An Experimental Study of Fractional Cooperation in Wireless Mesh Networks

Size: px
Start display at page:

Download "An Experimental Study of Fractional Cooperation in Wireless Mesh Networks"

Transcription

1 An Experimental tudy of Frational Cooperation in Wireless Mesh Networks Anthony Cale, Nariman Farsad, and Andrew W. Ekford Dept. of Computer iene and Engineering, York University 47 Keele treet, Toronto, Ontario, Canada M3J 1P3 Astrat Frational ooperation is a deentralized, lowomplexity wireless networking protool in whih nodes have the aility to dynamially selet a fration of its resoures to ommit to forwarding, and where soures may use more than one relay to onvey information to the destination. In this paper, an implementation and a series of experiments are presented to demonstrate the pratial performane and effetiveness of frational ooperation. A low-omplexity MAC layer protool is used, whih employs frational ooperation using LT odes in the asene of entral oordination. Experimental results from realworld trials are given, whih show that this protool an maintain a reasonale throughput when nodes are aruptly entering and leaving, making it ideal for a dynamially hanging system, suh as an ad-ho network. The redundany of information seen in the network makes this sheme roust to unfavourale hannel onditions. I. INTODUCTION With the prevalene of wireless networks and ever inreasing appliations, the sale of wireless networks grows year y year. Conurrently, the need for high-speed data transmission also grows every year as the Internet eomes an essential part of soiety. However, as the size of the wireless networks grow, maintaining higher data rates eomes ever more hallenging. One solution to this prolem is spreading the load aross different nodes in the network. The nodes of wireless networks an e distriuted over wide areas, where multiple hops may e needed in order for information to reah a destination. Cooperation [1], [2] provides a possile solution to this prolem y allowing eah node to assist its neighours in transmitting information to a data sink. The asi ooperative system onsists of three nodes: a soure, a relay, and a destination. The relay an employ various ooperative shemes suh as deode-andforward [3] and demodulate-and-forward [4], [5], to assist the soure in transmitting its information its to the destination. Furthermore, where links are affeted y fading, ooperation an e used to inrease the spatial diversity of the system. In a large sale wireless network, there are multiple soures and multiple relays, where eah soure node is typially in radio range of more than one relay. Furthermore, in systems suh as wireless mesh networks (WMN) [6], eah node an e a soure and a relay. When a traditional ooperative sheme is employed, eah soure has a dediated numer of relay(s), where eah relay forwards all the soure s transmission its. However, relays might have their own information to transmit to the destination or might e unwilling to dediate all their resoures to relaying; furthermore, alloation of resoures is a diffiult prolem. To overome this issue, frational ooperation [7], [8] an e employed, where eah relay node an forward a fration of the soures transmission its. A related frational strategy in ellular networks was independently proposed in [1], where moiles are permitted to use multiple ase stations to inrease throughput to ell-edge users for multiple-input multiple-output (MIMO) systems. In this work, we develop a low-omplexity medium aess ontrol (MAC) layer protool, employing frational ooperation, and test it on pratial sensor networking hardware in real-world experiments. Our ontriutions in this work are as follows: We implement our MAC layer protool on Imote2 sensor nodes, reating a WMN. To the est of our knowledge, this is the first work where frational ooperation is implemented in a real wireless system. Compared to simulations, real-world experiments are unommon in the wireless literature. Through experiments on our implemented WMN, we show that the proposed protool an relialy transmit information over the network, even when eah node in the network relays a fration of the soure s transmission, and there is no entralized oordination of the frations. Using the proposed protool, nodes an relialy enter and exit the network at any time. We also show that when our protool is employed, the throughput dereases graefully as relay nodes exit the network. This is in ontrast to a traditional ooperative system, where an exodus of relay nodes an result in a sudden, preipitous drop in throughput. Based on the otained results we onlude that frational ooperation is suitale in large sale networks where nodes enter and exit the network onstantly. A. Frational Cooperation II. COMMUNICATION POTOCOL In frational ooperation, eah node selets a fration α [, 1], representing the fration of any neighour s transmission that it will relay; for example, if α =.5 and a neighour transmits a paket of 1 its, then the relay will hoose 5 of those 1 its for retransmission. The manner in whih these

2 elay 2 a ink oure, a elay 3 elay 1 Fig. 1: A multiple relay system oure Paket Coded Paket Forwarded Coded Paket its are seleted is explained elow. Both the hoie of α and the identities of the its to e relayed are made y the relay, and not oordinated with other nodes (however, it is assumed that the destination knows whih symols are seleted). ee also [7], [8] for more details. ine the relays are not oordinating the seletion of frations, it is impossile to ensure that every soure symol is ultimately seleted for relaying. As a result, it is essential to use an erasure-orreting ode to fill in the lanks and reover any symols whih were missed during the seletion proess. The LT ode [11] is used, as it has exellent deoding performane and low enoding omplexity (whih is essential for our hardware). B. elay Model The main goal of this protool is to ahieve a low omplexity ommuniation sheme whih inorporates frational oded ooperation. In order to fulfill this requirement, all nodes in the model ommuniate y roadasting. A few nodes are seleted as soures, ut all nodes (exept the sink) have the aility to ehave as relays. A soure annot e its own relay. Nodes in this system follow two rules: oure nodes transmit unoded information pakets. If a node reeives an unoded paket, it will selet a fration α of the its in the paket, use those its to reate a oded paket (using an LT ode), and roadast the oded paket to all its neighours. If a node reeives a oded paket, it will reroadast the paket in its entirety without deoding or re-enoding. A small example of this relay model is shown in Figure 1. A soure node roadasts paket a whih is seen y two relays. Coded pakets and are generated y these relays and are roadast. At this point, any relay whih reeives a oded paket will forward it without any proessing. ine this is roadast sheme, nodes may reeive dupliate pakets throughout this proess, for example, relay 1 forwarding paket ak to relay 2. These transmission links have een omitted from the figure for ease of viewing. ine the nodes are unaware of the suess of transmission, or the loation of the sink, we use a paket time to live (TTL) (measured as a maximum numer of hops) as a simple means of preventing flooding. Furthermore, we assume that the destination has knowledge of, ut no ontrol over, the identities of soure symols that the nodes are seleting for relay. As we will disuss elow, this is equivalent to knowledge of the LT ode employed y eah relay node; in pratie, this is implemented y making the destination aware of eah relay s random numer seed, whih an e expressed ompatly. Due to the nature of the protool, every soure paket sent will trigger the generation of a ertain numer of oded and forwarded pakets. A soure paket onsists of k symols, with l its per symol. Traffi an e expressed as a sum of the numer of soure, oded, and forwarded pakets generated per unit time. Eah one of the s soures will generate a paket with size kl. For every soure paket in the system, r oded pakets are generated with size αkl. For every oded paket in the system, r 1 forwarded pakets are generated with size αkl. We define the quantity Φ, expressed in its per seond (ps), to e the upper ound of traffi seen in the hannel provided all nodes are within range of eah other, and there is no interferene etween ommuniation links. Given s soures, r relays, and a soure paket rate λ expressed in pakets per seond, let n soure, n oded, and n forwarded represent the numer of soure its, oded its, and forwarded its generated per paket. Then Φ is given as follows: Φ=(n soure + n oded + n forwarded )sλ = (kl)+r(αkl)+r(αkl)(r 1) sλ = kl(1 + αr 2 )sλ When soure nodes are also allowed to relay, the aove equation eomes: (1) Φ=skl 1+α(r + s 1) 2 λ (2) To further redue unneessary forwarding, eah node is ale to ross-hek paket id numers against a uffer in order to determine dupliates. This guarantees us that Φ remains onstant for systems whih require a large TTL. C. Enoding and Deoding Proess This setion desries the enoding/deoding proess from the generation of a soure paket to its reonstrution at the sink; for ease of implementation, the proess is slightly different from the LT odes found in the literature, in that operations are performed symol-wise. The proess egins when a soure node roadasts an unoded information paket in the network. Eah relay node, upon reeiving an unoded paket, will egin its enoding step.

3 1 9 8 oure Transmissions Deoded Pakets at the ink Coded Pakets at the ink Total Traffi at the ink 7 Throughput (ps) elay atio α Fig. 3: Plot illustrating the deoding effiieny for varying α values Fig. 2: Experiment setup Given k information symols reeived, a relay will generate αk LT oded symols whih are then enapsulated into a oded paket and roadast. In [11], an LT oded symol is generated as follows: A degree 1 d k is hosen for the enoding symol with some proaility given y the roust solition distriution [11]. d symols are hosen uniformly at random from the set of k information symols. This suset of symols is referred to as the neighour set of the enoding symol. The value of the enoding symol is determined y performing the symol-wise exlusive-or (XO) operation etween the value of eah neighour symol. Given distriution onstants =.1, δ =.1, and k = 3, the roust solition distriution is approximated as: P r (d = 1, 2, 3, 4, 5, 6) = (.13,.26,.1,.5,.4,.42) The deoder needs to e aware of oth the degree of a oded symol and its set of neighour symols. As noted in the previous setion, this is aomplished y using a random seed in the enoding proess whih is utilized y a pseudorandom generator at the deoder to reprodue the exat distriutions used in the enoding proess. Upon reeiving a oded paket, the sink will rereate the degree and neighour set of eah oded symol (as seen in olumns 3 and 4 of Tale I). The sink handles the deoding of pakets individually suh that all oded symols are analyzed efore moving on to the next oded paket. A symol is onsidered deoded when its degree is equal to one (sine there is only one neighour symol x k, the value of the ode is equal to the x th information symol). One all degree one symols are handled, the algorithm tries to redue the degree of every other symol to one. This is done y omparing already deoded information symols to TABLE I: ink proessing of oded pakets generated in a one-soure, two-relay system Information ymol Coded ymol x id 1 seed Coded ymol y id 2 seed Code ymol Proessing ymol Degree Deoded Neighour Value Information et ymol id {1,2} 28 (,,,92) 1 1 {4} 92 (,,,92) 3 1 {2} 11 (,11,,92) (23,11,,92) id {1,2,3,4} 166 (23,11,23,92) 1 2 {2,4} 87 (23,11,,92) 3 3 {2,3,4} 177 unused the neighour set and oserving if that symol is an element of it. If so, a XO operation is performed etween the value of the oded symol and the deoded information symol, the element is removed from the neighour set, and the degree is redued y one. This proess is repeated until the soure message is fully reonstruted. A short example of this is seen in Tale I; this example assumes α =.75 and k =4. The soure analyzes symols id 1 (1, 2, 3) and determines that symols 1 and 3 an e automatially deoded. It then ross-referenes the seond deoded information symol with oded symol 2 to retrieve information symol 1. It then ontinues to proess symols id 2 (1, 2, 3) and following the same proedure, manages to deode the information paket. ine the paket was deoded after analyzing symol 2, all susequent symols and oded pakets reeived are disarded (this inludes pakets reeived y the forwarding proess).

4 1 9 8 oure Transmissions Deoded Pakets at the ink Coded Pakets at the ink Total Traffi at the ink 3 25 oure Transmissions Deoded Pakets at the ink Coded Pakets at the ink Total Traffi at the ink Throughput (ps) Throughput (ps) Time Elapsed (s) Time Elapsed (s) Fig. 4: One soure transmitting to four initial relays, one relay eing shutoff every 5s. D. Limitations The sink node experienes a performane penalty if the numer of information symols k is large. The main ontriuting fator to this prolem is that the deoding algorithm in this model was designed in a reursive fashion. It was shown in [11] that the deoding step runs in linearithmi time. Due to the simpliity of the ommuniation protool, large traffi is seen at the sink if there are too many nodes in lose proximity. Under these onditions, this model suffers from hannel saturation. III. EXPEIMENT This setion desries the implementation of our protool using Imote2 [12] sensor nodes whih are fatory onfigured to run Mirosoft.NET Miro Framework 2. and are programmed with the C# language. Figure 2 displays a setup used during experimentation. A. Enoding and Deoding imulation A simulation of the enoding/deoding proess was performed and it was shown that over 5 trials, given an information paket onsisting of k symols and onstants and δ, a reeption overhead of aout 6% was oserved. That is to say, the deoder would need to see 1.6k oded symols on average to suessfully omplete a single deode. Given α =.5, that would equate to 3.2 oded pakets. B. esults In this ontext, the primary features of frational ooperation are roustness, fairness, an inrease in transmission range, and the asene of entral oordination. Four experiments were designed to test these aspets of our protool. A sensitivity analysis was first done on α to determine what effet it would have to total throughput seen at the sink. Figure 3 desries these results. Eah data point was generated using a single soure transmitting to three relays for 2s. Inreasing α results in a trade-off etween higher deoding effiieny and extra traffi. Fig. 5: Three soures transmitting to six initial relays, one relay eing shutoff every 5s TABLE II: Parameters used in experiments Parameters Information symols, k 3 ymol length, l 8 its elay ratio, α.5 oure send rate, λ.5 pakets per seond The next experiment is set up using five nodes; one ating as the sink, one as the soure, and four as dediated relays. Nodes are positioned suh that they are all within range of eah other. During the ourse of the experiment, one relay node is shutoff every 5s. This experiment is designed to show that the protool is roust to relays leaving the system. For simpliity, we hose α to e the same for all relays. The results are divided into 2s time ukets, and are oserved over 2s in Figure 4. As relays are dropped from the system, the sink node experienes a derease in the amount of oded pakets it reeives, whih results in a redution of deoding effiieny. The traffi seen at the sink is onsistent with Equation 2. For every soure paket sent, there are r oded pakets generated (assuming all relays are within range of the soure). The simulation in etion III-A tells us that under the system parameters, an average of 3.2 oded pakets are required to suessfully deode. ine there are four relays present at the start of the experiment, we an expet to reah lose to 1% deoding effiieny during this period. The third experiment mimis the previous in all aspets, exept there are three soures roadasting instead of one. As previously mentioned in etion II-B, all nodes are ale to relay. As suh, for every s soures in the network we have an extra s 1 relays. This test is designed to show the roustness of the protool when there are a large numer of relays. As Figure 5 illustrates, the presene of two extra soure nodes greatly inreases sink traffi in our model; so muh so that it reahes hannel saturation and traffi no longer onforms to Equation 2. As we an see, the sink is deoding

5 D 15 oure Transmissions Deoded Pakets at the ink Coded Pakets at the ink Total Traffi at the ink Diret Unoded Pakets at the ink Throughput (ps) 1 5 Fig. 6: ix relays positioned over a field size of 18m 3m. A soure node is moving farther away from the sink destination Distane from the ink (m) Fig. 7: Plot illustrating the enefits of frational ooperation over diret non-routed paths at almost the same rate as the soure is transmitting, even as relays are eing dropped. This shows that provided there are enough relays in the system, an exodus of a few nodes will not ause signifiant performane degradation. The final experiment is set up as seen in Figure 6. ix relay nodes were positioned over an area of aout five square meters. A soure node is set up to roadast for 2s at fixed loations away from the sink. This test is intended to show to that our protool ahieves a signifiant oost in range over diret transmission. As depited in Figure 7, throughput of deoded pakets at the sink tends to graefully falloff with distane. Our protool ahieves over a three fold inrease in transmission range over a diret non-routed path. The extra redundany of dupliated pakets allows us to employ this protool in unfavourale hannel onditions and expet reasonale throughput. IV. CONCLUION This paper has presented a low-omplexity MAC layer protool whih employs frational ooperation using LT odes in the asene of entral oordination. A node has the aility to dynamially selet a relay ratio, whih ontrols how muh, if any, of its resoures it is willing to ommit to forwarding. As we have shown, a system with many relays is roust to noisy hannel onditions eause there is a large amount of dupliate information in the network. Due to the roadast nature of this protool, pakets are ale to avoid forwarding loops y ross-heking paket ids, thus making this sheme pratial for larger systems whih have a high paket TTL. Our approah is partiularly useful for hardware with omplexity onstraints, suh as the imote hardware often found in sensor networks. Further, our results prove that this protool an maintain deent throughput when nodes aruptly enter or exit the system, making this ideal for a dynamially hanging system suh as an ad-ho network. For future work, we plan to perform further experiments on a larger tested one the deoding algorithm is restrutured to run more effiiently. This would allow us to inrease the numer of information symols sent y a soure, resulting in greater system throughput. EFEENCE [1] A. endonaris, E. Erkip, and B. Aazhang, User ooperation diversitypart I: system desription, IEEE Trans. Commun., vol. 51, pp , Nov. 23. [2] A. endonaris, E. Erkip, and B. Aazhang, User ooperation diversity, Part II: Implementation aspets and performane analysis, IEEE Trans. Commun., vol. 51, pp , Nov. 23. [3] A. Nosratinia, T. Hunter, and A. Hedayat, Cooperative ommuniation in wireless networks, IEEE Commun. Mag., vol. 42, no. 1, pp , Otoer 24. [4] D. Chen and J. N. Laneman, Modulation and demodulation for ooperative diversity in wireless systems, IEEE Trans. on Wireless Commun., vol. 5, no. 7, pp , Jul. 26. [5] J. P. K. Chu and.. Adve, Implementation of o-operative diversity using message-passing in wireless sensor networks, in Pro. IEEE Gloeom, t. Louis, MO, pp , De. 25. [6] Y. Yan et al., Performane Analysis of IEEE82.11 Wireless Mesh Networks, IEEE Int. Conf. Commun., pp , May [7] A.W. Ekford et al., Low Complexity and Frational Coded Cooperation for Wireless Networks, IEEE Trans. Wireless Commun., vol. 7, pp , May 28. [8] A.W. Ekford et al., Low-omplexity strategies for ooperative ommuniations, in Cooperative Wireless Commun., ed. Y. Zhang, H.-H. Chen, and M. Guizani, CC Press: Boa aton, FL, pp , 29. [9] N. Farsad, A. W. Ekford, esoure Alloation via Linear Programming for Multi-oure, Multi-elay Wireless Networks, in Pro. IEEE International Conferene on Communiations (ICC), pp.1 5, May 21. [1] N. Kusashima et al., Frational Base tation Cooperation Cellular Network, 7th Int. Conf. on Inform., Commun. and ignal Proessing, pp. 1-5, 8-1, De. 29. [11] M. Luy, LT Codes, in Pro. 43rd ymp. on Found. of Comp. i., pp , Nov [12] Imote2:

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis tkilinka@.hut.fi Astrat This paper presents a partiular group of routing protools that aim to omine the advantages

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Path Sharing and Predicate Evaluation for High-Performance XML Filtering*

Path Sharing and Predicate Evaluation for High-Performance XML Filtering* Path Sharing and Prediate Evaluation for High-Performane XML Filtering Yanlei Diao, Mihael J. Franklin, Hao Zhang, Peter Fisher EECS, University of California, Berkeley {diaoyl, franklin, nhz, fisherp}@s.erkeley.edu

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Figure 1. LBP in the field of texture analysis operators.

Figure 1. LBP in the field of texture analysis operators. L MEHODOLOGY he loal inary pattern (L) texture analysis operator is defined as a gray-sale invariant texture measure, derived from a general definition of texture in a loal neighorhood. he urrent form

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Efficient and scalable trie-based algorithms for computing set containment relations

Efficient and scalable trie-based algorithms for computing set containment relations Effiient and salale trie-ased algorithms for omputing set ontainment relations Yongming Luo #1, George H. L. Flether #2, Jan Hidders 3, Paul De Bra #4 # Eindhoven University of Tehnology, The Netherlands

More information

On Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage

On Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage International Journal of Fuzzy Mathemat and Systems. ISSN 48-9940 Volume 4, Numer (014, pp. 193-01 Researh India Puliations http://www.ripuliation.om On Optimal Total Cost and Optimal Order Quantity for

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Mining Edge-Weighted Call Graphs to Localise Software Bugs

Mining Edge-Weighted Call Graphs to Localise Software Bugs Mining Edge-Weighted Call Graphs to Loalise Software Bugs Frank Eihinger, Klemens Böhm, and Matthias Huer Institute for Program Strutures and Data Organisation (IPD), Universität Karlsruhe (TH), Germany

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Network Coding in Wireless Networks with Random Access

Network Coding in Wireless Networks with Random Access ISIT2007, Nie, Frane, June 24 - June 29, 200O Network Coding in Wireless Networks with Random Aess Danail Traskovt, Desmond S. Lun, Ralf Koettert, and Muriel Medardt Broad Institute MIT and Harvard Cambridge,

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert Loria Université Nany 2 Campus Sientifique, BP 239 F-54506 Vandoeuvre lès Nany edex Dirk.Seifert@Loria.fr inria-00268864, version 2-23 Apr 2008

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Finding the Equation of a Straight Line

Finding the Equation of a Straight Line Finding the Equation of a Straight Line You should have, before now, ome aross the equation of a straight line, perhaps at shool. Engineers use this equation to help determine how one quantity is related

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Optimizing Large-Scale MIMO Cellular Downlink: Multiplexing, Diversity, or Interference Nulling?

Optimizing Large-Scale MIMO Cellular Downlink: Multiplexing, Diversity, or Interference Nulling? Optimizing Large-Sale MIMO Cellular Downlink: Multiplexing, Diversity, or Interferene Nulling? Kianoush Hosseini, Wei Yu, and Raviraj S. Adve The Edward S. Rogers Sr. Department of Eletrial and Computer

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

The influence of QoS routing on the achievable capacity in TDMA based Ad hoc wireless networks

The influence of QoS routing on the achievable capacity in TDMA based Ad hoc wireless networks Wireless Netw () 6:9 DOI.7/s76-8-- The influene of QoS routing on the ahievable apaity in TDMA based Ad ho wireless networks S. Sriram Æ T. Bheemarjuna Reddy Æ C. Siva Ram Murthy Published online: August

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Structural Topology Optimization Based on the Smoothed Finite Element Method

Structural Topology Optimization Based on the Smoothed Finite Element Method 378 Strutural Topology Optimization Based on the Smoothed Finite Element Method Astrat In this paper, the smoothed finite element method, inorporated with the level set method, is employed to arry out

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Vibration of buildings on pile groups due to railway traffic finiteelement boundary-element, approximating and prediction methods

Vibration of buildings on pile groups due to railway traffic finiteelement boundary-element, approximating and prediction methods ie 010 Nottingham University Press Proeedings of the International Conferene on Computing in Civil and Building Engineering W Tizani (Editor) Viration of uildings on pile groups due to railway traffi finiteelement

More information

Multi-Level Modeling of Concurrent and Distributed Systems

Multi-Level Modeling of Concurrent and Distributed Systems Multi-Level Modeling of Conurrent and Distriuted Systems Peter Taeling Hasso-Plattner-Institute for Software Systems Engineering P.O. Box 90 04 60, 14440 Potsdam, Germany taeling@hpi.uni-potsdam.de strat

More information

Scalable TCP: Improving Performance in Highspeed Wide Area Networks

Scalable TCP: Improving Performance in Highspeed Wide Area Networks Salable TP: Improving Performane in Highspeed Wide Area Networks Tom Kelly ERN - IT Division Geneva 3 Switzerland tk@am.a.uk ABSTRAT TP ongestion ontrol an perform badly in highspeed wide area networks

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Exploiting Longer Cycles for Link Prediction in Signed Networks

Exploiting Longer Cycles for Link Prediction in Signed Networks Exploiting Longer Cyles for Link Predition in Signed Networks Kai-Yang Chiang kyhiang@s.utexas.edu Nagarajan Natarajan naga86@s.utexas.edu Inderjit S. Dhillon inderjit@s.utexas.edu Amuj Tewari amuj@s.utexas.edu

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

A Compressed Breadth-First Search for Satisfiability

A Compressed Breadth-First Search for Satisfiability A Compressed Breadth-First Searh for Satisfiaility DoRon B. Motter and Igor L. Markov Department of EECS, University of Mihigan, 1301 Beal Ave, Ann Aror, MI 48109-2122 dmotter, imarkov @ees.umih.edu Astrat.

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Modeling Wireless Channel for Ad-Hoc Network Routing Protocol

Modeling Wireless Channel for Ad-Hoc Network Routing Protocol Modeling Wireless Channel for Ad-Ho Network Routing Protool Merlinda Drini, Tarek Saadawi Dept. ofeletrial Engineering, City College and Graduate Center ofcity University ofnew York New York, NY 10031,

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

Path Diversity for Overlay Multicast Streaming

Path Diversity for Overlay Multicast Streaming Path Diversity for Overlay Multiast Streaming Matulya Bansal and Avideh Zakhor Department of Eletrial Engineering and Computer Siene University of California, Berkeley Berkeley, CA 9472 {matulya, avz}@ees.berkeley.edu

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Tracking Table Tennis Balls in Real Match Scenes for Umpiring Applications

Tracking Table Tennis Balls in Real Match Scenes for Umpiring Applications British Journal of Mathematis & Computer Siene 1(4): 228-241, 2011 SCIENCEDOMAIN international www.sienedomain.org Traking Tale Tennis Balls in Real Math Senes for Umpiring Appliations K. C. P. Wong 1*

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Backpressure with Adaptive Redundancy (BWAR)

Backpressure with Adaptive Redundancy (BWAR) Bakpressure with Adaptive Redundany (BWAR) Majed Alresaini alresain AT us. edu Maheswaran Sathiamoorthy msathiam AT us. edu Bhaskar Krishnamahari bkrishna AT us. edu Mihael J. Neely mjneely AT us. edu

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

Circular Pruning for Lazy Diagnosis of Active Systems

Circular Pruning for Lazy Diagnosis of Active Systems Cirular Pruning for Lazy Diagnosis of Ative Systems Andrea Duoli, Gianfrano Lamperti, Emanuele Piantoni, Marina Zanella Dipartimento di Elettronia per l Automazione, Università di Bresia, Italy Astrat:

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU Parallel Blok-Layered Nonbinary QC-LDPC Deoding on GPU Huyen Thi Pham, Sabooh Ajaz and Hanho Lee Department of Information and Communiation Engineering, Inha University, Inheon, 42-751, Korea Abstrat This

More information

Bring Your Own Coding Style

Bring Your Own Coding Style Bring Your Own Coding Style Naoto Ogura, Shinsuke Matsumoto, Hideaki Hata and Shinji Kusumoto Graduate Shool of Information Siene and Tehnology, Osaka University, Japan {n-ogura, shinsuke, kusumoto@ist.osaka-u.a.jp

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Capacity Analysis for Flat and Clustered Wireless Sensor Networks

Capacity Analysis for Flat and Clustered Wireless Sensor Networks International Conferene on Wireless Algoritms, Systems and Appliations Capaity Analysis for Flat and Clustered Wireless Sensor etworks Min Song, Bei He Department of Eletrial and Computer Engineering Old

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 3, March-2014 ISSN

International Journal of Advancements in Research & Technology, Volume 3, Issue 3, March-2014 ISSN International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN 2278-773 47 Phrase Based Doument Retrieving y Comining Suffix Tree index data struture and Boyer- Moore faster

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

INTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING

INTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING INTEGRATING PHOTOGRAMMETRY AND INERTIAL SENSORS FOR ROBOTICS NAVIGATION AND MAPPING Fadi Bayoud, Jan Skaloud, Bertrand Merminod Eole Polytehnique Fédérale de Lausanne (EPFL) Geodeti Engineering Laoratory

More information

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Real-Time Control for a Turbojet Engine

Real-Time Control for a Turbojet Engine A Multiproessor mplementation of Real-Time Control for a Turbojet Engine Phillip L. Shaffer ABSTRACT: A real-time ontrol program for a turbojet engine has been implemented on a four-proessor omputer, ahieving

More information

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes Redued-Complexity Column-Layered Deoding and Implementation for LDPC Codes Zhiqiang Cui 1, Zhongfeng Wang 2, Senior Member, IEEE, and Xinmiao Zhang 3 1 Qualomm In., San Diego, CA 92121, USA 2 Broadom Corp.,

More information

1 Disjoint-set data structure.

1 Disjoint-set data structure. CS 124 Setion #4 Union-Fin, Greey Algorithms 2/20/17 1 Disjoint-set ata struture. 1.1 Operations Disjoint-set ata struture enale us to effiiently perform operations suh as plaing elements into sets, querying

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information