Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Size: px
Start display at page:

Download "Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput"

Transcription

1 Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia , USA Abtract At the forefront of the recent advance in mobile network i the development of ophiticated mobility management mechanim that are uually baed on Mobile IP and it derivative. Baed on thee mobility management protocol, everal tudie that characterize tranport protocol performance have been preented. In thi work we move one tep further, and preent a joint performance evaluation model of TCP and TFRC, with the underlying IP-baed mobility protocol. We develop tochatic model that can characterize the protocol performance during handoff between heterogeneou wirele network like WLAN, cellular, or WMAN. We preent performance evaluation reult for validating the developed model under a et of different handoff cenario. The developed model can be utilized a a bai for further analytical evaluation of new mobility management protocol, allowing thu a fat and accurate comparion. I. INTRODUCTION The wide-pread ucce of IP-baed mobile and wirele device, ha created a need for new network protocol and architecture o that revenue-generating and eamle ervice can be provided to the end uer. One of the firt challenge that ha to be reolved i that of mobility management. The functionality that mobility management define conit of two eparate operation location management and handoff management. Currently, the protocol that i conidered to be a practical approach to the above problem i Mobile IP [1]. Depite however the elegant olution that Mobile IP offer, TCP performance uffer from everal problem due to handoff caued by hot mobility [2]. Neverthele, modeling the performance of TCP i uch a mobile environment ha received little attention. There are everal model for quantitatively analyzing TCP throughput [3], [4], pecifically in the context of the wired internet. On the other hand, coniderable amount of work on modeling mobility management protocol i available, and epecially for mobile IP and it derivative [5], [6]. The main focu of the thee mobility management modeling approache ha been the characterization of the ignalling and proceing load a a meaure of protocol performance. We are aware of only one recent tudy [7], where the author evaluate the performance of the TCP-friendly rate control protocol TFRC [8] during handoff between aymmetric network. However, they do not attempt to model or expre analytically thi behavior. II. SYSTEM MODEL AND ASSUMPTIONS The propoed ytem model aume an end-to-end connection with the data flowing from the correpondent hot CH to the mobile hot MH. According to the mobility cenario that we want to analyze, the MH i initially aociated with the firt acce network AN 1, and at ome time in the future it may move toward AN 2. The two acce network are modeled eparately, while they are both attached to the core network CN which i the Internet. We make the aumption that while the mobile hot i connected to AN 1, the tranport protocol i in teady tate. Subequently, after handoff i performed to AN 2, the protocol will reach the teady tate at ome time in the future. Many tudie have hown that the firt-order two-tate Markov chain i.e. the Gilbert path model can approximate fairly well the behavior of the Internet. However, in thi paper we adopt the Bernoulli path model which i a implification of the Gilbert model. The reaon why we elected a impler path model come from the need to model TCP on the packet level and obtain a cloed form reult. By following a more complex path model, and therefore TCP model, the overall ytem complexity will be unnecearily increaed. With the Bernoulli model the only quantity needed to model the channel i the average packet lo rate. The average packet lo rate i imply calculated by dividing the number of lot packet v. the total number of packet lot or received for each of the two path: #lot P 1,2 = 1 #lot + received However, in order to capture the effect of the handoff we define the handoff packet lo rate P H, which repreent packet loe caued only by handoff. III. TCP MODEL WITH MOBILE HANDOFFS Objective of thi performance model i to evaluate how the pecific parameter related to handoff affect the tranient packet lo, and ultimately the actual TCP throughput. More pecifically, we aume that TCP i in the congetion avoidance phae when a handoff take place. We alo model a TCP connection between two endpoint by conidering round, that have a duration of one RTT. We name the number of RTT

2 round that pa until there i a packet lo a the NL round figure 1. During thi round, TCP end a burt of packet equal to the allowed window, and wait for acknowledgment. Thi approach, which i baed on renewal theory can lead to a cloed form olution for the average throughput. Sequence no. Fig. 1. RTT round FTT 1 A BTT 1 C: No more ack received, RTO tart RTO FTT 2 E L2 handoff diruption time X B packet ent packet received packet lot ack received BTT 2 time Packet-level TCP behavior at the ender during a handoff. A. Handoff packet lo rate P H Figure 1 will be ued for explaining the behavior of TCP during a handoff event. The variable FTT 1 /BT T 1, and FTT 2 /BT T 2 decribe the forward and backward trip time for the two acce network repectively. According to thi figure, at time intant t A, L2 connection i lot and at time t A +RTO, the TCP ender retranmit the firt lot packet. Even more, if t B >t C + FTT 1, then clearly no duplicate acknowledgment will be received at the ender, and the only way for TCP to reume the data flow i by expiration of the RTO of the firt lot packet. On the other hand, a T H hrink, and if t B t C + FTT 1 the probability to receive a number of the lat packet cloe to time intant t C i increaed. If thi happen, then the ender would fat retranmit the firt lot packet, reulting into a fater recovery. If we rewrite the previou equation we have and becaue t C = t A + BTT 1 : t B t C + FTT 1 T H RT T 1. Therefore, the probability of handoff induced packet lo i the probability of that the one way network latency L N, i maller than the handoff duration T H,or: P H = P [L T H ] 2 We define a f LN the ditribution of the end-to-end network induced latency. However, the election of f LN i a deciion orthogonal to our work in thi paper. In our cae we will model the one-way Internet latency a a Gamma ditribution that occur mainly due to buffering at the routing infratructure. On the other hand, the diruption time T H i a parameter that depend of the mobility management a protocol. B. Throughput Having calculated the packet lo probability due to handoff P H, we now have to calculate the actual number of packet ent and lot during the handoff event. Firt, we will ee how the congetion window i evolved when packet lo lead only to triple-duplicate event. Then we will calculate the probability that a packet lo event led to recovery of the lot packet with TO and we will alo calculate the number of packet ent during the TO event. Congetion window in congetion avoidance: Concerning the evolution of the congetion window, we next how the equation that decribe it evolution baed on the average endto-end packet lo rate. By re-uing the formula developed at [3], that decribe congetion window evolution a a function of the packet lo rate, we have: E[Wx h ]= 2 2+b 2b1 P x P H 2+b b 6 3P x + P H 6 3 where P x + P H i the aggregate end-to-end packet lo rate for either path 1 or 2 x =1, 2. Now if packet loe caued by handoff or other reaon in the end-to-end path, and thee loe create only triple duplicate event TD, the throughput formula would be of coure imilar to [3]: 1 P x P T x = x + E[Wx h ] RT T E[Wx h 4 ]b/2+1 However, there i the probability that packet loe caued by the handoff event or the end to end path lead to a timeout TO. Thi i what we calculate next. Probability of TO and TD event: Aume that the ender ha ent a window w worth of packet in the current RTT round. The probability that the firt i packet are acknowledged in thi round, given that the ret are lot becaue of a handoff or buffer overflow in the wireline path 1, i given by P HW = p H + p 1. Becaue packet lo in the wired path and handoff lo are independent, the previou equation become: P HW w, i = 1 P H i P H 1 1 P H w + 1 P 1 i P P 1 w 5 In the above equation the term 1 P i P expree the probability that i packet are received before one i lot on a channel with packet lo rate P. Alo 1 1 P w i the probability that a lo happen in a NLR where w packet were ent. We alo write the probability that m packet acknowledged from the n ent in the lat RTT round [3]: { P m Gn, m = H 1 P H if m n 1 PH m 6 if m = n Now, the probability that at mot two of them were acknowledged i gk = 2 i= Gk, i. The probability for a TO to happen, will be one of coure if w<3, ince not enough duplicate ACK can be received. Now let u ee what happen when w 3. In that cae a packet lo could lead to a TO in two cae: Firt, if TCP end

3 uccefully le than three packet from a round of w packet end, thi would lead to a TO becaue not enough duplicate acknowledgement will be received at the ender. Second, there i alo the probability that the number of acknowledged packet i more than three in one RTT round, while a TO happen becaue in the next round le than three packet are acknowledged. The contribution of the aforementioned two cae in the probability that a packet lo i a TO for path x will give the final: P TOx w = 2 w P HW w, k+ P HW w, kgk 7 k= k=3 Note alo that P TDx w =1 P TOx w. TO duration: Beide the probability for a TO to happen, we have to calculate the average duration of a timeout, baed on the probability that t B > t C + FTT 1 figure 1. The number of the retranmitted packet that will be lot leading to further RTO increae determine when the data flow will be reumed on the new link. Given that the duration of a handoff i T H = t B t A, the number of retranmitted packet depend on the duration of the timeout period, and ubequently on the number of exponential growth the TO timer experienced. We know that for TCP, j conecutive RTO event will have a duration: { 2 = j 1RT O if j< j 6RT O if j 7 where RT O i the initial value of the retranmiion timer. By inverting thi expreion, we obtain the number of RTO expiration: { log 2 RT O j = +1 if 2 6 1RT O 9 RT O +5 otherwie Therefore, the number of experienced TO will be obtained L by taking the of h RT O. Thi value will give the number of RTO expiration and the number of retranmitted packet. The previou equation finally give the expected number of packet ent during t C <t<t B : { E[S h ]= log 2 TH +1 if T H 2 6 1RT O TH +5 otherwie 1 and the duration of the induced TO i E[ ]+T H. Final throughput formula: Finally, by combining all the previou equation, the complete TCP throughput model that conider handoff between aymmetric link i given by: 1 P x Tx h P = x + E[Wx h ]+P TO E[S h ] RT T x E[Wx h ]b/2+1+p TO T H + E[ ] With thi formula we are able to etimate the throughput of TCP connection that i characterized by packet lo rate P x and RT T x after a diruption of T H econd happen. For the new path the P H will be zero which mean that the throughput etimate will only depend on the characteritic of the new path. It i intereting to note that we have decribed the TCP throughput a a function of the diruption time T H, which i eentially controlled by the mobility management cheme in ue, and the handoff packet lo rate P H. St RTT 1 link 1 link 2 B : A: L2 lot with link1 Convergence time t_inter t_inter 2 1 t_interx Fig. 2. B: L2 with link 2 etablihed time TFRC behavior during IP layer handoff. IV. TFRC THROUGHPUT After dealing with TCP, we proceed with the characterization of the rate control protocol TFRC [8]. Our goal i to quantify the effect of mobile handoff on a rate control protocol which ue a completely different congetion control algorithm. In thi paper we conider TFRC to be implemented on top of UDP. TFRC ue the cloed form equation for TCP throughput in order to regulate the ender output rate: T TFRC = 11 2p RT T 3 + t 3p RT O3 8 p1 + 32p2 where i the packet ize, RT T i the RTT etimate, and t RT O i the value of the retranmiion timer. In addition TFRC follow a packet pacing algorithm at the ender [8]. Note that, equation 11 doe not repreent the actual TFRC ending rate but only an upper bound for it. The actual output rate of TFRC i calculated uing the algorithm 1. In thi algorithm, repreent the packet ize, tld i time when the rate wa lat doubled, tmbi i the maximum back-off time 64 econd by default, and X recv i the average receive rate. If p i zero, no packet lo ha yet been een by the flow and in thi phae, the TFRC ender emulate low tart of TCP by doubling the tranmiion rate every RTT. However, the main feature of TFRC i that it react lowly and cautiouly to RTT change and thi mean that the throughput etimate change lowly when compared with TCP. Therefore, a udden change in the RTT and bandwidth of a link, a i the cae with handoff, will lead to coniderable packet loe. We will now attempt to model thi behavior. We tart by identifying the RTT etimation procedure that TFRC ue. Given a decay factor df,then-th RTT etimate i calculated a follow: RT T n = df RT T n 1 +1 df RT Tcur, with RT T cur be the lat real RTT meaurement.

4 Algorithm 1 TFRC rate etimation. 1: if p> then 2: X calc = T p, RT T, T 3: tfrc x = max[minx calc, 2 X recv, tmbi ] 4: ele 5: if tnow tld RT T then 6: tfrc x = maxmin2 tfrc x, 2 X recv,/rtt 7: end if 8: tld = tnow 9: end if When the TFRC ender doe not receive feedback during an entire RTT, it cut the output rate in half. If we aume that at intant t B, where handoff i over the ender end at leat on packet and receive feedback, then in a period of RT T 2 the ender will receive the firt feedback report. So for the handoff duration T H, the ender will reduce the rate in half every RT T 1, ince thi the lat RTT etimate. Therefore the total number of packet ent during T H will be gradually reduced with a total number: E[S h ]= T H RT Tcur i= 1 2 i T TFRC RT T 12 Therefore, for two link with different characteritic, p 1,RTT 1 and p 2,RTT 2, for link 1,2 or when t < t A or t>t C, the actual rate at the ender will be given by the baic TFRC formula: T A B + TFRC = max when t A <t<t B then: T AB TFRC = 1 T H 2 mint TFRC, 21 P 1,2 T TFRC, T H RT Tcur i= 1 2 i T TFRC RT T tmbi If t B <t<t C, the ender gradually tart to catch up with the new link characteritic: TTFRC BC = 1 ncv T TFRC RT T n cv RT T n 15 t cv n=1 We define a convergence time, t cv, the time needed for TFRC to obtain it fair hare of the bandwidth on the new link. Then we can rewrite the equation for RT T n : RT T n = df n RT T + df n 1 1 df RT T cur df RT T cur 16 which if we olve for n give: RT T n 1 df RT T cur n cv = log df RT T 1 df 1 df 17 RT T cur Therefore, n cv will give the number of RTT round needed in order for the RT T n etimate to converge to the RT T cur. In the handoff cae, RT T cur repreent the RT T 2 of the new link while RT T i the lat etimate we had and it i RT T 1. Practically we would like for RT T n to be cloe to 9% of the RT T cur. So the total convergence time will be: t cv = T H + n cv RT T n 18 The throughput i calculated from equation 13, 14, 15. V. EXPERIMENTS FOR MODEL VALIDATION The topology that form the bai of the imulation aume the handoff between two WLAN acce point. Each AP i connected to a LAN which i configured a follow: The value for bandwidth and delay of the LAN link are 1Mbp/1m and 5Kbp/1m for the GFA link, and two FA link, repectively. The elected parameter for TCP and TFRC in the imulation are: W max i 6MB, W i one egment, MSS i 146 byte, the RT O i 2 mec, and the i 15 byte. The cae tudy imulated i now decribed Initially, the MH initiate an FTP data flow from the correpondent hot CH. According to the cenario, at the time intant ec, the MH tart moving away from the firt acce point AP, at a peed of 1m/ec, and i heading toward the other AP. The FA follow the Mobile IP procedure in order to notify the HA after the MH regiter with new FA. In the cae of Hierarchical MIP, the GFA i the one that handle the handoff from the two FA that correpond to the two acce point: AP 1, and AP 2. Finally, for the MIP-RO cae we configured the MH to end a binding update directly to the CH. For all thee experiment we ued the n-2 [9] network imulator. HMIP and MIP-RO: With thi experiment, we want to evaluate the effect of the handoff diruption time T H,onthe throughput of a eion between the erver and the client. Throughput reult are hown in figure 3. A expected, even with MIP-RO, TCP throughput uffer coniderably when diruption time i increaed. The propoed model, predict a logarithmic decreae in throughput a the packet lo rate i increaed, which of coure depend on the duration of the diruption. Concerning the throughput for the combination of HMIP/buffering, we can oberve in figure 3 that TCP throughput remain coniderably table until the point where the diruption time come cloe to the average RTT of the end-to-end eion. Packet are buffered in the old AP and forwarded to the new AP, but after the buffer overflow, packet are dropped and the throughput decreae. Thi mean that after the point where the forwarding buffer i full, the throughput will continue to decreae very fat ince any new packet will be dropped. In figure 4 we preent reult for TFRC throughput. TFRC ue a rate control algorithm that react lowly to packet lo and RTT fluctuation. In addition TFRC make ue of a packet pacing algorithm that arrange the packet in time. A hown in figure 4, the combined MIP-RO/TFRC uffer from minimal packet loe and throughput degradation. With the addition of a buffer in the previou AP, thee loe are reduced further. Alo it i important to note that ince TFRC pace the packet

5 Throughput Kbyte/ Analytical for MIP-RO Simulation for MIP-RO Analytical for HMIP+buffering Simulation for HMIP+buffering Stabilization time ec Analytical for TCP+MIP Simulation for TCP+MIP Analytical for TFRC+MIP Simulation for TFRC+MIP Average diruption time T H ec Fig. 3. Throughput reult for a TCP eion of 15 econd and handoff between two different WLAN ubnet. Fig. 5. TFRC. Required recovery time veru diruption time for both TCP and Throughput Kbyte/ Analytical for MIP-RO Simulation for MIP-RO Analytical for HMIP+buffering Simulation for HMIP+buffering Average diruption time T H ec Fig. 4. Throughput reult for a TFRC eion of 15 econd and handoff between two different WLAN ubnet. in time, the buffer at the previou AP hould not overflow frequently ince it doe not receive packet burt a with TCP. Recovery period: We define a recovery period the time duration that the MH ha to be out of the handoff tate, o that the achieved throughput in thi time period reache the nominal for thi link. Eentially we want to know how fat TCP will recover from a handoff with a pecific duration T H. The anwer to thi quetion can alo give u ueful information concerning the effect of the handoff rate on the TCP throughput. Figure 5, preent reult for thi experiment when baeline Mobile IP wa ued for both TCP and TFRC protocol. We ee that for our model the required recovery period, i increaed exponentially diverging from the real meaurement which are not o peimitic. We believe that thi behavior i due the interpretation of more loe a a TO indication intead of TD. However, the TFRC model doe not have to claify packet lo type, allowing thu a more accurate etimation a figure 5 alo indicate. VI. CONCLUSIONS In thi paper we preented a model for tudying the effect of mobile handoff on two tranport protocol, namely TCP and TFRC. The model wa found to be accurate for TCP in both the cae where HMIP and MIP-RO were ued a the underlying mobility management protocol. However, the TFRC model predict the expected throughput with even better accuracy, due to the impler protocol algorithm. For example the wort cae error for the TCP model wa nearly 22% while for the TFRC model it wa 13%. We alo introduced in thi paper the notion of the recovery period. The low-reponive rate control algorithm of TFRC, require le time in order to recover when compared with TCP. However, we found that a the diruption time i increaed, TFRC uffer from more packet loe than TCP, due to the low-reponive algorithm. REFERENCES [1] C. Perkin, IP Mobility Support for IPv4, RFC 322, January 22. [2] H. Balakrihnan, Challenge to Reliable Data Tranport over Heterogeneou Wirele Network, Ph.D. diertation, UC Berkeley, [3] J. Padhye, V. Firoiu, and D. Towley, Modeling TCP Reno Performance: A Simple Model and It Empirical Validation, IEEE/ACM Tranaction on Networking, vol. 8, no. 2, pp , April 2. [4] B. Sikdar, S. Kalyanaraman, and K. Vatola, Analytic model for the latency and teady-tate throughput of TCP Tahoe, Reno and SACK, in INFOCOM, 21. [5] C. Blondia et al., Performance Analyi of Optimized Smooth Handoff in Mobile IP, in MSWiM, 22. [6], Performance Comparion of Low Latency Mobile IP cheme, in WiOpt, 23. [7] A. Gurtov, Effect of Vertical Handover on Performance of TCP-Friendly Rate Control, in ACM Computer Communication Review, 24. [8] M. Handley, S. Floyd, J. Pahdye, and J. Widmer, TCP Friendly Rate Control TFRC: Protocol Specification, RFC 3448, January 23. [9] Network imulator. [Online]. Available:

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

Performance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control

Performance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control Performance Evaluation and Comparion of,, and Vega TCP Congetion Control Luigi A. Grieco and Saverio Macolo Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari, Italy {a.grieco,macolo}@poliba.it

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

A study on turbo decoding iterative algorithms

A study on turbo decoding iterative algorithms Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function

Modeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function Proceeding of the World Congre on Engineering and Computer Science 2012 Vol II, October 24-26, 2012, San Francico, USA Modeling Throughput and Delay in 802.11 Infratructure Mode Network with QoS Support

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks

Coordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks Coordinated TCP Wetwood Congetion Control for Multiple Path over Wirele Network Tuan Anh Le, Choong eon Hong, and Eui-Nam Huh Department of Computer Engineering, Kyung Hee Univerity 1 eocheon, Giheung,

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

TFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks

TFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks 213 International onference on omputing, Networking and ommunication (IN) Workhop on omputing, Networking and ommunication -R: An Equation-baed Tranport Protocol for ognitive Radio Network Abdulla K. Al-Ali

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153

More information

Available Bandwidth-Based Association in IEEE Wireless LANs

Available Bandwidth-Based Association in IEEE Wireless LANs Available Bandwidth-Baed Aociation in IEEE 82. Wirele LAN Heeyoung Lee, Seongkwan Kim, Okhwan Lee, Sunghyun Choi, Sung-Ju Lee 2 School of Electrical Engineering & INMC, Seoul National Univerity, Seoul,

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

On Peer-to-Peer Media Streaming Λ

On Peer-to-Peer Media Streaming Λ On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,

More information

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks

Distributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

p done CPU p user p drivdone 1-p drivdone

p done CPU p user p drivdone 1-p drivdone Approximate Analytical Performance Evaluation of a UNIX Baed Multiproceor Operating Sytem Stefan Greiner Duke Univerity Dept. of Electrical Engineering Durham, NC 2770-029, USA Box 9029 greiner@ee.duke.edu

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Web Science and additionality

Web Science and additionality Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

Improving TCP Performance in High Bandwidth High RTT Links Using Layered Congestion Control

Improving TCP Performance in High Bandwidth High RTT Links Using Layered Congestion Control 1 Improving P Performance in High Bandwidth High R Link Uing Layered ongetion ontrol Sumitha Bhandarkar, Saurabh Jain and A. L. Naraimha Reddy Dept. of Electrical Engineering, exa A & M Univerity umitha,aurabhj,reddy

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

DWH Performance Tuning For Better Reporting

DWH Performance Tuning For Better Reporting DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information