is the horizontal mapping of sub-channels in the frequency omain. Each request occupies horizontal strips of the allocation bin one after the other without leaving ile slots in between. This metho allows contiguous slots to be accommoate on a row-by-row basis until all requests are mappe or the allocation is fully fille. We also aopt this technique as the main uplink mapping scheme for our stuy ue to its simplicity. Several scheuling an mapping approaches on resource allocation in Mobile WiMAX employ sub-frames of fixe size, ignoring that ownlink-to-uplink ratio coul be ynamically moifie as specifie by the stanar. It is worth mentione that our previous work [] limits its focus on the ownlink sub-frame, since it examines only the feeback provie from the ownlink mapping process in contrary to this stuy that consiers both the performance of ownlink an uplink mapping processes in orer to ynamically ajust the ownlink-to-uplink ratio. IV. DOWNLINK-TO-UPLINK RATIO DETERMINATION A. Scope an Motivation Static scheuling an mapping schemes may limit network performance by keeping the sub-frames length fixe, particularly in a ynamically environment of a WiMAX access network. A fixe ownlink-to-uplink ratio of the OFDMA framework coul result in failure to map a portion of subscribers requests, even though there are available resources in the whole frame. This weakness is aresse in the current stuy by proposing a novel mechanism that ynamically ajusts the capacity of ownlink an uplink sub-frames with in orer to accommoate existing traffic requests. The aaptation scheme use employs an effective technique, stemming from the numerical analysis fiel, calle extrapolation spline. B. Cubic Splines The interpolation an extrapolation techniques are wiely use to fit smooth continuous function through iscrete ata. Among other interesting interpolation techniques, spline

3 metho seems to be one of the most attractive one, since it infers piecewise cubic polynomials to interpolate the ata points. One of the most interesting avantages of low-orer polynomials is the low complexity, since they keep the computational requirements low compare to other interpolation techniques that inclue complex numerical calculations, involving higher egree curves []. C. Algorithm The ownlink-to-uplink with ratio ajustment is the main objective of the algorithm propose. In orer to efficiently operate, the algorithm nees recent scattere ata. This set of collecte ata will be the basis of the extrapolation, applie by the scheme so as to estimate the next - most suitable - ratio. The set of collecte scattere ata is obtaine by the execution of the ownlink an uplink mapping processes. The algorithm receives the feeback obtaine by each mapping process an estimates the most appropriate ratio with respect to the banwith nees of both sub-frames. In other wors, the scheme etermines the grante symbols per irection, which means it is able to offer more symbols to the irection that nees more banwith. Furthermore, the mapping approach propose shoul be capable of balancing the banwith sharing between the two sub-frames. The current status of each mapping process is avertise by the feeback info. The feeback is forme with respect to two basic performance metrics. The first one is calle unserve_slots an enotes the cumulative number of requests that fail to fin accommoation space, measure in slots. The secon one is calle ile_slots an refers to the total number of waste slots within the examine sub-frame (ownlink or uplink sub-frame): unserve _ slots ile _ slots ownlink _ feeback = H u u unserve _ slots ile _ slots uplink _ feeback = H where unserve_slots (unserve_slots u ) stans for the unserve_slots, prouce from the ownlink (uplink) mapping process. In the same manner, ile_slots (ile_slots u ) enotes the number of ile_slots, efine by the ownlink (uplink) mapping process. The parameter H symbolizes the allocation bin s height. Positive feeback implies that there is no sufficient allocation space ( unserve _ slots > ile _ slots ), while a negative one affirm banwith wastage, since one or more columns are in excess. Lastly, zero feeback stans for a consummate mapping. The scheme is escribe in Algorithm. Two states, the current an the ieal, obliquely show the ownlink-touplink ratio. The set of all possible states shows all possible with values that the ownlink (or the uplink) may receive in relation to the uplink (or the ownlink) sub-frame. For example, if the frame with is set to slots an the initial ownlink-to-uplink ratio is : then the with of the ownlink sub-frame is, the same as the uplink sub-frame. The couple of values (, ) enotes the first possible state of the pool, so in this case current =. The next possible state, giving current =, gives the set (, 0), while the final possible state of the set is given by current =, enoting the set (, ). Beyon the current state, the ieal state points out the state that coul return the most efficient feeback if was applie an of course it is known only after the completion of both mapping processes. In the light of the aforementione remarks, the algorithm consists of a IF- ELSE_IF central loop, in which the ieal state is etermine base on the feeback obtaine by the mapping proceures. The latest V ieal states are recore into an array, calle history, which is use in orer to provie the y-axis scattere ata for the extrapolation technique. Specifically, the history vector continuously upates its values an upon the completion of the mapping processes provies its values to the applie extrapolation technique in orer to estimate the history[v+] ieal state for the next frame. Hence, the algorithm provies an estimate ownlink-to-uplink with ratio base on the previous most appropriate V ratios an the forthcoming frame begins with this value ( current = history[ V + ] ). It shoul be note that the estimate state is not allowe to surpass the upper an lower limits in accorance with the stanar ratio limits, i.e., from : to :. Finally, it is worth mentioning that the extrapolation process may be erroneous, returning state values out of the bouns. For this purpose, it is consiere that if the extrapolation technique estimates a value out of the bouns (e.g., enoting a ratio :) then the ieal state is aopte ( current = ieal ). Algorithm: mapping algorithm - Set the initial ownlink-to-uplink with ratio :, i.e., current = - FOR each frame - Apply the ownlink mapping algorithm aopte by []. - Apply the fixe uplink mapping algorithm. - Calculate ownlink_feeback an uplink_feeback. - IF ownlink_feeback > 0 uplink_feeback < 0 THEN ieal = current - + min( ownlink _ feeback, uplink _ feeback ) - ELSE_IF ownlink_feeback < 0 uplink_feeback > 0 THEN ieal = current - min( ownlink _ feeback, uplink _ feeback ) - ELSE_IF ownlink_feeback > uplink_feeback THEN ieal = current - ownlink _ feeback uplink _ feeback + - ELSE_IF ownlink_feeback < uplink_feeback THEN ieal = current - uplink _ feeback ownlink _ feeback - END_IF - FOR counter = :V- - history[ V counter + ] = history[ V counter] - END_FOR - history[] = ieal

4 0 0 Mean number of unserve MSs Mean number of unserve MSs 0 0 Number of connecte MSs 0 0 Number of connecte MSs Figure. Scenario: Mean number of unserve MSs. - Apply Cubic Spline Extrapolation with x =,,..., V an y = history[], history[],..., history[ V ] an calculate history[ V + ] - Set current = history[ V + ] - END_FOR V. PERFORMANCE EVALUATION The performance of the is evaluate in this section in a custom Matlab environment. Apart from, three static mapping schemes, maintaining static an preefine ownlink-to-uplink ratio, are evelope also in orer to be compare with the approach. All schemes aopt the AHBM algorithm [] as the main mapping process regaring the ownlink mapping an the fixe uplink mapping scheme as the algorithm for the uplink sub-frame. It is assume that for each frame MSs may request only a single burst for each irection. For each simulation conucte, a single BS is consiere along with multiple MSs that have been establishe communication to the BS. Both ownlink an uplink irections are consiere. Regaring the simulation parameters, the partially use sub-channelization (PUSC) moe is aopte ue to its common frequency iversity for mobile communication environments efining 0 istinct channels. The frame length is fixe an it is consiere as 0 ms. In aition, three symbols are eicate to control information (one symbol for Preamble, an two symbols for MAP an FCH fiels). As previously mentione, the scheme is able to efine the ownlink-to-uplink ratio on a frame-by-frame basis. The three fixe schemes maintain a fixe ratio in the context of all simulation scenarios conucte in this work. Therefore, the so-calle mapping scheme efines the ownlink-to-uplink ratio stable an equal to :, allowing symbols for each sub-frame. Similarly, the scheme maintains the ratio to : offering available symbols to TABLE I. POISSON REQUEST VALUES # of Frame iteration λ (slots) λ u (slots) Figure. Scenario: Mean number of unserve slots. ownlink sub-frame an to the uplink one. Lastly, the thir stanar mapping scheme, calle keeps the ratio equal to :, allowing symbols for ownlink an for uplink. The scheme ajusts the ratio from : to :, allowing to available symbols to be exploite in the context of the ownlink sub-frame an to available symbols eicate to uplink sub-frame, respectively. Three performance metrics are consiere. First, the mean number of unserve MSs is consiere, which expresses the portion of MSs that fail to be accommoate in both ownlink an uplink sub-frame ue to lack of resources, secon the mean number of unserve slots is measure, which enotes the total number of slots that fail to fin allocation space in both sub-frames ue to lack of resources, an three the mean number of ile slots, which inicates the utilization of the available allocation bin. The performance evaluation is subivie in two scenarios. In the former one, the performance of the four mapping approaches is evaluate as the number of the connecte MSs to the BS increases. In the latter one, the mapping performance is evaluate as the ownlink traffic loa increases keeping the uplink traffic loa stable. Each simulation experiment elapses after 000 contiguous transmission frames. The generate traffic follows a Poisson process, consiering ifferent λ for each irection. In the first evaluation scenario the number of the connecte MSs varies from to 0, while the Poisson mean values vary as time passes, inicating an unpreictable, realistic, an alterable behavior. In the secon scenario the number of the connecte MSs is consiere stable an equal to 0 for each irection, altering, however, the Poisson mean value of the ownlink requests, enote by λ. Mean number of ile slots Number of connecte MSs Figure. Scenario: Mean number of ile slots.

5 Mean number of unserve MSs Mean number of ile slots lamba (ownlink) lamba (ownlink) Figure. Scenario: Mean number of unserve MSs. Specifically, the Poisson mean value of the uplink requests remains fixe an equal to 0, while λ is increase from 0 to 0. Table I summarizes the exact number of Poisson values for the first evaluation scenario. The evaluation results are expresse in Figs -, where Fig. shows the performance of the four schemes, in terms of the mean number of unserve MSs, Fig. epicts the mean number of unserve slots, an Fig. illustrates the mean number of ile slots, as the number of MSs increases. It is clear that the role of the approach propose is beneficial, since it achieves a) to reuce the number of subscribers that fail to be mappe, b) to ecrease the portion of waste banwith, an c) to limit the number of slots that shoul be returne to the scheuler in orer to be re-allocate in the following frames. In essence, the senses the banwith nees of both irections an assign the waste portion of allocation space, if any, to the sub-frame that coul really exploit it. This ability is cause by the appropriate ownlink-to-uplink ratio estimation, which provies more allocation opportunities to the sub-frame that nees it mostly. In the secon set of experiments (Fig. -), the obtaine results with respect to the aforementione performance metrics are acquire keeping the number of the connecte MSs stable an equal to 0 for each irection, altering, however, the λ. Specifically, the Poisson mean value of the uplink requests remains fixe an equal to 0, while λ is increase from 0 to 0. Fig. shows the mean number of unserve MSs, Fig. presents the mean number of unserve slots, an Fig. epicts the mean number of ile slots. Mean number of unserve slots lamba (ownlink) Figure. Scenario: Mean number of unserve slots. Figure. Scenario: Mean number of ile slots. Once again the approach presents better network performance compare to the fixe schemes. Its ability to aequately ajust the ownlink-to-uplink with ratio leas to consierable improvements, since the effectively exploits the available banwith, re-efining the sub-frame s bounaries base on the traffic nees. VI. CONCLUSIONS Recent scheuling an mapping approaches presente in the literature assume a fixe ownlink-to-uplink with ratio, resulting in limite network performance. A novel approach was presente in this paper, by ajusting the capacity of the ownlink an uplink sub frames of the OFDMA framework so as to accommoate emaning traffic loa an new incoming requests. The iea beyon this approach lies in the cubic spline extrapolation technique, which is applie in orer to estimate the most suitable ratio. The approach presente is evaluate in realistic scenarios, whereas the performance results inicate consierable performance improvements. REFERENCES [] J. Anrews, A. Ghosh, R. Muhame, Funamentals of WiMAX, Unerstaning Broaban Wireless Networking, Prentice Hall,. [] Y. Ben-Shimol, I. Kitroser, an Y. Dinitz, Two-Dimensional Mapping for Wireless OFDMA Systems, IEEE Trans. Broacasting, vol., no., pp.-, September. [] C. Desset, E. B. e Lima Filho, an G. Lenoir, WiMAX Downlink OFDMA Burst Placement for Otimize Receiver Duty-Cycling, in Proc. IEEE Int. Conf. Comm., pp. -,. [] T. Ohseki, M. Morita, an T. Inoue, Burst Construction an Packet Mapping Scheme for OFDMA Downlinks in IEEE 0. Systems, in Proc. IEEE Global telecom Conf., pp. 0-,. [] T. Wang; H. Feng; B. Hu;, "Two-Dimensional Resource Allocation for OFDMA System," in Proc. IEEE International Conference on Communications Workshops, pp.-, - May. [] C. So-In, R. Jain, an A. Al-Tamimi, eocsa: An Algorithm for Burst Mapping with Strict QoS requirements in IEEE 0.e Mobile WiMAX Networks To appear in the n Inter. Conf. on Comp. an Automation Engin. (ICCAE 00), Feb. 00. [] P. G. Sarigianniis, G. I. Papaimitriou, P. Nikopolitiis, M. S. Obaiat, an A. Pomportsis, A Novel Aaptive Mapping Scheme for IEEE 0. Mobile Downlink Framing, Globecom 00, to appear. C. Geral, P. Wheatley, "Applie Numerical Analysis", Aison-Wesley Publishing Company,.

eocsa: An Algorithm for Burst Mapping with Strict QoS Requirements in IEEE e Mobile WiMAX Networks

eocsa: An Algorithm for Burst Mapping with Strict QoS Requirements in IEEE e Mobile WiMAX Networks eocsa: An Algorithm for Burst Mapping with Strict QoS Requirements in IEEE 82.6e Mobile WiMAX Networks Chakchai So-In Department of Computer Science & Engineering, Washington University in St. Louis St.

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

A MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611

A MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611 A MIMO Fuzzy Controller for tracking: Robot control Paul A.C. Mason Assistant Professor, Kevin Walchko Research Assistant Carl Crane Professor, Mechanical Engineering University of Floria Gainesville,

More information

Wireless Sensing and Structural Control Strategies

Wireless Sensing and Structural Control Strategies Wireless Sensing an Structural Control Strategies Kincho H. Law 1, Anrew Swartz 2, Jerome P. Lynch 3, Yang Wang 4 1 Dept. of Civil an Env. Engineering, Stanfor University, Stanfor, CA 94305, USA 2 Dept.

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach W. E. Dixon e-mail: wixon@ces.clemson.eu D. M. Dawson e-mail: awson@ces.clemson.eu E. Zergeroglu e-mail: ezerger@ces.clemson.eu Department of Electrical & Computer Engineering, Clemson University, Clemson,

More information

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 4 Digital fringe profilometry base on triangular

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Advanced method of NC programming for 5-axis machining

Advanced method of NC programming for 5-axis machining Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

On-path Cloudlet Pricing for Low Latency Application Provisioning

On-path Cloudlet Pricing for Low Latency Application Provisioning On-path Cloulet Pricing for Low Latency Application Provisioning Argyrios G. Tasiopoulos, Onur Ascigil, Ioannis Psaras, Stavros Toumpis, George Pavlou Dept. of Electronic an Electrical Engineering, University

More information

Powerful Software to Simulate Soil Consolidation Problems with Prefabricated Vertical Drains

Powerful Software to Simulate Soil Consolidation Problems with Prefabricated Vertical Drains water Article Powerful Stware to Simulate Soil Consoliation Problems with Prefabricate Vertical Drains Gonzalo García-Ros 1, *, Iván Alhama 1 an Manuel Cánovas 2 ID 1 Civil Engineering Department, Technical

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

A Deficit Round Robin with Fragmentation Scheduler for IEEE e Mobile WiMAX 1,2

A Deficit Round Robin with Fragmentation Scheduler for IEEE e Mobile WiMAX 1,2 1 A Deficit Round Robin with Fragmentation Scheduler for IEEE 802.16e Mobile WiMAX 1,2 Chakchai So-In, Student Member, IEEE, Raj Jain, Fellow, IEEE, Abdel-Karim Tamimi, Member, IEEE Deficit Round Robin

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Performance evaluation of the Zipper duplex method

Performance evaluation of the Zipper duplex method Performance evaluation of the Zipper lex metho Frank Sjöberg, Mikael Isaksson, Petra Deutgen, Rickar Nilsson, Per Öling, an Per Ola Börjesson Luleå University of Technology, Division of Signal Processing,

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic 24 International Journal Information Theories an Applications, Vol. 23, Number 1, (c) 2016 Clustering using Particle Swarm Optimization Nuria Gómez Blas, Octavio López Tolic Abstract: Data clustering has

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

Correlation-based color mosaic interpolation using a connectionist approach

Correlation-based color mosaic interpolation using a connectionist approach Correlation-base color mosaic interpolation using a connectionist approach Gary L. Embler * Agilent Technologies, Inc. 75 Bowers Avenue, MS 87H Santa Clara, California 9554 USA ABSTRACT This paper presents

More information