EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS

Size: px
Start display at page:

Download "EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS"

Transcription

1 FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti, Coimbatoe. -mail: 1 sheejaajize@gmail.com, 2 siamu.vp@gmail.com ABSTRACT In ecent yeas, MANT is the popula and gowing netwok used in vaious applications. Hee the mobile nodes ae andomly moving without any access point. Due to mobility of nodes, enegy consumption of the netwok goes highe. Moe enegy consumption occus due to etansmission of packets and occuence of packet loss unlimitedly. So the main goal of the netwok is to ensue moe enegy efficiency. To povide minimum enegy consumption and avoiding moe congestion, enegy consumption model and multipath outing scheme is needed in netwoks. In this eseach pape, we developed an fficient negy based Congestion Contol Scheme (CCS) fo congestion avoidance and to impove enegy efficiency of the mobile nodes. Hee the coss laye design is deployed to impove the netwok pefomance. The multipath outing is focussed to avoid congestion and to incease netwok lifetime. We also demonstated the enegy consumption mathematical model to illustate the node s minimum enegy consumption level in the netwok. Pobability of the etansmission of packets is educed with the help of calculating the enegy level of data and acknowledgment packets. By using extensive simulation, the poposed scheme achieves minimum enegy consumption, low packet loss atio, high packet delivey atio, low end to end delay and ovehead than ou pevious schemes like CAS, CLSMRSCA. Keywods: MANT, Pobability of etansmission of packets, Coss Laye design, Multipath Routing, enegy consumption model, packet delivey atio, packet loss atio, end to end delay, ovehead and netwok lifetime 1 INTRODUCTION 1.1 Mobile Ad Hoc Netwoks (MANT) Mobile Ad hoc Netwoks (MANT) consist of wieless nodes that fom a communications netwok among themselves without a fixed infastuctue. Topology changes in MANT usually occu due to the mobility of a paticipating node o beakdown of a node due to loss of enegy in that node. These dynamic conditions disupt the smooth communication between needs in the netwok. Conceptually, in MANT, a node may eithe function as an end node o as a oute fowading data packets between end nodes. Hence the fitness of the node in tems of available enegy in the node becomes an impotant issue duing the selection of an intemediate node 1.2 Need fo Coss laye Design in MANT The equiement of Coss Laye design in ad hoc netwoks is given below Adaptive and self-oganization Netwok potocols fo MANTs must be adaptive to many factos to effectively suppot fai shaing of devices and esouces and to hide the system dynamics to the uppe layes. The system dynamics include a wide ange of communication conditions a wieless node can expeience inside a MANT, including changing topology, shaed medium contention, vaying taffic pattens and distibutions. negy Consevation It is a limiting facto in the successful deployment of MANTs, because nodes ae expected to ely on potable, limited powe souces. Moeove, enegy consevation is extemely challenging in multi-hop envionments, whee the wieless nodes should also consume enegy to oute packets fo othe nodes and to guaantee the connectivity of the netwok. At the MAC laye, some techniques can be used to educe the enegy consumed duing tansmission and eception; additionally, a caeful policy may tun off the 205

2 wieless device when the node is idle. At the netwok laye, the oute selection pocess should be pefomed by educing the end-to end powe needed to fowad the packet. If the netwok laye may have access to enegy infomation, batteylevel metics can be used in the outing pocess. 1.3 Congestion Contol in MANTs Congestion contol is the main poblem in ad-hoc netwoks. Congestion contol is associated to contolling taffic incoming into a telecommunication netwok. To avoid congestive cumple o link capabilities of the intemediate nodes and netwoks and to educe the ate of sending packets congestion contol is used extensively. Congestion contol and dependability mechanisms ae combined by TCP to pefom the congestion contol without explicit feedback about the congestion position and without the intemediate nodes being diectly intemittent. Packet failue in MANTs is pimaily caused due to obstuction. The packet loss can be condensed by involving congestion contol ove a mobility and failue adaptive outing potocol at the netwok laye. The congestion non-adaptive outing potocols, leads to the following difficulties: xtensive delay, Moe Ovehead, Heavy packet losses 2 RLATD WORK Iman Chowdhuy et.al [1] poposed an enegy efficient and coopeative congestion contol potocol (CCCP) fo coopeative multicasting in mobile ad hoc netwoks. It ovecomes the disadvantages of existing multicast congestion contol potocols such as AODV and RCCP. In the fist phase it builds a coopeative multicast tee ooted at the souce, by including the nodes with highe esidual enegy towads the eceives. In the second phase an admission contol scheme in which a coopeative multicast flow is admitted o ejected depending upon on the output queue size. Finally tests whethe the elay node has the potential path to the equied destination, if not then choose anothe node which has the second highest esidual enegy as a new elay node. K.Sinivas and A.A. Chai poposed [2] negy fficient Coss Layeed Congestion Detection and Contol Routing Potocol to delive an enegy efficient mechanism to quantify the degee of congestion at victim node with maximal accuacy. The poposed model involves contolling of congestion in two steps with effective enegy efficient congestion detection and optimal utilization of esouces. Packet loss in netwok outing is pimaily due to link failue and congestion. Most of the existing congestion contol solutions do not possess the ability to distinguish between packet loss due to link failue and packet loss due to congestion. Appaji and Seedha [3] poposed a coss layeed outing topology in shot CRT to impove the congestion detection and handling stategy. The CRT is Mac, application and physical laye centic in paticula. With the motivation gained fom CRT, hee in this pape we popose a coss layeed powe conseved outing topology (CPCRT) fo mobile ad hoc netwoks. The goal is to impove tansmission pefomance by distinguishing between packet loss due to link failue and abitay loss of packets along with powe consevation that used fo packet tansmission. Suyapakash Reddy et.al [4] poposed the outing algoithm called negy efficient Odeed Congestion Contol using Coss laye suppot. In this aticle, it is efined the OCC to gain the ability of enegy consevation in congestion discovey. In this effot it attempts to limit the ole of MAC laye to detect link failue and developed a new stategy to detect the congestion at a elay node level and path level. Vishnu kuma [5] poposed an Congestion and Powe Contol Technique Based on Agent in MANT. The mobile agent fom souce stats fowading the data packets though the path which has minimum cost and congestion. The status of evey node is composed and lastly it is deliveed to destination node. In powe contol technique, the nodes ae selected based on the powe level. Rajesh babu et.al [6] poposed to develop an negy fficient Secue Authenticated Routing Potocol (SARP) fo mobile adhoc netwoks, which uses a lightweight, attack esistant authentication mechanism. The potocol povides efficient secuity against oute discovey attacks using hop-by-hop signatues. It also uses an efficient node selection mechanism which maximizes netwok life time and minimizes delay. Mohammad Amin Kheiandish Fad [7] exploed an end-to-end theshold-based algoithm which enhances congestion contol to addess link failue loss in MANT. It consists of two pats. Thesholdbased loss classification algoithm uses queue usage to classify netwok state peiodically into congestion o non-congestion mode. Any etansmission timeout in peiod which MANT is no congested mode is an indication of link failue 206

3 loss. Afte detecting losses due to link failue, it should adjust RTO fo econstucted oute by compaing its capabilities with boken oute using available infomation in tanspot laye. V. Thilagavathe and D. K. Duaiswamy [8] poposed the a coss-laye based technique to ovecome congestion that occus in MAC and tanspot laye in MANT. The poposed technique was applied ove a Adhoc On demand Multipath Reliable and negy Awae QoS Routing Potocol (AOMP-RQR). If souce eceives congestion status infomation fom both MAC and tanspot laye simultaneously fo the same oute, then congestion fee oute can be established fo tansmission, without pefoming ate contol. Kaunakaan et.al [9] pesented a Cluste Based Congestion Contol (CBCC) potocol that consists of scalable and distibuted cluste-based mechanisms fo suppoting congestion contol in adhoc netwoks. The distinctive featue of appoach was that it was based on the self-oganization of the netwok into clustes. Afte estimating the taffic ate along a path, the sending ate of the souce nodes was adjusted accodingly. In ou pevious wok [10] & [11], the congestion avoidance scheme and efficient secuity scheme is poposed using coss laye appoach. The congestion less outing is established to educe the highest packet loss in this appoach. Choong Seon Hong and Sungwon Lee [12] poposed joint congestion and powe contol appoach to attain an optimal solution via message passing while maintaining the achitectual modulaity between the layes. Shengming Jiang and Gang Wei [13] poposed distibuted pediction-based cognitive topology contol (PCTC) scheme fo outing in Cognitive Radio MANTs. The main aim is to pedict the available duation of the links. The pape is oganized as follows. The Section 1 descibes with oveview of MANT, Need fo Coss laye Design and congestion contol in MANTs. Section 2 deals with the Related Wok. Section 3 is devoted fo the implementation of fficient negy based Congestion Contol Scheme. Section 4 descibes the pefomance analysis and the last section concludes the wok. 3 IMPLMNTATION OF FFICINT NRGY BASD CONGSTION CONTROL SCHM Ou poposed fficient negy based Congestion Contol Scheme (CCS) is implemented with the thee phases. In fist phase, the coss laye based multipath outing is developed to educe effect of packet loss, packet dops and to achieve the load balancing in MANT. In second phase, the enegy consumption model is integated in the coss laye model to acquie minimum enegy consumption of mobile nodes. In thid phase, the packet fomat of the poposed scheme is exploed to monito the status of the congestion level, enegy level and packet loss level. The flow diagam of the CCS is given in Fig.1. Souce Node sends RRQ messages to Multipath Route stablishment Deploying Coss laye Design If yes, link quality is impoved Implementation of negy Link quality is not Figue.1. Flow Chat Of Poposed Scheme The flow diagam of the poposed scheme is show in fig.1. In this scenaio, each cluste heads communicate though the cluste paticipants while keeping the multipath outing. The enegy consumption is also deployed in each and evey packet fom souce to destination. This makes data with minimum enegy consumption and to monito the enegy level of each path. 3.1 Coss Laye Based Multipath Routing Appoach The coss laye design is used infomation shaing acoss diffeent layes. In Wieless netwok, physical laye, Media Access Contol (MAC) laye and outing Laye is combined fo netwok 207

4 esouce. At physical laye, tansmission powe and data ate is decided which affects MAC and outing decisions. The MAC laye is esponsible fo scheduling and allocating the wieless channel, it also veifies the available tansmitte bandwidth and the packet delay. Routing laye also depends on bandwidth and delay to select the link. The outing laye chooses the oute to send the data packets to the destination. The outing decision will change the contention level at the MAC laye and accodingly the physical laye paametes. Multipath outing is oganized in tems of path with disjoint links and path with disjoint nodes. To ensue the netwok connectivity, educing the packet loss, the multipath outing is implemented in ou poposed wok. The poposed wok is mainly focusing on congestion contol to avoid the etansmission and packet dop as well as packet loss. Fo an example in Fig. 2, the multipath outing concept is enabled between the souce S and Destination node D. Conside a packet tansmission tavels though the 1st path. In case, the packet tavels though path which exceeds the capacity of the path, the dop will occu apidly. So in this case, the multipath is deployed to ovecome the effect of congestion. The altenative disjoint links and disjoints nodes ae integated to each the packet to its destination without affecting othe tansmission and loss. In altenate path outing, the shotest path between exchanges is typically one hop acoss the backbone netwok; the netwok coe consists of a fully connected switches. Wheneve the shotest path fo a paticula souce destination pai becomes unavailable (due to eithe link failue o full capacity), athe than blocking the connection, altenate path which is nomally uses two hops. Multipath outing inceases fault-toleance and eliability. The oute can split the same label taffic flow into diffeent paths with the given taffic engineeing constains. Minimum delay and maximum bandwidth ae consideed fo splitting a given dynamic flow into these multiple paths Cluste Head 2 (CH2) Cluste paticipant nodes (CP1, CP2,CP3, CP31, CP21, CR1, CR2, CR3) 1 st path Path with displace lines Path with displace nodes 3.2 negy Consumption Model In MANT, mobile node consumes moe enegy due to its mobility. In case any misbehavio o link failue occus, packet has to be tansmitted again. To maintain the minimum enegy consumption, the pobability of the packet etansmission should be educed. Position of node may be of thee states like tansmission, eception and idle mode. ach state epesents the diffeent level of enegy consumption. Steps in negy consumption model as follows: Step 1: In tansmission state, node is tansmitting a packet with tansmission enegy P t. In eception state, node is eceiving a packet with powe P. Hee the enegy is consumed even if the packet is dopped by the node due to unintended to the destination o the packet was not coectly decoded. In listening state, even if the packets ae not being tansmitted, the nodes may stay idle and keep listening the paticula medium P idle. In sleeping state, node consumes less powe than any othe powe. The enegy spent on both tansmission and eception of one packet is given as, = P delay (1) t t Pt = delay (2) Hee, delay means the time taken fo the packet duing tansmission and eception. Step 2: Fig.3, shows the enegy status of mobile nodes. If a souce node tansmits a packet to the next hop, all its neighbous eceive this packet even it is intended to only one of them due to wieless natue of the medium. Fist souce node finds its neighbos duing tansmission ange. Nodes ae situated between tansmitte ange and intefeence ange eceives the packet but it cannot decode it. These two cases geneate loss of enegy. Figue.2. Implementation of Multipath Routing Cluste Head 1 (CH1) 208 Ovehea Slee Tansmit

5 Figue.3. Mobile node s enegy Status In ode to compute the enegy dissipated by one tansmission, these losses ae taken in to account as follows, cost t ( k) = t + m + Pta (3) whee m epesents the numbe of nonsleeping nodes belonging to the intefeence zone of the tansmitte k and P ta epesents the pobability of packet loss occued duing tansmission and eception phases. epesents the enegy is spent duing eception. cost t ( k) epesents the angle whee the oute is taken fo tansmitting a packet. It is nothing but how fa the souce and destination nodes ae communicating with each othe at cetain location. Step 3: The estimation of enegy fo both packet ( ) and acknowledgement packets ( ) ae pkt also detemined as follows pkt ack = λ d τ pkt (4) ack = λ d τ ack (5) Hee, d is the distance between the souce node m and destination node n. λ is the appoximated simulation value. τ pkt andτ ack ae the delay on tansmission of both acknowledgement and data packets. Step 4: The total enegy is calculated fo tansmitting a packet is given by, + + n 1 = λ d k ( k + 1) ( τ pkts ack) k = 1 n 1 k = 1 n 1 λ k = 1 λ d d kk + 1 ) ( τ pkts ack ) k ( k + 1) ( τ pkts ack s cs) (6) In the above equation, k is the single oute and k+1 is the neaest multipath oute in case if any link beak occus. τs and τ ts ae the delay occus on equest to send packets and clea to send packets. Step 5: The total enegy is an impotant metic to all the enegy outing schemes and it should be kept minimum. Wheneve the souce node chooses the packet to destination node, it will select only the minimum enegy consumption path to each the intended destination. The condition fo minimum enegy consumption is min m k = 1 0 = 0 (7) Step 6: If node s enegy consumption exceeds theshold value, it is identified that moe packets ae dopped. In this peiod, nodes have to etansmit the packets. So the enegy is lost. 3.3 Poposed packet fomat Souc e ID Destinatio n ID Hop Coun t neg y Level Packe t loss Ratio FC S Figue.4. Packet fomat In Fig. 4, the poposed packet fomat is shown. Hee the souce and destination node ID caies 2 bytes. The thid field hop count detemines the numbe of n does connected to the paticula node in the cluste. It occupies 1 byte. The enegy level occupies which induces the whethe the etansmission of packets ae occued with high enegy consumption fom the souce node to the destination node. Packet loss atio status is veified duing the infomation shaing phase. It occupies 4 bytes. The last filed FCS i.e. Fame Check Sequence which is fo eo coection and detection in the packet while tansmission. Algoithm: Step 1: Detemine enegy spent on both tansmission and eception. Step 2: Compute the enegy cost that includes losses in the tansmission. Step 3: Calculate the enegy spent fo data packet and acknowledgement packet tansmission. Step 4: Detemine the total enegy fo tansmitting a packet. Step 5: Define the condition fo enegy consumption. 4 5 PRFORMANC ANALYSIS 209

6 The poposed coss laye design is integated with the Dynamic Souce Routing (DSR) potocol. The Netwok Simulato (NS 2.34) is used to simulate ou poposed algoithm. In ou simulation, 300 mobile nodes move in a 1500 mete x 1500 mete squae egion fo 120 seconds simulation time. All the nodes have the same tansmission ange of 250 metes. The simulated taffic used is Constant Bit Rate (CBR) and Poisson taffic. Ou simulation settings and paametes of CCS ae summaized in Table 1.Table1. Simulation settings and paametes No. of Nodes 300 Aea Size 1500 X 1500 Radio Range 250 m Simulation Time 120 sec Taffic Souce CBR and Poisson Packet Size 512 bytes Mobility Model Random Way Point Potocol DSR Pause time 5 msec Packet Queuing Dop Tail 5.1 Pefomance Metics We assess the pefomance mainly accoding to the following metics. Contol ovehead: This is defined as the total numbe of outing contol packets nomalized by the total numbe of eceived data packets. nd-to-end delay: The end-to-end-delay is aveage ove all suviving of data packets fom the souces to the destinations. Packet Delivey Ratio: It is the atio of the numbe.of packets eceived successfully and the total numbe of packets tansmitted. Packet Loss Ratio: The atio of occuence of packet lost to the total numbe of packets used in the netwok duing one tansmission phase is defined as packet loss ate. negy consumption level: It keeps the enegy level of node which is spent fo sending and eceiving a data to the total enegy spent on the netwok. Netwok Lifetime: It shows the lifetime of the nodes fo the enegy spent on oute maintenance phase. The simulation esults ae pesented in the following analysis. We compae ou CCS with the CAS [10] and CLSMRSCA [11] in pesence of congestion envionment. Figue.5. Topology and Taffic ceation Fig. 5 shows that taffic ceation with the nodes. To identify the packet loss, the constant bit ate taffic is implemented. The delay is poduced in packet fom souce node to destination node via neighbou nodes. Souce may choose the diffeent paths to achieve the high packet delivey faction. Fig.6 shows the esults of packet delivey atio fo vaying the nodes 10, 20, 300. Fom the esults, we can see that CCS scheme has highe delivey atio than the CLSMRSCA and CAS schemes. Figue.6. No.of Nodes Vs delivey atio Figue. 7. Mobility Vs negy Consumption 210

7 Figue.8. No. of Nodes Vs negy Consumption Figue.10.Speed Vs Netwok lifetime Fig.10, shows the esults of Speed Vs Netwok Lifetime. Fom the esults, we can see that CCS scheme has highe Netwok Lifetime than the CLSMRCSA and CAS while vaying the speed fom 20 to 200. Analysis of the poposed scheme is shown in Table 2. Figue. 9. Time Vs nd to nd Delay Fig.7, pesents the compaison of enegy consumption and mobility. It is clealy shown that the CCS has low enegy consumption than the CAS and CLSMRSCA. Fig.8, pesents the compaison of enegy consumption and Numbe of Nodes. Nodes ae vaied as 5, 10,. 50. It is clealy shown that the CCS has low enegy consumption than the CAS and CLSMRSCA. Fig.9, pesents the compaison of nd to end delay while vaying the time fom 10 to 100. It is clealy shown that the delay of CCS has low than the CAS and CLSMRSCA potocol. Table 2. Analysis Of Poposed Method (CCS) And xisting Methods (CAS And CLSMRSCA) In Tems Of Diffeent Paametes Metics CCS CLSMRSCA CAS Packet loss atio (%) Packet Delivey Ratio (pkts) Netwok lifetime (msec) nd to end delay (msec) 27.4 negy Consumption (Joules) Vs No. of Nodes negy Consumption (Joules) Vs Mobility CONCLUSION Mobile nodes ae moving andomly without any centalized administation in MANT. Due to high mobility, the packet loss occus unnecessaily and 211

8 unlimited etansmission of packets happens. So the enegy consumption of netwok goes vey high. In this pape, we have developed an fficient negy based Congestion Contol Scheme fo minimum enegy consumption which attains the moe enegy efficiency and educed congestion among nodes. In the fist phase of the scheme, multipath outing is poposed to achieve high netwok lifetime and thoughput. In second phase, Coss Laye design is achieved. Hee the infomation is sent to the souce node depends upon the fading of channel detemined fom destination node. In thid phase, the negy Consumption model is poposed to achieve minimum enegy consumption of nodes, acknowledgement and data packets. By using the extensive simulation esults, the poposed scheme CCS achieves the bette packet delivey atio, high netwok lifetime, low delay and ovehead, minimum enegy consumption than the existing schemes like CLSMRSCA and CAS while vaying the mobility, time, speed, thoughput and numbe of nodes. RFRNCS: [1] Iman Chowdhuy, Asaduzzaman, Saki Kowsa, An negy fficient and Coopeative Congestion Contol Potocol in MANT, Intenational Jounal of Compute Applications ( ) Volume 58 No.17, Novembe 2012, pp [2] K. Sinivas, A. A. Chai, CDC: negy fficient Coss Layeed Congestion Detection and Contol Routing Potocol, Intenational Jounal of Soft Computing and ngineeing (IJSC) ISSN: , Volume-2, Issue-2, May 2012, pp [3] V. V. Appaji, D. Seedha, CPCRT: Coss layeed and Powe Conseved Routing Topology fo congestion Contol in mobile ad hoc netwoks, IOSR Jounal of Compute ngineeing (IOSRJC), Volume 3, Issue 5 (July-Aug. 2012), pp [4] T.Suyapakash Reddy, D. P. Chenna Reddy, OCC: negy-fficient Odeed congestion contol using coss laye suppot in Mobile Ad Hoc Netwok outing, Intenational Jounal of Scientific & ngineeing Reseach, Volume 3, Issue 10, Octobe-2012, pp.1-9. [5] Vishnu Kuma Shama and D. Saita Singh Bhadauia, Congestion and Powe Contol Technique Based on Mobile Agent and ffect of Vaying Rates in MANT, Intenational Jounal of Advancements in Compute Science and Infomation Technology [ ] Vol. 01, No. 1, 2011, pp [6] M. Rajesh Babu, S. Selvan, An negy fficient Secue Authenticated Routing Potocol fo Mobile Adhoc Netwoks, Ameican Jounal of Scientific Reseach, ISSN X Issue 9(2010), pp [7] Mohammad Amin Kheiandish Fad, Sasan Kaamizadeh1, Mohammad Aflaki, nhancing Congestion Contol to Addess Link Failue Loss ove Mobile Ad-Hoc Netwok Intenational Jounal of Compute Netwoks & Communications (IJCNC) Vol.3, No.5, Sep 2011,pp [8] V. Thilagavathe and D. K. Duaiswamy, Coss Laye based Congestion Contol Technique fo Reliable and negy Awae Routing in MANT, Intenational Jounal of Compute Applications ( ), Volume 36 No.12, Decembe 2011, pp.1-6. [9] S.Kaunakaan & P.Thangaaj, A Cluste Based Congestion Contol Potocol Fo Mobile Ad hoc Netwoks, Intenational Jounal of Infomation Technology and Knowledge Management, July-Decembe 2010, Volume 2, No. 2, pp [10] S.Sheeja and Ramachanda.V.Pujei, ffective Congestion Avoidance Scheme fo Mobile Ad Hoc Netwoks, Intenational Jounal of Compute Netwok and Infomation Secuity, Januay 2013, Vol.1, pp [11] S.Sheeja and Ramachanda.V.Pujei, Coss Laye Based Secue Multipath Routing Scheme fo Congestion Avoidance in MANT, uopean Jounal of Scientific Reseach, Vol. 97, No. 3, 2013, pp [12] Choong Seon Hong, Sungwon Lee, Coss- Laye Optimization fo Congestion and Powe Contol in OFDM-Based Multi-Hop Cognitive Radio Netwoks, I Tansactions on Communications, Vol.60, Issue 8, 2012, pp [13] Shengming Jiang, Gang Wei, Pediction- Based Topology Contol and Routing in Cognitive Radio Mobile Ad Hoc Netwoks, I Tansactions on Vehicula Technology, Vol.59, Issue 9, 2010, pp

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements

More information

Totally Disjoint Multipath Routing in Multihop Wireless Networks

Totally Disjoint Multipath Routing in Multihop Wireless Networks Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR

QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS By SRINIVAS KATAR A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Advances in Automobile Engineering

Advances in Automobile Engineering nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

How to outperform IEEE802.11: Interference Aware (IA) MAC

How to outperform IEEE802.11: Interference Aware (IA) MAC How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks

Quality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Prediction of Time Series Using RBF Neural Networks: A New Approach of Clustering

Prediction of Time Series Using RBF Neural Networks: A New Approach of Clustering 138 The Intenational Aab Jounal of Infomation Technology, Vol. 6,. 2, Apil 2009 Pediction of Time Seies Using RBF Neual Netwoks: A New Appoach of Clusteing Mohammed Awad 2, Hécto Pomaes 1, Ignacio Rojas

More information

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,

More information

P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks

P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks J Supecomput (217) 73:733 755 DOI 1.17/s11227-16-1785-9 P-: a polong stable election outing algoithm fo enegy-limited heteogeneous fog-suppoted wieless senso netwoks Paola G. Vinueza Naanjo 1 Mohammad

More information

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry Univesity of Wollongong Reseach Online Faculty of Infomatics - Papes (Achive) Faculty of Engineeing and Infomation Sciences 2010 Fast quality-guided flood-fill phase unwapping algoithm fo thee-dimensional

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information