S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea
|
|
- Evan Gibbs
- 5 years ago
- Views:
Transcription
1 S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, , Korea ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for wireless sesor etworks. It is based o the IEEE 802. s power savig mechaism (PSM) ad slotted aloha, ad utilizes multiple slots dyamically to improve performace. Existig MAC protocols for sesor etworks reduce eergy cosumptios by itroducig variatio i a active/sleep mechaism. But they may ot provide eergy efficiecy i varyig traffic coditios as well as they did ot address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maitais eergy efficiecy as well as QoS issues like latecy, throughput, ad chael utilizatio. Our umerical results show that H-MAC has sigificat improvemets i QoS parameters tha the existig MAC protocols for sesor etworks while cosumig comparable amout of eergy. KEYWORDS Sesor etworks, MAC protocol, eergy efficiecy.. ITRODUCTIO Wireless sesor etworkig is a emergig techology that has a wide rage of potetial applicatios icludig moitorig, medical systems ad robotic exploratio. Sesor etworks ormally cosists of a large umber of desely deployed distributed odes that orgaize themselves ito a multi-hop wireless etworks. The wireless sesor odes are usually equipped with limited power source. I some applicatio scearios, replacemet of power resource might be ot possible. It is for these reasos that researcher are curretly focusig o the desig of power-aware protocols ad schemes for sesor etworks. These schemes iclude power savig hardware desig, power savig topology desig ad power efficiet MAC layer protocols, to ame a few []. Commuicatio i wireless sesor etworks is divided ito several layers. Oe of those is the Medium Access Cotrol (MAC) layer. MAC is a importat techique that eables the successful operatio of the etwork. MAC protocol tries to avoid collisios so that two iterferig odes do ot trasmit at the same time. There are some MAC protocols that have bee developed for wireless sesor etworks. Typical examples iclude S-MAC ad T- MAC [2][3]. The mai desig goal of the typical MAC protocols is to provide high throughput ad QoS. O the other had, wireless sesor MAC protocol gives higher priority to miimize eergy cosumptio tha QoS requiremets. Eergy gets wasted i traditioal MAC layer protocols due to idle listeig, collisio, protocol overhead, ad over-hearig [2]. S-MAC is proposed to improve eergy efficiecy i wireless sesor etworks. It divides the time ito large frames. Every frame has two parts: a active part (o time) ad a sleepig part. A ode turs off its radio durig the sleep time to preserve the eergy. Durig the active time, a A part of this paper was published i IEEE Seoul Sectio 2008 Poster Compettitio as poster, Seoul,Korea [7]. 0.52/ijcc
2 ode ca commuicate with its eighbors ad trasmits the queued packets durig the sleepig time. Hece, S-MAC saves the uecessary waste of eergy o idle listig. Periodic sleep may result i high latecy (for mutihop sesor etworks) ad low throughput problems [2]. Timeout- MAC protocol is proposed to ehace the performace of S-MAC uder variable traffic coditios. It defies the miimum time out timer TA. T-MAC works similar to S-MAC with oe differece of time out timer. I T-MAC, active time eds whe o activatio has occurred for a time out timer TA. Time-out timer may result i early sleepig ad low throughput problems [3]. Data gatherig MAC falls ito duty cycle based MAC protocols category. The mai aim of D-MAC is to achieve low latecy as well as eergy-efficiecy. D-MAC is a improved slotted aloha protocol where slots are assiged to the sets of odes based o data gatherig tree (Paret-child topology). I D-MAC, low latecy is achieved by assigig subsequet slots to the odes that are successive i the data trasmissio path. However, D- MAC works well oly for tree based structure ad may cause a collisio problem [4]. Patter- MAC is a time slotted protocol. It adaptively determies the sleep-wake up schedules for a ode based o its ow traffic ad the traffic patters of its eighbours. I P-MAC, a ode gets iformatio about the activity i its eighbourhood before had through patters. Based o theses patters, a ode ca put itself ito a log sleep for several time frames whe there is o traffic i the etwork. If there is ay activity i the eighbourhood, a ode will kow this through the patters ad will wake-up whe required. Hece, P-MAC saves more eergy compared to S-MAC without compromisig o the throughput. But it is worthwhile to metio about complexity, collisio, ad overhead problems i P-MAC [5]. To maximize the battery lifetime, sesor etworks MAC protocols implemet the variatio of active/sleep mechaism. This mechaism trades etworks QoS for eergy savigs. However, the propose H-MAC ot oly reduce the comparable amout of eergy but also gets good QoS such as latecy, throughput, ad chael utilizatio. From [2]-[5], we ca compare the previous works o differet poits, ad summarize them as show i table. Table. Compariso table Protocol S-MAC T-MAC D-MAC P-MAC H-MAC Time-Syc. Yes Yes Yes Yes Yes Poit to Poit Suitable Suitable ot- Suitable Suitable Suitable Broadcast ot- ot- ot- Suitable Suitable Suitable Suitable Suitable Covergecast ot- ot- Suitable Suitable Suitable Suitable Suitable Mobility ot- ot- ot- Suitable Suitable Suitable May be May Be Type CSMA CSMA TDMA/S. Slotted CSMA/S. Aloha Aloha Aloha Adaptive to chage Ok Good Weak Good Good Half/Full Duplex Half Half Full Full Full 2. H-MAC PROTOCOL We preset a ew hybrid MAC protocol- H-MAC, for sesor etworks. H-MAC is based o IEEE 802. s PSM mode ad slotted aloha [6]. I H-MAC, time is divided ito large frames, every frame has two parts: a active part (o time) ad a sleepig part. Active part is like ATIM widow i PSM mode ad sleepig part is further divided ito slots, where each slot is bit 09
3 bigger tha data frame. Figure shows the compariso betwee S-MAC ad H-MAC time frames. (a) A time frame of S-MAC protocol (b) A time frame of H-MAC protocol (c) O time frame of H-MAC protocol Figure. Time frame of S-MAC ad H-MAC protocols The odes that have packets to trasmit egotiate slots with the destiatio odes durig active time ad trasmit/receive the data packets i pre-egotiated slots durig sleep time. If the odes do t have to trasmit or receive ay data packets go to sleep durig the sleep-time slots. Figure 2 illustrates the workig of H-MAC. (a) A example topology (b) Data trasmissio i H-MAC protocol Figure 2. Workig of H-MAC protocol If ode A has buffered packets destied for ode B, it will otify ode B by sedig ATIM packet. ode A icludes its preferable slot(s) list i the ATIM packet. ode B, upo receivig the ATIM packet, select slot(s) based o seder s list ad its ow list. The receiver s list has higher priority i selectig the slot(s). After ode B selects a slot(s), it icludes the slot iformatio i the ATIM-ACK packet ad seds it to ode A. Whe ode A receives the 0
4 ATIM-ACK packet, it sees if it ca also select the slot(s) specified i the ATIM-ACK. If ode A selects the slot(s) specified i the ATIM-ACK, ode A seds a ATIM-RES (ATIM- Reservatio) packet to the ode B, with ode A s selected slot(s) specified i the packet. The ATIM-RES is a ew type of packet used i our MAC scheme, which is ot i IEEE 802. PSM. The ATIM-RES packet otifies the odes i the viciity of ode A which slot(s) ode A is goig to use, so that the eighbourig odes ca use this iformatio to update their list. Similarly, the ATIM-ACK packet otifies the odes i the viciity of ode B. After the ATIM (O time) time, ode A ad ode B will trasfer the data packet(s) i selected slot(s). 3. UMERICAL RESULTS I this sectio, we show latecy ad throughput aalysis of S-MAC ad H-MAC protocols. As S-MAC is widely accepted ad popular sesor etworks MAC protocol, we choose S-MAC for compariso with H-MAC [2, 7]. For our calculatio we cosider 0 hops lier topology as show i figure 3. Figure 3. 0 hops lier topology Ad we also cosider 20 slots per cycle, where 8 slots are used for data trasfer ad 2 slots for hadshakig sigals. 3.. Latecy Aalysis: IEEE 802. Protocol [8]: The etire latecy over hops is give by cs, tx () = D( ) = ( t + t ). Where, is the umber of hops. t cs, ad t tx represets backoff ad trasmissio delay respectively. Ad represets the curret hop value, average latecy over hops is give by E[ D( )] = ( t + t ) (2) cs, tx S-MAC Protocol 2 : I S-MAC, a complete cycle is deoted by T f ad has two parts: a active part ad a sleep part. Liste/active time is fixed ad set to 0% of T f (0% duty cycle). The delay at hop is give by As adaptive listeig mode icreases the eergy cosumptio; we are ot cosiderig this mode of S-MAC. However, adaptive listig mode reduces the latecy at the cost of eergy-efficiecy.
5 D = t + t + t (3) s, cs, tx Where, Tf >> ttx ad t s, is the sleep delay. I S-MAC without adaptive listeig, cotetio oly starts at the begiig of each frame. This is give by T = t + t + t (4) f cs, tx s, So the sleep delay at hop is give by t = T ( t + t ). (5) s, f cs, tx Substitutig (5) i to (3) D = T + t t (6) f cs, cs, A packet ca be geerated o the source ode at ay time withi a frame, so the sleep delay o the first hop, t s,, is a radom variable whose value lies i (0, T f ). Suppose t s, is uiformly distributed i (0, T f ). Its mea value is T f 2. Combiig it with (6), the overall delay of a packet over hops is give by D( ) = D + D = 2 ( ) s, cs, tx f cs, cs, = 2 = t + ( ) T + t + t s, f cs, tx = t + t + t + T + t t (7) The average latecy of S-MAC without adaptive liste over hops is give by E[ D( )] = E[ t + ( ) T + T + t ] s, f cs, tx = T 2 + ( ) T + t + t f f cs tx = T T 2 + t + t. f f cs tx (8) From the (8) we ca observe that the multihop latecy liearly icreases with the umber of hops i S-MAC whe each ode strictly follows its sleep schedule(s). H-MAC Protocol: H-MAC is similar to S-MAC with oly oe differece of slotted sleep time. I H-MAC, time frame Tf X is give by Tf x = tactive + Cts, (9) Where C is the umber of equal legth slots ad t active is the liste time same as S-MAC (0% duty cycle). Durig the t active time H-MAC ca reserve the slots for r hops withi the same, so the delay for hop trasmissio over r hops is give by Tf x D T (0) f x r 2
6 From the (0), we ca also calculate the delay for hops as D( ) D () From (0) ad (), we ca calculate the average latecy of H-MAC as = E[ D( )] E[ D ] = ( T ) ( Tf x r ) f x r (2) Where * defie the largest iteger value which is equal to *. From (2) we ca observe that the multihop latecy liearly icreases with the umber of hops i H-MAC as i S-MAC. However, the slop of the lie chages to Tf x r Throughput Aalysis: Here, packet legth is fixed ad represeted by t p. Sleep time is represeted by t Sleep ad equivalet to Ct s. Actual data trasmissio take place oly durig the sleep time ad t Sleep >> t p. Hece, the throughput is give by Th = t t active sleep + t sleep (3) S-MAC Protocol: I S-MAC, a ode ca commuicate throughput is give by p packets to oly oe ode withi a frame time, so the Th s = t active p + t sleep (4) H-MAC Protocol: I H-MAC, a ode ca commuicate p packets to maximum m odes withi a frame time. So the throughput is give by Th x = t = t active active Ct p s + Ct m + Ct s s (5) from (4) ad (5) it is clear that H-MAC gives better throughput coditio compared to S- MAC. 3
7 ow we preset aalysis to fid the ratio of successful trasmitted messages 3 [9]. Here, active time is fixed ad equivalet to S m slots. There are odes to compete for medium/slots. A ode ca trasmit oly oe request. Let be the umber of odes tries to get the same mii-slot amog odes. The request messages are uiformly distributed i a active time. The probability that odes are i a slot is give by biomial distributio as follows P[ X = ] = Sm Sm (6) The above biomial distributio also applies to S m slots, thus the expected value of the umber of slots with odes i a slot is give by E[ X = ] = Sm Sm Sm (7) C represets the umber of slots beig filled with exactly odes. So the average umber of collided messages is give by Sm σ = P[ X = C ] C = E[ X = C ] = 2 c = = 2 = S m (8) = 2 Sm Sm = Sm from (7) ad (8) we ca calculate the ratio of the umber of successfully trasmitted request messages ad the total umber of trasmitted request messages. The ratio is give by σ Ratio = = Sm (9) Figure 4 shows the throughput of the etwork while varyig the umber of packets trasmitted from sik to source. After 8 packets H-MAC s throughput reduces to S-MAC throughput, as H- MAC ca t trasmit the packets simultaeously above 8 packets ad data packets take more cycles to reach sik 4. Figure 5 shows the eergy cosumptio of the etwork, S-MAC ad H- MAC cosumes the same amout eergy. Figure 6 shows the latecy performace of S-MAC ad H-MAC. H-MAC performs otably well compared to S-MAC, as it ca trasmit the data simultaeously to other odes. Figure 7 ad 8 shows the ratio of successful trasmitted message. First result we obtai by varyig the umber of eighbourig odes, ad keepig cycle size of 20 slots. Similarly, secod result we obtai by varyig the umber of slots i give cycle, ad keepig the eighbourig odes costat. Oly for H-MAC protocol. Here, we simplified our result for simplicity; ormally H-MAC will perform better tha S-MAC protocol 4
8 S-MAC H-MAC 0.2 Throughput (Th) umber of Packets Figure 4. Throughput of the etwork x 04 H-MAC S-MAC Total eergy (mj) umber of Packets Figure 5. Total eergy cosumptio 4 2 S-MAC H-MAC 0 Latecy (Cycle) umber of Packets Figure 6. Latecy performace 5
9 0.95 H-MAC Ratio umber of odes Figure 7. Ratio of successful trasmitted messages H-MAC, =0 H-MAC, =5 H-MAC, = Ratio umer of Slots Figure 8. Ratio of successful trasmitted messages 4. COCLUSIOS I this paper, we preset the H-MAC protocol, a hybrid MAC protocol based o IEEE 802. s PSM mode ad slotted aloha, ad utilizes multiple slots dyamically to improve performace. We also preset the umerical results of H-MAC, ad show that H-MAC has sigificat improvemets i QoS parameters tha the existig MAC protocols for sesor etworks while cosumig comparable amout of eergy. REFERECES [] I.F. Akayildiz, W. Su, S. Yogesh, & E. Cayirci, (2008) " A Survey o Sesor etworks, IEEE Commuicatio, August, pp 02-4 [2] W. Ye, J. Heidema, & D. Estri, (2000) A Eergy- Efficiet MAC Protocol for wireless Sesor etworks, i proceedig of IFOCOM 2002, ew York, Jue, pp [3] T. V. Dam & K. Lagedoe, (2003) A Adaptive Eergy-Efficiet MAC Protocol for Wireless Sesor etworks, i proceedig of SeSys 03, Los Ageles, ov., pp
10 [4] G. Lu, B. Krishamachari, & C. Ragavedra, (2004) A Adaptive Eergy-Efficiet ad Low- Latecy MAC for Data Gatherig i Sesor etworks, i proceedig of WMA 04, April [5] T. Zheg, S. Radhakrisha, & V. Saraga, (2005) PMAC: A Adaptive Eergy-Efficiet MAC Protocol for Wireless Sesor etworks, i proceedig of IPDPS 05, April, pp [6] IEEE 802. Workig Group, (999) Wireless LA Medium Access Cotrol (MAC) ad Physical Layer (PHY) specificatios. [7] S.Mehta & K.S. Kwak, (2008) H-MAC: A Hybrid MAC Protocol for Wireless Sesor etworks, i proceedig of IEEE Seoul Chapter Paper Cotest, December, pp:705/706. [8] G.Biachi, Performace Aalysis of IEEE 802. distributed coordiatio fuctio, IEEE JSAC, Vol.8,o-3, pp , Mar [9] R. Rom ad M.Sidi, Multiple Access Protocols: Performace ad Aalysis, Spriger-Verlag Publicatio, 989. Authors S.Mehta received the B.E. ad M.S degrees both i Electroics Egieerig from Mumbai Uiversity, Mumbai, Idia, ad Ajou Uiversity, Korea i 2002 ad 2005, respectively. He is curretly pursuig the Ph.D. degree i Telecommuicatio egieerig from the Iha Uiversity, Korea. His research iterests are i the area performace aalysis of wireless etworks ad RFID systems. K. S. Kwak received the B.S. degree from Iha Uiversity, Korea i 977, ad the M.S. degree from the Uiversity of Souther Califoria i 98 ad the Ph.D. degree from the Uiversity of Califoria at Sa Diego i 988, respectively. From 988 to 989 he was a Member of Techical Staff at Hughes etwork Systems, Sa Diego, Califoria. From 989 to 990 he was with the IBM etwork Aalysis Ceter at Research Triagle Park, orth Carolia. Sice the he has bee with the School of Iformatio ad Commuicatio, Iha Uiversity, Korea as a professor. He had bee the chairma of the School of Electrical ad Computer Egieerig from 999 to 2000 ad the dea of the Graduate School of Iformatio Techology ad Telecommuicatios from 200 to 2002 at Iha Uiversity, Icho, Korea. He is the curret director of Advaced IT Research Ceter of Iha Uiversity, ad UWB Wireless Commuicatios Research Ceter, a key govermet IT research ceter, Korea. He has bee the Korea Istitute of Commuicatio Scieces (KICS) s presidet of 2006 year term. I 993, he received Egieerig College Youg Ivestigator Achievemet Award from Iha Uiversity, ad a distiguished service medal from the Istitute of Electroics Egieers of Korea (IEEK). I 996 ad 999, he received distiguished service medals from the KICS. He received the Iha Uiversity Egieerig Paper Award ad the LG Paper Award i 998, ad Motorola Paper Award i His research iterests iclude multiple access commuicatio systems, mobile commuicatio systems, UWB radio systems ad ad-hoc etworks, high-performace wireless Iteret. 7
Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationHistory Based Probabilistic Backoff Algorithm
America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationEnergy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless
More informationRandom Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach
Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationInterference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks
Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh
More informationMarkov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size
Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA
More informationGTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationSECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA
ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationLecture 10 Collision resolution. Collision resolution
Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationCalculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding
Calculatio ad Simulatio of Trasmissio Reliability i Wireless Sesor Network Based o Network Codig https://doi.org/0.399/ijoe.v3i2.7883 Zhifu Lua Weifag Uiversity of Sciece ad Techology, Weifag, Chia 92268476@qq.com
More informationAdmission control issues in sensor clusters
Admissio cotrol issues i 802.15.4 sesor clusters Jelea Mišić, Shairmia Shafi, ad Vojislav B. Mišić Departmet of Computer Sciece, Uiversity of Maitoba Wiipeg, Maitoba, Caada PACS umbers: Valid PACS appear
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationQuality of Service. Spring 2018 CS 438 Staff - University of Illinois 1
Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2
More informationCost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.
ISSN 2348 2370 Vol.08,Issue.12, September-2016, Pages:2397-2401 www.ijatir.org Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU
More informationMedia Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1
Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationDesign of efficient, virtual non-blocking optical switches
Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig
More informationA Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationECE4050 Data Structures and Algorithms. Lecture 6: Searching
ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated
More informationMAC Throughput Improvement Using Adaptive Contention Window
Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationWorld Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible
World Scietific Research Joural (WSRJ) ISSN: 2472-3703 www.wsr-j.org Research o Fresel Les Optical Receivig Atea i Idoor Visible Light Commuicatio Zhihua Du College of Electroics Egieerig, Chogqig Uiversity
More informationForce Network Analysis using Complementary Energy
orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,
More informationA New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*
A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,
More informationSecure Software Upload in an Intelligent Vehicle via Wireless Communication Links
Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationCourse Site: Copyright 2012, Elsevier Inc. All rights reserved.
Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationCapNet: A Real-Time Wireless Management Network for Data Center Power Capping
24 IEEE Real-Time Systems Symposium CapNet: A Real-Time Wireless Maagemet Network for Data Ceter Power Cappig Abusayeed Saifullah, Sriram Sakar, Jie Liu, Cheyag Lu, Raveer Chadra, ad Bodhi Priyatha Washigto
More informationThe Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems
The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationLoad balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *
Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationAccuracy Improvement in Camera Calibration
Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z
More informationAn Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network
A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationFCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks
FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,
More informationMalicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationA Study on the Performance of Cholesky-Factorization using MPI
A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio
More informationMultiprocessors. HPC Prof. Robert van Engelen
Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies
More informationAPPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS
APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationGuaranteeing Hard Real Time End-to-End Communications Deadlines
Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More informationOn Nonblocking Folded-Clos Networks in Computer Communication Environments
O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationIdentification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.
Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationAdaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1
Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network
More informationRelay Placement Based on Divide-and-Conquer
Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber
More informationHashing Functions Performance in Packet Classification
Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,
More informationAn upper bound model for TCP and UDP throughput in IPv4 and IPv6
ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity
More informationAdaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery
Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard
More informationK-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns
K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationPartition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration
Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL
More informationΣ P(i) ( depth T (K i ) + 1),
EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More informationThe CCITT Communication Protocol for Videophone Teleconferencing Equipment
The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract
More information27 Refraction, Dispersion, Internal Reflection
Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet
More informationUsing a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations
Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu
More informationA Generalized Markov Chain Model for Effective Analysis of Slotted IEEE
A Geeralized Markov Chai Model for Effective Aalysis of Slotted IEEE 8..4 Pagu Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischioe, Karl Herik Johasso Abstract A geeralized aalysis of the IEEE 8..4
More informationEffect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions
Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural
More informationDETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION
Proceedigs, 11 th FIG Symposium o Deformatio Measuremets, Satorii, Greece, 2003. DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Michaela Haberler, Heribert Kahme
More informationTHIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk
THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:
More informationReducing SDRAM Energy Consumption in Embedded Systems Λ
Reducig SDRAM Eergy Cosumptio i Embedded Systems Λ Jelea Trajkovic, Alexader Veidebaum Uiversity of Califoria, Irvie fjeleat,alexvg@ics.uci.edu Abstract DRAM eergy cosumptio i embedded systems ca be very
More informationANN WHICH COVERS MLP AND RBF
ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi
More informationResearch Article Optimal Configuration of Virtual Links for Avionics Network Systems
Iteratioal Joural of Aerospace Egieerig Volume 205, Article ID 329820, 9 pages http://dx.doi.org/0.55/205/329820 Research Article Optimal Cofiguratio of Virtual Liks for Avioics Network Systems Dogha A,
More informationAdmission control approaches in the IMS presence service
Bod Uiversity epublicatios@bod Iformatio Techology papers Bod Busiess School Jauary 6 Admissio cotrol approaches i the IMS presece service Muhammad T. Alam Bod Uiversity, Muhammad_Alam@bod.edu.au Zheg
More informationAbstract With the evolution of the Internet, multicast communications seem particularly well adapted for large scale
(IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, Aalysis of the various key maagemet algorithms ad ew proposal i the secure multicast commuicatios Joe Prathap P M. Departmet of Iformatio
More informationAnalysis of End-to-End Packet Delay for Internet of Things in Wireless Communications
(IJACSA) Iteratioal Joural of Advaced Computer Sciece ad Applicatios, Aalysis of Ed-to-Ed Packet Delay for Iteret of Thigs i Wireless Commuicatios Imae Maslouhi 1 Dept: Electroics, Iformatics ad Telecommuicatios
More informationNew Results on Energy of Graphs of Small Order
Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order
More information