EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS
|
|
- Joleen Priscilla Franklin
- 5 years ago
- Views:
Transcription
1 FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti, Coimbatoe. -mail: 1 sheejaajize@gmail.com, 2 siamu.vp@gmail.com ABSTRACT In ecent yeas, MANT is the popula and gowing netwok used in vaious applications. Hee the mobile nodes ae andomly moving without any access point. Due to mobility of nodes, enegy consumption of the netwok goes highe. Moe enegy consumption occus due to etansmission of packets and occuence of packet loss unlimitedly. So the main goal of the netwok is to ensue moe enegy efficiency. To povide minimum enegy consumption and avoiding moe congestion, enegy consumption model and multipath outing scheme is needed in netwoks. In this eseach pape, we developed an fficient negy based Congestion Contol Scheme (CCS) fo congestion avoidance and to impove enegy efficiency of the mobile nodes. Hee the coss laye design is deployed to impove the netwok pefomance. The multipath outing is focussed to avoid congestion and to incease netwok lifetime. We also demonstated the enegy consumption mathematical model to illustate the node s minimum enegy consumption level in the netwok. Pobability of the etansmission of packets is educed with the help of calculating the enegy level of data and acknowledgment packets. By using extensive simulation, the poposed scheme achieves minimum enegy consumption, low packet loss atio, high packet delivey atio, low end to end delay and ovehead than ou pevious schemes like CAS, CLSMRSCA. Keywods: MANT, Pobability of etansmission of packets, Coss Laye design, Multipath Routing, enegy consumption model, packet delivey atio, packet loss atio, end to end delay, ovehead and netwok lifetime 1 INTRODUCTION 1.1 Mobile Ad Hoc Netwoks (MANT) Mobile Ad hoc Netwoks (MANT) consist of wieless nodes that fom a communications netwok among themselves without a fixed infastuctue. Topology changes in MANT usually occu due to the mobility of a paticipating node o beakdown of a node due to loss of enegy in that node. These dynamic conditions disupt the smooth communication between needs in the netwok. Conceptually, in MANT, a node may eithe function as an end node o as a oute fowading data packets between end nodes. Hence the fitness of the node in tems of available enegy in the node becomes an impotant issue duing the selection of an intemediate node 1.2 Need fo Coss laye Design in MANT The equiement of Coss Laye design in ad hoc netwoks is given below Adaptive and self-oganization Netwok potocols fo MANTs must be adaptive to many factos to effectively suppot fai shaing of devices and esouces and to hide the system dynamics to the uppe layes. The system dynamics include a wide ange of communication conditions a wieless node can expeience inside a MANT, including changing topology, shaed medium contention, vaying taffic pattens and distibutions. negy Consevation It is a limiting facto in the successful deployment of MANTs, because nodes ae expected to ely on potable, limited powe souces. Moeove, enegy consevation is extemely challenging in multi-hop envionments, whee the wieless nodes should also consume enegy to oute packets fo othe nodes and to guaantee the connectivity of the netwok. At the MAC laye, some techniques can be used to educe the enegy consumed duing tansmission and eception; additionally, a caeful policy may tun off the 205
2 wieless device when the node is idle. At the netwok laye, the oute selection pocess should be pefomed by educing the end-to end powe needed to fowad the packet. If the netwok laye may have access to enegy infomation, batteylevel metics can be used in the outing pocess. 1.3 Congestion Contol in MANTs Congestion contol is the main poblem in ad-hoc netwoks. Congestion contol is associated to contolling taffic incoming into a telecommunication netwok. To avoid congestive cumple o link capabilities of the intemediate nodes and netwoks and to educe the ate of sending packets congestion contol is used extensively. Congestion contol and dependability mechanisms ae combined by TCP to pefom the congestion contol without explicit feedback about the congestion position and without the intemediate nodes being diectly intemittent. Packet failue in MANTs is pimaily caused due to obstuction. The packet loss can be condensed by involving congestion contol ove a mobility and failue adaptive outing potocol at the netwok laye. The congestion non-adaptive outing potocols, leads to the following difficulties: xtensive delay, Moe Ovehead, Heavy packet losses 2 RLATD WORK Iman Chowdhuy et.al [1] poposed an enegy efficient and coopeative congestion contol potocol (CCCP) fo coopeative multicasting in mobile ad hoc netwoks. It ovecomes the disadvantages of existing multicast congestion contol potocols such as AODV and RCCP. In the fist phase it builds a coopeative multicast tee ooted at the souce, by including the nodes with highe esidual enegy towads the eceives. In the second phase an admission contol scheme in which a coopeative multicast flow is admitted o ejected depending upon on the output queue size. Finally tests whethe the elay node has the potential path to the equied destination, if not then choose anothe node which has the second highest esidual enegy as a new elay node. K.Sinivas and A.A. Chai poposed [2] negy fficient Coss Layeed Congestion Detection and Contol Routing Potocol to delive an enegy efficient mechanism to quantify the degee of congestion at victim node with maximal accuacy. The poposed model involves contolling of congestion in two steps with effective enegy efficient congestion detection and optimal utilization of esouces. Packet loss in netwok outing is pimaily due to link failue and congestion. Most of the existing congestion contol solutions do not possess the ability to distinguish between packet loss due to link failue and packet loss due to congestion. Appaji and Seedha [3] poposed a coss layeed outing topology in shot CRT to impove the congestion detection and handling stategy. The CRT is Mac, application and physical laye centic in paticula. With the motivation gained fom CRT, hee in this pape we popose a coss layeed powe conseved outing topology (CPCRT) fo mobile ad hoc netwoks. The goal is to impove tansmission pefomance by distinguishing between packet loss due to link failue and abitay loss of packets along with powe consevation that used fo packet tansmission. Suyapakash Reddy et.al [4] poposed the outing algoithm called negy efficient Odeed Congestion Contol using Coss laye suppot. In this aticle, it is efined the OCC to gain the ability of enegy consevation in congestion discovey. In this effot it attempts to limit the ole of MAC laye to detect link failue and developed a new stategy to detect the congestion at a elay node level and path level. Vishnu kuma [5] poposed an Congestion and Powe Contol Technique Based on Agent in MANT. The mobile agent fom souce stats fowading the data packets though the path which has minimum cost and congestion. The status of evey node is composed and lastly it is deliveed to destination node. In powe contol technique, the nodes ae selected based on the powe level. Rajesh babu et.al [6] poposed to develop an negy fficient Secue Authenticated Routing Potocol (SARP) fo mobile adhoc netwoks, which uses a lightweight, attack esistant authentication mechanism. The potocol povides efficient secuity against oute discovey attacks using hop-by-hop signatues. It also uses an efficient node selection mechanism which maximizes netwok life time and minimizes delay. Mohammad Amin Kheiandish Fad [7] exploed an end-to-end theshold-based algoithm which enhances congestion contol to addess link failue loss in MANT. It consists of two pats. Thesholdbased loss classification algoithm uses queue usage to classify netwok state peiodically into congestion o non-congestion mode. Any etansmission timeout in peiod which MANT is no congested mode is an indication of link failue 206
3 loss. Afte detecting losses due to link failue, it should adjust RTO fo econstucted oute by compaing its capabilities with boken oute using available infomation in tanspot laye. V. Thilagavathe and D. K. Duaiswamy [8] poposed the a coss-laye based technique to ovecome congestion that occus in MAC and tanspot laye in MANT. The poposed technique was applied ove a Adhoc On demand Multipath Reliable and negy Awae QoS Routing Potocol (AOMP-RQR). If souce eceives congestion status infomation fom both MAC and tanspot laye simultaneously fo the same oute, then congestion fee oute can be established fo tansmission, without pefoming ate contol. Kaunakaan et.al [9] pesented a Cluste Based Congestion Contol (CBCC) potocol that consists of scalable and distibuted cluste-based mechanisms fo suppoting congestion contol in adhoc netwoks. The distinctive featue of appoach was that it was based on the self-oganization of the netwok into clustes. Afte estimating the taffic ate along a path, the sending ate of the souce nodes was adjusted accodingly. In ou pevious wok [10] & [11], the congestion avoidance scheme and efficient secuity scheme is poposed using coss laye appoach. The congestion less outing is established to educe the highest packet loss in this appoach. Choong Seon Hong and Sungwon Lee [12] poposed joint congestion and powe contol appoach to attain an optimal solution via message passing while maintaining the achitectual modulaity between the layes. Shengming Jiang and Gang Wei [13] poposed distibuted pediction-based cognitive topology contol (PCTC) scheme fo outing in Cognitive Radio MANTs. The main aim is to pedict the available duation of the links. The pape is oganized as follows. The Section 1 descibes with oveview of MANT, Need fo Coss laye Design and congestion contol in MANTs. Section 2 deals with the Related Wok. Section 3 is devoted fo the implementation of fficient negy based Congestion Contol Scheme. Section 4 descibes the pefomance analysis and the last section concludes the wok. 3 IMPLMNTATION OF FFICINT NRGY BASD CONGSTION CONTROL SCHM Ou poposed fficient negy based Congestion Contol Scheme (CCS) is implemented with the thee phases. In fist phase, the coss laye based multipath outing is developed to educe effect of packet loss, packet dops and to achieve the load balancing in MANT. In second phase, the enegy consumption model is integated in the coss laye model to acquie minimum enegy consumption of mobile nodes. In thid phase, the packet fomat of the poposed scheme is exploed to monito the status of the congestion level, enegy level and packet loss level. The flow diagam of the CCS is given in Fig.1. Souce Node sends RRQ messages to Multipath Route stablishment Deploying Coss laye Design If yes, link quality is impoved Implementation of negy Link quality is not Figue.1. Flow Chat Of Poposed Scheme The flow diagam of the poposed scheme is show in fig.1. In this scenaio, each cluste heads communicate though the cluste paticipants while keeping the multipath outing. The enegy consumption is also deployed in each and evey packet fom souce to destination. This makes data with minimum enegy consumption and to monito the enegy level of each path. 3.1 Coss Laye Based Multipath Routing Appoach The coss laye design is used infomation shaing acoss diffeent layes. In Wieless netwok, physical laye, Media Access Contol (MAC) laye and outing Laye is combined fo netwok 207
4 esouce. At physical laye, tansmission powe and data ate is decided which affects MAC and outing decisions. The MAC laye is esponsible fo scheduling and allocating the wieless channel, it also veifies the available tansmitte bandwidth and the packet delay. Routing laye also depends on bandwidth and delay to select the link. The outing laye chooses the oute to send the data packets to the destination. The outing decision will change the contention level at the MAC laye and accodingly the physical laye paametes. Multipath outing is oganized in tems of path with disjoint links and path with disjoint nodes. To ensue the netwok connectivity, educing the packet loss, the multipath outing is implemented in ou poposed wok. The poposed wok is mainly focusing on congestion contol to avoid the etansmission and packet dop as well as packet loss. Fo an example in Fig. 2, the multipath outing concept is enabled between the souce S and Destination node D. Conside a packet tansmission tavels though the 1st path. In case, the packet tavels though path which exceeds the capacity of the path, the dop will occu apidly. So in this case, the multipath is deployed to ovecome the effect of congestion. The altenative disjoint links and disjoints nodes ae integated to each the packet to its destination without affecting othe tansmission and loss. In altenate path outing, the shotest path between exchanges is typically one hop acoss the backbone netwok; the netwok coe consists of a fully connected switches. Wheneve the shotest path fo a paticula souce destination pai becomes unavailable (due to eithe link failue o full capacity), athe than blocking the connection, altenate path which is nomally uses two hops. Multipath outing inceases fault-toleance and eliability. The oute can split the same label taffic flow into diffeent paths with the given taffic engineeing constains. Minimum delay and maximum bandwidth ae consideed fo splitting a given dynamic flow into these multiple paths Cluste Head 2 (CH2) Cluste paticipant nodes (CP1, CP2,CP3, CP31, CP21, CR1, CR2, CR3) 1 st path Path with displace lines Path with displace nodes 3.2 negy Consumption Model In MANT, mobile node consumes moe enegy due to its mobility. In case any misbehavio o link failue occus, packet has to be tansmitted again. To maintain the minimum enegy consumption, the pobability of the packet etansmission should be educed. Position of node may be of thee states like tansmission, eception and idle mode. ach state epesents the diffeent level of enegy consumption. Steps in negy consumption model as follows: Step 1: In tansmission state, node is tansmitting a packet with tansmission enegy P t. In eception state, node is eceiving a packet with powe P. Hee the enegy is consumed even if the packet is dopped by the node due to unintended to the destination o the packet was not coectly decoded. In listening state, even if the packets ae not being tansmitted, the nodes may stay idle and keep listening the paticula medium P idle. In sleeping state, node consumes less powe than any othe powe. The enegy spent on both tansmission and eception of one packet is given as, = P delay (1) t t Pt = delay (2) Hee, delay means the time taken fo the packet duing tansmission and eception. Step 2: Fig.3, shows the enegy status of mobile nodes. If a souce node tansmits a packet to the next hop, all its neighbous eceive this packet even it is intended to only one of them due to wieless natue of the medium. Fist souce node finds its neighbos duing tansmission ange. Nodes ae situated between tansmitte ange and intefeence ange eceives the packet but it cannot decode it. These two cases geneate loss of enegy. Figue.2. Implementation of Multipath Routing Cluste Head 1 (CH1) 208 Ovehea Slee Tansmit
5 Figue.3. Mobile node s enegy Status In ode to compute the enegy dissipated by one tansmission, these losses ae taken in to account as follows, cost t ( k) = t + m + Pta (3) whee m epesents the numbe of nonsleeping nodes belonging to the intefeence zone of the tansmitte k and P ta epesents the pobability of packet loss occued duing tansmission and eception phases. epesents the enegy is spent duing eception. cost t ( k) epesents the angle whee the oute is taken fo tansmitting a packet. It is nothing but how fa the souce and destination nodes ae communicating with each othe at cetain location. Step 3: The estimation of enegy fo both packet ( ) and acknowledgement packets ( ) ae pkt also detemined as follows pkt ack = λ d τ pkt (4) ack = λ d τ ack (5) Hee, d is the distance between the souce node m and destination node n. λ is the appoximated simulation value. τ pkt andτ ack ae the delay on tansmission of both acknowledgement and data packets. Step 4: The total enegy is calculated fo tansmitting a packet is given by, + + n 1 = λ d k ( k + 1) ( τ pkts ack) k = 1 n 1 k = 1 n 1 λ k = 1 λ d d kk + 1 ) ( τ pkts ack ) k ( k + 1) ( τ pkts ack s cs) (6) In the above equation, k is the single oute and k+1 is the neaest multipath oute in case if any link beak occus. τs and τ ts ae the delay occus on equest to send packets and clea to send packets. Step 5: The total enegy is an impotant metic to all the enegy outing schemes and it should be kept minimum. Wheneve the souce node chooses the packet to destination node, it will select only the minimum enegy consumption path to each the intended destination. The condition fo minimum enegy consumption is min m k = 1 0 = 0 (7) Step 6: If node s enegy consumption exceeds theshold value, it is identified that moe packets ae dopped. In this peiod, nodes have to etansmit the packets. So the enegy is lost. 3.3 Poposed packet fomat Souc e ID Destinatio n ID Hop Coun t neg y Level Packe t loss Ratio FC S Figue.4. Packet fomat In Fig. 4, the poposed packet fomat is shown. Hee the souce and destination node ID caies 2 bytes. The thid field hop count detemines the numbe of n does connected to the paticula node in the cluste. It occupies 1 byte. The enegy level occupies which induces the whethe the etansmission of packets ae occued with high enegy consumption fom the souce node to the destination node. Packet loss atio status is veified duing the infomation shaing phase. It occupies 4 bytes. The last filed FCS i.e. Fame Check Sequence which is fo eo coection and detection in the packet while tansmission. Algoithm: Step 1: Detemine enegy spent on both tansmission and eception. Step 2: Compute the enegy cost that includes losses in the tansmission. Step 3: Calculate the enegy spent fo data packet and acknowledgement packet tansmission. Step 4: Detemine the total enegy fo tansmitting a packet. Step 5: Define the condition fo enegy consumption. 4 5 PRFORMANC ANALYSIS 209
6 The poposed coss laye design is integated with the Dynamic Souce Routing (DSR) potocol. The Netwok Simulato (NS 2.34) is used to simulate ou poposed algoithm. In ou simulation, 300 mobile nodes move in a 1500 mete x 1500 mete squae egion fo 120 seconds simulation time. All the nodes have the same tansmission ange of 250 metes. The simulated taffic used is Constant Bit Rate (CBR) and Poisson taffic. Ou simulation settings and paametes of CCS ae summaized in Table 1.Table1. Simulation settings and paametes No. of Nodes 300 Aea Size 1500 X 1500 Radio Range 250 m Simulation Time 120 sec Taffic Souce CBR and Poisson Packet Size 512 bytes Mobility Model Random Way Point Potocol DSR Pause time 5 msec Packet Queuing Dop Tail 5.1 Pefomance Metics We assess the pefomance mainly accoding to the following metics. Contol ovehead: This is defined as the total numbe of outing contol packets nomalized by the total numbe of eceived data packets. nd-to-end delay: The end-to-end-delay is aveage ove all suviving of data packets fom the souces to the destinations. Packet Delivey Ratio: It is the atio of the numbe.of packets eceived successfully and the total numbe of packets tansmitted. Packet Loss Ratio: The atio of occuence of packet lost to the total numbe of packets used in the netwok duing one tansmission phase is defined as packet loss ate. negy consumption level: It keeps the enegy level of node which is spent fo sending and eceiving a data to the total enegy spent on the netwok. Netwok Lifetime: It shows the lifetime of the nodes fo the enegy spent on oute maintenance phase. The simulation esults ae pesented in the following analysis. We compae ou CCS with the CAS [10] and CLSMRSCA [11] in pesence of congestion envionment. Figue.5. Topology and Taffic ceation Fig. 5 shows that taffic ceation with the nodes. To identify the packet loss, the constant bit ate taffic is implemented. The delay is poduced in packet fom souce node to destination node via neighbou nodes. Souce may choose the diffeent paths to achieve the high packet delivey faction. Fig.6 shows the esults of packet delivey atio fo vaying the nodes 10, 20, 300. Fom the esults, we can see that CCS scheme has highe delivey atio than the CLSMRSCA and CAS schemes. Figue.6. No.of Nodes Vs delivey atio Figue. 7. Mobility Vs negy Consumption 210
7 Figue.8. No. of Nodes Vs negy Consumption Figue.10.Speed Vs Netwok lifetime Fig.10, shows the esults of Speed Vs Netwok Lifetime. Fom the esults, we can see that CCS scheme has highe Netwok Lifetime than the CLSMRCSA and CAS while vaying the speed fom 20 to 200. Analysis of the poposed scheme is shown in Table 2. Figue. 9. Time Vs nd to nd Delay Fig.7, pesents the compaison of enegy consumption and mobility. It is clealy shown that the CCS has low enegy consumption than the CAS and CLSMRSCA. Fig.8, pesents the compaison of enegy consumption and Numbe of Nodes. Nodes ae vaied as 5, 10,. 50. It is clealy shown that the CCS has low enegy consumption than the CAS and CLSMRSCA. Fig.9, pesents the compaison of nd to end delay while vaying the time fom 10 to 100. It is clealy shown that the delay of CCS has low than the CAS and CLSMRSCA potocol. Table 2. Analysis Of Poposed Method (CCS) And xisting Methods (CAS And CLSMRSCA) In Tems Of Diffeent Paametes Metics CCS CLSMRSCA CAS Packet loss atio (%) Packet Delivey Ratio (pkts) Netwok lifetime (msec) nd to end delay (msec) 27.4 negy Consumption (Joules) Vs No. of Nodes negy Consumption (Joules) Vs Mobility CONCLUSION Mobile nodes ae moving andomly without any centalized administation in MANT. Due to high mobility, the packet loss occus unnecessaily and 211
8 unlimited etansmission of packets happens. So the enegy consumption of netwok goes vey high. In this pape, we have developed an fficient negy based Congestion Contol Scheme fo minimum enegy consumption which attains the moe enegy efficiency and educed congestion among nodes. In the fist phase of the scheme, multipath outing is poposed to achieve high netwok lifetime and thoughput. In second phase, Coss Laye design is achieved. Hee the infomation is sent to the souce node depends upon the fading of channel detemined fom destination node. In thid phase, the negy Consumption model is poposed to achieve minimum enegy consumption of nodes, acknowledgement and data packets. By using the extensive simulation esults, the poposed scheme CCS achieves the bette packet delivey atio, high netwok lifetime, low delay and ovehead, minimum enegy consumption than the existing schemes like CLSMRSCA and CAS while vaying the mobility, time, speed, thoughput and numbe of nodes. RFRNCS: [1] Iman Chowdhuy, Asaduzzaman, Saki Kowsa, An negy fficient and Coopeative Congestion Contol Potocol in MANT, Intenational Jounal of Compute Applications ( ) Volume 58 No.17, Novembe 2012, pp [2] K. Sinivas, A. A. Chai, CDC: negy fficient Coss Layeed Congestion Detection and Contol Routing Potocol, Intenational Jounal of Soft Computing and ngineeing (IJSC) ISSN: , Volume-2, Issue-2, May 2012, pp [3] V. V. Appaji, D. Seedha, CPCRT: Coss layeed and Powe Conseved Routing Topology fo congestion Contol in mobile ad hoc netwoks, IOSR Jounal of Compute ngineeing (IOSRJC), Volume 3, Issue 5 (July-Aug. 2012), pp [4] T.Suyapakash Reddy, D. P. Chenna Reddy, OCC: negy-fficient Odeed congestion contol using coss laye suppot in Mobile Ad Hoc Netwok outing, Intenational Jounal of Scientific & ngineeing Reseach, Volume 3, Issue 10, Octobe-2012, pp.1-9. [5] Vishnu Kuma Shama and D. Saita Singh Bhadauia, Congestion and Powe Contol Technique Based on Mobile Agent and ffect of Vaying Rates in MANT, Intenational Jounal of Advancements in Compute Science and Infomation Technology [ ] Vol. 01, No. 1, 2011, pp [6] M. Rajesh Babu, S. Selvan, An negy fficient Secue Authenticated Routing Potocol fo Mobile Adhoc Netwoks, Ameican Jounal of Scientific Reseach, ISSN X Issue 9(2010), pp [7] Mohammad Amin Kheiandish Fad, Sasan Kaamizadeh1, Mohammad Aflaki, nhancing Congestion Contol to Addess Link Failue Loss ove Mobile Ad-Hoc Netwok Intenational Jounal of Compute Netwoks & Communications (IJCNC) Vol.3, No.5, Sep 2011,pp [8] V. Thilagavathe and D. K. Duaiswamy, Coss Laye based Congestion Contol Technique fo Reliable and negy Awae Routing in MANT, Intenational Jounal of Compute Applications ( ), Volume 36 No.12, Decembe 2011, pp.1-6. [9] S.Kaunakaan & P.Thangaaj, A Cluste Based Congestion Contol Potocol Fo Mobile Ad hoc Netwoks, Intenational Jounal of Infomation Technology and Knowledge Management, July-Decembe 2010, Volume 2, No. 2, pp [10] S.Sheeja and Ramachanda.V.Pujei, ffective Congestion Avoidance Scheme fo Mobile Ad Hoc Netwoks, Intenational Jounal of Compute Netwok and Infomation Secuity, Januay 2013, Vol.1, pp [11] S.Sheeja and Ramachanda.V.Pujei, Coss Laye Based Secue Multipath Routing Scheme fo Congestion Avoidance in MANT, uopean Jounal of Scientific Reseach, Vol. 97, No. 3, 2013, pp [12] Choong Seon Hong, Sungwon Lee, Coss- Laye Optimization fo Congestion and Powe Contol in OFDM-Based Multi-Hop Cognitive Radio Netwoks, I Tansactions on Communications, Vol.60, Issue 8, 2012, pp [13] Shengming Jiang, Gang Wei, Pediction- Based Topology Contol and Routing in Cognitive Radio Mobile Ad Hoc Netwoks, I Tansactions on Vehicula Technology, Vol.59, Issue 9, 2010, pp
Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationDynamic Topology Control to Reduce Interference in MANETs
Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationNumber of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks
Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationTier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints
Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationWormhole Detection and Prevention in MANETs
Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationFault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs
Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,
More informationMANET QoS support without reservations
SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationMinimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks
Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationi-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA
i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043
More informationAnalysis of Wired Short Cuts in Wireless Sensor Networks
Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationInterference-Aware Multicast for Wireless Multihop Networks
Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationA Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More informationLifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationEfficient protection of many-to-one. communications
Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok
More informationHeterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks
1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More information(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)
1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,
More informationTime-Constrained Big Data Transfer for SDN-Enabled Smart City
Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationRT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver
1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationThe concept of PARPS - Packet And Resource Plan Scheduling
The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.
More informationAn Optimised Density Based Clustering Algorithm
Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationCharacterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks
Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More information1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses
http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationAMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR
AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements
More informationTotally Disjoint Multipath Routing in Multihop Wireless Networks
Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationANN Models for Coplanar Strip Line Analysis and Synthesis
200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationQUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS SRINIVAS KATAR
QUALITY OF SERVICE DESIGN ISSUES IN MULTIMEDIA COMMUNICATIONS OVER POWER LINE NETWORKS By SRINIVAS KATAR A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationMobility Pattern Recognition in Mobile Ad-Hoc Networks
Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationMultidimensional Testing
Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of
More informationBo Gu and Xiaoyan Hong*
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More informationAdvances in Automobile Engineering
nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment
More informationSecure Collaboration in Mediator-Free Environments
Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationHow to outperform IEEE802.11: Interference Aware (IA) MAC
How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationSimulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM
J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on
More informationA VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM
Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationOn Adaptive Bandwidth Sharing with Rate Guarantees
On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ
More informationQuality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks
Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationPrediction of Time Series Using RBF Neural Networks: A New Approach of Clustering
138 The Intenational Aab Jounal of Infomation Technology, Vol. 6,. 2, Apil 2009 Pediction of Time Seies Using RBF Neual Netwoks: A New Appoach of Clusteing Mohammed Awad 2, Hécto Pomaes 1, Ignacio Rojas
More informationA Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering
Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,
More informationP-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks
J Supecomput (217) 73:733 755 DOI 1.17/s11227-16-1785-9 P-: a polong stable election outing algoithm fo enegy-limited heteogeneous fog-suppoted wieless senso netwoks Paola G. Vinueza Naanjo 1 Mohammad
More informationFast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry
Univesity of Wollongong Reseach Online Faculty of Infomatics - Papes (Achive) Faculty of Engineeing and Infomation Sciences 2010 Fast quality-guided flood-fill phase unwapping algoithm fo thee-dimensional
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationAn Identification Protocol based the secure USB
An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which
More informationOn the throughput-cost tradeoff of multi-tiered optical network architectures
1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationExploring non-typical memcache architectures for decreased latency and distributed network usage.
Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationAccelerating Storage with RDMA Max Gurtovoy Mellanox Technologies
Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability
More information