Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Size: px
Start display at page:

Download "Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks"

Transcription

1 Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity, Clemson, SC 29634, USA School of Computing, Clemson Univesity, Clemson, SC 29634, USA Depatment of Compute Science, Geogia State Univesity, Atlanta, GA 332, USA {jinweil, shenh, yyhe, Abstact As a popula outing potocol in wieless senso netwoks (WSNs), geedy outing has eceived geat attention. The pevious woks chaacteize its data deliveability in WSNs by the pobability of all nodes successfully sending thei data to the base station. Thei analysis, howeve, neithe povides the infomation of the quantitative elation between successful data delivey atio and tansmission powe of senso nodes no consides the impact of the netwok congestion o link collision on the data deliveability. To addess these poblems, in this pape, we chaacteize the data deliveability of geedy outing by the atio of successful data tansmissions fom sensos to the base station. We intoduce η-guaanteed delivey which means that the atio of successful data deliveies is not less than η, and study the elationship between the tansmission powe of sensos and the pobability of achieving η-guaanteed delivey. Futhemoe, with consideing the effect of netwok congestion and link collision, we povide a moe pecise and full chaacteization fo the deliveability of geedy outing. Extensive simulation and ealwold expeimental esults show the coectness and tightness of the uppe bound of the smallest tansmission powe fo achieving η-guaanteed delivey. I. INTRODUCTION Wieless senso netwoks (WSNs) have been inceasingly deployed fo envionment monitoing [], [2]. Usually senso nodes (sensos in shot) ae distibuted ove a geogaphic egion of inteest and tansmit the sensed data to a emote base station using multi-hop outing. Thus, data delivey, as a fundamental function of WSNs, has eceived geat attention. Consideable eseach effots have been devoted to studying the eliability [3], timeliness [4] and enegy-efficiency [5], [6] of data delivey. High delivey atio with low enegy consumption is a challenging issue of data delivey in WSNs. Many outing potocols have been poposed to addess this challenge, including data-centic [7], hieachical [8] and location-based [9], [] design. Among these potocols, the location-based geedy outing (geedy outing in shot) potocol [9], [] is paticulaly attactive fo lage-scale senso netwoks due to its simplicity, efficiency and scalability, and thus has been widely exploited. In this potocol, each node makes outing decision with only local knowledge and fowads the packet to its neighbo that has the smallest distance to the destination until the packet eaches the destination. A well-known poblem with geedy outing is that it fails at a node called void node that has no neighbo close to the destination. To handle this poblem, many pevious woks [] [3] theoetically analyzed the elationship between the tansmission adius and the deliveability of geedy outing. Specifically, Wan et al. [] studied the citical tansmission adius (i.e., smallest tansmission adius) fo geedy outing to ensue that packets can be deliveed between any souce-destination pais in andomly deployed wieless ad hoc netwoks. Wang et al. [2] futhe deived highe accuate asymptotic bounds on the citical tansmission adius. Yang et al. [3] studied the elationship between the citical tansmission powe (i.e., smallest tansmission powe) and the pobability of guaanteed data delivey fom all sensos to the cental base station (efeed to as many-to-one). These woks have studied the deliveability of geedy outing in tems of pobability of guaanteeing all deliveies (i.e., pobability of guaanteed delivey) and the tansmission condition (e.g., citical tansmission powe/adius) to eliminate void nodes in the netwok. Howeve, no pevious woks have studied the elationship between the tansmission powe and the packet delivey atio of geedy outing, which is the atio of the nodes that successfully delive thei data to the base station. We call these nodes delivey-success nodes, othewise, delivey-failue nodes. The wok in [4] demonstates that data delivey in WSNs is inheently faulty and unpedictable, and thus the fault toleant potocols ae necessay fo senso applications and the potocols should ensue eliable data delivey while minimizing enegy consumption [5]. Theefoe, the elationship between tansmission powe and packet delivey atio of geedy outing is of geat inteest fo WSN designes in pactice. It helps to infe the numbe of delivey-failue nodes with a given tansmission powe, and povides insights on the impact of void nodes on the numbe of delivey-failue nodes. Accodingly, the designes can detemine whethe it is acceptable to use a elatively lowe tansmission powe fo sensos by estimating the numbe of delivey-failue nodes, since a limited numbe of delivey-failue nodes may be acceptable fo possible easons like edundant node deployment. Thus, η-guaanteed delivey is not tivial [6], [7]. Anothe limitation of these pevious woks is that they neglect the impact of netwok congestion and link collision on the deliveability of geedy outing in theoetical analysis, though these two factos ae also well-known causes fo packet delivey failue in WSNs [8] [2]. Since geedy fowading decisions ae made based on location infomation without the knowledge of taffic flows in the WSN, it could geneate spatial congestion and collision, which may educe packet delivey atio. The impact of netwok congestion and collision on data deliveability poses a challenge to the chaacteization of data deliveability. In this pape, we analyze the geedy outing deliveability fo many-to-one data delivey in WSNs. Unlike the pevious wok [3] that consides the deliveability in tems of the

2 pobability of guaanteeing all sensos to successfully send thei data to the base station, we conside the deliveability in tems of the atio of delivey-success nodes. In paticula, we study the citical tansmission powe equied to ensue that the atio of delivey-failue nodes does not exceed a theshold with a given pobability. We also conside the impact of netwok congestion and link collision on the deliveability in the study. Compaed with the pevious wok [3], ou esults chaacteize the deliveability in geneal sense and is much moe pactical with the additional consideation of the two factos. The main contibutions of this pape ae as follows: We intoduce the concept of η-guaanteed delivey, which guaantees that the atio of delivey-failue nodes is at most η. Based on this concept, we study the elationship between the citical tansmission powe and the atio of delivey-failue nodes, which povides a moe geneal chaacteization of the many-to-one deliveability of geedy outing compaed to the pevious woks. We deive analytical uppe bounds on citical tansmission powe fo the η-guaanteed delivey unde Signal-to- Intefeence-plus-Noise-Ratio (SINR in shot) [2] model. Simulation and eal-wold expeimental esults ae povided to validate ou analysis esults. We futhe conduct ou analysis with the consideation of netwok congestion and link collision to povide a moe accuate chaacteization of the deliveability of geedy outing. The emainde of this pape is oganized as follows. Section II eviews the elated wok. Section III descibes the poblem definition and the system model used in this pape. In Sections IV and V, we deive the uppe bounds on citical tansmission powe with and without netwok congestion and link collision consideations. Section VI pesents the numeical analysis, simulation esults and eal-wold expeimental esults. Section VII concludes ou wok with emaks on ou futue wok. II. RELATED WORK Geedy fowading with geogaphical locations in a WSN may fail at void nodes. The most well-known method to handle the poblem is face outing [9]. It planaizes the netwok gaph and fowads a message along one o a sequence of adjacent faces, which povides pogess towads the destination node. Anothe method is using vitual coodinates. Saka et al. [22] popose to compute a new embedding of the sensos in the plane such that geedy fowading with the vitual coodinates guaantees delivey. To handle this void node poblem, many woks [] [3], [23], [24] theoetically analyzed the deliveability of geogaphic geedy outing in WSNs o wieless ad hoc netwoks. The woks in [], [2], [23], [24] focus on the deliveability between any pai of souce-destination nodes by geedy outing. Howeve, these woks assume packet tansmission with no intefeence, which makes them impossible to accuately chaacteize the data deliveability in pactical scenaios. Yang et al. [3] modeled the elationship between the citical tansmission powe and the pobability of guaanteed delivey in the many-to-one delivey in a 2-D WSN. They showed that the citical tansmission adius fo many-to-one deliveability can be much smalle than that fo any-to-any deliveability. Howeve, they studied the outing deliveability of all nodes in tems of the pobability of guaanteed delivey instead of the packet delivey atio, as indicated in Section I. Also, thei analysis neglect the netwok congestion and link collision, which ae main causes that affect deliveability. Consideing the impotance of many-to-one data collection fo senso netwoks, ou wok tagets at many-toone deliveability of geedy outing and studies the elationship between the citical tansmission powe and the pobability of η-guaanteed delivey. Futhe, ou wok is the fist to analyze the effect of netwok congestion and link collision on the deliveability of geedy outing in the physically ealistic SINR model, which makes ou wok substantially diffeent fom pevious woks and enables ou wok to accuately chaacteize the data deliveability in pactical scenaios. Thus, ou wok is a notable extension compaed to pevious woks. III. SYSTEM MODEL AND PROBLEM DEFINITION A. System Model Fo analytical tactability, we assume that a WSN with N nodes is deployed in a 2-D disk egion with adius R. The base station X bs is located at the cente of the egion. The disk egion is denoted by D(X bs,r). The distibution of the sensos ove the egion follows a homogeneous Poisson point pocess with constant density λ []. Each senso, denoted by X i, has the same tansmission powe. We model the WSN as a gaph G(V,E), in which V epesents the set of nodes in the netwok, and E stands fo the links of the netwok. B. Channel Model In this pape, we use the SINR model to captue channel chaacteistics in WSNs. Many pevious woks [25], [26] on data deliveability assume Unit Disk Gaph (UDG) model fo communication. The UDG model, which assumes that two nodes within cetain distance can communicate diectly, ovesimplifies the channel model [27], because it does not conside intefeence fom othe on-going tansmissions. In SINR, the successful eception of a tansmission depends not only on the eceived signal stength but also the intefeence caused by simultaneously tansmitting nodes and the ambient noise level. Thus, based on SINR, we ae able to povide moe ealistic and accuate analysis on the data deliveability of geedy outing in WSNs. We use v s and v to denote a souce tansmitte and a eceive. Let P ec be the eceived signal powe at the eceive v fom the tansmitte v s. Denote I as the amount of intefeence geneated by othe nodes in the netwok. Let N n be the ambient noise powe level. Then, in the SINR model, eceive v eceives a tansmission iff P ec /(N n + I ) β () whee β is a small constant (depending on the hadwae) and it denotes the minimum signal to intefeence atio equied fo a message to be successfully eceived. The value of the eceived signal powe P ec is a deceasing function of the Euclidean distance d s between the tansmitte v s and the eceive v, epesented by P ec (d s )=P t /d α s (2) whee P t is the tansmission powe of the tansmitte, and the so-called path-loss exponent α is a constant between 2 and 6. α indicates the ate at which the eceived signal powe deceases with the distance between the tansmitte and the eceive. Based on (), the tansmission adius fo successful delivey can be epesented as =sup{d P ec (d) β(n n + I ), <d<+ } (3) whee sup epesents the least uppe bound. In WSNs on 2-D plane, I can be epesented by

3 I = v i V \{v s} P t d i α (4) whee V R 2 is the set of nodes in the 2-D plane. C. Poblem Definition Definition : η-guaanteed delivey: Given a WSN G with N sensos, and a minimum delivey atio equiement (η), a data gatheing of G achieves η-guaanteed delivey if N s /N η, whee N s is the numbe of delivey-success nodes in the data gatheing. η-guaanteed delivey with η<% is usually desied in the applications that can toleate a limited numbe of deliveyfailue nodes, such as statistical infeence to the population with sensed data samples. The detemination of η depends on the numbe of delivey-failue nodes that can be toleated. When η<%, the tansmission powe of sensos to achieve η-guaanteed delivey is much lowe than that equied by %-guaanteed delivey. Based on η-guaanteed delivey, we define the citical tansmission powe and adius and pesent ou poblems below. Definition 2: Citical tansmission powe: The citical tansmission powe Pt ci (η, P th ) denotes the minimal tansmission powe, which ensues that the pobability of achieving η-guaanteed delivey is no less than a theshold P th ( <P th < ), i.e., P{N s /N η} P th (5) Definition 3: Citical tansmission adius: The citical tansmission adius ci (η, P th ), coesponding to the citical tansmission powe Pt ci (η, P th ), denotes the minimal tansmission adius which ensues that the pobability of achieving η-guaanteed delivey is no less than P th. Accoding to the definition, citical tansmission powe Pt ci (η, P th ) is detemined by the delivey atio η and theshold P th. It ensues that the pobability of achieving η- guaanteed delivey fo a WSN is no less than a theshold with minimal enegy consumption. To ensue η-guaanteed delivey with a cetain pobability, we need to find the citical tansmission powe Pt ci (η, P th ). Obviously, a senso using the citical tansmission powe Pt ci (η, P th ) has a coesponding citical tansmission adius ci (η, P th ). Based on the above definitions, we can fomulate ou poblems as follows: Poblem : Given a desied atio of delivey-success n- odes η and a pobability theshold P th, what is the citical tansmission powe Pt ci (η, P th ) to achieve η-guaanteed delivey? Fom the above, we can see the pevious wok [3] is a special case of ou poblem with η = %. Ou poblem povides a moe in-depth and pecise chaacteization on the data deliveability of geedy outing. The study of ou poblem is also vey useful to WSN applications that use appoximate data collection that collects incomplete data fom WSNs, which has been widely studied due to its enegyefficiency [28], [29]. Because netwok congestion and link collision affect geedy outing deliveability, we futhe study Poblem with the consideation of these factos. We pesent this new poblem as Poblem 2 in the following. We conside a continuous data gatheing scenaio, in which all sensos peiodically send sensed data to the base station, and the data is collected ound by ound. In one ound of data gatheing, the atio of deliveysuccess nodes is affected by the cuent status of netwok congestion and link collision. Poblem 2: Given a desied atio of delivey-success n- odes η fo each ound of a continuous data gatheing and a pobability theshold P th, what is the citical tansmission powe Pt ci (η, P th ) to achieve η-guaanteed delivey with the consideation of the impact of netwok congestion and link collision on the atio of delivey-success nodes? IV. CRITICAL TRANSMISSION POWER In this section, we addess Poblem and deive the uppe bounds on citical tansmission powe fo the poblem solution in the SINR model. We fist establish the elationship between the pobability of η-guaanteed delivey and the pobability of a node being a delivey-failue node. Then, we fomulate the elationship between the pobability of a node being a deliveyfailue node and the tansmission powe. As a esult, we can find the uppe bounds on citical tansmission powe. A. The Relationship between η-guaanteed Delivey and Delivey Failue Pobability Fo a senso X i, C(X i ) denotes a Benoulli andom vaiable that equals one iff X i is a delivey-failue n- ode. Fo all nodes V = {X,,X V } in the netwok, C(X ),,C(X n ) ae identically distibuted andom vaiables, whee V is the cadinality of V. As the wok in [3], we assume the distibution of the delivey-failue nodes is statistically independent. Let Z be the numbe of deliveyfailue nodes in the netwok, and we have Z = C(X i) (6) x i V Accoding to Definition 2, fo citical tansmission powe, we have P{Z ( η)n} P th (7) Accoding to Makov s inequality, we have P[Z ( η)n] = P[Z (( η)n +)] E(Z)/(( η)n +) Suppose that C(X i )( i N) ae identically distibuted andom vaiables. Then, the expectation of andom vaiable Z can be computed by + k E[Z] = E[ C(X i)]p( V = k) = k= + k= i= (ke[c(x i)]p( V = k)) = E[C(X i)] + k= k(λπr 2 ) k exp( λπr 2 )/(k!) = λπr 2 E[C(X i)] = λπr 2 P(C(X i)=) whee the distibution of the delivey-failue sensos ove the egion follows a homogeneous Poisson point pocess with constant density λπr 2. Combining Fomulas (7), (8) and (9), we have P(C(X i)=) ( P th )(( η)n +)/(λπr 2 ) () In ode to achieve η-guaanteed delivey, the citical tansmission powe should be chosen to make the delivey failue pobability of any node satisfy (). (8) (9)

4 i Xbs ik Xi+n Xi Xi+ Xbs () u 2 () u u () u S 2 ( u) Xi+k () u Fig. : Routing. Fig. 2: Feasible egion of nodes. B. Uppe Bound on Citical Tansmission Powe Definition 4: Void node: X i is a void node iff it cannot diectly communicate with the cental base station X bs and it is close to X bs than all its neighbos. X i is a delivey-failue node if it cannot diectly communicate with the base station X bs, and also cannot communicate with X bs via multi-hop due to the existence of void nodes on the outing path. To compute the pobability of X i being a delivey-failue node, we fist conside the pobability of X i being a delivey-success node. Suppose that the distance between X i and X bs is ρ and the tansmission adius is, X i is a delivey-success node only if it falls into eithe of the following two cases: Case : ρ is less than o equal to, that is, X i can diectly communicate with X bs. Case 2: ρ is geate than, and thee exists a multi-hop geedy outing path to X bs with no delivey-failue nodes. Suppose X i+,,x i+k,,x i+n ae intemediate n- odes fom X i to the base station, as shown in Fig.. ρ i+k is the distance between the node X i+k (k =,,,n) and the base station X bs. n =if X i can diectly communicate with X bs. Case 2 is satisfied iff X i satisfies both of the following two conditions: Condition E : Thee exists at least one node located in X i s tansmission ange which is close to the base station than X i. Condition E 2 : The next fowading node X i+, one of X i s neighbos who has the smallest distance to the base station among X i and all its neighbos, can successfully fowad the packet to the base station. Next, we fist conside the pobability of E, then deive the pobability of X i being a delivey-success node which is equal to the pobability of both E and E 2 ae satisfied. ) Condition E : We call the aea whee the potential next fowading node X i+ can be located as the feasible egion of node X i. Because X i+ must be in the tansmission ange of X i and also must have smalle distance to the base station than X i, the feasible aea of X i is the intesection aea of the two cicles of adius and ρ centeed at X i and the base station, espectively. We use andom vaiable U to denote the distance between the base station (X bs ) and the next fowading node chosen by the geedy outing algoithm. Conside the feasible egion of X i, whee potential next fowading nodes can be located at some distance u o less fom the base station (shaded egion in Fig. 2). The aea of the feasible egion is denoted by S ρ (u). Accoding to [3], because when ρ is geate than, the pobability of no next fowading nodes existing in the feasible egion of aea is equivalent to the pobability that U is stictly geate than u. The complement of this pobability yields the distibution of U [3] which vaies with u { exp( λsρ(u)), ρ u<ρ F (u) =, u ρ (), u < ρ Xi We can obtain the following pobability density function by diffeentiating the distibution F (u) which is absolutely continuous f(u) =λs ρ(u)exp( λs ρ (u)), ρ u<ρ (2) whee S ρ(u) is the deivative of S ρ (u) with espect to u. We define the angles of the two intesecting sectos as 2α ρ, 2β ρ, as shown in Fig. 2. By the Law of Cosines, we have α ρ(u) = accos( 2 + ρ 2 u 2 ) (3) 2ρ β ρ(u) = accos( u2 + ρ 2 2 ) (4) 2uρ Then, we have S ρ(u) = 2 α ρ(u)+u 2 β ρ(u) uρ sin β ρ(u), ρ u<ρ (5) Based on (3), (4) and (5), we have S ρ(u) 2uβ ρ(u) (6) 2) Being a Delivey-success Node: Consideing that the sensos ae unifomly distibuted on 2-D plan, the nodes which has the same distance to the base station ae equal on the netwok deliveability fo thei packets. Thus, fo a given node X i which has distance ρ to the base station, we let the pobability of X i being a delivey-success node is a function of the distance ρ, denoted by P (ρ). The distance U has pobability density function f(u) given by (2). When U = u, the pobability of X i+ being deliveysuccess node is P (u). Because X i can successfully send a packet to X bs only if it satisfies both Condition E and Condition E 2,wehave P (ρ) = ρ ρ P (u)f(u)du (7) We take the deivative of this equation with espect to ρ fist, and get a diffeential equation. Afte computing this diffeential equation using Mathematica, we get the following analytic solution: P (ρ) =exp( 2exp( λ( 2 accos( 2t ) + accos( 2 +2t 2 )t 2 2 ( 2 +4t 2 ) 2t 2 2 t2 )) t 4 λ accos( 2 +2t 2 ρ )tdt + 2exp( λ( 2 2t 2 accos( 2t ) + accos( 2 +2t 2 )t 2 2t 2 2 t2 2 ( 2 +4t 2 ) ))λ accos( 2 +2t 2 )tdt) t 4 2t 2 Accodingly, the pobability of the node X i being a deliveyfailue node is (P (ρ)) c = P (ρ) (9) whee supescipt c means the complement of P (ρ). 3) Uppe Bound on Citical Tansmission Powe: Consideing all the possible locations of X i, the pobability of a node being a delivey-failue node is P c = 2π whee Hence (P (ρ)) c ρdρdθ = 2 πr 2 R 2 g() = (8) ρ(p (ρ)) c dρ = 2g() R 2 (2) ρ( P (ρ))dρ (2) P(C(X i)=)=(2g())/r 2 (22)

5 Let x =( η)n. Based on (8), (9) and (22), we have P[Z x] (λπr 2 (2g())/R 2 )/(x +) (23) To ensue that P[Z x] P th,wehave g() ( P th )(x +)/(2λπ) (24) g() is stictly deceasing fo, and the fomal poof is povided in ou technical epot [32]. Hence, we can ensue P[Z x] P th as long as the citical tansmission adius ci (η, P th ) satisfies ci (η, P th ) =inf{ g() ( Pth )(x +) } (25) 2λπ whee inf epesents the geatest lowe bound. Letting d s in (2) be, with P ec (d s ) (N n + I )β we can obtain the uppe bound of the citical tansmission powe Pt ci (η, P th ), that is Pt ci (η, P th ) P t = β(n n + I ) α (26) whee I can be computed based on Fomula (4). V. EFFECTS OF NETWORK CONGESTION AND LINK COLLISION In this section, we deive the uppe bound on the citical tansmission powe fo η-guaanteed delivey with consideation of the effects of congestion and collision. The congestion at the eceive node intoduces packet loss due to buffe oveflow. Also, when multiple active senso nodes ty to access the channel simultaneously, collisions could occu and coupt the packet in tansmission. A senso fails in deliveing data to its next hop when the tansmission expeiences a collision o the buffe of its next hop is full. Since the congestion and collision ae well-identified causes of packet loss in WSNs [8], [33], we investigate thei effects on the deliveability of geedy outing to povide ealistic analysis esults. Hee, we assume each senso in the WSN has a buffe size of m packets. To compute the pobability that a given node X i delives data to X bs, we assume the data delivey path fom X i to X bs is X i X i+,, X i+n X bs. n = if X i can diectly communicate with X bs. We fist conside the pobability of successful data tansmission at one hop in the path. A. Delivey Success in One Hop Fo a successful one-hop data tansmission, say X j X j+, the following two conditions must be satisfied. Condition E A : X j is not a void node, i.e., X j has a neighbo whose distance to X bs is smalle than X j s. Condition E B : No link collision occus duing the packet tansmission fom X j to X j+, and when the packet aives at X j+ the buffe queue of X j+ is not full, i.e., no congestion occus to the packet. Hence, we have P(X j X j+) =P(E A)P(E B) (27) ) Condition E A : The pobability that X j is a void node is the pobability that no nodes exist in X j s feasible egion. The aea of X j s feasible egion whee any node has smalle distance fom the base station than X j, denoted by S(ρ j,), can be computed by (5) with u = ρ j whee ρ j, is the distance between X j and X bs, i.e., S(ρ j,)=2ρ 2 jacsin + 2 accos 2ρ j 2ρ j ρ 2 j 2 4 (28) Accoding to spatial Poisson point pocess distibution of nodes, we have P(EA) = exp( λs(ρ j,)) (29) 2) Condition E B : Next, to compute P(E B ), we fist deive the pobability of packet loss caused by netwok congestion and link collision espectively, and then obtain P(E B ). Netwok Congestion: Let P nc be the pobability that a node fails to delive a packet to its next hop due to buffe oveflow. We deive P nc based on M/M//k model. The M/M//k model descibes a stochastic pocess whose state space is the set I = {,, 2,, k} whee the value coesponds to the numbe of packets in the node s buffe. Accoding to [34], steady state pobabilities of the system, denoted by P j (j =,, 2,,k), ae { ϱ, ϱ P = ϱ k+, ϱ = (3) k+ P j = { ϱ j ( ϱ), ϱ k+ ϱ (3), k+ ϱ = Hee ϱ = λ ARR /μ in which μ is the packet tansmission ate and λ ARR is packet aival ate. Since it is a many-to-one model (i.e., all packets go to sink), the aival ate of the senso in the cente (close to the sink) should be highe (moe contending nodes) than that of the senso away fom the sink, and thus we conside the aival ate as a function (invese popotion to the eceive s distance to the base station) of the eceive s distance to the base station so that it can bette eflect the case in eal system [35]. The aival ate of node X j+ is as follows λ ARR (ρ j+ )=(R/2)/ρ j+ λ (32) whee R is the adius of the 2-D disk egion, ρ j+ is the distance between X j+ and X bs, and λ is an expected aival ate. Each senso has a buffe size of m packets. With k = m, the steady state pobability P m is the pobability of a buffe being full which causes packet dop. Obviously, P nc = P m (33) Hence, the pobability that node X j fails to delive a packet to its next hop X j+ due to buffe oveflow is P m with ϱ = λ ARR (ρ j+ )/μ (denoted as P m (ρ j+ )). Link Collision: Since in WSNs wieless channels ae shaed by seveal nodes using CSMA-like (Caie Sense Multiple Access) potocols, we deive the pobability of packet loss due to link collision based on modeling of CSMA/CA in [36]. The binay exponential backoff pocedue is modeled as a Makov chain with the assumption of constant and independent collision pobability of a packet tansmitted by each node. We conside a fix numbe l of contending nodes, each always having a packet available fo tansmission afte the completion of each successful tansmission. Based on [36], we can get the pobability of a packet encounteing collision P lc as P lc = ( τ) l (34) whee τ is the pobability that a node tansmits in a andomly chosen slot time. τ = 2( 2P lc ) ( 2P lc )(W +)+P lc W ( (2P lc ) v ) (35) whee W is the minimum contention window size W = CW min, and the maximum contention window size is CW max =2 v W. v is the maximum backoff stage. In paticula, when v =, i.e., no exponential backoff is consideed, the pobability τ esults to be independent of P lc. Fomula (35) thus simply becomes: τ =2/(W +) (36)

6 Computation of P(E B ): Based on (33) and (34), the pobability of Condition E B is P(E B)=( P nc)( P lc )=( P m)( τ) l (37) B. Delivey Success to the Base Station Fo simplicity, we use the aveage numbe of hops that a packet can tavese fom a node to the base station to appoximately estimate the pobability of successful data delivey fom node X i to base station X bs. ) Aveage Numbe of Hops: If a packet tavels fom a node with distance ρ i to the base station to anothe node with distance ρ i+ to the base station, the distance it advances equals ρ i ρ i+. Pevious wok [37] shows that the pobability density function of pogess in one hop fom X i towads the base station X bs is f c(c X i,x bs = ρ) =σ( 2 π 2 )σ 2(ρ c)[ π 2 acsin( + c2 2 )][(ρ c)2 2ρ(ρ c) acsin( + c2 2 2ρ(ρ c) )+ (38) 42 ρ 2 2 (c 2 2 2ρc) 2 2 acsin( c2 2 2ρc ) 2ρ π(ρ c)2 ] σ, c 2 whee ρ is the distance between X i and X bs, c is the maximum fowad pogess in one hop towads the base station X bs, and σ is the numbe of nodes located in the semi-cicle with adius, computed by σ = λ π2 2 whee λ is the constant density. Based on (38), we can get the aveage pogess pe hop towads the base station c fo X i with distance ρ to X bs as follows: c(ρ) = vf c(v)dv (39) Conside all the possible locations of X i,wehave, 2π c(ρ) c = πr ρdρdθ 2 = 2 vf c(v X i,x R 2 bs = ρ)dvρdρ (4) Since the adius of the geogaphic egion D(X bs,r) is R, we estimate the maximum numbe of hops fo deliveing a packet to the base station X bs by Ĥ max = R/ c (4) Accoding to [38], the aveage numbe of hops a packet taveses in the netwok equals E(H) = Ĥ max k= {k [e (k )2 λπ 2 e k2 λπ 2 ] ( e λa ) k } whee A is the intesection aea between two tansmission anges, illustated by the shaded aea in Fig. 3, and can be computed by: A = 2 (2 accos( x 2 ) sin(2 accos( x ))) (43) 2 2) The Delivey Success: A node succeeds in deliveing a packet to the base station if evey hop on the outing path achieves successful delivey of the packet. Fo simplicity, we assume that the delivey of <x<2 Xj+ (42) Xj- Xj Fig. 3: Geomety of a two-hop connection. each hop tansmission is independent of othe hop tansmissions along the path. Then, given the pobability of delivey success in one hop P(E A )P(E B ) and the aveage numbe of hops fo deliveing a packet to the base station E(H), the pobability that a node X i succeeds in deliveing a packet to the base station can be deived by combining (29), (37) and (42): P(C(X i)= X i,x bs = ρ i)=(p(e A)P(E B)) E(H) =Π i+e(h) 2 j=i P(E A)P(E B) (44) =Π i+e(h) 2 j=i ( exp( λs(ρ i,)))( P m(ρ j+))( τ) l C. Uppe Bound on Citical Tansmission Powe Based on (2), (2) and (44), we can obtain the pobability of a node being a delivey failue node: P(C(X i)= X i,x bs = ρ i) = P(C(X i)= X i,x bs = ρ i) = Π i+e(h) 2 j=i ( exp( λs(ρ i,)))( P m(ρ j+))( τ) l (45) Consideing all the possible locations of X i,wehave P(C(X i)=) = 2π (ρ i( Π i+e(h) 2 j=i P(E A) P(E B)))/(πR 2 )dρ idθ = 2 ρ i( Π i+e(h) 2 R 2 j=i ( exp( λs(ρ i,))) (46) ( P m(ρ j+))( τ) l )dρ i Because the complexity of computing P(C(X i )=), and P c is the pobability of a node being a delivey-failue node caused by void nodes, and P(E A ) is the pobability that a node X j is not a void node, we use P(C(X i ) = ) = Π i+e(h) 2 j=i ( P c )P(E B ) to appoximately compute P(C(X i )=)then we have P(C(X i ) = ) = h(),whee h() = Π i+e(h) 2 j=i ( P c )P(E B) = ( R2 2g() ) (E(H) ) (47) R 2 ( P m(ρ j+))( τ) l Then, based on (8), we can get P[Z x] (λπr 2 h())/(x +) (48) Π i+e(h) 2 j=i Thus, to ensue that P[Z x] P th, we need to ensue h() ( P th )(x +)/(λπr 2 ) (49) h() stictly deceases with, and the fomal poof is povided in ou technical epot [32]. Theefoe, the citical tansmission adius has ci (η, P th ) =inf{ h() ( Pth )(x +) λπr 2 } (5) Given a WSN G(V,E) deployed ove a geogaphic egion D(X bs,r) and a pobability theshold P th, the citical tansmission powe Pt ci (η, P th ) fo SINR model satisfies Pt ci (η, P th ) P t = β(n n + I ) α (5) VI. EXPERIMENTAL RESULTS In this section, we pesent numeical analysis of ou theoetical esults to investigate the elationships among the tansmission powe, pobability of η-guaanteed delivey and minimum delivey atio η. Then, we pesent simulation esults that evaluate the tightness of ou uppe bounds on the citical tansmission powes. Finally, we povide eal-wold expeimental esults to validate ou model s ability of well appoximating eal life pefomance.

7 % guaanteed delivey 85% guaanteed delivey.2 9% guaanteed delivey 95% guaanteed delivey % guaanteed delivey Radio tansmission powe (mw) 8% guaanteed delivey.4 85% guaanteed delivey 9% guaanteed delivey.2 95% guaanteed delivey % guaanteed delivey Radio tansmission powe (mw) (a) W/o congestion & collision (b) W/ congestion & collision Fig. 4: Relationship between pobability of η-guaanteed delivey and tansmission powe with intefeence. A. Numeical Analysis In ou numeical analysis, we assume that 5 senso nodes ae distibuted ove a disk egion D(X bs, m) following a Poisson distibution. The base station is located at the cente of the disk egion. All the senso nodes have the same tansmission powe. Fo SINR model, we set path-loss exponent α = 3, the minimum signal to intefeence atio β =4, and ambient noise powe level N n =nw [39], [4]. The Fomulas (23)-(26) in Section IV show the uppe bound on citical tansmission powe without consideing congestion and collision, and Fomulas (48)-(5) in Section V conside congestion and collision. Based on these esults, Fig. 4(a) and Fig. 4(b) show the elationship between the pobability of η-guaanteed delivey and tansmission powe when η=8%, 85%, 9%, 95%, and %, without and with the existence of congestion and collision, espectively. Both figues show that the pobability of η-guaanteed delivey inceases as the adio tansmission powe inceases. Compaing Fig. 4(b) to 4(a), we see that with the consideation of congestion and collision, geate tansmission powe is equied to achieve the same pobability of η-guaanteed delivey. The pobability of η-guaanteed delivey in Fig. 4(a) eventually goes to when the tansmission powe is lage enough. Howeve, in Fig. 4(b) it appoaches but cannot be (though it is not obvious in the figue) due to the existence of congestion and collision. Both figues show that with a smalle η, the tansmission powe equied to achieve the same pobability of η-guaanteed delivey is smalle. An inteesting obsevation is that the cuve of η = % is widely sepaated fom the cuves of othe η values. This esult indicates that with toleance to a small pecentage of delivey failue nodes, much less tansmission powe is needed compaed to that needed by %-guaanteed delivey, thus obtaining significant enegy saving. Fig. 5 shows the elationship between the pobability of η- guaanteed delivey and η with diffeent tansmission powes. We see that given a tansmission powe, the pobability of η-guaanteed delivey deceases with the incease of η, and highe tansmission powe esults in highe pobability of η- guaanteed delivey. This is because a highe tansmission powe enables nodes to communicate with nodes futhe away, deceasing the pobability of delivey failue caused by void nodes. Compaing Fig. 5(a) and 5(b), fo the same tansmission powe and the same η, the pobability of η-guaanteed delivey in Fig. 5(b) is lowe than that in Fig. 5(a) because of the congestion and collision effects. Fig. 6 shows the elationship between the uppe bound on citical tansmission powe and the node density. We changed the node density by vaying the numbe of senso nodes ove the disk egion D(X bs, m). Fig. 6(a), 6(b), 6(c) and 6(d) show the uppe bounds on the citical tansmission powe fo η= 8%, 85%, 9%, and 95% guaanteed delivey, espectively. Each figue shows uppe bounds deived with congestion Radio tansmission powe: mw Radio tansmission powe: 5mw.2 Radio tansmission powe: 2mw Radio tansmission powe: 25mw Minimum delivey atio equiement η (%) Radio tansmission powe:mw Radio tansmission powe:5mw.2 Radio tansmission powe:2mw Radio tansmission powe:25mw Minimum delivey atio equiement η (%) (a) W/o congestion & collision (b) W/ congestion & collision Fig. 5: Relationship between pobability of η-guaanteed delivey and the minimum delivey atio equiement η. and collision (denoted as cong-col in figues) as well as without congestion and collision. The uppe bounds fo %- guaanteed delivey ae dawn in evey figue fo compaison. Fom these figues, it can be seen that the uppe bounds on citical tansmission powe decease as the numbe of nodes in the netwok (hence node density) inceases. This is because a highe node density leads to a smalle aveage distance between any pai of nodes, which enables each node to use a smalle tansmission adius fo communication. We also see that the uppe bounds on citical tansmission powe decease slowly with the node density. This is because the incease of node density intoduces moe intefeence, offsetting some effect of deceasing aveage distance of any pais. All of these figues show that the uppe bound deived with the consideation of congestion and collision is lage than that without the consideation. This indicates that highe tansmission powe is equied to counte the effect of congestion and collision. We also find that a smalle η geneates a smalle uppe bound on citical tansmission powe. The uppe bound fo %- guaanteed delivey is consideably lage than that fo smalle η, which indicates that highe delivey atio equies highe tansmission powe egadless of the existence of congestion and collision. B. Simulation Results We used netwok simulato NS2 [4] to conduct simulation expeiments. Constant Bit Rate (CBR) Taffic geneato [4] is used fo each senso to ceate a fixed size packet fo evey fixed inteval. To validate the coectness and tightness of ou uppe bound, we compae ou theoetical esults with simulation esults in vaious scenaios. By default, the numbe of nodes in the netwok was set to 2 in the simulation. The nodes ae distibuted ove a disk egion D(X bs, 3m) following a Poisson distibution. The theshold fo decoding a signal was set to P th = 64dBm. Fo each setting of tansmission powe, we geneated 2 andom netwok topologies and fo each topology we computed the atio of delivey success nodes. The pobability of η-guaanteed delivey is estimated with the 2 delivey atio samples. Fig. 7(a)-7(b) show the theoetical uppe bounds on citical tansmission powe and the simulation esults fo 85% and 95% guaanteed delivey. We see that ou theoetical uppe bounds ae vey close to the simulation esults. By examining Fig. 7(a)-7(b), we see the uppe bound on citical tansmission powe inceases as η inceases, which is consistent with ou numeical esults. To futhe validate ou model, we vaied the netwok density and taffic load of the netwok. In Fig. 8, we deceased the numbe of nodes in the netwok to to decease the netwok density. Fig. 8(a)-8(b) show the theoetical uppe bounds on citical tansmission powe and the simulation esults fo 85% and 95% guaanteed delivey. We see that ou theoetical uppe bounds ae still vey close to the simulation esults. We.8.6.4

8 Uppe bound on citical tansmission powe (mw) % guaanteed delivey % guaanteed delivey with 8% guaanteed delivey 8% guaanteed delivey with Numbe of nodes in the WSNs Uppe bound on citical tansmission powe (mw) % guaanteed delivey % guaanteed delivey with 9 85% guaanteed delivey 85% guaanteed delivey with Numbe of nodes in the WSNs Numbe of nodes in the WSNs (a) 8%-guaanteed delivey (b) 85%-guaanteed delivey (c) 9%-guaanteed delivey (d) 95%-guaanteed delivey Fig. 6: Relationship between uppe bound on citical tansmission powe and node density with intefeence Simulation esult Radio tansmission powe (mw) Radio tansmission powe (mw) Fig. 7: η-guaanteed delivey vs. tansmission powe (path-loss exponent α =3, N = 2, inteval=2) Simulation esult Radio tansmission powe (mw) Simulation esult Radio tansmission powe (mw) Fig. 8: η-guaanteed delivey vs. tansmission powe (path-loss exponent α =3, N =, inteval=2). also find that the uppe bound on citical tansmission powe inceases as η inceases. Compaing Fig. 8 with Fig. 7, we find that the uppe bounds on citical tansmission powe in Fig. 8 ae lage than those in Fig. 7, which indicates that the uppe bound on citical tansmission powe inceases as node density deceases. This is because lage node density shotens the aveage distance between nodes and theeby educes the pobability of delivey failue caused by void nodes Simulation esult Radio tansmission powe (mw) Simulation esult Radio tansmission powe (mw) Fig. 9: η-guaanteed delivey vs. tansmission powe (path-loss exponent α =3, N =, inteval=) Simulation esult Radio tansmission powe (mw) Simulation esult Radio tansmission powe (mw) Fig. : η-guaanteed delivey vs. tansmission powe (path-loss exponent α =3, N =, inteval=.5). We then vaied taffic load by diffeent intevals fo CBR taffic geneato. Fig. 8, 9 and show the elationship between the pobability of η-guaanteed delivey and the tansmission powe with nodes in the netwok, unde diffeent intevals 2, and.5. Smalle inteval means highe taffic load. It is obvious to see that ou theoetical uppe bounds ae vey close Simulation esult Uppe bound on citical tansmission powe (mw) % guaanteed delivey % guaanteed delivey with 9% guaanteed delivey 9% guaanteed delivey with Uppe bound on citical tansmission powe (mw) % guaanteed delivey % guaanteed delivey with cong 95% guaanteed delivey 95% guaanteed delivey with Numbe of nodes in the WSNs to the simulation esults. Compaing Fig. 8, 9 and, we find the uppe bounds on citical tansmission powe follows Fig. >Fig. 9>Fig. 8, which indicates the uppe bound on citical tansmission powe inceases as taffic load inceases. This is because heavie taffic load inceases congestion and collision and theeby inceases the pobability of delivey failue. C. Real-wold Expeimental Results Ou testbed [42] consists of 6 Tmote Sky motes [43] unning TinyOS A compute unning Ubuntu 2.4 was used to configue all senso nodes. Each senso node was configued to peiodically sample and tansmit data. The netwok delivey atio was measued unde diffeent taffic loads, netwok densities, and adio tansmission powe levels. Fig. shows the elationship between the pobability of η-guaanteed delivey and adio powe level fo 85% and 95% guaanteed delivey. In the test, the inteval between two consecutive packet tansmissions was set as second. In Fig. 2, we inceased the inteval between two consecutive packet tansmissions to 2 seconds to decease taffic load. Both Fig. and Fig. 2 indicate that the expeimental esults ae close to the theoetical esults. By compaing Fig. (a) and Fig. (b), Fig. 2(a) and Fig. 2(b), similaly, we see that the uppe bound on citical tansmission powe inceases as η inceases, which is consistent with numeical esults and simulation esults. Compaing Fig. 2 and Fig., we find that the uppe bounds on citical tansmission powe in Fig. ae lage than those in Fig. 2. This esult indicates that the uppe bound on citical tansmission powe inceases as taffic load inceases, which is consistent with ou simulation esults Expeimental esult 2 3 Radio Powe level 2 3 Radio Powe level Fig. : η-guaanteed delivey vs. tansmission powe (path-loss exponent α =3, N =6, inteval= second) Expeimental esult Radio Powe level Expeimental esult 2 3 Radio Powe level Fig. 2: η-guaanteed delivey vs. tansmission powe (path-loss exponent α =3, N =6, inteval=2 seconds). Ou theoetical and eal-wold expeimental esults show that by toleancing to a small pecentage of delivey failue nodes, much enegy can be saved Expeimental esult

9 VII. CONCLUSION In this pape, we study the deliveability of geedy outing in 2-D WSNs. As opposed to pevious woks that only analyze the pobability of guaanteeing all deliveies and neglect netwok congestion and collision, we intoduce η-guaanteed delivey, whee η can be vaied and study its pobability with the consideation of netwok congestion and collision. We adopt a moe ealistic model to analyze uppe bounds on citical tansmission powe. Though theoetical analysis, we deive the uppe bounds on the citical tansmission powe fo achieving η-guaanteed delivey with a given pobability. The extensive numeical analysis, simulation and eal-wold expeimental esults show that ou chaacteization is close to the pactical scenaios and ou deived uppe bounds ae coect and tight. Ou futue wok is to evaluate the deliveability of geedy outing with vaious impovements poposed ecently fo handling void nodes not only caused by shot tansmission ange, but also caused by non-homogeneous density o physical obstacles (e.g., lake), localization eos. ACKNOWLEDGEMENTS This eseach was suppoted in pat by U.S. NSF gants NSF-4498, IIS-35423, CNS-2546, CNS-24963, Micosoft Reseach Faculty Fellowship REFERENCES [] B. O Flynn, R. Matínez-Català, S. Hate, C. O Mathuna, J. Cleay, C. Slate, F. Regan, D. Diamond, and H. Muphy, Smatcoast: A wieless senso netwok fo wate quality monitoing, in LCN, 27. [2] A. Cepa, J. Elson, M. Hamilton, and J. Zhao, Habitat monitoing: application dive fo wieless communications technology, in Poc. of ACM SIGCOMM, 2. [3] F. Ye, G. Zhong, S. Lu, and L. Zhang, Gadient boadcast: a obust data delivey potocol fo lage scale senso netwoks, Wieless Netwok, vol., no. 3, pp , May 25. [4] T. He, J. Stankovic, C. Lu, and T. Abdelzahe, Speed: a stateless potocol fo eal-time communication in senso netwoks, in ICDCS, 23. [5] K. Kalpakis, K. Dasgupta, and P. Namjoshi, Efficient algoithms fo maximum lifetime data gatheing and aggegation in wieless senso netwoks, Compute Netwoks, vol. 42, no. 6, pp , 23. [6] T. Dam and K. Langendoen, An adaptive enegy-efficient mac potocol fo wieless senso netwoks, in Poc. of SenSys, 23. [7] C. Intanagonwiwat, R. Govindan, and D. Estin, Diected diffusion: a scalable and obust communication paadigm fo senso netwoks, in Poc. of MOBICOM, 2. [8] S. Lindsey and C. Raghavenda, Pegasis: Powe-efficient gatheing in senso infomation systems, in Poc. of IEEE Aeospace Conf., 22. [9] B. Kap and H. Kung, Gps: Geedy peimete stateless outing fo wieless netwoks, in Poc. of MOBICOM, 2. [] Y. Xu, J. Heidemann, and D. Estin, Geogaphy-infomed enegy consevation fo ad hoc outing, in Poc. of MOBICOM, 2. [] P. J. Wan, C. W. Yi, F. Yao, and X. Jia, Asymptotic citical tansmission adius fo geedy fowad outing in wieless ad hoc netwoks, in Poc. of MobiHoc, 26. [2] L. Wang, C. W. Yi, and F. Yao, Impoved asymptotic bounds on citical tansmission adius fo geedy fowad outing in wieless ad hoc netwoks, in Poc. of MobiHoc, 28. [3] Y. Yang, Y. Li, and M. Hou, Many-to-one deliveability of geedy outing in 2-d wieless senso netwoks, in Poc. of INFOCOM, 2. [4] L. Paadis and Q. Han, A suvey of fault management inwieless senso netwoks, In JNSM, vol. 5, pp. 7 9, 27. [5] X. Li, P. Wan, Y. Wang, and C. Yi, Fault toleant deployment and topology contol in wieless netwoks, in Poc. of MobiHoc, 23. [6] S. Lin, J. Zhang, G. Zhou, L. Gu, T. He, and J. A. Stankovic, Atpc: Adaptive tansmission powe contol fo wieless senso netwoks, in Poc. of SenSys, 26. [7] J. Sheu, K. Hsieh, and Y. Cheng, Distibuted tansmission powe contol algoithm fo wieless senso netwoks, Jounal of Infomation Science and Engineeing, vol. 25, no. 5, pp , 29. [8] H. Zhang, A. Aoa, Y. i Choi, and M. Gouda, Reliable busty convegecast in wieless senso netwoks, in Poc. of MobiHoc, 25, pp [9] I. S. L. Popa, C. Raiciu and D. Rosenblum, Reducing congestion effects by multipath outing in wieless netwoks, in ICNP, 26. [2] R. Kleinbeg, Geogaphic outing using hypebolic space, in Poc. of INFOCOM, 27, pp [2] T. Moscibod, R. Wattenhofe, and A. Zollinge, Topology contol meets sin: The scheduling complexity of abitay topologies, in Poc. of MobiHoc, 26. [22] R. Saka, X. Yin, J. Gao, F. Luo, and X. Gu, Geedy outing with guaanteed delivey using icci flows, in Poc. of IPSN, 29. [23] G. Xing, C. Lu, R. Pless, and Q. Huang, On geedy geogaphic outing algoithms in sensing-coveed netwoks, in Poc. of MobiHoc, 24. [24] Y. Wang, C. W. Yi, and F. Li, Delivey guaantee of geedy outing in thee dimensional wieless netwoks, in Poc. of WASA, 28. [25] B. Deb, S. Bhatnaga, and B. Nath, Reinfom: Reliable infomation fowading using multiple paths in senso netwoks, in LCN, 23. [26] F. Kuhn, R. Wattenhofe, and A. Zollinge, An algoithmic appoach to geogaphic outing in ad hoc and senso netwoks, IEEE/ACM Tans. on Netwoking, vol. 6, pp. 5 62, 28. [27] W. Wang, Y. Wang, X.-Y. Li, W.-Z. Song, and O. Fiede, Efficient intefeence-awae tdma link scheduling fo static wieless netwoks, in Poc. of MOBICOM, 26. [28] C. Wang, H. Ma, Y. He, and S. Xiong, Adaptive appoximate data collection fo wieless senso netwoks, TPDS, vol. 23, no. 6, pp. 4 6, 22. [29] P. Floéen, P. Kaski, J. Kohonen, and P. Oponen, Exact and appoximate balanced data gatheing in enegy-constained senso netwoks, Theoetical Compute Science, vol. 344, no., pp. 3 46, 25. [3] V. Bhandai and N. H. Vaidya, Reliable boadcast in wieless netwoks with pobabilistic failues, in Poc. of INFOCOM, 27. [3] H. P. Keele and P. G. Taylo, A stochastic analysis of a geedy outing scheme in senso netwoks, SIAM J. APPL. MATH., vol. 7(7), pp , 2. [32] J. Liu, L. Yu, H. Shen, Y. He, and J. Hallstom, Chaacteizing data deliveability of geedy outing in wieless senso netwoks, Clemson Univesity, Tech. Rep., 25. [33] V. Rajendan, K. Obaczka, and J. Gacia-Luna-Aceves, Enegyefficient, collision-fee medium access contol fo wieless senso netwoks, in Poc. of SenSys, 23. [34] D. Goss, J. F. Shotle, J. M. Thompson, and C. M. Hais, Fundamentals of Queueing Theoy. John Wiley & Sons, 23. [35] P. Kamat, W. Xu, W. Tappe, and Y. Zhang, Tempoal pivacy in wieless senso netwoks: Theoy and pactice, TOSN, vol. 5, no. 4, pp. 24, 29. [36] G. Bianchi, Pefomance Analysis of the IEEE 82. Distibuted Coodination Function, JSAC, 2. [37] S. De, A. Causo, T. Chaia, and S. Chessa, Bounds on hop distance in geedy outing appoach in wieless ad hoc netwoks, ACM Wieless and Mobile Computing, vol., no. 2, pp. 3 4, 26. [38] S. M. Hab and J. Mcnai, Analytical study of the expected numbe of hops in wieless ad hoc netwok, in Poc. of WASA, 28. [39] T. Mosciboda, Y. Oswald, and R. Wattenhofe, How optimal ae wieless scheduling potocols? in Poc. of INFOCOM, 27. [4] H. Li, Q. Hua, C. Wu, and F. Lau, Minimum-latency aggegation scheduling in wieless senso netwoks unde physical intefeence model, in Poc. of MSWiM, 2. [4] NS2, [accessed in Dec. 24]. [42] A. R. Dalton and J. O. Hallstom, An inteactive, souce-centic, open testbed fo developing and pofiling wieless senso systems, IJDSN, vol. 5, no. 2, pp. 5 38, 29. [43] Moteiv, Tmote sky. [Online]. Available: konad/pojects/shimme/efeences/tmotesky-datasheet.pdf

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Reducing Information Gathering Latency through Mobile Aerial Sensor Network

Reducing Information Gathering Latency through Mobile Aerial Sensor Network Reducing Infomation Gatheing Latency though Mobile Aeial Senso Netwok Zhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang and Fancis C.M. Lau Institute fo Theoetical Compute Science, Institute fo Intedisciplinay

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Totally Disjoint Multipath Routing in Multihop Wireless Networks

Totally Disjoint Multipath Routing in Multihop Wireless Networks Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

How to outperform IEEE802.11: Interference Aware (IA) MAC

How to outperform IEEE802.11: Interference Aware (IA) MAC How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ ISIT, Austin, Texas, U.S.A., June - 8, Divesity-Multiplexing-Delay Tadeoffs in MIMO Multihop Netwos with ARQ Yao Xie, Andea Goldsmith Depatment of Electical Engineeing, Stanfod Univesity, Stanfod, CA.

More information

Topic 7 Random Variables and Distribution Functions

Topic 7 Random Variables and Distribution Functions Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Modeling Spatially Correlated Data in Sensor Networks

Modeling Spatially Correlated Data in Sensor Networks Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,

More information

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti,

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

TCP Libra: Exploring RTT-Fairness for TCP

TCP Libra: Exploring RTT-Fairness for TCP TCP Liba: Exploing RTT-Fainess fo TCP UCLA Compute Science Depatment Technical Repot #TR050037 Gustavo Mafia, Claudio Palazzi, Giovanni Pau, Maio Gela, M. Y. Sanadidi, Maco Roccetti, Compute Science Depatment

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity alams@pudue.edu Sonia Fahmy Pudue Univesity fahmy@cs.pudue.edu Abstact Assessing the tustwothiness

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

DISTRIBUTION MIXTURES

DISTRIBUTION MIXTURES Application Example 7 DISTRIBUTION MIXTURES One fequently deals with andom vaiables the distibution of which depends on vaious factos. One example is the distibution of atmospheic paametes such as wind

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information