S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

Size: px
Start display at page:

Download "S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea"

Transcription

1 S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, , Korea ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for wireless sesor etworks. It is based o the IEEE 802. s power savig mechaism (PSM) ad slotted aloha, ad utilizes multiple slots dyamically to improve performace. Existig MAC protocols for sesor etworks reduce eergy cosumptios by itroducig variatio i a active/sleep mechaism. But they may ot provide eergy efficiecy i varyig traffic coditios as well as they did ot address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maitais eergy efficiecy as well as QoS issues like latecy, throughput, ad chael utilizatio. Our umerical results show that H-MAC has sigificat improvemets i QoS parameters tha the existig MAC protocols for sesor etworks while cosumig comparable amout of eergy. KEYWORDS Sesor etworks, MAC protocol, eergy efficiecy.. ITRODUCTIO Wireless sesor etworkig is a emergig techology that has a wide rage of potetial applicatios icludig moitorig, medical systems ad robotic exploratio. Sesor etworks ormally cosists of a large umber of desely deployed distributed odes that orgaize themselves ito a multi-hop wireless etworks. The wireless sesor odes are usually equipped with limited power source. I some applicatio scearios, replacemet of power resource might be ot possible. It is for these reasos that researcher are curretly focusig o the desig of power-aware protocols ad schemes for sesor etworks. These schemes iclude power savig hardware desig, power savig topology desig ad power efficiet MAC layer protocols, to ame a few []. Commuicatio i wireless sesor etworks is divided ito several layers. Oe of those is the Medium Access Cotrol (MAC) layer. MAC is a importat techique that eables the successful operatio of the etwork. MAC protocol tries to avoid collisios so that two iterferig odes do ot trasmit at the same time. There are some MAC protocols that have bee developed for wireless sesor etworks. Typical examples iclude S-MAC ad T- MAC [2][3]. The mai desig goal of the typical MAC protocols is to provide high throughput ad QoS. O the other had, wireless sesor MAC protocol gives higher priority to miimize eergy cosumptio tha QoS requiremets. Eergy gets wasted i traditioal MAC layer protocols due to idle listeig, collisio, protocol overhead, ad over-hearig [2]. S-MAC is proposed to improve eergy efficiecy i wireless sesor etworks. It divides the time ito large frames. Every frame has two parts: a active part (o time) ad a sleepig part. A ode turs off its radio durig the sleep time to preserve the eergy. Durig the active time, a A part of this paper was published i IEEE Seoul Sectio 2008 Poster Compettitio as poster, Seoul,Korea [7]. 0.52/ijcc

2 ode ca commuicate with its eighbors ad trasmits the queued packets durig the sleepig time. Hece, S-MAC saves the uecessary waste of eergy o idle listig. Periodic sleep may result i high latecy (for mutihop sesor etworks) ad low throughput problems [2]. Timeout- MAC protocol is proposed to ehace the performace of S-MAC uder variable traffic coditios. It defies the miimum time out timer TA. T-MAC works similar to S-MAC with oe differece of time out timer. I T-MAC, active time eds whe o activatio has occurred for a time out timer TA. Time-out timer may result i early sleepig ad low throughput problems [3]. Data gatherig MAC falls ito duty cycle based MAC protocols category. The mai aim of D-MAC is to achieve low latecy as well as eergy-efficiecy. D-MAC is a improved slotted aloha protocol where slots are assiged to the sets of odes based o data gatherig tree (Paret-child topology). I D-MAC, low latecy is achieved by assigig subsequet slots to the odes that are successive i the data trasmissio path. However, D- MAC works well oly for tree based structure ad may cause a collisio problem [4]. Patter- MAC is a time slotted protocol. It adaptively determies the sleep-wake up schedules for a ode based o its ow traffic ad the traffic patters of its eighbours. I P-MAC, a ode gets iformatio about the activity i its eighbourhood before had through patters. Based o theses patters, a ode ca put itself ito a log sleep for several time frames whe there is o traffic i the etwork. If there is ay activity i the eighbourhood, a ode will kow this through the patters ad will wake-up whe required. Hece, P-MAC saves more eergy compared to S-MAC without compromisig o the throughput. But it is worthwhile to metio about complexity, collisio, ad overhead problems i P-MAC [5]. To maximize the battery lifetime, sesor etworks MAC protocols implemet the variatio of active/sleep mechaism. This mechaism trades etworks QoS for eergy savigs. However, the propose H-MAC ot oly reduce the comparable amout of eergy but also gets good QoS such as latecy, throughput, ad chael utilizatio. From [2]-[5], we ca compare the previous works o differet poits, ad summarize them as show i table. Table. Compariso table Protocol S-MAC T-MAC D-MAC P-MAC H-MAC Time-Syc. Yes Yes Yes Yes Yes Poit to Poit Suitable Suitable ot- Suitable Suitable Suitable Broadcast ot- ot- ot- Suitable Suitable Suitable Suitable Suitable Covergecast ot- ot- Suitable Suitable Suitable Suitable Suitable Mobility ot- ot- ot- Suitable Suitable Suitable May be May Be Type CSMA CSMA TDMA/S. Slotted CSMA/S. Aloha Aloha Aloha Adaptive to chage Ok Good Weak Good Good Half/Full Duplex Half Half Full Full Full 2. H-MAC PROTOCOL We preset a ew hybrid MAC protocol- H-MAC, for sesor etworks. H-MAC is based o IEEE 802. s PSM mode ad slotted aloha [6]. I H-MAC, time is divided ito large frames, every frame has two parts: a active part (o time) ad a sleepig part. Active part is like ATIM widow i PSM mode ad sleepig part is further divided ito slots, where each slot is bit 09

3 bigger tha data frame. Figure shows the compariso betwee S-MAC ad H-MAC time frames. (a) A time frame of S-MAC protocol (b) A time frame of H-MAC protocol (c) O time frame of H-MAC protocol Figure. Time frame of S-MAC ad H-MAC protocols The odes that have packets to trasmit egotiate slots with the destiatio odes durig active time ad trasmit/receive the data packets i pre-egotiated slots durig sleep time. If the odes do t have to trasmit or receive ay data packets go to sleep durig the sleep-time slots. Figure 2 illustrates the workig of H-MAC. (a) A example topology (b) Data trasmissio i H-MAC protocol Figure 2. Workig of H-MAC protocol If ode A has buffered packets destied for ode B, it will otify ode B by sedig ATIM packet. ode A icludes its preferable slot(s) list i the ATIM packet. ode B, upo receivig the ATIM packet, select slot(s) based o seder s list ad its ow list. The receiver s list has higher priority i selectig the slot(s). After ode B selects a slot(s), it icludes the slot iformatio i the ATIM-ACK packet ad seds it to ode A. Whe ode A receives the 0

4 ATIM-ACK packet, it sees if it ca also select the slot(s) specified i the ATIM-ACK. If ode A selects the slot(s) specified i the ATIM-ACK, ode A seds a ATIM-RES (ATIM- Reservatio) packet to the ode B, with ode A s selected slot(s) specified i the packet. The ATIM-RES is a ew type of packet used i our MAC scheme, which is ot i IEEE 802. PSM. The ATIM-RES packet otifies the odes i the viciity of ode A which slot(s) ode A is goig to use, so that the eighbourig odes ca use this iformatio to update their list. Similarly, the ATIM-ACK packet otifies the odes i the viciity of ode B. After the ATIM (O time) time, ode A ad ode B will trasfer the data packet(s) i selected slot(s). 3. UMERICAL RESULTS I this sectio, we show latecy ad throughput aalysis of S-MAC ad H-MAC protocols. As S-MAC is widely accepted ad popular sesor etworks MAC protocol, we choose S-MAC for compariso with H-MAC [2, 7]. For our calculatio we cosider 0 hops lier topology as show i figure 3. Figure 3. 0 hops lier topology Ad we also cosider 20 slots per cycle, where 8 slots are used for data trasfer ad 2 slots for hadshakig sigals. 3.. Latecy Aalysis: IEEE 802. Protocol [8]: The etire latecy over hops is give by cs, tx () = D( ) = ( t + t ). Where, is the umber of hops. t cs, ad t tx represets backoff ad trasmissio delay respectively. Ad represets the curret hop value, average latecy over hops is give by E[ D( )] = ( t + t ) (2) cs, tx S-MAC Protocol 2 : I S-MAC, a complete cycle is deoted by T f ad has two parts: a active part ad a sleep part. Liste/active time is fixed ad set to 0% of T f (0% duty cycle). The delay at hop is give by As adaptive listeig mode icreases the eergy cosumptio; we are ot cosiderig this mode of S-MAC. However, adaptive listig mode reduces the latecy at the cost of eergy-efficiecy.

5 D = t + t + t (3) s, cs, tx Where, Tf >> ttx ad t s, is the sleep delay. I S-MAC without adaptive listeig, cotetio oly starts at the begiig of each frame. This is give by T = t + t + t (4) f cs, tx s, So the sleep delay at hop is give by t = T ( t + t ). (5) s, f cs, tx Substitutig (5) i to (3) D = T + t t (6) f cs, cs, A packet ca be geerated o the source ode at ay time withi a frame, so the sleep delay o the first hop, t s,, is a radom variable whose value lies i (0, T f ). Suppose t s, is uiformly distributed i (0, T f ). Its mea value is T f 2. Combiig it with (6), the overall delay of a packet over hops is give by D( ) = D + D = 2 ( ) s, cs, tx f cs, cs, = 2 = t + ( ) T + t + t s, f cs, tx = t + t + t + T + t t (7) The average latecy of S-MAC without adaptive liste over hops is give by E[ D( )] = E[ t + ( ) T + T + t ] s, f cs, tx = T 2 + ( ) T + t + t f f cs tx = T T 2 + t + t. f f cs tx (8) From the (8) we ca observe that the multihop latecy liearly icreases with the umber of hops i S-MAC whe each ode strictly follows its sleep schedule(s). H-MAC Protocol: H-MAC is similar to S-MAC with oly oe differece of slotted sleep time. I H-MAC, time frame Tf X is give by Tf x = tactive + Cts, (9) Where C is the umber of equal legth slots ad t active is the liste time same as S-MAC (0% duty cycle). Durig the t active time H-MAC ca reserve the slots for r hops withi the same, so the delay for hop trasmissio over r hops is give by Tf x D T (0) f x r 2

6 From the (0), we ca also calculate the delay for hops as D( ) D () From (0) ad (), we ca calculate the average latecy of H-MAC as = E[ D( )] E[ D ] = ( T ) ( Tf x r ) f x r (2) Where * defie the largest iteger value which is equal to *. From (2) we ca observe that the multihop latecy liearly icreases with the umber of hops i H-MAC as i S-MAC. However, the slop of the lie chages to Tf x r Throughput Aalysis: Here, packet legth is fixed ad represeted by t p. Sleep time is represeted by t Sleep ad equivalet to Ct s. Actual data trasmissio take place oly durig the sleep time ad t Sleep >> t p. Hece, the throughput is give by Th = t t active sleep + t sleep (3) S-MAC Protocol: I S-MAC, a ode ca commuicate throughput is give by p packets to oly oe ode withi a frame time, so the Th s = t active p + t sleep (4) H-MAC Protocol: I H-MAC, a ode ca commuicate p packets to maximum m odes withi a frame time. So the throughput is give by Th x = t = t active active Ct p s + Ct m + Ct s s (5) from (4) ad (5) it is clear that H-MAC gives better throughput coditio compared to S- MAC. 3

7 ow we preset aalysis to fid the ratio of successful trasmitted messages 3 [9]. Here, active time is fixed ad equivalet to S m slots. There are odes to compete for medium/slots. A ode ca trasmit oly oe request. Let be the umber of odes tries to get the same mii-slot amog odes. The request messages are uiformly distributed i a active time. The probability that odes are i a slot is give by biomial distributio as follows P[ X = ] = Sm Sm (6) The above biomial distributio also applies to S m slots, thus the expected value of the umber of slots with odes i a slot is give by E[ X = ] = Sm Sm Sm (7) C represets the umber of slots beig filled with exactly odes. So the average umber of collided messages is give by Sm σ = P[ X = C ] C = E[ X = C ] = 2 c = = 2 = S m (8) = 2 Sm Sm = Sm from (7) ad (8) we ca calculate the ratio of the umber of successfully trasmitted request messages ad the total umber of trasmitted request messages. The ratio is give by σ Ratio = = Sm (9) Figure 4 shows the throughput of the etwork while varyig the umber of packets trasmitted from sik to source. After 8 packets H-MAC s throughput reduces to S-MAC throughput, as H- MAC ca t trasmit the packets simultaeously above 8 packets ad data packets take more cycles to reach sik 4. Figure 5 shows the eergy cosumptio of the etwork, S-MAC ad H- MAC cosumes the same amout eergy. Figure 6 shows the latecy performace of S-MAC ad H-MAC. H-MAC performs otably well compared to S-MAC, as it ca trasmit the data simultaeously to other odes. Figure 7 ad 8 shows the ratio of successful trasmitted message. First result we obtai by varyig the umber of eighbourig odes, ad keepig cycle size of 20 slots. Similarly, secod result we obtai by varyig the umber of slots i give cycle, ad keepig the eighbourig odes costat. Oly for H-MAC protocol. Here, we simplified our result for simplicity; ormally H-MAC will perform better tha S-MAC protocol 4

8 S-MAC H-MAC 0.2 Throughput (Th) umber of Packets Figure 4. Throughput of the etwork x 04 H-MAC S-MAC Total eergy (mj) umber of Packets Figure 5. Total eergy cosumptio 4 2 S-MAC H-MAC 0 Latecy (Cycle) umber of Packets Figure 6. Latecy performace 5

9 0.95 H-MAC Ratio umber of odes Figure 7. Ratio of successful trasmitted messages H-MAC, =0 H-MAC, =5 H-MAC, = Ratio umer of Slots Figure 8. Ratio of successful trasmitted messages 4. COCLUSIOS I this paper, we preset the H-MAC protocol, a hybrid MAC protocol based o IEEE 802. s PSM mode ad slotted aloha, ad utilizes multiple slots dyamically to improve performace. We also preset the umerical results of H-MAC, ad show that H-MAC has sigificat improvemets i QoS parameters tha the existig MAC protocols for sesor etworks while cosumig comparable amout of eergy. REFERECES [] I.F. Akayildiz, W. Su, S. Yogesh, & E. Cayirci, (2008) " A Survey o Sesor etworks, IEEE Commuicatio, August, pp 02-4 [2] W. Ye, J. Heidema, & D. Estri, (2000) A Eergy- Efficiet MAC Protocol for wireless Sesor etworks, i proceedig of IFOCOM 2002, ew York, Jue, pp [3] T. V. Dam & K. Lagedoe, (2003) A Adaptive Eergy-Efficiet MAC Protocol for Wireless Sesor etworks, i proceedig of SeSys 03, Los Ageles, ov., pp

10 [4] G. Lu, B. Krishamachari, & C. Ragavedra, (2004) A Adaptive Eergy-Efficiet ad Low- Latecy MAC for Data Gatherig i Sesor etworks, i proceedig of WMA 04, April [5] T. Zheg, S. Radhakrisha, & V. Saraga, (2005) PMAC: A Adaptive Eergy-Efficiet MAC Protocol for Wireless Sesor etworks, i proceedig of IPDPS 05, April, pp [6] IEEE 802. Workig Group, (999) Wireless LA Medium Access Cotrol (MAC) ad Physical Layer (PHY) specificatios. [7] S.Mehta & K.S. Kwak, (2008) H-MAC: A Hybrid MAC Protocol for Wireless Sesor etworks, i proceedig of IEEE Seoul Chapter Paper Cotest, December, pp:705/706. [8] G.Biachi, Performace Aalysis of IEEE 802. distributed coordiatio fuctio, IEEE JSAC, Vol.8,o-3, pp , Mar [9] R. Rom ad M.Sidi, Multiple Access Protocols: Performace ad Aalysis, Spriger-Verlag Publicatio, 989. Authors S.Mehta received the B.E. ad M.S degrees both i Electroics Egieerig from Mumbai Uiversity, Mumbai, Idia, ad Ajou Uiversity, Korea i 2002 ad 2005, respectively. He is curretly pursuig the Ph.D. degree i Telecommuicatio egieerig from the Iha Uiversity, Korea. His research iterests are i the area performace aalysis of wireless etworks ad RFID systems. K. S. Kwak received the B.S. degree from Iha Uiversity, Korea i 977, ad the M.S. degree from the Uiversity of Souther Califoria i 98 ad the Ph.D. degree from the Uiversity of Califoria at Sa Diego i 988, respectively. From 988 to 989 he was a Member of Techical Staff at Hughes etwork Systems, Sa Diego, Califoria. From 989 to 990 he was with the IBM etwork Aalysis Ceter at Research Triagle Park, orth Carolia. Sice the he has bee with the School of Iformatio ad Commuicatio, Iha Uiversity, Korea as a professor. He had bee the chairma of the School of Electrical ad Computer Egieerig from 999 to 2000 ad the dea of the Graduate School of Iformatio Techology ad Telecommuicatios from 200 to 2002 at Iha Uiversity, Icho, Korea. He is the curret director of Advaced IT Research Ceter of Iha Uiversity, ad UWB Wireless Commuicatios Research Ceter, a key govermet IT research ceter, Korea. He has bee the Korea Istitute of Commuicatio Scieces (KICS) s presidet of 2006 year term. I 993, he received Egieerig College Youg Ivestigator Achievemet Award from Iha Uiversity, ad a distiguished service medal from the Istitute of Electroics Egieers of Korea (IEEK). I 996 ad 999, he received distiguished service medals from the KICS. He received the Iha Uiversity Egieerig Paper Award ad the LG Paper Award i 998, ad Motorola Paper Award i His research iterests iclude multiple access commuicatio systems, mobile commuicatio systems, UWB radio systems ad ad-hoc etworks, high-performace wireless Iteret. 7

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks

GTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding Calculatio ad Simulatio of Trasmissio Reliability i Wireless Sesor Network Based o Network Codig https://doi.org/0.399/ijoe.v3i2.7883 Zhifu Lua Weifag Uiversity of Sciece ad Techology, Weifag, Chia 92268476@qq.com

More information

Admission control issues in sensor clusters

Admission control issues in sensor clusters Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ISSN 2348 2370 Vol.08,Issue.12, September-2016, Pages:2397-2401 www.ijatir.org Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Design of efficient, virtual non-blocking optical switches

Design of efficient, virtual non-blocking optical switches Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible World Scietific Research Joural (WSRJ) ISSN: 2472-3703 www.wsr-j.org Research o Fresel Les Optical Receivig Atea i Idoor Visible Light Commuicatio Zhihua Du College of Electroics Egieerig, Chogqig Uiversity

More information

Force Network Analysis using Complementary Energy

Force Network Analysis using Complementary Energy orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,

More information

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*

A New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN* A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

CapNet: A Real-Time Wireless Management Network for Data Center Power Capping

CapNet: A Real-Time Wireless Management Network for Data Center Power Capping 24 IEEE Real-Time Systems Symposium CapNet: A Real-Time Wireless Maagemet Network for Data Ceter Power Cappig Abusayeed Saifullah, Sriram Sakar, Jie Liu, Cheyag Lu, Raveer Chadra, ad Bodhi Priyatha Washigto

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

An upper bound model for TCP and UDP throughput in IPv4 and IPv6

An upper bound model for TCP and UDP throughput in IPv4 and IPv6 ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity

More information

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

Σ P(i) ( depth T (K i ) + 1),

Σ P(i) ( depth T (K i ) + 1), EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE

A Generalized Markov Chain Model for Effective Analysis of Slotted IEEE A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Proceedigs, 11 th FIG Symposium o Deformatio Measuremets, Satorii, Greece, 2003. DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Michaela Haberler, Heribert Kahme

More information

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:

More information

Reducing SDRAM Energy Consumption in Embedded Systems Λ

Reducing SDRAM Energy Consumption in Embedded Systems Λ Reducig SDRAM Eergy Cosumptio i Embedded Systems Λ Jelea Trajkovic, Alexader Veidebaum Uiversity of Califoria, Irvie fjeleat,alexvg@ics.uci.edu Abstract DRAM eergy cosumptio i embedded systems ca be very

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems

Research Article Optimal Configuration of Virtual Links for Avionics Network Systems Iteratioal Joural of Aerospace Egieerig Volume 205, Article ID 329820, 9 pages http://dx.doi.org/0.55/205/329820 Research Article Optimal Cofiguratio of Virtual Liks for Avioics Network Systems Dogha A,

More information

Admission control approaches in the IMS presence service

Admission control approaches in the IMS presence service Bod Uiversity epublicatios@bod Iformatio Techology papers Bod Busiess School Jauary 6 Admissio cotrol approaches i the IMS presece service Muhammad T. Alam Bod Uiversity, Muhammad_Alam@bod.edu.au Zheg

More information

Abstract With the evolution of the Internet, multicast communications seem particularly well adapted for large scale

Abstract With the evolution of the Internet, multicast communications seem particularly well adapted for large scale (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, Aalysis of the various key maagemet algorithms ad ew proposal i the secure multicast commuicatios Joe Prathap P M. Departmet of Iformatio

More information

Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications

Analysis of End-to-End Packet Delay for Internet of Things in Wireless Communications (IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Aalysis of Ed-to-Ed Packet Delay for Iteret of Thigs i Wireless Commuicatios Imae Maslouhi 1 Dept: Electroics, Iformatics ad Telecommuicatios

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information