Dynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things

Size: px
Start display at page:

Download "Dynamic Resource Discovery based on Preference and Movement Pattern Similarity for Large-Scale Social Internet-of-Things"

Transcription

1 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynac Resource Dscovery based on Preference and Moveent Pattern Slarty for Large-Scale Socal Internet-of-Thngs Zhyuan L, Rulong Chen, Lu Lu, Meber, IEEE and Geyong Mn, Meber, IEEE Abstract Gven the wde range deloyent of dsconnected delay-tolerant socal Internet-of-Thngs (SIoT), effcent resource dscovery reans a fundaental challenge for large-scale SIoT. The exstng search echanss over the SIoT do not consder reference slarty and are desgned n Cartesan coordnates wthout suffcent consderaton of real-world network deloyent envronents. In ths aer, we roose a novel resource dscovery echans n a 3-densonal Cartesan coordnate syste wth the a of enhancng the search effcency over the SIoT. Our schee s based on both of reference and oveent attern slarty to acheve hgher search effcency and to reduce the syste overheads of SIoT. Sulaton exerents have been conducted to evaluate ths new schee n a large-scale SIoT envronent. The sulaton results show that our roosed schee outerfors the state-of-the-art resource dscovery schees n ters of search effcency and average delay. Index Ters socal Internet of thngs, resource dscovery, cosne slarty, reference, oveent attern. I. INTRODUCTION HE ntegraton of socal networkng concets nto the TInternet-of-Thngs (IoT) has led to a burgeonng toc of research, so called Socal Internet of Thngs (SIoT) aradg, accordng to whch the sart obects are caable of establshng socal relatonshs n an autonoous way wth resect to ther owners. The benefts are those of rovng scalablty n resource/servce dscovery when the SIoT s ade of a large nuber of heterogeneous nodes, slarly to what haens wth socal networks aong huans [1]. SIoT s turnng out to be a successful aradg for eer-to-eer councatons, beng Manuscrt receved Arl 15, Ths work was suorted n art by the Natonal Natural Scence Foundaton of Chna under Grant No , the Proect Funded by Chna Postdoctoral Scence Foundaton No. 2015M570469, the Natural Scence Foundaton of Jangsu Provnce under Grant No.BK and the Senor Professonal Scentfc Research Foundaton of Jangsu Unversty under Grant No.12JDG049. Z.Y. L and R.L. Chen are wth the Deartent of Internet of Thngs, School of Couter Scence and Telecouncatons Engneerng, Jangsu Unversty, Zhenang, Chna (e-al: lzhyuan@us.edu.cn). L. Lu s wth the Deartent of Coutng and Matheatcs, Unversty of Derby, Derby, UK and the Deartent of Internet of Thngs, School of Couter Scence and Telecouncatons Engneerng, Jangsu Unversty, Zhenang, Chna (e-al: l.lu@derby.ac.uk). G. Mn s wth the Deartent of Matheatcs and Couter Scence, Unversty of Exeter, Exeter, UK (e-al: g.n@exeter.ac.uk). drven by the followng roertes: Sart obects belongng to the sae county due to ther owners often have coon nterests. Sart obects carred by ther owners wth coon nterests usually exhbt slarty n ther oveents and behavor atterns. Sart obects carred by ther owners wth coon nterests tend to eet each other frequently. However, leveragng the above entoned socal roertes for desgnng an effcent resource dscovery echans over SIoT s an acute ssue n the context of resource sharng n SIoT. The exstng resource dscovery echanss n SIoT can be classfed nto three categores: socal connectvty-based ethods, oveent attern-based ethods and reference slarty-based ethods. The socal connectvty-based ethods [2-9] utlze the long-ter socal tes exstng between the nodes for buldng countes, n such a way that those havng frequent encounters n the ast wll belong to the sae county. Once the countes are bult, resource sharng s acheved aong the nodes wthn the countes by socal-connectvty. The oveent attern-based ethods [10-13] utlze the traectores of the oble users to buld the countes, n such a way that nodes exhbtng slar oveent and behavour atterns wll belong to the sae county. Both the above two strateges are beneftted wth low transsson delay but also have slar dsadvantages, such as anageent overhead and low search effcency snce both the two aroaches do not consder reference slarty. The reference slarty-based ethods [14-15] can show better search effcency, whch utlzes the nterests and shared resources of the oble users to for the countes wth nodes havng slar references. However, the dsadvantages of those aroaches can be attrbuted to ts toology satch and hgher traffc cost, snce reference slarty-based ethods do not consder the nforaton regardng the geograhcal locaton of the oble nodes. In order to overcoe the drawbacks of the resource dscovery echanss entoned above, ths aer rooses a novel Resource Dscovery echans based on the Preference and Moveent attern slarty (RDPM). Frstly, we extract the references of the nodes fro ther rofle table and resources, and also oveent attern fro ther traectores usng the AGNES clusterng ethod [16]. Then the cosne slarty of the references and oveent attern of the nodes

2 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 2 s generated for the urose of buldng sub-county n a 3-densonal Cartesan coordnate syste n order to rove the effcency of resource dscovery. Next, vrtual global countes are fored by utlzng the slarty found aong sub-countes, ultately to rove the searchng erforance for the resources. Fnally, we desgn a resource dscovery algorth that can dynacally adust the search radus n order to balance the erforance and councaton overhead. The reander of the aer s structured as follows: Secton II ntroduces the related works. Secton III resents the network odel. Our roosed resource dscovery algorth based on reference and oveent attern slarty s elaborated n Secton IV. The exerental evaluaton and erforance results are resented n Secton V. Fnally, Secton VI concludes ths aer. II. RELATED WORK In ths secton, the exstng resource dscovery echanss are analyzed by classfyng the nto three categores socal connectvty-based ethods, oveent attern-based ethods and reference slarty-based ethods. A. Socal connectvty-based ethods L and Wu [4] roosed a Moble county-based Pub/Sub schee (MOPS) to roote the content-based servce by utlzng the long-ter neghborng relatonsh between the nodes. In ths aroach, the node county s bult n a dstrbutve fashon based on the encounter frequences of the nodes. A contact duraton aware fraework was roosed [5] to odel the content dssenaton rocess for MSNs n order to reduce the content dssenaton delay. ICast [6] adots the behavor-aware echans whch regularly extracts weak tes,.e. nodes havng rare encounters, to ensure rearkable erforance results n content delvery. By analyzng the tght-couled relatonsh between huan and oortunstc connecton of sart thngs (e.g., oble hones, vehcles), [7] roosed oortunstc Internet of Thngs. It enables nforaton sharng and dssenaton wthn/aong oortunstc countes that are fored wth the oveent and oortunstc contact nature of huan. [8] roosed a county detecton schee based on frend relatonsh to solve the roble n ntegrated IoT and Socal Network (SN) archtecture. Zheng and Wang [9] roosed a grah-based socal aware algorth n whch cellular lnks and D2D lnks are establshed accordng to socal tes and socal contrbutons of users for effcent ult-fle dssenaton. However, such ethods are subected to lower effcences n ther resource dscovery echanss snce they do not consder reference slarty. B. Moveent attern-based ethods Huan traectores often show a hgher degree of teoral and satal regularty, wth each ndvdual beng characterzed by a te ndeendent characterstc length scale and also a sgnfcant robablty of returnng to a few hghly frequented locatons [10], whch tends oble users to exhbt slar oveent and behavor atterns. Such oveent atterns of a grou of nodes can be extracted by recordng the node oveents. A oveent attern-aware otal routng for socal delay tolerant networks was roosed n the works of [11], where both a local search schee and a tabu-search schee are utlzed n fndng the otal set. The tabu-search based routng shows the ablty to gude the evaluaton of relay node sets nto otcal node sets. [12] analyzed frstly the socal relaton between oble-aware nodes, and then ned the actvty rules of nodes and the county roerty and guded to select the oble-aware nodes n target regons, so as to rove the dscovery effcency of nodes n obectve regons, and ncrease the success rato of servce dscovery. An effcent roactve servce dscovery rotocol was roosed [13], whch can leverage both the socal behavor and the eole oblty. Sulaton results show that the rotocol acheves ncreased effcency n dscoverng servces. Such oveent attern-based ethods can enoy lower resource dscovery delay and transsson delay than the socal connectvty-based ethods. However, they do not fully utlze the reference of users, and hence the success rate of the resource dscovery s stll low. C. Preference slarty-based ethods An adatve content sharng rotocol to facltate the leentaton of MSNs over eer-to-eer networks was roosed [14] for reference drven councaton. The roosed rotocol takes nto account the nforaton about user s nterests, reference based content storng and forwardng, and host oblty n a dsconnected delay tolerant MANET, whch can rove the erforance of content dssenaton. A P2P content-based fle sharng syste, naely SPOON, was roosed [15] for dsconnected MANETs. The syste uses an nterest extracton algorth to derve a node s nterests fro ts fles for content-based fle searchng. For effcent fle searchng, SPOON grous coon-nterest nodes that frequently eet each other, as countes. It exlots the node oblty for the urose of categorzng the nodes nto two tyes, n such a way that the nodes wth ore frequent encounters wth the county ebers are categorzed as stable nodes and the nodes frequently vstng other countes are categorzed as hghly oble nodes. Stable nodes are generally assgned as county coordnates for ntra-county searchng and the hghly oble nodes are assgned as county abassadors for nter-county searchng. In general, the success rate of resource dscovery of the reference slarty-based ethods s better than two other ethods. However, t ncurs toology satch, whch leads to hgher councaton overhead snce they lack ultdensonal context-aware nforaton n ther resource sharng echanss. III. NETWORK MODEL The archtecture of the roosed RDPM odel can be classfed nto three layers as shown n Fg. 1. Each node reresents a counterart of a hyscal sart devce at the hyscal layer. Frstly, the hyscal area s dvded nto square unts of equal area. In each square unt, the nodes belongng to the sae sub-county have slar references and show consstent oveent atterns. Then, slar sub-countes are erged nto a global vrtual county. For nstance,

3 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 3 hundreds of football fans are watchng a World Cu soccer tournaent n an oen-ar stadu. In the stadu, they sontaneously for a football sub-county. Meanwhle, fans outsde the stadu for another football sub-county by watchng TV n ubs or at hoe. But all of the together for the football global vrtual county. The sub-countes together for the global vrtual county and also have ther corresondng local characterstcs. For exale, n the sub-county network layer, node 2 has two neghbors, as node 1 and node 3, resectvely. Furtherore, consderng the global county network layer, node 1 and node 3 are the neghbors of node 2. Ths strategy greatly reduces the traffc overheads ncurred by the toology satch and roves the effcency of resource dscovery. Then, Forula (2) s used to calculate the slarty aong the resource u and the resource v. s( u, v) w w u v wu wv 1 1. where s the total nuber of coon keywords, wu and w v reresent the weghts of the th coon keyword n the two resources, resectvely. In a slar way, a global slarty atrx could be obtaned by coarng the slartes of all the resources. The eleent of the slarty atrx s s ( u,v ), and then they are sorted n a descendng order to generate a resource slarty lst. Forula (3) s used to choose the to r hgher slarty resources. r s( u,v) 1 arg n,0 1, 0 k s( u,v) 1 r r k Fg. 1. Three-layer network structure of RDPM. IV. THE DESIGN OF RDPM A. Preference Extracton Users wth coon references tend to on the sae county, and ther shared resources or servces are often slar. Hence, we extract the nterests and references of the nodes usng ther rofle lsts and shared resources or servces. 1) Resource or servce Reresentaton The roertes of the resources or servces are ult-densonal, and the assocaton roertes of the nodes are generally weak. The dfferences n the assocaton roertes can only be attrbuted to the occurrence frequency of the keywords. For resource R, ts reference vector s defned as R ( k, w);( k, w );...;( k, w ) n n where k refers to the th keyword and w s the weght of the th keyword. They are sorted by weghts n descendng order. 2) Preference Reresentaton The shared resources are requred to be clustered n order to be reresentatve rather than a sngle entty. For exale, the coon resource vectors are extracted fro R u and R v, utlzng the coon keywords and corresondng weghts. where k s the length of the resource slarty lst and ρ s a user-secfc araeter to deterne to r resources wth hgher slarty to reresent the nterests of a oble user. The araeter could be set accordng to the secfc user s requreent. Generally seakng, the hgher ρ, the hgher r. When ρ = 1, all the resources wll be selected (r=k). Whle ρ = 0, none of the resources wll be selected (r=0). Next, the reference vector should be re-calculated for the to r hgher slarty resources to reresent the nterests of a oble user, as shown below w w / r. k r 1 k R R ( k, w ), 0. n k k where wr denotes the weght of the keyword k n the resource R, and R reresents the reference vector of the node n. n B. Moveent Pattern Analyss and Extracton 1) Current locaton The current locaton nforaton of nodes can be obtaned va the Global Poston Syste (GPS). The current locaton of a node s reresented by the vector lx (, y, z, t ), where ( x, y, z ) s three-denson coordnates of the node and t reresents the testa that the node stays at the oston ( x, y, z ). 2) Stay regon The stay regon A s a hyscal sace where a user stayed over a te threshold t 0. Suose that l( x, y, z, t ) s the

4 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 4 node s oston at te t, and l ( x, y, z, t ) s the node s oston at te t, then the soourn te of a user s T, and the value T s equal to ( t t ). When T s larger than the threshold value t and the dstance between the oston l and the oston l s saller than a threshold value r, we conclude that the oble users are n the sae stay regon. The shae of the regon A s a shere whose radus s r and the center s ( x, y, z ). 3) Moveent attern reresentaton In order to analyze and extract the oveent atterns of a node, the oton traectores of the nodes are requred ncludng the locaton, the start te and the end te. Forula (6) s used to reresent the oton traectory of a node. As shown n Fg. 2, the oton traectory of node and node s the sae fro te t a to te t b. Ths shows the slarty of oveent attern. V (, ) T ( A1( x1, y1, z1, lst( tstart, tend), 1),...., A ( x, y, z, lst( t, t ), )) n n n n start end n where t start reresents the start te when a node oves nto the regon A, and tend reresents the end te when the corresondng node oves out of the regon A. The lst s an array storng ultle te records. The weght value n shere A s calculated usng (7). 1 0 ( lst ( ). tend lst ( ). tstart )) t. where s the length of a lst, and t total reresents the total te. C. County Constructon 1) Sub-county constructon The references are cobned wth the oveent attern of the oble users n order to buld a sub-county. 1 Preference slarty Forula (8) s used to calculate the reference slarty between node and node. S total wk wk k wk wk k1 k1 S. (8) where s the total nuber of coon keywords of the reference vector S, and wk and w k reresent the weghts of the k th coon keyword of the reference vector and S. 2 Moveent attern slarty S Fg. 2. Overla soourn regon at the sae erod. Equaton (9) s used to calculate the oveent attern slarty S between node and node. S n n V n n (, ) 4n r. where V (, ) s the overla sace between the volue of the soourn regon A of the node and the volue of the soourn regon A of node at the sae te erod, both the weght values of the soourn regons resectvely. 3 Constructon rocedure Algorth 1. Constructon of the sub-county and A and are A, Inut: reference and oveent attern vectors of a node N and ts neghbors Outut: sub-county eber lst Begn for each N nb of N do N. brocaststo N nb t N nb.couters S. t f S nb. > T s nb N nb.add N To CoLst N nb.sendonessageto N

5 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 5 f accetedessage s onessage N.addN nb To CoLst Return subcolst End Forula (10) s used to calculate the total slarty between node and node. t S S S, 1. t If S s greater than a redefned thresholdt s, node ons the sub-county of node. In the ntal rocess of sub-countes constructon, node wll broadcast the Hello essage to ts neghbors, and the neghbor nodes use Forula (10) to coute ther total slarty wth node. The neghborng node s added to the sub county when the total slarty value S t s larger than the redefned threshold value. To reduce the overhead, each node saves the to k neghbors. The seudo code for the constructon of the sub-county s shown n Algorth 1. Regardng T s n Algorth 1, T s s drectly related to the sze of each sub-county. T s should be set accordng to the slarty between county ebers and the sze of each sub-county. Generally seakng, the hgher T s, the saller the sub-county. When T s =0, there should be only one sub-county where ts sze s equal to the global county. When T s =1, each sub-county wll be the node tself. After the successful constructon of the sub-county, the anageent node calculates the central locaton vector of the county whch s shown below n n n ( x x, y y, z z ). k k k n k1 n k1 n k1 where n s the nuber of ebers n the sub-county. 2) Node role assgnent and sub-county erger In each sub-county, there are three tyes of nodes, ncludng adnstrators, abassadors and ordnary nodes. An Adnstrator lays the anagng role n a sub-county, and antans the ndexes of all resources belongng to the sub-county. Hence a stable and relable node s chosen as the adnstrator n a sub-county. The adnstrator has two ortant tasks: One s to hel ordnary nodes to search resources wthn or out of the sub-county, and the other s to erodcally collect the nforaton of the ordnary users n the sub-county and to extract the nterest vector usng the AGNES clusterng ethod. The rary resonsblty of an abassador s to brdge the sub-countes n order to for the global vrtual county. To ths end, the abassador regularly oves n and out of the sub-countes. Then, we gve a rocedure of sub-county erger. Ste 1: County reference vectors extracton Adnstrator erodcally collects the reference vectors nforaton of the nodes n the sub-county, and calculates the s(, ) value usng Forula (2), where and reresent any two nodes n the sae sub-county, resectvely. Then the sae clusterng ethod wth the reference extracton s leveraged to get the reference vector of sub-county R. Analogously, we can get the reference vector of global county by calculatng the slarty between the sub-county reference vectors. Ste 2: Sub-county erger The oblty of the abassadors s utlzed to carry the reference vectors of the sub-countes n order to erge slar sub-countes. When an abassador oves nto another sub-county, t frstly calculates the slarty of the nterest vector between the two sub-countes. If ths slarty s larger than the threshold value, the two sub-countes are then erged to for a bgger vrtual county. Ideally, all the slar sub-countes wth coon nterests wll be assocated together to construct a global county. It s noted that the reference vector for the global county s also need to be calculated. D. Message Routng Message routng and data forwardng on the two densonal lane wll reduce the effcency of resource dscovery and transsson. As a result, a greedy algorth s used to rove the effcency of resource dscovery n the three densonal Cartesan coordnate syste. Fg. 3 s a dagra of essage routng. The source node S lans to construct a ath SD to the target node D. After a node B suddenly oves out of the councaton range of node S, ths node needs to calculate ts angle wth nodes EFand, G. As shown n Fg.3, 1 s the angle between SD and SE, 2 s the angle between SD and SF, 3 s the angle between SD and SG. Now, node S chooses node E as the next ho snce 1 beng the nu forwardng angle. After that, node C s also chosen as the next ho. To ensure quck essage forwardng, the su value 1 k 0 should be nu, where, s the th forwardng node. c k

6 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 6 Y S F 2 1 E 3 Fg. 3. Dagra of essage routng. E. Resource Dscovery Process Algorth 2. Search wthn the sub-countes Inut: the request vector of a node Outut: resource holder lst Begn f S QC, < T Q then N.sendQueryTo N Ad else N.rank N nb By S, Z QNb 4 B N C G D X 1) Searchng wthn the sub-county The requester calculates the slarty between the query vector and ts sub-county nterest vector. If ths slarty s lower than the threshold value, the query essage s sent out of the local sub-county. Otherwse, the query essage s sent to the to k neghbors wth hgher slarty. The neghbor contnues to forward ths query essage to ts neghbors f t lacks the requested resource. TTL (te-to-lve) s used to control the search deth and avod excessve overhead. The TTL value decreases one when the essage s forwarded every te. The resource dscovery wll eventually sto when the TTL value becoes zero. Algorth 2 shows the seudo code of the resource dscovery rocess wthn a sub-county. 2) Searchng wthn the global countes The Fg.4 llustrates an exale of searchng wthn the global countes. If the requested resource s not found wthn a sub-county 1-1, the query essage wll be forwarded to ts slar neghborng sub-countes 1-2, 1-3, and 1-4 by the abassador node 1, the abassador node 2 and the abassador node 3 resectvely. And the search wthn the sub-county s recalled agan. The search wthn the global county stos when ether the TTL value of the query essage becoes zero or the requested resources s dscovered. for each N nb of N do N.sendQueryTo N nb wth essage routng Count++ f(n nb ==resource holder) then Fg. 4. Searchng wthn the global countes The searchng rocess wthn the global countes s descrbed n Algorth 3. Algorth 3. Searchng wthn the global countes Return N nb else f (Query.hos<MaxHo) then N.sendQueryTo N next Query.hos++ f Count>k then break f(searchresults == null) then N.sendQueryTo N Ad End Inut: the request vector of Outut: resource holder lst Begn N N Ad. rankc sub ByCentralLocaton for each C sub of N Ad do N Ad. sendqueryto C sub wth essage routng Count++ Searchng wthn sub-countes() f Count>k then break

7 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 7 f(searchresults == null) then N.sendQueryTo N Ad End 3) Global searchng over socal Internet of Thngs Fg. 5 llustrates an exale of global searchng over the socal IoT. End V. PERFORMANCE EVALUATION A. Sulaton Envronent and Paraeters Settng The oortunstc network envronent (ONE) [17] has been used as the sulaton latfor n order to evaluate the erforances of our schee. As shown n Fg. 6, the oble socal actvtes of the users over the SIoT are based on the caus envronent of Jangsu Unversty n Chna. Fg. 5. Global searchng over the socal Internet of Thngs. If the search wthn a global county s not successful, the global search over the socal IoT s trggered. The slarty between the query vector and other vrtual countes ncludng vrtual county 2, vrtual county 3 and vrtual county 4 are calculated, resectvely. And then, the query essage s quckly forwarded to the vrtual county wth hgher slarty through the essage routng. Now, searchng wthn the sub-countes of the corresondng global county s trggered agan. The global searchng rocess over socal Internet of Thngs s descrbed n Algorth 4. Algorth 4. Global searchng over socal Internet of Thngs Inut: the request vector of Outut: resource holder lst Begn P N Ad. rankc vruby S, QC N for each C vru of N Ad do N Ad. sendqueryto C vru wth essage routng Count++ Searchng wthn the global countes() f Count>k then break; Fg. 6. The geograhc a. 100 oble users have been classfed nto four nterest grous and one oveent grou, such that each grou corses 20 users. The four nterest grous nclude the checal nterest grou, the electrcal nterest grou, the scentfc research nsttute s nterest grou and the ebedded syste nterest grou, accordngly. The oveent grou conssts of rando walk users along the roads, as shown n Fg. 6. The resonsblty of the rando walk users s to hel the eber nodes n the nterest grous to carry and forward the essage and data. The corresondng araeter confguraton nforaton s shown n Table 1. TABLE I. SIMULATION PARAMETERS Paraeters Descrton Default values MoveentModel.world Sze( 2 ) Sulaton scenaro area Scenaro.endTe(hour) Sulaton te 12 Scenaro.nrofHosts Nuber of nodes 100 Scenaro.nrofHostGrous Nuber of grous 5 BtInterface.tye BtInterface.transt Seed(Kbs/s) BtInterface.transt Range() Grou.oveentModel Councaton tye nterface Bandwdth 250 Transsson range 10~20 Moveent odel of nodes wthn a grou Moblty Seed(/s) Walkng seed of nodes 0.5~1.5 SleBroadcast Interface ShortestPathMa BasedMoveent Message.Sze(k) Sze of essage 500~1024

8 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 8 Message. Interval(s) Message nterval 1~2 Message.TTL(n) T s T Q The te to lve value for the forwarded essage The threshold value for choosng the to r hgher slarty resources The threshold value for constructon of the sub-county The threshold value for resource query wthn the sub-countes The weght wth reference slarty araeter. The weght wth oveent attern slarty araeter. Our roosed schee RDPM s coared wth the two related ethods - geograhc locaton-based schee (LOC) [12] and the reference slarty-based schee (SPOON) [15] n ters of the success rate of resource dscovery and the average delay. The success rate of resource dscovery s couted as the rato of the nuber of successful queres to the total nuber of the queres. The average delay s the average te used for successful queres. B. Success Rate of Resource Dscovery (b) Intercounty search effcency. (a) Intracounty search effcency. (c) Global search effcency. Fg. 7. Search effcency. We evaluate the search effcency of the three schees based on the ntra-county search, the nter-county search and the global search. Fg. 7(a) dects the ntra-county search effcency coarsons, Fg. 7(b) shows the nter-county search effcency coarsons, and Fg. 7(c) shows the global search effcency coarsons. The LOC schee leverages the slartes of the oveent atterns aong oble users for the urose of constructng countes to search the desred resources. However, ths schee does not exlot the content slarty of the resources, whch akes t less effcent than both the RDPM schee and the SPOON schee. The SPOON schee selects the oble users wth hgher reference slarty over the overlay socal networks n order to construct a county but t does not consder the hyscal councaton dstance between the users. Thus, the success rate of resource dscovery of the SPOON schee s sgnfcantly lower than that of the RDPM schee. The RDPM schee cobnes the advantages of the SPOON wth LOC schee, and hence, t can aarently rove the effcency of resource dscovery.

9 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 9 C. Average Delay Fg. 8. Average delay. Fg. 8 shows the coarson of the three schees n ters of the average delay. Sulaton results show that the average delay of the SPOON s larger aong the three. Ths s because the query essage s forwarded to the node wth the hghest reference slarty n the SPOON schee. However, f the otal forwardng node s out of the councaton range of the requestng node, the transsson of the query essage wll ncur addtonal watng te n oortunstc wreless ad-hoc networks, whch results n hgher average delay. The resource dscovery of the LOC schee can only suort forwardng n roxate SIoT. Hence, the average delay of the LOC schee s lower than that of the SPOON schee. Nevertheless, the LOC schee does not utlze the reference slarty of the oble users. And thus, the resource dscovery of the LOC schee ncurs longer delay te than our roosed schee. Our schee leverages the reference slarty of the oble users to construct nterest countes n roxate SIoT. As shown n Fg. 8, the average delay of the RDPM schee s lower than the other two schees. VI. CONCLUSION AND FUTURE WORK Ths aer rooses a resource dscovery algorth based on reference and oveent attern slarty n dsconnected and delay-tolerant socal Internet of Thngs. Our roosed schee s based on reference and oveent attern slarty as well as ncororates the 3-denson geograhcal locaton awareness to acheve the hgher search effcency and reduce the syste overheads for socal Internet of Thngs. Our algorth has been sulated and evaluated n an oortunstc socal Internet of Thngs envronent. Sulaton results show that our roosed schee outerfors the state-of-the-art resource dscovery schees n ters of the search effcency and the average delay. To further rove the effcency of our resource dscovery algorth and to reduce the wat te of the nodes n oble socal Internet of Thngs, we lan to utlze the characterstc of day-to-day huan socal behavor to desgn an effectve behavor redcton odel to solve the technologcal roble as our future work. ACKNOWLEDGEMENT Ths work was artally suorted by the Natonal Natural Scence Foundaton of Chna under Grant No , the Natural Scence Foundaton of Jangsu Provnce under Grant No.BK and the Senor Professonal Scentfc Research Foundaton of Jangsu Unversty under Grant No.12JDG049. REFERENCES [1] L. Atzora, A. Ierab, G. Morabtoc, M. Ntt, The socal Internet of thngs (SIoT) when socal networks eet the nternet of thngs: concet, archtecture and network, Couter Networks, vol. 56, no.16, , Nov [2] S.M. Allen, M.J. Chorley, G.B. Colobo, E. Jaho, M. Karalooulos, I. Stavrakaks, et al, Exlotng user slarty and socal lnks for cro-blog forwardng n oble oortunstc networks, Pervasve and Moble Coutng, vol. 11, Arl 2014, , Arl [3] S.H. Chen, G.J. Wang, and W.J. Ja June. Cluster-grou based trusted coung for oble socal networks usng lct socal behavoral grah. Future Generaton Couter Systes. [Onlne]. Avalable:htt:// [4] F. L and J. Wu, MOPS: Provdng content-based servce n dsruton-tolerant networks, Proc. the 29th IEEE Int. Conf. on Dstrbuted Coutng Syste(ICDC 09), IEEE Press, Jun. 2009, [5] Y. L, Q. L, D.P. Jn, S. L, H. Pan and L.G. Zeng, Contact duraton aware evaluaton for content dssenaton delay n oble socal network, Wreless Councatons & Moble Coutng, vol. 15, no.3, , Feb [6] E. Pagan, L. Valero and GP. Ross Weak socal tes rove content delvery n behavor-aware oortunstc networks, Ad Hoc Networks, vol. 25, no.pb, , Feb [7] B. Guo, Z. Yu, X. Zhou, and D.Zhang, Oortunstc IoT: Exlorng the socal sde of the nternet of thngs, Proc. the 16th IEEE Int. Conf. on Couter Suorted Cooeratve Work n Desgn (CSCWD 12), IEEE Press, May 2012, [8] S. Msra, R. Barthwal, M. S. Obadat, County detecton n an ntegrated Internet of thngs and socal network archtecture, Proc. the 54th IEEE Global Councatons Conf. (GLOBECOM 12), IEEE Press, Dec 2012, [9] Z.J. Zheng, T.Y. Wang, L.Y. Song, Z. Han and J.J. Wu, Socal-aware ult-fle dssnaton n devce-to-devce overlay networks, Proc. of the 33rd IEEE Int. Conf. on INFOCOM, Couter Councatons Workshos, IEEE Press, Ar. 2014, [10] J. An, X. Gu, W. Zhang, J. Jang, Nodes Socal Relatons Cognton for Moblty-Aware n the Internet of Thngs, Proc. of the 4th IEEE Int. Conf. Internet Thngs Cyber, Phys. Soc. Cout., Thngs/CPSCo, IEEE Press, Oct. 2011, [11] M. C. Gonzales, C. A. Hdalog and A. L. Barabas, Understandng ndvdual huan oblty atterns, Nature, vol. 453, , Jun [12] L. You, J.B. L, C.J. We and L.J. Hu, MPAR: A oveent attern-aware otal routng for socal delay tolerant networks, Ad Hoc Networks, vol.24, no. PA, Jan. 2015, [13] M. Grola, P. Barsocch and S. Chessa, A socal-based servce dscovery rotocol for oble Ad Hoc networks Proc. 12th Annual Int. Conf. on Ad Hoc Networkng Worksho (MED-HOC-NET, 2013), [14] B. Quresh, G.Y. Mn and D. Kouvatsos, An adatve content sharng rotocol for P2P oble socal networks, Proc. of the 24th IEEE Int. Conf. on Advanced Inforaton Networkng and Alcatons Workshos, Ar 2010, [15] K. Chen, H.Y. Shen and H.B. Zhang, Leveragng socal networks for P2P content-based fle sharng n dsconnected MANETs, IEEE Transactons on Moble Coutng, vol. 13, , Feb [16] L. Kaufan and P.Rousseeuw, Fndng grous n data: an ntroducton to cluster analyss, John Wley and Sons, [17] K. Ar, O. Jrg and K. Teeu, The one sulator for DTN rotocol evaluaton, Proc. of the 2nd Int. Conf. on Sulaton Tools and Technques(ICST 09), Mar 2009.

10 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 10 Zhyuan L s an assocate rofessor n the School of Couter Scence and Telecouncaton Engneerng at Jangsu Unversty. He receved hs Ph.D. degree n nforaton and councaton engneerng fro Nanng Unversty of Posts and Telecouncatons, Nanng, n Deceber He s a ebersh of Chna Couter Federaton and ACM. Hs research nterests nclude socal Internet of Thngs, oble eer-to-eer coutng, vehcle networks, and oble cloud coutng. Rulong Chen s a graduate research student n the School of Couter Scence and Telecouncaton Engneerng at Jangsu Unversty. He s a student ebersh of Chna Couter Federaton and ACM. Hs research nterests nclude oble socal networks and resource sharng. Lu Lu s the Professor of Dstrbuted Coutng at the School of Coutng and Matheatcs n the Unversty of Derby and adunct rofessor n the School of Couter Scence and Councaton Engneerng at Jangsu Unversty. Prof. Lu receved hs Ph.D. degree fro Unversty of Surrey (funded by DIF DTC) and M.S. n Data Councaton Systes fro Brunel Unversty. He s the Fellow of Brtsh Couter Socety and Meber of IEEE. Dr. Lu s research nterests are n areas of cloud coutng, servce-orented coutng, eer-to-eer coutng, vrtual coutng and syste of systes engneerng. Geyong Mn s the Professor and Drector of Hgh Perforance Coutng and Networkng (HPCN) Research Grou at the Unversty of Exeter, UK. He receved the PhD degree n Coutng Scence fro the Unversty of Glasgow, UK, n 2003, and the B.Sc. degree n Couter Scence fro Huazhong Unversty of Scence and Technology, Chna, n He oned the Unversty of Bradford as a Lecturer n 2002, becae a Senor Lecturer n 2005 and a Reader n 2007, and was rooted to a Professor n Couter Scence n Hs an research nterests nclude Next-Generaton Internet, Analytcal Modellng, Cloud Coutng, and Bg Data.

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

IEEE Distributed Coordination Function(DCF): Analysis and Enhancement *

IEEE Distributed Coordination Function(DCF): Analysis and Enhancement * IEEE 802. Dstrbuted Coordnaton Functon(DCF): Analyss and Enhanceent * Hatao Wu, Shduan Cheng, Yong Peng, Keng Long, Jan Ma 2 Natonal Key Lab of Swtchng Technology and Telecouncaton Networks, P.O.Box 206,

More information

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO

More information

The ray density estimation of a CT system by a supervised learning algorithm

The ray density estimation of a CT system by a supervised learning algorithm Te ray densty estaton of a CT syste by a suervsed learnng algort Nae : Jongduk Baek Student ID : 5459 Toc y toc s to fnd te ray densty of a new CT syste by usng te learnng algort Background Snce te develoent

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations

Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations Access Delay Analyss of IEEE 82. DCF n the Presence of Hdden tatons Fu-Y Hung and Ivan Marsc CAIP Center, ECE Deartent, Rutgers Unversty Pscataway, NJ 8854-888 {fuyhung, arsc}@ca.rutgers.edu Abstract In

More information

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks

An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks An Energy-Aware QoS Routng Protocol for Wreless Sensor Networks Abstract Recent advances n wreless sensor networks have led to any new routng rotocols secfcally desgned for sensor networks. Alost all of

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

Algorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns

Algorithm for Computer Aided Design Curve Shape Form Generation of Knitting Patterns Algorth for Couter Aded Desgn Curve Shae For Generaton of Knttng Patterns Elena Zahareva-Stoyanova Techncal Unversty of Gabrovo 4 H. Drat str. 500 Gabrovo, ulgara, hone +59 59 Abstract - The knttng ndustry

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks Councatons 07; (): -7 http://www.scencepublshnggroup.co/j/co do: 0.8/j.co.0700. ISSN: 8-9 (Prnt); ISSN: 8-9 (Onlne) Handover Delay Estaton Method for IMS-Based Systes wth Heterogeneous Access Networks

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Delay Analysis of Different Backoff Algorithms in IEEE

Delay Analysis of Different Backoff Algorithms in IEEE Delay Analyss of Dfferent Backoff Algorths n IEEE 82. Ivan N. Vukovc otorola Inc., 44 W. Sure Dr., Arlngton Heghts, IL, 64 USA, Ivan.Vukovc@otorola.co, (847) 632-5963, fax (847) 435-997 Abstract - In ths

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

Sums of exponential functions and their new fundamental properties

Sums of exponential functions and their new fundamental properties Sus of exonental functons and ther new fundaental roertes Yur K. Shestoaloff Abstract hs aer dscovers and roves the fundaental roertes of sus of exonental functon n the for of а heore that s stated as

More information

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections Journal of Web ystes and Applcatons (2017) Vol. 1, Nuuber 1 Clausus centfc Press, Canada Load Balancng Algorth for Web erver Based on Weghted Mnal Connectons Pan Zhu1, a, Jangxng Zhang 2,b College of Inforaton

More information

Routing Time-Constrained Traffic in Wireless Sensor Networks

Routing Time-Constrained Traffic in Wireless Sensor Networks Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Scheduling Workflow Applications on the Heterogeneous Cloud Resources

Scheduling Workflow Applications on the Heterogeneous Cloud Resources Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3 Internatonal Conference on Autoaton, Mechancal Control and Coputatonal Engneerng (AMCCE 05) Research on acton recognton ethod under oble phone vsual sensor Wang Wenbn, Chen Ketang, Chen Langlang 3 Qongzhou

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri* 126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera

More information

Region Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided

Region Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided Regon Segmentaton Readngs: hater 10: 10.1 Addtonal Materals Provded K-means lusterng tet EM lusterng aer Grah Parttonng tet Mean-Shft lusterng aer 1 Image Segmentaton Image segmentaton s the oeraton of

More information

A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS

A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS A FUZZY-LOGIC APPROACH FOR DEVELOPING VARIABLES CONTROL CHARTS AND PROCESS CAPABILITY INDICES UNDER LINGUISTIC MEASUREMENTS Abbas Al-Refae, Areen Obadat 1, Ra H. Fouad 1, and Bassel Hanayneh 1 Deartent

More information

MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH

MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH بسم االله الرحمن الرحيم (الهي همه چيز را به تو مي سپارم ياريم كن) MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH JAVAD AKBARI TORKESTANI Deartment

More information

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET

A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept.

More information

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs Advanced LEACH: A Statc Clusterng-based Heteroneous Routng Protocol for WSNs A. Iqbal 1, M. Akbar 1, N. Javad 1, S. H. Bouk 1, M. Ilah 1, R. D. Khan 2 1 COMSATS Insttute of Informaton Technology, Islamabad,

More information

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Tracing Anonymous Mobile Attackers in Wireless Network

Tracing Anonymous Mobile Attackers in Wireless Network Internatonal Journal of Dgtal Content Technology and ts Applcatons Volue 4, uber 4, July 2010 Tracng Anonyous Moble Attacers n Wreless etwor Mng Hour Yang *1, Shuhpyng Sheh *2 *1 Departent of Inforaton

More information

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network Recognton of Identfers from Shng Contaner Images Usng uzzy Bnarzaton and Enhanced uzzy Neural Networ Kwang-Bae Km Det. of Comuter Engneerng, Slla Unversty, Korea gbm@slla.ac.r Abstract. In ths aer, we

More information

A system based on a modified version of the FCM algorithm for profiling Web users from access log

A system based on a modified version of the FCM algorithm for profiling Web users from access log A syste based on a odfed verson of the FCM algorth for proflng Web users fro access log Paolo Corsn, Laura De Dosso, Beatrce Lazzern, Francesco Marcellon Dpartento d Ingegnera dell Inforazone va Dotsalv,

More information

Void Vertex Genetic Algorithm for Production-Distribution Supply Chain with GTSP Model

Void Vertex Genetic Algorithm for Production-Distribution Supply Chain with GTSP Model ISSN 746-7659 England UK Journal of Inforaton and Coutng Scence Vol. No. 5 26. 259-265 Vod Vertex Genetc Algorth for Producton-Dstrbuton Suly Chan wth GTSP Model X Zhao 2 Jan-lang Ln Han Huang 3 Zh-feng

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, Mar. 2015 872 Copyrght c 2015 KSII Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty Zhgang L 1, Yan

More information

1 Calculation and Analysis of Buffer

1 Calculation and Analysis of Buffer Sep. 5 Journal of Electronc Scence and Technology of Chna Vol.3 No.3 ` Calculaton and Analyss of Destnaton Buffer for ulteda Servce n ole Ad Hoc Network ZHOU Zhong, AO Yu-ng, JIANG Zh-qong. School of Councaton

More information

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks

Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks 414 The Internatonal Arab Journal of Informaton Technology, Vol. 8, No. 4, October 011 Dstrbuted Grd based Robust Clusterng Protocol for Moble Sensor Networks Shahzad Al and Sajjad Madan Department of

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

More information

Color Image Segmentation Based on Adaptive Local Thresholds

Color Image Segmentation Based on Adaptive Local Thresholds Color Iage Segentaton Based on Adaptve Local Thresholds ETY NAVON, OFE MILLE *, AMI AVEBUCH School of Coputer Scence Tel-Avv Unversty, Tel-Avv, 69978, Israel E-Mal * : llero@post.tau.ac.l Fax nuber: 97-3-916084

More information

A Clustering-Based Fast and Stable Routing Protocol for Vehicular Ad Hoc Networks

A Clustering-Based Fast and Stable Routing Protocol for Vehicular Ad Hoc Networks Journal of Physcs: Conference Seres PAPR OPN ACCSS A Clusterng-ased Fast and Stable Routng Protocol for Vehcular Ad Hoc Networks To cte ths artcle: P F Zhao et al 2018 J. Phys.: Conf. Ser. 1060 012050

More information

The Hybrid Mobile Wireless Sensor Networks for Data Gathering

The Hybrid Mobile Wireless Sensor Networks for Data Gathering The Hybrd Moble Wreless Sensor Networks for Data Gatherng Bao Ren Bejng Unv. of Posts & Telecommuncatons, Bejng 876, Chna +86--62287 renb@bupt.edu.cn Jan Ma Noka Research Center, Bejng 3, Chna +86--65392828-2883

More information

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN 21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network

More information

Educational Semantic Networks and their Applications

Educational Semantic Networks and their Applications BUIU Unverstăţ Petrol Gaze dn Ploeşt Vol. X o. /008 77-85 Sera atematcă - Informatcă - Fzcă ducatonal Semantc etwors and ther Alcatons Gabrela ose vu Ionţă Unverstatea Petrol-Gaze dn Ploeşt Bd. Bucureşt

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Making Name-Based Content Routing More Efficient than Link-State Routing

Making Name-Based Content Routing More Efficient than Link-State Routing Makng Name-Based Content Routng More Effcent than Lnk-State Routng Ehsan Hemmat and J.J. Garca-Luna-Aceves, Comuter Engneerng Deartment, UC Santa Cruz, Santa Cruz, CA 95064 PARC, Palo Alto, CA 94304 {

More information

Traffic Classification Method Based On Data Stream Fingerprint

Traffic Classification Method Based On Data Stream Fingerprint 5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence

More information

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn

More information

Relational Analysis based Concurrent Multipath Transfer over Heterogeneous Vehicular Networks

Relational Analysis based Concurrent Multipath Transfer over Heterogeneous Vehicular Networks www.ijcsi.org 1 Relatonal Analyss based Concurrent Multpath Transfer over Heterogeneous Vehcular Networks Yuanlong Cao 1, Changqao Xu 1,2, Janfeng Guan 1, Ja Zhao 3, We Quan 1, Mngchuan Zhang 1 and Hongke

More information

Modelling Spatial Substructure in Wildlife Populations using an Approximation to the Shortest Path Voronoi Diagram

Modelling Spatial Substructure in Wildlife Populations using an Approximation to the Shortest Path Voronoi Diagram 18 th World IMACS / MODSIM Congress, Carns, Australa 13-17 July 2009 http://ssanz.org.au/ods09 Modellng Spatal Substructure n Wldlfe Populatons usng an Approxaton to the Shortest Path Vorono Dagra Stewart,

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,

More information

Learn more at

Learn more at Proceedngs of OMAE 6: 5 th Internatonal Conference on Offshore Mechancs and Arctc Engneerng June 4-9, 6, Haburg, Gerany OMAE6-9366 OPTIMIZATION OF SENSOR PLACEMENT TO CAPTURE RISER VIV RESPONSE Shreenaath

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Measuring Cohesion of Packages in Ada95

Measuring Cohesion of Packages in Ada95 Measurng Coheson of Packages n Ada95 Baowen Xu Zhenqang Chen Departent of Coputer Scence & Departent of Coputer Scence & Engneerng, Southeast Unversty Engneerng, Southeast Unversty Nanjng, Chna, 20096

More information

Multi-Constraint Multi-Processor Resource Allocation

Multi-Constraint Multi-Processor Resource Allocation Mult-Constrant Mult-Processor Resource Allocaton Ar R. B. Behrouzan 1, Dp Goswa 1, Twan Basten 1,2, Marc Gelen 1, Had Alzadeh Ara 1 1 Endhoven Unversty of Technology, Endhoven, The Netherlands 2 TNO Ebedded

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

user journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing.

user journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing. Topc Dscovery user journey: a seres of steps (typcally 4-12) whch represent a scenaro n whch a user mght nteract wth the thng you are desgnng. Two (2) man uses: 1. demonstratng the way users currently

More information

Generalized Spatial Kernel based Fuzzy C-Means Clustering Algorithm for Image Segmentation

Generalized Spatial Kernel based Fuzzy C-Means Clustering Algorithm for Image Segmentation Internatonal Journal of Scence and Research (IJSR, Inda Onlne ISSN: 39-7064 Generalzed Spatal Kernel based Fuzzy -Means lusterng Algorth for Iage Segentaton Pallav Thakur, helpa Lnga Departent of Inforaton

More information

Discovering User Access Pattern Based on Probabilistic Latent Factor Model

Discovering User Access Pattern Based on Probabilistic Latent Factor Model Dscoverng User Access Pattern Based on Probablstc Latent Factor Model Guandong Xu, Yanchun Zhang, Jangang Ma School of Comuter Scence and Mathematcs Vctora Unversty PO Box 14428, VIC 8001, Australa {xu,yzhang,ma}@csm.vu.edu.au

More information

Wireless Temperature Monitoring Overview

Wireless Temperature Monitoring Overview Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information