Applied Mathematics. Elixir Appl. Math. 84 (2015)

Size: px
Start display at page:

Download "Applied Mathematics. Elixir Appl. Math. 84 (2015)"

Transcription

1 3341 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) Avalable onlne at (Elxr Internatonal Journal) Appled Mathematcs Elxr Appl. Math. 84 (015) Bayesan Inference Approach for Energy Effcent Wreless Sensor Networks Usng Game Theory V.Vnoba 1 and S.M.Chthra 1 Department of Mathematcs, K.N. Govt. Arts college, Thanjavur, Inda. Department of Mathematcs, R.M.K College of Engneerng and Technology, Chenna, Inda. ARTICLE INFO Artcle hstory: Receved: 0 May 015; Receved n revsed form: 19 June 015; Accepted: 9 June 015; Keywords Wreless sensor networks, Game Theory, Bayesan Game Theory, LEACH and ELEACH protocols. ABSTRACT In ths paper, we propose a dfferent approach for effcently conservng energy n wreless sensor networks. Our approach towards energy consumng n sensor networks s fully dstrbuted to consume very low energy for fndng the path along wth data transmsson. We use two protocols LEACH and ELEACH-M to fnd the route for data transmsson and make ts performance by comparng the route dscovery of those two protocols. Bayesan nference s used to nference the mssng data from the nodes that were not actve durng each sensng. Game theory offers mode for dstrbuted allocaton of energy resources and thus provdes a way of expectng the characterstcs of wreless sensor networks. We make game approach to obtan the optmal probabltes of sleep and wake up states that were used for energy conservaton. 015 Elxr All rghts reserved. Introducton Recently, ncreasng research attenton has been drected toward wreless sensor networks: collectons of small low-power nodes physcally stuated n the envronment that can ntellgently delver hgh-level sensng results to the user node. The most complex desgn efforts are long-lved systems, largescale that truly requre self-organzaton and adaptvely to the envronment. The small low-power hardware platforms that ntegrate sensng, processng, computaton, and wreless communcaton have led to wdespread nterest n the desgn of wreless sensor networks. Such networks are envsoned to be large-scale dense deployments n envronments where tradtonal centrally wred sensors are mpractcal. The wreless ad hoc network s to allow a group of communcaton nodes to set up and mantan a network lfetme among themselves and wthout the support of a base staton or a central controller. The wreless ad hoc networks are useful for stuatons that requre quck or nfrastructure less local network deployment, such as crss response, mltary applcatons, possbly home and offce networks. Ad hoc networks could, empower medcal personnel and cvl servants to better coordnate ther efforts durng large-scale emergences that brng nfrastructure networks down. An mportant subclass of ad hoc networks s wreless sensor networks. The most central premse of sensor networks s the dstrbuted collecton of data from a physcal space, provdng an nterface between the dgtal and physcal domans. Sensor networks consst of a potentally large number of sensor modules that ntegrate sensng capabltes, memory, communcaton and processng. Ths sensor modules form ad hoc networks n order to share the collected physcal data and to provde ths data to the network user or operator. Wreless Sensor networks have a wde range of applcatons, n mltary, medcal, envronmental, ndustral, and commercal. Based on the applcatons of ad hoc and sensor networks, new challenges emerge. The lack of nfrastructure n ad hoc and sensor networks requres the nodes to perform the network setup, management and control among themselves and each node must act as a router and data forwarder n addton to playng the role of a data termnal. Dstrbutng network management across the nodes places a burden on the resources of ndvdual nodes. The addtonal load of each node complcates the protocol desgn and performance optmzaton of ad hoc and sensor networks. Game theory s a useful and powerful mathematcal tool for analyzng and predctng the behavor of ratonal and selfsh enttes. In the present work we propose to use the model-based approach, Bayesan Exploraton [8], to take account of all dynamc features and acheve good routng scheme through tral-and error nteractons wth the envronment. Related Work There are many energy-effcent routng algorthms have been proposed based on the herarchcal topology. LEACH [3] s called as a classcal clusterng algorthm. It randomly selects the cluster heads n a perodcal way and evenly dstrbutes energy consumpton of the entre networks to each sensor node, whch ams to reduce energy consumpton and mprove the whole network lfetme. It s smple; however, t has some defcences: () t does not guarantee about even dstrbuton of cluster heads over the network. Some of the very bg clusters and very small clusters may exst n the network at the same tme. () Cluster head (CH) selecton s unreasonable n heterogeneous networks where nodes have dfferent energy level. () Due to ths protocol each cluster head transmts data to base staton (BS) over a sngle hop, whch may consume more energy. LEACH and PEGASIS [4] s a chan-based protocol and each node communcates only n a close neghbor node and takes turns to transmt data to the snk. In HEED [5], cluster heads are decded based on the average mnmum reach ablty power and closer to the clusters or to be the snk, t saves the energy to the nter-cluster. Most of the clusters around the snk wll produce a large number of summary packets that leads to heavy traffc load. Selected and approprate cluster-head electon s an essental consderaton Tele: E-mal addresses: srlakshmvj@gmal.com 015 Elxr All rghts reserved

2 334 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) and nodes locaton and connectvty have been ntally focused. NECHS [7] uses fuzzy logc technque consderng two factors: neghbor nodes and remanng energy. Cluster heads elected n [8] are determned to have mnmum composte dstance of sensors to cluster head and cluster head to base staton. The cluster-head selecton depends on remanng energy level of sensor nodes for transmsson n [9]. The frst trajectory based clusterng technque for selectng the cluster heads and meanwhle extenuates the energy whole problem n H. Munaga, et al. [10]. DBCP [11] mproves LEACH on the bass of a metrc of nodes relatve densty. In general, Game theory and mechansm desgn have been used wth great success n analyzng routng algorthms n the planner network topology. FDG [14] s a game theoretc approach wth the probablty of strategy selecton based on the mxed strategy Nash equlbrum of the game. Comparng to AODV [15], t lmts the number of redundant broadcasts n dense networks whle stll allowng connectvty. VGTR [16] judges the energy consumpton of the paths and takes notce of nodes wth low remanng energy or hgh nformaton value. The dstance between nodes, remaned energy and load traffc together contrbute to the cost of transmsson n [17]. The am of algorthm s to mantan a postve proft of all nodes. Most of the routng algorthms adopt game theory on the herarchcal topology. DEER [18] adopts a game-theoretc model wth both remaned energy and average energy loss on among neghborng nodes under consderaton whle evaluatng the utlty functon for determnng cluster heads. Intra-cluster and nter-cluster routng schemes ncludes n DTTR [19] wth the utlzaton of multstage fntely repeated games and the lnk qualty ndcaton (LQI) based metrc method, the energy consumpton s balanced. F. Kazemeyn, et al. [] combnes a modfed verson of the AODV protocol wth coaltonal game theory to fnd the cheapest route n a group wth respect to power consumpton. How to choose correspondng leaders s not mentoned though.. In [], the Nash barganng soluton (NBS) s used for analyzng clusterng based sensor network. Harsany transformaton s ntroduced to form a statc game of complete but mperfect nformaton. G. Z. Zheng, et al. [3] analyzes routng n WSNs based on a Bayesan game. Routng Protocols Routng s complex n WSN due to dynamc nature of WSN. It has a lmted battery lfe, computatonal overhead, no conventonal addressng scheme, self-organzaton and lmted transmsson range of sensor nodes [4], [5] and [6]. As sensor has lmted battery and ths battery cannot be replaced due to area of deployment. Therefore the network lfetme depends upon sensors battery capacty. Most needed management of resources s to ncrease the lfetme of the wreless sensor network and Qualty of routng protocols. It depends upon the amount of data (actual data sgnal) successfully receved by Base staton from sensors nodes deployed n the network regon. of routng protocol has been proposed for wreless sensor network. Manly there are three types of routng protocols we have (1) Flat routng protocols () Herarchcal routng protocols (3) Locaton based routng protocols. The category of Herarchcal routng protocol s provdng maxmum energy effcent routng protocols [1], [], [3], [4] and [7]. of herarchcal routng protocol has been proposed s consderng as a Basc energy effcent herarchcal routng protocol s LEACH (Low Energy Adaptve Clusterng Herarchy). Many protocols have been derved from LEACH wth some modfcatons and applyng advance routng technques. Ths paper dscus and compare a herarchcal routng protocols. They are all energy effcent routng protocols and provde qualty enhancement to LEACH-M. Leach protocol (low energy adaptve clusterng herarchy) LEACH s one of the frst herarchcal routng Protocols. It s used n wreless sensor networks for ncreasng the lfe tme of network and performs self-organzng and re-clusterng functons for every round [1]. In the LEACH routng protocol each and every sensor nodes act as a clusters. In every cluster one of the sensor node acts as cluster-head and remanng sensor nodes as member nodes of that cluster. Cluster-head only can drectly communcate all the nformaton s to snk and member nodes use cluster-head as ntermedate router n case of communcaton to snk. It collects the data from all the nodes, aggregate the data and route all the meanngful nformaton to Snk. Due to these addtonal responsbltes Cluster-head dsspates more energy and f t remans cluster-head permanently t wll de quckly as happened n case of statc clusterng so n ths way LEACH can solve the problem by randomzed rotaton of cluster-head to save the battery of ndvdual node [4], [5]. In ths ways LEACH maxmze lfe tme of network nodes and also reduce the energy dsspaton by compressng the date before transmttng to cluster-head. LEACH routng protocol operatons based on rounds. Each round normally conssts of two phases. () Setup phase and () steady state phase. In the setup phase cluster-head and cluster are created and the whole network nodes are dvded nto multple clusters. Some nodes elect themselves as a cluster-head ndependently from other nodes and these nodes are elect themselves on behalf suggested percentage P and ts prevous record as cluster-head. Nodes whch were not cluster-head n prevous 1/p rounds generate a number between 0 to 1 and f t s less then threshold T(n) then nodes become cluster-head. Threshold value s set through ths formula. P 1 T n 1 P r mod f n ϵ G ( ) p 0, otherwse Where G s set of nodes that have not been cluster-head n prevous 1/p rounds, P s the cluster-head probablty, r s current round. If the node becomes cluster-head n current round and t wll be a cluster-head after next 1/p rounds [4], [5], [6] then t ndcates that every node wll serve as a cluster-head equally and energy dsspaton wll be unform throughout the network. Noncluster-head node wll select ts multple of cluster-head from where node receved advertsements. Cluster-head fnally wll create TDMA (Tme Dvson Multple Access) schedule for ts assocated members n the cluster. In Steady state phase starts when clusters have been created. In ths phase nodes communcate to cluster-head durng allocated tme slots otherwse nodes completely keep sleepng. Due to ths man attrbute LEACH mnmze energy dsspaton and extend battery lfe of all ndvdual nodes. An amount of energy can be used n fgure (a) s amp K 3d d 1 Whereas the amount of energy used n fgure (b) s amp K 3d d 1 These are all the amount of energy depleton by data transfer formula.

3 3343 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) Energy beng dsspated to run the transmtter s E elec 50nj / bt. Fgure 1. Drect transmsson and Mnmum transmsson energy Energy dsspaton of the transmsson amplfer s 100 pj / bt / m amp E K, d E K Kd Transmsson cost s Tx elec amp and fnally the Recevng cost s E K E K Rx Where K s the length of the message n bts d s the dstance between nodes n s a random number between 0 and 1 and represents the path-loss exponent ( ). elec In [3], new cluster head selecton algorthm s establshed, n whch cluster head s decded by Snk node accordng to ts energy n the lst. The man energy consumpton of these handlngs comes to snk node whose energy s free, therefore, ELEACH-M an balance energy consumpton and prolong entre network perod comparng wth LEACH. However, n ELEACH-M, cluster nodes frequently need to send control frame to cluster head, makng waste energy of the network. Besdes, the mprovement of ELEACH-M a data delvery mechansm s only consdered on the aspect of energyeffcency, not data-effcency. In [4] Zhou desgns based on the Dfferentated Servces, whch dvdes data nto common and exgent. When dealng wth common data, the request of data relablty s not very hgh, therefore, source node can choose a path to snk node dependng on probablty for data delvery, whch can save energy. Emergency takes place only to ensure the exgent data delvered to snk s accurate, the source node wll synchronously start all non-nter secant paths to Snk, satsfyng users requre for unexpected emergent events. In other words, ths paper uses redundancy manner to mprove ts relablty. The followng fgure 4. Shows that dfferent processes of nodes n LEACH protocol. Fgure. LEACH bad and good Scenaro Both of these dagrams s the optmum scenaro, comparatvely second s better because the cluster-heads are spaced out and the network s more properly sectoned n fgure. Eleach-M (Enhancement Of Mult-Hop - Protocol) It s an mproved verson of LEACH called enhancement of mult-hop leach (ELEACH-M). There was no matter wth the dstance from the CH to BS. The CH always communcates wth the BS so t wll consume a lot of energy. The focus only on the heterogeneous sensor networks, n whch two types of sensors are dsplayed: Frst s Hgh capacty sensor and second s a smple sensor. The sensors whch have a large capacty

4 3344 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) processng capabltes and communcates very ntensvely and acts as cluster head s a hgh capacty sensor whle others are n smple sensors and they have lmted power, afflated to the closest CH n ther neghborhood and communcates wth t drectly Moble Enhanced. The followng fgure 5. Shows that Routng of Mult-hop LEACH Protocol. We assume the followng notons λ 1 : Arrval rate of TCP λ : Arrval rate of UDP μ 1 : servce rate of TCP μ : Servce rate of UDP L: Length of queue A t : of TCP arrved at queue A u : of UDP packets arrved at queue P t : of TCP stored at queue P u : of UDP packets stored at queue D t : of TCP to be dropped n model-1 D t: of TCP to be dropped n model- D u : of UDP to be dropped P dt : probablty that droppng TCP packets n model-1 P dt: probablty that droppng TCP packets n Model-. D t s computed as follows n model-1 Fgure 5. Routng of Enhancement of Mult-hop LEACH Protocol Authors n [7] ntroduced a new verson of LEACH wth a moblty factor. ELEACH-M uses the same threshold formula based on the orgnal LEACH. It s used to calculate the threshold, but ELEACH-M takes nto consderaton the moblty of nodes durng data transfer phase, whch LEACH does not. The moblty tself s a challenge because moble node can leave cluster whle t s transmttng data to a CH. ELEACH-M solves ths problem by confrmng whether a moble node stll able to communcate wth CH or not to TDMA schedule. In the begnnng of each TDMA slot, the CHs transmt the message to REQ-DATA-TRANSMITION. If the moble node s unable to receve the message then the CH wats for the request n the next TDMA slot and f the node msses two successve TDMA frames, t consders tself out of range, and the CH wll remove unreachable nodes from ts member lst. Analytcal Model We consder two models Model-1 & Model -, model -1 for sngle queue and model- for Double queue are shown n fgures 6 & 7. Fg 6. Model -1 Sngle queue Fgure 7. Model-.Double queue D t = [A t -[L-(P u +P t ) ] f [L-(P u +P t )] A t 0 f [L-(P u +P t )] >A t P dt s computed as follows Dt Pdt A t D / t s computed n model - as follows [A t -(L / - P t )] f (L / - P t) A t D t = 0 f [L / - P t ] >A t P / dt s computed as follows P ' dt D A ' t t P dt P dt f ( P u > L / ) Here we proved that Probablty that droppng TCP packets n Model- s less than Probablty that droppng TCP packets n Model-1. Game Theory In early 1950's John Nash recognzed that n non cooperatve games there exst sets of optmal strateges (socalled Nash equlbrum) used by the players n a game such that no player can beneft by unlaterally changng hs or her strategy f the strateges of the other players reman unchanged. Recently game theory has been used extensvely to model networkng problems, where dfferent players may have dfferent strateges for network usage. Game theory s a formal way to analyze nteracton among a group of ratonal players who behave strategcally. A game s the nteractve stuaton, specfed by the set of players (.e., sensor nodes), the possble actons of each node, and the set of all possble payoffs. Games n whch the actons of the players are drected to maxmze ther own proft wthout subsequent subdvson of the proft among the players are called Cooperatve Games. Game theory provdes a good framework wth concepts of a coalton and coaltonal value and dfferent notons of stablty. Cooperatve game-theoretc models can be used to do ths for self-motvated agents (sensor nodes), each of whch has tasks t must fulfll and resources t needs to complete these tasks. Although the agents (sensor nodes) can act and reach goals by themselves, t may be benefcal to jon together. Behavor of sensor nodes can be coordnated based on Nash Equlbrum proposed n Game theory to acheve some desred objectves. The proposed game s expressed as: N,, where N s S P the set of sensor nodes, S the set of strateges of sensor nodes, and P the payoff functon for node.

5 3345 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) () Payoff functon The payoff functon between sensor nodes s composed of two mportant factors: cooperaton, reputaton. The Stronger cooperaton between two nodes means the more relable data communcaton between them. Also, the more a node cooperates, the better ts reputaton s. The payoff between two sensor nodes should be dependent on ther dstance and each node's transmtter sgnal strength. () Game Strategy Each sensor node utlze ts strategy accordng to the nformaton t attaned n precedng tme slots n the lght of the followng factor: (1) reputaton sensor nodes have not made enough reputaton to trust each other and cooperate wth each other, () dstance d s the closer to two nodes, the more they j trust each other. All the sensor nodes wll cooperate wth each other successfully accordng to reputaton level, and closeness of sensor nodes. Bayesan Theory of Games Bayesan ratonal pror equlbrum requres agent to make ratonal decsons and statstcal predctons. Startng wth frst order non nformatve pror and keeps updatng wth statstcal decson theoretc and game theoretc reasonng untl a convergence of conjectures s acheved. So far we have been assumng that everythng n the game was common knowledge for everybody playng, n fact the players may have prvate nformaton about ther own payoffs, about ther type or preferences etc. In ths stuaton the way of modelng of asymmetrc or ncomplete nformaton s by recurrng to an dea generated by Harsany (1967). The key s to ntroduce a move by the Nature, whch transforms the uncertanty by convertng an ncomplete nformaton problem nto an mperfect nformaton problem. In a Bayesan game, a state refers to a possble scenaro that may be realzed n the game. Bayesan games are n multple states and types that are used to summarze the degree to whch each player can dfferentate between the states. Due to nstance, n a Bayesan game wth two states, a player wth two types can dstngush between the states whle a player wth one type cannot. For a player wth multple types n Bayesan, each type has a separate set of preferences that correspond wth a partcular state of the game. The dea s the Nature moves determnng players types, a concept that embodes all the relevant prvate nformaton about them such as payoffs, preferences, belefs about other players, etc. Defnton A Bayesan Game s a game wth ncomplete nformaton n a normal form that conssts of 1,,.....I. () Players () a fnte acton set for each player () A fnte type set for each player (v) A probablty dstrbuton over type belefs about the players types). (v)utltes u j a A : A1 XA X... AI X 1X ϴ p / (Common pror X... Now t s mportant to dscuss a lttle bt each part of the defnton. Players types contan all relevant nformaton about certan player s prvate characterstcs. The type s only observed by player, who uses ths nformaton both to make decsons and to update hs belefs about the lkelhood of opponents type. (Usng the condtonal probablty p / I. Combnng actons and types for each player t s possble to construct the strateges. Strateges wll be gven by a mappng from the type space to the acton space, s : A wth elements s. In words a strategy may assgn dfferent actons to dfferent types. Fnally, utltes are calculated by each player by takng expectatons over types usng hs or her own condtonal belefs about opponents types. Hence, f player uses the pure strategys, other players use the strateges s and player s type s, the expected utlty can be wrtten as s / s, Eu u s s,, p /, Bayesan Nash Equlbrum (BNE) A Bayesan Nash Equlbrum s bascally the same concept than Nash equlbrum wth the addton that players need to take expectatons over opponents types. Defnton A Bayesan Nash Equlbrum (BNE) s a Nash Equlbrum of a Bayesan Game, (.e) ' ' E s / s, E s / s, s S and for u u for all all types occurrng wth postve probablty. Theorem: Every fnte Bayesan Game has a Bayesan Nash Equlbrum. Bayesan Network The prmary hypothess varable for the Bayesan network was the degree of nterest. We could not test the accuracy of predcton drectly related to the hypothess varable. Bayesan network survey ncludes two ndcators of degree of nterest, nterpersonal counterproductve behavor and organzatonal counterproductve behavor. We used these varables as crtera to examne the extent to whch the changes n the Bayesan network affected ts ablty to predct counterproductve behavor. The followng strategy was used to test the predctons of the Bayesan network. The network processed a number of cases n whch the values of varables ncluded n the paper. These values were entered nto the network as fndngs (or evdence), and the network then predcted the probablty of counterproductve behavor based on ths evdence. The predcted values were then compared to the actual values to assess the correctness of the predctons. For the orgnal and then the revsed Bayesan network, we conducted ths analyss for a set of cases smulated usng the Bayesan network to get an upper bound on the possble accuracy of model predcton and repeated the analyss usng actual cases from the survey data set. The two sources are () smulated cases that were generated by the Bayesan network tself, and () emprcal cases based on responses to the survey. The emprcal cases were drawn drectly from the survey measures, but were normalzed to have means and standard devatons that corresponded to the comparable varables n the Bayesan network. The smulated cases provded a baselne aganst whch the qualty of the predctons of emprcal cases was assessed. Smulaton and Results In ths secton, t descrbes the smulaton and varous parameters chosen for smulaton. The varous performance metrcs used to compare the performance of LEACH aganst ELEACH-M. The followng table 3 shows the varous parameters and ther values.. I

6 3346 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) The ELEACH-M has been mplemented by usng Network Smulaton-(NS-), t s a standard smulator. The channel bandwdth s Mbps. A free space rado propagaton model s used n whch the sgnal power attenuates s 1/r, where r s the dstance between the nodes. All the nodes have the same transmsson range of 50 meters. The dstrbuted coordnaton functon of IEEE80.11 s used MAC layer. All nodes can overhear packets destned for others. The nodes are deployed at random locatons n a 1000mx 1000m regon. Smulator NS-.34 Verson Network Model Network sze 1000m x 1000m of Nodes 50 Node placement Unform Physcal Layer Sgnal Propagaton Two-ray ground Model reflecton model Transmsson Range 50m MAC Layer IEEE Routng Layer Moblty Model Traffc Model Lnk Bandwdth Interface Queue Mbps FIFO-BASED, Sze 50 ELEACH-M, LEACH Requested bandwdth 0.1Mbps to 0.6 Mbps Smulaton Tme 300 Sec Random-way pont model Maxmum Speed 5,10,15,0 m/s Pause Tme 5 sec Constant Bt Rate (CBR) of Source- 3 to 10 Destnaton pars Data Packet Sze 51 bytes Energy Intal energy of each 6 Joules Consumpton node Model Transmttng Power 0.360mW Recevng Power 0.335mW Idle Power 0.13mW For the moble scenaros, the random waypont model s used for node moblty. In ths model, a node chooses a random pont n the network. It moves towards ts destnaton pont at a constant speed. The speeds are unformly chosen between the mnmum and maxmum speeds and are set 0 m/s and 0 m/s, respectvely. If the node reaches ts destnaton pont, t stays there for a certan pause tme, after whch t chooses another random destnaton pont and repeats ths process and the smulaton ends after 300sec. The data traffc s generated by Constant Bt Rate (CBR) sessons ntated between the source and destnaton. All the nodes are assumed to have the same amount of battery capacty wth full energy at the begnnng of the smulaton and ntal energy of each node s 6 Joules. Whle transmttng power and recevng power of each node s 0.360mW and 0.335mW respectvely. In ths smulaton, a group of data rates rangng from 3 kbps to 104 kbps s appled, the moblty scenaro s wth a pause tme of 3 seconds and the maxmum node speed s 5 m/s. The followng quanttatve metrcs are used to measure the performance of protocols. Packet Delvery Rato Packet Delvery Fracton (PDF): The rato of the number of packets generated by the sources to the number of packets receved by the destnatons. PDF= ( of Data packets receved/ of Data packets sent) * 100. From fgure 8, t can be seen clearly that the LEACH-M and ELEACH-M have approxmately equal PDR at low data rate (data rate below 51 kbps). When the data rate of traffc flow ncreases to kbps to 56 kbps. Fgure 8. Data rate Vs Sent Data packets Fgure 9. Data rate Vs Receved Data Fgure 10. Data packet delvery rato versus speed The PDR of LEACH suddenly drops from 98% to 60%. At hgher data rates ELEACH-M performs better than to LEACH, because In the ELEACH-M, the route s selected based on bandwdth and energy. Packet delvery rato s drectly proportonal to the bandwdth and energy. Fg.9 shows that number receved data packets n ELEACH-M are greater than number receved data packets n LEACH. The comparson of packet delvery rate Vs speed s shown n fgure 10. The packet delvery rate of ELEACH-M s hgher than LEACH due to less lnk breaks. In LEACH, three events may occur; soluton s mmedately alternatve path s chosen wthout delay. The probablty of lnk falure n the ELEACH-M s less than the probablty of lnk falure n the LEACH, as the speed of the nodes ncreases, the probablty of lnk falure ncreases and hence the number of packet drops also ncreases. The ELEACH-M has hgher packet delvery rato than LEACH. End -To-End Delay Average end-to-end delay s the delay of data propagaton, transfer and the delays caused by queung, bufferng and retransmttng data packets. The delay of each packet= the tme

7 3347 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) of receved data packets - the tme of sent ths data packet. The average end to end delay s then computed as: Average delay =Total delay of each data packets / total data packets receved. Generally, there are three factors affectng end-to-end delay of a packet: () Route dscovery tme, whch causes packets to wat n the queue before a route path s found. () Bufferng watng tme, whch causes packets to wat n the queue before they can be transmtted. () The length of routng path. The more number of hops a data packet has to go through, the more tme t takes to reach ts destnaton node. Whle n the real tme communcatons, each packet whch arrves late could be useless although they reach the destnaton successfully. Real tme traffc s delay senstve. Routng Overhead It s equal to the number of routng packets transmtted per data packet delvered at destnaton. Each hop-wse transmsson of a routng packet s counted as one transmsson. It s also known as Normalzed Routng Load (NRL). It s also defned as NRL = of control packets generated /number of receved data packets. The routng overhead s an mportant metrc to compare the performance of dfferent protocols snce t gves a measure of the effcency of protocols, especally n a low bandwdth wth congested wreless envronments. Protocols that transmt a large number of packets can also ncrease the probablty of packet collsons and watng tme of data packets n transmsson buffer queues. Fgure 11. Data rate Vs Average Delay Fgure 13. Overhead Vs Data rate Fgure 1. Average delay Vs Speed From fgure 11, t can be seen clearly that the ELEACH-M and LEACH have low and approxmately equal average delay at low data rate (data rate below 56 kbps). When the data rate of traffc flow ncreases to kbps to 51 kbps. It shows that networks wth the ELEACH-M routng protocol can provde lower end to end delay for traffc flows than the LEACH because the ELEACH-M always choose to fnd a route wth satsfyng data rate and energy. In addton to that, durng the transmsson, the QoS of the traffc s montored. Fgure 1 depcts the varaton of the average end-to-end delay as a functon of moblty of nodes. It can be seen that the general trend of all curves s an ncrease n delay wth the ncrease of velocty of nodes. Manly the reason s that hgh moblty of nodes results n an ncreased probablty of lnk falure that causes an ncrease n the number of routng redscovery processes. Ths makes data packets have to wat for more tme n ts queue untl a new routng path s found. The delay of ELEACH-M remans approxmately equal at all Statc snks. In LEACH, the delay ncreases quckly as node moblty ncreases. In the avalablty of alternate node-dsjont routng paths n ELEACH-M elmnates route dscovery latency that contrbutes. In addton, when a congeston state occurs n a routng path, the source node s dstrbuted ncomng data packets to the other node-dsjont routng paths to avod the congeston. Ths reduces the watng tme of data packets n queue. Fgure 14. of control packets Vs Data rate Fgure 15. of control packets Vs Speed Fgure 13 shows the Overhead Vs data rate. At low moblty; sngle path routng generates less overhead than multpath. At hgh moblty, frequently lnks falure, so the route dscovery s repeatedly performed by the sources to fnd new routes due to overhead ncreases. It has shown that the normalzed routng load n ELEACH-M performs better than the LEACH when speed ncreases. The normalzed routng load n LEACH ncreases more quckly than that n ELEACH-M wth the ncrease of moblty. ELEACH-M generates less overhead due the followng reason, whle durng route dscovery tself. It elmnate the some paths f they don t support QoS, ths result n an ncreased packet delvery rato, decreasng end-to-end delays

8 3348 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) S. No. for data packets, lower control overhead, and fewer collsons of packets. Fgure 14 and fg.15 show the number of control packets Vs date and the number of control packets and speed respectvely Energy consumpton The nodes n a WSN are typcally powered by batteres whch have lmted energy reservor. It becomes very dffcult to recharge or replace the battery of nodes. In such stuatons energy conservatons are essental. The lfetme of the nodes show strong dependence on the lfetme of the batteres. In the WSN nodes depend on each other to relay packets and the lst of some nodes may cause sgnfcant topologcal changes, undermne the network operaton, and affect the lfetme of the network. The comparson of energy consumpton s shown Fg.16 and fg 17. Fgure 16. Energy consumpton aganst Data rate Fgure 17. Energy consumpton aganst Lfe Tme Result (I) Eleach-M of Data sent (X) of Data Receved (Y ) PDF= Y/X*100 of Control generated (Z) Total energy Consumpton Total delay of data packets (II) Leach S. No. of Data sent X of Data Receved Y PDF= Y/X*100 of Control generated Z Total energy Consumpton Total delay of data packets Concluson In ths paper, we proposed an energy effcent protocol for WSNs. Our approach can be useful for applcatons that requre scalablty, prolonged network lfetme and node are dspersed n a large spacous feld. It depends on overhead and load, the path falure manly depends on due to lack energy of any one node on selected path. That t was elmnated n ELEACH-M. The ELEACH-M consumes less energy than to LEACH and to maxmze the lfetme of network. Each node mantans mnmum energy level drng the transmsson of data, each node checks whether ts energy reaches to threshold or not. If ts energy reaches to threshold value, then node sends a EERP packet to the source node n reverse path. The source node mmedately selects the alternate route. References [1] Akyldz and W. Su, Y. Sankarasubramanam and E. Cayrc, A Survey on Sensor Networks, IEEE Commun. Mag., vol. 8, (00), pp. 10. []. WANG Xuan-zheng, LI La-yuan, ZHANG We-hua, and ZHANG Lu- mn, Research on routng protocol for wreless sensor networks, APPLICATION RESEARCH OF COMPUTERS, 009, pp. 6(4) [3] Zhou Xn-Lan, Wang Run-Yun, Relable Data Delvery Algorthm based on Dfferentated Servce n WSNs, Electronc Computer Technology, 009 Internatonal Conference on 0- Feb. 009 pp [4] W. Henzelman, A. Chandrakasan, and H. Balakrshnan, Energy-effcent routng protocols for wreless mcrosensor networks, n Proc. 33rdHawa Int. Conf. SystemScences(HICSS), Mau, HI,Jan [5] Henzelman W. B., Chandrakasan A. P., Balakrshnan H., An applcaton- specfc protocol archtecture for wreless mcrosensor networks, IEEE Trans on Wreless Communcatons, Vol. 1, No. 4, 00, pp , do: /TWC [6] X. H. Wu, S. Wang, Performance comparson of LEACH and LEACH- C protocols by NS, Proceedngs of 9th Internatonal Symposum on Dstrbuted Computng and Applcatons to Busness, Engneerng and Scence. Hong Kong, Chna, pp , 010 [7] P.T.V.Bhuvaneswar and V.Vadeh Enhancement technques ncorpo- rated n LEACH- a survey Department of Electroncs Engneerng, Madras Insttute Technology, Anna Unversty Chenna, Inda, 009. [8] D. S. Km and Y. J. Chung, "Self-organzaton routng protocol supportng moble nodes for wreless sensor network," n Proc. Frst Internatonal Mult-Symposums on Computer and Computatonal Scences, Hangzhou, Chna, 006. [9] C. Xu and L. Cao, G. A. Zhang and J. Y. Gu, Edtors, Applcaton Research of Computers, vol. 3, (010), pp [10] W. Henzelman, A. Chandrakasan and H. Balakrshnan, Energy-effcent Routng Protocols for Wreless Mcrosensor Networks, Proceedngs of the 33rd Annual Hawa

9 3349 V.Vnoba and S.M.Chthra/ Elxr Appl. Math. 84 (015) Internatonal Conference of System Scences, (000) January 4-7; Mau, Hawa. [11] S. Lndsey and C. S. Raghavendra, Edtors, PEGASIS: Power-effcent Gatherng n Sensor Informaton Systems, Parallel and Dstrbuted Systems, vol. 9, (00), pp. 94. [1] O. Youns and S. Fahmy, Edtors, HEED: A Hybrd, Energy-effcent, Dstrbuted Clusterng Approach for Ad Hoc Sensor Networks, Moble Comput., vol. 3, (004), pp [13] B. S. Lee, H. W. Ln and W. Tarng, A Cluster Allocaton and Routng Algorthm Based on Node Densty for Extendng the Lfetme of Wreless Sensor Networks, Proceedngs of the 6th Internatonal Conference on Advanced Informaton Networkng and Applcatons Workshops (WAINA), (01) March 6-9; Fukuoka, Japan. [14] Y. Hu and X. R. Shen and Z. H. Kang, Energy-effcent Cluster Head Selecton n Clusterng Routng for Wreless Sensor Networks, Proceedngs of the 5th Internatonal Conference on Wreless Communcatons, Networkng and Moble Computng (009) September 4-6; Bejng, Chna. [15] X. X. Zhang and M. Zhang, Z. C. Zhang, An Improved WSNs Clusterng Routng Algorthm and Its Performance, Scence paper Onlne, vol., (010), pp. 96. [16] M. C. M. Then and T. Then, An Energy Effcent Cluster-head Selecton for Wreless Sensor Networks, Proceedngs of Internatonal Conference on Intellgent Systems, Modellng and Smulaton (ISMS), (010) January 7-9; Lverpool, Unted Kngdom. [17] J. F. Qao, S. Y. Lu and X. Y. Cao, Densty-based Clusterng Protocol for Wreless Sensor Networks, Computer Scence, vol. 1, (009), pp. 46. [18] A. Schllngs and K. Yang, VGTR: A Collaboratve, Energy and Informaton Aware Routng Algorthm for Wreless Sensor Networks Through the Use of Game Theory, Lecture Notes n Computer Scence, vol. 5659, (009), pp. 51. [19] B. Arsan and K. Eshgh, A game theory approach for optmal routng n wreless sensor networks, Proceedngs of the 6th Internatonal Conference on Wreless Communcatons Networkng and Moble Computng (WCOM), (010) September 3-5; Chengdu, Chna. [0] N. Yang, H. Tan and P. Huang, Edtors, Dstrbuted Energy-economcal Routng Algorthm Based on Game-theory for WSN, Journal of Electroncs & Informaton Technology, vol. 5, (008), pp. 130 [1] J. Hu and L. F. Shen, Clusterng Routng Protocol of Wreless Sensor Networks Based on Game Theory, Jornal of Southeast Unwersty, vol. 3, (010), pp [] F. Kazemeyn, E. B. Johnsen and O. Owe, Edtors, Groupng Nodes n Wreless Sensor Networks Usng Coaltonal Game Theory, Proceedngs of the 16th IEEE Internatonal Conference on Engneerng of Complex Computer Systems (ICECCS), (011) Aprl 7-9; Las Vegas, Nevada USA. [3] G. Z. Zheng, S. Y. Lu and X. G. Q, Clusterng Routng Algorthm of Wreless Sensor Networks Based on Bayesan Game, Journal of Systems Engneerng and Electroncs, vol. 1, (01), pp [4] D. Lee, H. Shn and C. Lee, Game theory-based resource allocaton strategy for clusterng based wreless sensor network, Proceedngs of the 6th Internatonal Conference on Ubqutous Informaton Management and Communcaton (ICUIMC '1), (01) February; Kuala Lumpur, Malaysa. [5] T. Rappaport, Edtor, Wreless Communcatons: Prncples & Practce, Englewood Clffs, Prentce-Hall (1996). [4] D. Fudenberg and J. Trole, Edtors, Game Theory, MIT Press, (1991).

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks

Mobile Adaptive Distributed Clustering Algorithm for Wireless Sensor Networks Internatonal Journal of Computer Applcatons (975 8887) Volume No.7, Aprl Moble Adaptve Dstrbuted Clusterng Algorthm for Wreless Sensor Networks S.V.Mansekaran Department of Informaton Technology Anna Unversty

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks

DECA: distributed energy conservation algorithm for process reconstruction with bounded relative error in wireless sensor networks da Rocha Henrques et al. EURASIP Journal on Wreless Communcatons and Networkng (2016) 2016:163 DOI 10.1186/s13638-016-0662-9 RESEARCH Open Access DECA: dstrbuted energy conservaton algorthm for process

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Cognitive Radio Resource Management Using Multi-Agent Systems

Cognitive Radio Resource Management Using Multi-Agent Systems Cogntve Rado Resource Management Usng Mult- Systems Jang Xe, Ivan Howtt, and Anta Raja Department of Electrcal and Computer Engneerng Department of Software and Informaton Systems The Unversty of North

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Classification Method in Integrated Information Network Using Vector Image Comparison

Classification Method in Integrated Information Network Using Vector Image Comparison Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com Classfcaton Method n Integrated Informaton Network Usng Vector Image Comparson Zhou Yuan Guangdong Polytechnc Normal Unversty

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks

A Finite Queue Model Analysis of PMRC-based Wireless Sensor Networks A Fnte Queue Model Analyss of PMRC-based Wreless Sensor Networks Qaoqn L, Me Yang, Hongyan Wang, Yngtao Jang, Jazh Zeng College of Computer Scence and Technology, Unversty of Electronc Scence and Technology,

More information

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Layer Based and Energy-Balanced Clustering Protocol for Wireless Sensor Network

Layer Based and Energy-Balanced Clustering Protocol for Wireless Sensor Network Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Layer Based and nergy-balanced Clusterng Protocol for Wreless Sensor Network 1 Yu HU, 2 Shu HAN 1 Measurng and Controllng Technology Insttute,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives Wreless Sensor Network, 2009, 1, 358-364 do:10.4236/wsn.2009.14044 Publshed Onlne November 2009 (http://www.scrp.org/ournal/wsn). An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton

More information

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks

Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks Dstrbuted Topology Control for Power Effcent Operaton n Multhop Wreless Ad Hoc Networks Roger Wattenhofer L L Paramvr Bahl Y-Mn Wang Mcrosoft Research CS Dept. Cornell Unversty Mcrosoft Research Mcrosoft

More information

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Advanced radio access solutions for the new 5G requirements

Advanced radio access solutions for the new 5G requirements Advanced rado access solutons for the new 5G requrements Soumaya Hamouda Assocate Professor, Unversty of Carthage Tuns, Tunsa Soumaya.hamouda@supcom.tn IEEE Summt 5G n Future Afrca. May 3 th, 2017 Pretora,

More information

sensors ISSN

sensors ISSN Sensors 2011, 11, 5383-5401; do:10.3390/s110505383 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle FRCA: A Fuzzy Relevance-Based Cluster Head Selecton Algorthm for Wreless Moble Ad-Hoc

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information