Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

Size: px
Start display at page:

Download "Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility"

Transcription

1 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, Mar Copyrght c 2015 KSII Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty Zhgang L 1, Yan Sh 1, Shanzh Chen 2,3 and Jngwen Zhao 4 1 State Key Laboratory of Networkng and Swtchng Technology, Beng Unversty of Posts and Telecommuncatons, Beng Chna [e-mal: zhgang.l.mal@gmal.com, shyan@bupt.edu.cn] 2 State Key Laboratory of Wreless Moble Communcatons, Chna Academy of Telecommuncatons Technology, Beng Chna 3 Datang Telecom Technology & Industry Group Beng Chna [e-mal: chensz@datanggroup.cn] 4 Internatonal school, Beng Unversty of Posts and Telecommuncatons, Beng Chna [e-mal: @bupt.edu.cn] *Correspondng author: Yan Sh Receved December 11, 2014; revsed February 7, 2015; accepted February 27, 2015; publshed March 31, 2015 Abstract The rapd ncrease of smart moble devces and moble applcatons has led to explosve growth of data traffc n cellular network. Offloadng data traffc becomes one of the most urgent techncal problems. Recent work has proposed to explot opportunstc communcatons to offload cellular traffc for moble data dssemnaton servces, especally for acceptng large delayed data. The basc dea s to delver the data to only part of subscrbers (called target-nodes) va the cellular network, and allow target-nodes to dssemnate the data through opportunstc communcatons. Human moblty shows temporal and spatal characterstcs and predctablty, whch can be used as effectve gudance effcent opportunstc communcaton. Therefore, based on the regularty of human moblty we propose NodeRank algorthm whch uses the encounter characterstcs between nodes to choose target nodes. Dfferent from the exstng work whch only usng encounter frequency, NodeRank algorthm combned the contact tme and nter-contact tme meanwhle to ensure ntegrty and avalablty of message delvery. The smulaton results based on real-world moblty traces show the performance advantages of NodeRank n offloadng effcency and network redundant copes. Keywords: Cellular traffc offloadng, human moblty, opportunstc communcatons Ths work s partally funded by the Natonal Scence Foundaton Proects (Grant No ) and the Natonal Scence Fund for Dstngushed Young Scholars (Grant No ) n Chna. ISSN :

2 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, March Introducton In the past several years, the explosve ncrease of ntellgent moble devces such as smartphones, tablets, and laptops, especally the ncreasng popularty of varous applcatons for smartphones has led to the rapd growth of data traffc n cellular network. Global moble data traffc wll ncrease nearly 11-fold between 2013 and Moble data traffc wll grow at a compound annual growth rate (CAGR) of 61 percent from 2013 to 2018, reachng 15.9 exabytes per month by 2018 [1]. The unpredctable contnuous growth of data traffc wll brng great challenge to the current cellular network. How to reduce the congeston of network, mprove the qualty of servce for customers and reduce the cost become the most urgent problems to solve at present. The moble data dssemnaton n moble networks may nclude multmeda newspapers, weather forecasts, move tralers, moble socal applcatons, shoppng advertsements, etc. All these nformaton s generated by content servce provders. If everyone gets nformaton from cellular network nfrastructure lke Fg. 1(a), the load of the cellular network nfrastructure wll be hgh. In order to save the bandwdth of cellular network nfrastructure, beneft from the delay-tolerant nature of non-real-tme applcatons, these servce provders through the base staton may delver nformaton to only a small fracton of selected users (.e. target-nodes, lke the N 1, N 2, N 3 n Fg. 1(b)), then the target-nodes can further dssemnate the nformaton to subscrbed users when ther moble phones are n proxmty and can communcate opportunstcally usng W-F or Bluetooth technology as shown n Fg. 1(b) to reduce cellular data traffc. The servce provder wll send the nformaton to N 4 drectly through cellular networks, f he or she fals to receve the nformaton before ther delvery deadlne. We can translate ths obectve nto maxmzng the expected number of users that can receve the delvered nformaton through opportunstc communcatons. Fg. 1. (a) The nfrastructure-only mode; (b) the opportunstc communcaton mode The exstng works selectng the target-nodes that merely have the hghest probablty to encounter other users as the ntal sources, but they do not consder the message s fully delvered n the meetng tme, also dd not consder the messagng success s exceed the tme can be tolerated. Meanwhle, the message dssemnaton through target-nodes on encounter spread wll cause a huge amount of copes. In addton, they all utlze the hstorcal traectory nformaton to calculate the sum of the encounter frequency between nodes, therefore they can

3 874 L et al.: Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty not avod the stuaton that hstorcal data couldn t reflect the current movng rule of human moblty. We ntroduce NodeRank algorthm based on the regularty of human moblty ranks the mportance of a node n the contact graph. The exstng research results show that the moblty of human follows a certan spatal-temporal regulaton and there s a potental predctablty. So to take advantage the rule of human moblty can gude the opportunstc communcatons. NodeRank s nspred by the PageRank algorthm [2] used n Google s search engne to measure the relatve mportance of a Web page wthn a set of pages. Smlar to the PageRank, NodeRank dentfes the most popular nodes to dssemnate the message, gven that popular nodes are more lkely to meet other nodes n the networks. We study the target-nodes selecton problem as the frst step towards bootstrappng the cellular traffc offloadng for nformaton delvery n cellular networks. Our frst contrbuton s that we proposed NodeRank algorthm to choose target-nodes and dssemnate message. The NodeRank utlze the characterstcs of human moblty whch combned wth the encounter frequency, contact tme and nter-contact tme. Our second contrbuton s to explot the regularty of human moblty and apply the target-nodes dentfed by usng moblty regularty to nformaton delvery n the future. In the algorthm, we choose the target-nodes n consderaton of the contact tme and nter-contact tme that to ensure the ntegrty and avalablty of message delvery. Our thrd contrbuton s usng the NodeRank algorthm whch combnes the centralzaton and dstrbuton. Ths algorthm chooses the target-nodes not only n consderaton of the hstorcal nformaton of human moblty but also the present state of human moblty. Wth the hstorcal data, we can ensure the practcablty of predcton towards human moblty and wth the present nformaton, we can avod the stuaton that hstorcal data couldn t reflect the current movng rule of human moblty. Ths paper uses the real-world data sets that are based on the encounter of Bluetooth to evaluate the effect of data traffc offloadng. The trace-based evaluaton shows our method offloads almost 75% data traffc compared wth the tradtonal method wthout offloadng data, although we also take the ntegrty and avalablty of message delvery nto consderaton by addng contact tme and nter-contact tme. Smlarly, the offloadng effcency has mproved up to 6% compared wth Greedy algorthm, and the network redundant copes also have reduced almost 20%. The result of turns out that our method can well balance the success rate of message delvery and the network copy redundances. The rest of ths paper s organzed as followng: Secton 2 revews related work on cellular traffc offloadng. The NodeRank algorthm and target-nodes selecton are presented n secton 3. In Secton 4, we evaluate the NodeRank algorthm performance through real-world moblty trace, and then conclude ths paper. 2. Related Work 2.1 Cellular Traffc Offloadng Techncal Analyss To allevate the data overloadng of cellular networks and mprove the user experence, most moble operators have ntroduced and started to mplement moble data offloadng strategy [3]. To the best of our knowledge, we analyze and summarze the exstng moble data offloadng solutons. Base staton: The tradtonal approach of scalng network capacty wth nstallng more base statons per area s always avalable, but not cost-effectve and vable consderng the pace at whch the demand for data servces s ncreasng. Moreover, from the perspectve

4 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, March of energy savng, ths wll greatly mprove the entre network energy consumpton. W-F: Due to degradaton of cellular servces n overloaded areas, an ncreasng number of users are already usng W-F to access Internet servces for better experence. W-F s attractve because t allows data traffc to be shfted from expensve lcensed bands to free unlcensed bands (2.4GHz and 5GHz). Nevertheless, the operator loses vsblty (and hence control) of ts subscrbers whenever they are on the W-F network. Meanwhle, the operator s unable to delver any subscrbed content, leadng to potental loss of revenue. Femtocells: Femtocell s a small cellular base staton typcally desgned for ndoor use (e.g. n a home or offce). It connects to the servce provder s network va broadband (e.g. dgtal subscrber lne, DSL), especally n areas where access would otherwse be lmted or unavalable. Although femtocells can provde a hghly effectve method of easng the traffc carred by a macrocellular network, the careful plannng s requred as they operate n costly (lcensed) and lmted spectrum bands. Spread spectrum: The development of spread spectrum technology mproves the utlzaton of the frequency spectrum to a great extent and at the same tme reduce the mpact that comes from the co-channel nterference, whch greatly mproves the capacty of the cellular network and can provde users wth hgher qualty of the servce. However, the spectrum resources are always lmted and therefore the optmum utlzaton s restrcted. Devce to Devce: D2D communcaton technology [4] can mprove the utlzaton of the spectrum resources and the network capacty, allevate the burden of the network, reduce the consumpton of the battery on the moble termnals and ncrease the bt rate by obtanng the frequency resources and transmsson power. However, when ths technology sharng wreless resources wth the cellular network, there wll be some nterference. Dfferent from the opportunstc communcatons that D2D s needed durng the communcaton under the control of the macro-cellular base staton, means that need money cost. There are also some methods such as Meda optmzaton solutons, IP Flow Moblty and so on. Compared to the above methods, we manly focus on offloadng the cellular traffc from the perspectve of system and network to optmze the qualty of servce, whch s the research method, cellular data offloadng va opportunstc communcaton, of ths paper. Opportunstc communcatons s a promsng soluton to partally solve cellular traffc overloaded, because there s scarcely any monetary cost for t, and does not exst the shortcomngs of the above methods. We wll dscuss the related work n the next secton. 2.2 Cellular Traffc Offloadng Through Opportunstc Communcatons Usng opportunstc communcaton to offload cellular traffc for moble content dssemnaton applcatons s a novel and nterestng dea and t has drawn great attenton of the researchers. Opportunstc communcaton [5-6] s a technque that allows users wthout permanent connecton to exchange nformaton usng low-cost proxmty-based connecton, such as W-F or Bluetooth, when they encounter opportunstcally. Although usng opportunstc communcaton to offload cellular traffc can sgnfcantly reduce the cost of communcaton, but t can only be appled to non-real-tme messages that have hgh delay-tolerant characterstc and sometmes the messages wll be unreachable for few nodes. Meanwhle, t wll also generate more copy of the message. The work [7] studes the traectory of 100, 000 anonymzed moble phone users whose poston are tracked for a sx month perod and the result shows that the moblty of human follows the characterstcs of the perodc and return the locaton of hgh frequency to vst.

5 876 L et al.: Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty follows a certan knd of regularty. The work [8] ndcates that there s a potental 93% average predctablty n user moblty, an exceptonally hgh value rooted n the nherent regularty of human behavor. Consequently, to take advantage the rule of human moblty can gude the opportunstc communcatons. Nelson et al. proposed encounter-based routng [9] to encounter communcaton opportunty. Some studes [10-11] explot uncast routng to enable a source to delver the obect to multple destnatons n an opportunstc network. All the above studes consder an envronment where the source nodes are gven. However, our work dffers n that t focuses on how to choose a set of sources to dssemnate the nformaton to all subscrbers before the nformaton deadlne. The work [12] selects target-nodes to delver the message by usng the Greedy algorthm on the bass of the encounter probablty of the users hstorcal traectory and then dssemnate the message to all the subscrbed users. However, the selecton of the target-nodes only consders the encounter frequency, at the same tme the message dssemnaton through target-nodes on encounter spread wll cause a huge amount of copes. Based on the study [12], the work [13] evaluates the amount of data exchanged from encounterng to separatng through Bluetooth between two phones. It shows that we need to consder the ntegrty of message delvery, however, the factor does not be appled n the algorthm. However, the factor does not be appled n the algorthm. The work [14] selected the target-nodes based communty. Smlar to the above mentoned works, t only uses the encounter frequency and the hstorcal traectory nformaton to calculate the sum of the encounter frequency between nodes. On the bass of the node whch has the maxmum encounter frequency and by usng the breadth frst search algorthm, t wll traverse the detecton communty. Then t chooses the target-nodes whose number equals to the number of the communty and use the target-nodes to dssemnate nformaton. Compared wth the above studes, we add the contact tme when we select the target-nodes, thereby guaranteeng the ntegrty of the data transmsson. At the same tme, we added to the contact tme also better accord wth the process of data transmsson n opportunstc communcaton. In addton, we add the nter-contact tme n NodeRank algorthm to ensure the avalablty of data delvery and receved good results. In addton all the above works explot the hstorcal traectory nformaton to predct the present mportant nodes and the encounter of nodes for message dssemnaton. Usng the global hstorcal encounter nformaton between nodes to establsh contact graph for selectng target-nodes, although n reference [11] they observe that the hstorcal data (one week or month) s enough to detect users that keep ther mportance, snce the random of human moblty, for example a long dstance travel or a travellng on offcal busness, the node wll dsappear from the zone where t supposed to appear. So we adopt the combnaton of hstorcal and present moble nformaton to choose the nodes and predct the encounter of the nodes, thereby dssemnatng the nformaton. That s our NodeRank algorthm whch combnes the dstrbuted and the centralzed. We wll dscuss t n detal n next secton. The work [15] offloads the cellular traffc through opportunstc communcaton. It manly proposes a Subscrbe-and-Send archtecture whch conssts of an applcaton and an opportunstc routng protocol. Compared wth spreadng message by choosng target-nodes based on the analyss of the regularty of the human moblty, ths archtecture manly emphaszes on the content dstrbuton mechansm wth base staton nstead of dssemnatng messages wth the analyss of users encounter regularty, whch s dfferent from usng opportunstc communcaton to offload cellular traffc for moble content dssemnaton applcatons.

6 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, March Algorthm Descrpton and Target Nodes Selecton Our focus here s on offloadng cellular data traffc through opportunstc communcatons, especally n metropoltan areas wth hgh populaton densty. The content servce provders who can tolerate large delay through the base staton send the message to the target-nodes selected accordng to NodeRank algorthm and then the target-nodes can further dssemnate the message to all subscrbed users as large as possble. 3.1 NodeRank Algorthm NodeRank algorthm s nspred by the most famous web page rankng employed by Google to rank web pages. PageRank measures the relatve mportance of a page wthn a web graph. Motvated by the success of ths algorthm, we propose to apply a smlar algorthm whch we call NodeRank to rank the nodes n a contact graph. The man dea s that nodes wth a hgher NodeRank value wll generally be more mportant nodes to dssemnate the message, gven that popular nodes are more lkely to meet other nodes n the networks. Before gong nto the detals of our NodeRank algorthm, we revst the propertes of the PageRank algorthm. PageRank performs a random walk on the World Wde Web graph, where the nodes are pages and the edges are lnks between pages. PageRank gves the probablty dstrbuton used to represent the lkelhood that a person randomly clckng on lnks wll arrve at any partcular page. PageRank s gven by the followng equaton: 1 d PR p PR p d (1) n L p p M p Where p 1, p 2,, p n are the pages, M( p ) s the set of pages that lnk to p, Lp ( ) s the number of outbound lnks on page p, n s the total number of pages, and d (0 < d 1) s a dampng factor whch s defned as the probablty, at any step, that the person wll contnue clckng on lnks nstead of openng another random page. Varous studes have tested dfferent dampng factors, but t s generally assumed that the dampng factor wll be set around 0.85 [2]. Frstly, we wll ntroduce ntal NodeRank algorthm namely NodeRank. It uses the same dea as PageRank algorthm to represent the mportance of a node. In the same way web pages are lnked, we buld a contact graph between nodes when they contact wth each other. As we all know PageRank calculates page rankng value through drected graph whch bult by the ctatons between pages, nevertheless n most cases the mportant pages have connecton wth each other, so that s a bdrectonal lnk between A and B. For the same reason, the encounter of nodes s equvalent ths specfc bdrectonal lnk. Our NodeRank algorthm was based on the characterstc of the bdrectonal lnk to buld the contact graph and to compute the mportance of nodes. So we denote such a contact graph Gc ( Nc, Ec ) wth a node set N c and an edge set E c. An edge ( N, N ) Ec there s a contact between nodes N and N. Consequently, the NodeRank value s gven by the followng equaton: 1 d NR( N ) NR N d (2) n L( N ) N E ( N) Where N 1, N 2,..., Nn are the nodes (users), EN ( ) s the set of nodes that encounter to N, LN ( ) s the number of nodes encounter to N.

7 878 L et al.: Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty In NodeRank algorthm we use only the encounter frequency between nodes to rank the mportant of nodes. Therefore, we choose the mportant nodes that have hgh rankng value to dssemnate message through opportunstc communcaton wth the am of offloadng traffc because they have more communcaton opportuntes. But n the actual message transfer, except for encounter frequency havng an mpact on communcaton opportunty of message, the contact tme and nter-contact tme are also should be consdered. The contact tme between two nodes wll affect the ntegrty of the delvery of the message. That s to say, f a message needs 10 seconds to be fully delvered, however, the contact tme between two nodes s only 5 seconds, thus the message transfer s not fully completed. Smlarly, f the nter-contact tme between two nodes s so long, for example over 12 hours or even longer, that exceed the maxmum tolerate tme then even the message s successfully delvered t s meanngless. Therefore, we ntroduce NodeRank algorthm based on NodeRank whch takes contact tme and nter-contact tme as weght of the edge to ensure the ntegrty and avalablty of message delvery. The weghted NodeRank value s gven by Eq (3). 1 d NR( N ) ( N, N) NR N d (3) n L( N ) N E ( N) In Eq (3), ( N, N) s the weght of the edge between node N and N, whch ntegrates contact tme ( ) and nter-contact tme ( ) between the two nodes. ( N, N ) s ct calculated as follows: ct ( N, N ) ( N, N ) ( N, N ) (4) ct ct From Eq (2) and Eq(3) we can fnd that the three ndexes encounter frequency, contact tme and nter-contact tme have close relatons to the lnk between two nodes, n other words, the encounter of nodes. However, the three ndexes are ndependent wth each other n terms of computng relatonshps. Wth regard to encounter frequency, the more encounter wth other nodes, the hgher the rankng value wll be. Combne wth the above analyss on the ntegrty and avalablty of message delvery, we can know that the rankng value ncreased wth the ncrease of contact tme and decreased wth the ncrease of nter-contact tme. The work [7] studes the opposte drecton walkng consderng the moderate human walkng speed s around 1 m/s and the contact duraton of two moble phones s about 20 seconds. Apart from the tme used for detectng and connectng the devces,the average number of transferred bytes s KB and the average duraton of data transfer s seconds whch means wthn 29.8s the transferred bytes s 1MB has been hgher than that of most of message. So we use 29.8s as the segmentaton of contact tme to ndcate the ntegrty level of the data transmsson. As for the nter-contact tme, we defne 12h as the nterval. Ths s because f the nter-contact tme s bgger than ths value there wll be excessve delay and the message wll become meanngless. The technques we descrbed thus far are sutable for centralzed mplementatons where the contact graph s known a-pror. Clearly ths may not be feasble n the moble wreless envronment we are consderng. We explot the combnaton method of dstrbuted and centralzed to select the target-nodes n the next secton. 3.2 Target Nodes Selecton for Message Dssemnaton The combnaton of dstrbuted and centralzed of NodeRank s shown n Algorthm 1. In ths

8 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, March method, whenever two nodes meet each other, they exchange two peces of nformaton: () ther NodeRank values ncluded the value of the day and week; and () the number of contact nodes they have. Then, the two nodes update ther NodeRank values usng the formula gven n Eq.3. Implctly, ths algorthm explots the moblty and contact behavor of the nodes snce the NodeRank value s updated every tme the nodes meet. Note that n ths algorthm frequently seen nodes update ther NodeRank more often. In fact, the rank of the node whch meets wth more other nodes wll ncrease rapdly. Algorthm Combnaton NodeRank Requre L n NR n NR n day 0 week whlen sncontact wth n n f n E n then end f day day send NR n L n send NR n Ln receve NR n L n send NR n L n week update NR n update NR n Eq(3) day whlembuffer n do week f n subscrber m and NR n max NR n end f end whle Delvered m n week week and day end whle Note that ths combned NodeRank algorthm, where the day and week are respectvely the rankng value from the past days and the past weeks contnung untl the current tme, s manly n response to the dsappearance of nodes n the regon as a result of sudden long-dstance travel. Ths s because the rankng value of a week s relatvely stable and can predct the mportance of nodes well, but t fals to predct the unexpected events of nodes. In the contrary, the rankng value of a day can reflect the mportance of the nodes of the current tme better, thus the combnaton wll predct the mportance of nodes more accurately and then dssemnate the messages. Here max NRn week and day combnes the rankng value of a day and a week, however, t takes the week rankng value as the frst ndcator and dvdes t nto hgh, medum and low levels. When the week rankng values are at the same level, we choose the target-nodes to dssemnate message based on the day rankng values. Once the target-nodes have been chosen, the target-nodes wll contnue dssemnate messages to subscrbed users. There s one problem we could not gnore whch s the strategy of message dssemnaton, because t must offer the best trade-off between cost (number of message replcas) and rate of successful message delvery. Ths s because end-to-end paths between two communcatng nodes are rarely avalable n opportunstc networks [16]. In such stuatons, the nodes mght stll copy and delver messages to nodes that are more lkely to

9 880 L et al.: Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty meet the destnaton. There are also several exstng works [17-18] for nformaton dssemnaton n wreless networks. They all dedcated to reduce the number of cost whle ncreasng the success rate, and were confrmed wth good results. Here we adopt the Hgh Rank sole One (HRO) method n whch we choose the contnuous dssemnaton nodes on the bass of NodeRank algorthm to ensure the success rate of message dssemnaton. By choosng the node whch has the bggest NodeRank value among the meetng nodes to contnuously dssemnate message, we can reduce the number of message replcas effectvely. Snce n ths stuaton the message delvery stll uses the way of opportunstc communcaton, there wll be a small quantty of message replcas. Meanwhle, because of property of wthout permanent connecton of opportunstc communcaton, sometmes the message s unreachable for few nodes. At ths tme we stll need to send messages through the base staton. However, the result of our smulaton turns out that our method can well balance the success rate of message delvery and the network copy redundances. 4.1 Moblty Traces 4. Performance Evaluaton We now evaluate the performance of NodeRank based opportunstc offloadng usng the real-world moblty traces from the Realty Mnng proect [19]. The Realty Mnng trace was collected usng Noka 6600 smartphones carred by 94 users from the MIT Meda Laboratory and Sloan Busness School, from to The nformaton n ths trace ncludes call logs, neghborng Bluetooth devces, assocated cell-tower IDs, etc. For the traffc offloadng effcency analyses n ths paper, we used a subset of the moblty traces data whch are Bluetooth data collected from October, November and December, 2004, snce compared wth other months these three months data are complete enough to support the research of ths paper. Moreover, Bluetooth data we used are dfferent from cell tower data whch thnk two moble users are n contact of each other f ther phones are assocated wth the same cell tower. The reason why we choose Bluetooth data s that there s a good evdence to prove that the two users have a close connect f a user scannng another va Bluetooth. What s more, when forwardng message, we use Bluetooth or W-F as a way of nformaton dssemnaton whch s close connect compared wth under the cell tower. Furthermore, n the envronment where the data coverng areas are relatvely small, f we consder that under the same cell tower s equvalent to encounter, then the contact graph establshed accordng to ths rule conssts of many strongly connected domans, whch wll enlarge the scope of message dssemnaton greatly and get the naccurate success rate of transmsson. From the secton 3 we have already known that we dssemnate messages by choosng nodes accordng to the rank value whch combnes two tme perod and the NodeRank algorthm whch consders the ndex of contact tme and nter-contact tme s weghted. Next we wll compare the related performance of the algorthms, snce NodeRank and Greedy algorthm selects target nodes all only based on encounter frequency, so when we compare the NodeRank and Greedy algorthm, also add NodeRank algorthm to compare. In Table 1 we use the three algorthms n dfferent tme perod to calculate the mportant nodes. From the Table we can see that the node sets are dfferent from each other, where the day s lasted 6 hours startng from 6 December, :00PM and the week s lasted 7 days begnnng from 1 December, 2004.

10 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, March Table 1. The top 6 most actve users for dfferent algorthm Algorthm No. 1 No. 2 No. 3 No. 4 No. 5 No. 6 Greedy(day) NodeRank(day) NodeRank(day) Greedy(week) NodeRank(week) NodeRank(week) Smulaton Results The performance of cellular traffc offloadng s determned by two conflctng factors: () the success rate of message delvery; and () the cost nduced by the dssemnaton mechansm,.e. the number of message replcas n the system. In the followng, we assess the NodeRank performance wth regard to these two performance ndcators. In the meantme, we wll compare the performance of Greedy, NodeRank and NodeRank usng the real-world traces n ths secton. Besdes, n the experment, we assume that all the users are subscrbers. Before analyzng the offload effcency, we frstly consder the number of target-nodes selected to dssemnate messages wth the am of gettng better offload effcency. As we known n above works have verfed select the sze of target-nodes s a NP-Completeness problem. In ths paper, we utlze the real-world traces analyzes the problem of the sze of target-nodes. We select the number of target-nodes s from 2 to 30, and respectvely select 1 hour, 2 hours and 6 hours as message dssemnate deadlne. In Fg. 2 we can see the smulaton results show that when usng 5 target-nodes ganed the best offloadng effect n ths data. Fg. 2. Percentage of offloadng for dfferent sze of target-nodes Next, let us analyze the offload effcency. We can see from Fg. 3 that the offload effcency n unweghted NodeRank algorthm s better than the weghted NodeRank. Ths s due to we takng contact tme and nter-contact tme nto account n Nodebank algorthm that affected the delvery rate to some degree, but t ensures the ntegrty and avalablty of the message delvered. It s easy to understand that when usng the NodeRank algorthm, some of the messages faled to fully complete transmsson, and some messages become meanngless once exceedng tolerant tme. However, the NodeRank algorthm whch takes two ndexes nto consderaton stll can offload almost 75% data traffc n cellular network and the offloadng effcency has mproved up to 6% than by Greedy algorthm. When the delay of message s less than 6h, t s obvous that NodeRank and NodeRank are sgnfcantly better than the offload effcency of Greedy

11 882 L et al.: Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty algorthm. Along wth the growth of the delay tme, the NodeRank stll mantans a hgh offload effcency, NodeRank and Greedy converge to a consstent offload performance, whch s not dffcult to explan: when the ncrease of delay goes to a certan extent, nodes wll encounter more and more users, even ones wthn the whole regon, whch corresponds wth the phenomenon that the message spread to less users when t ust begns to delay. Another queston s about the value of the dampng factor d, we are able to fnd out that the offload effcency acheves the best value when d s around 0.85, n agreement wth the PageRank algorthm [2]. Fg. 3. Percentage of offloadng comparson of NodeRank, NodeRank and Greedy algorthms We verfed the offload effcency of NodeRank algorthm and got the deal result. However, t wll cause the waste of a great deal of termnal resources and make the moble phone users unwllng to cooperate f there are a large number of redundant copes. There are many papers whch study how to establsh effectve ncentve schemes to prompt people forwardng messages, because t s not the man research content of ths paper, so we wll not do too much dscusson n ths paper. From Fg. 4 we can see that snce the Greedy algorthm dssemnatng messages through encounter dssemnaton, t has the maxmum amount of copes. It s easy to see when comparng wth NodeRank, the number of copes generated by NodeRank s lesser. That s because, frstly, the dssemnaton method NodeRank and NodeRank adopted whch selects the nodes that have hgher rank value to keep on dssemnatng messages when encounterng a lot of nodes s dfferent from Greedy algorthm. Secondly, the reason why NodeRank algorthm has few copes s that ths algorthm s weghted, therefore the success rate decreases resultng n less number of copes. Fg. 4. The number of copy comparson of NodeRank, NodeRank and Greedy algorthms

12 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, March Then we extract 10 days a month randomly from October, November and December, every day we wll start from 12:00 PM contnung 12 hours of delay tme, through 10 randomly-selected experments, the average offload effcency obtaned s shown as Fg. 5. We can see from the fgure that NodeRank stll has the best offload effcency, and NodeRank s slghtly better than the Greedy algorthm, but because of the use of a longer delay tme of 12 hours, so n November 2014 Greedy Algorthm has almost the same offload effcency as NodeRank. Fg. 6 s that we use the same method as offload effcency to calculate the copy quantty, we can fnd out from the fgure the result stll matches the prevous copy smulaton analyss. Fg. 5. Month average offloadng effcency comparson of NodeRank, NodeRank and Greedy algorthms Fg. 6. Month average copes comparson of NodeRank, NodeRank and Greedy algorthms 5. Concluson In ths paper, we study the way to offload cellular network traffc through opportunstc communcatons. We propose NodeRank algorthm based on the regularty of human moblty to choose the target-nodes and dssemnate nformaton. NodeRank algorthm uses the encounter frequency characterstcs to rank the mportant nodes, meanwhle we add contact tme and nter-contact tme to ensure the ntegrty and avalablty of message delvery to a certan extent. So from the perspectve of the effect of data offloadng, our mprovement s lmted. Ths paper uses the real-world moblty traces for smulaton experment to show that

13 884 L et al.: Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty compared wth the tradtonal method wthout traffc offloadng our method can offload almost 75% data traffc n cellular network. Smlarly, the offloadng effcency has mproved up to 6% than that by encounter frequency, and the network redundant copes also have reduced almost 20%. References [1] Csco, Csco vsual networkng ndex: Global moble data traffc forecast update, Artcle (CrossRef Lnk) [2] S. Brn, L. Page, The anatomy of a large-scale hypertextual web search engne, Comput. Netw. ISDN Syst., vol. 30, pp , Artcle (CrossRef Lnk) [3] A. Aaz, H. Aghvam, M. Aman, A survey on moble data offloadng: techncal and busness perspectves, Wreless Communcatons of IEEE, vol. 20, no.2, pp , Artcle (CrossRef Lnk) [4] Km S. Y, Lm C. H, Cho C. H, Performance Analyss of a Dense Devce to Devce Network, KSII Transactons on Internet and Informaton Systems, vol. 8, no. 9, pp , [5] A. Chantreau, P. Hu, J. Crowcroft, C. Dot, R. Gass, J. Scott, Pocket swtched networks: Real-world moblty and ts consequences for opportunstc forwardng, Unversty of Cambrdge, Computer Lab, Tech. Rep, Artcle (CrossRef Lnk) [6] M. Motan, V. Srnvasan, P. S. Nuggehall, Peoplenet: engneerng a wreless vrtual socal network, n Proc. of ACM MobCom, Artcle (CrossRef Lnk) [7] M. C. Gonzalez, C. A. Hdalgo, A.-L. Barabas, Understandng ndvdual human moblty patterns, Nature, vol. 453, pp , Artcle (CrossRef Lnk) [8] Song C, Qu Z, Blumm N, et al. Lmts of predctablty n human moblty, Scence, vol. 327, no. 5968, pp , Artcle (CrossRef Lnk) [9] S. Nelson, M. Bakht, R. Kravets, Encounter-based routng n DTNs, IEEE INFOCOM, Artcle (CrossRef Lnk) [10] U. Lee, S. Y. Oh, K.-W. Lee, M. Gerla, RelayCast: Scalable multcast routng n delay tolerant networks, n Proc. of IEEE ICNP, Artcle (CrossRef Lnk) [11] W. Gao, Q. L, B. Zhao, G. Cao, Multcastng n delay tolerant networks: A socal network perspectve, n Proc. of ACM MobHoc, Artcle (CrossRef Lnk) [12] B. Han, P. Hu, M. Marathe, G. Pe, A. Srnvasan, A. Vullkant, Cellular traffc offloadng through opportunstc communcatons: A case study, n Proc. of ACM Chants, [13] B. Han, P. Hu, V. Kumar, M. Marathe, J. Shao, A. Srnvasan, Moble Data Offloadng through Opportunstc Communcatons and Socal Partcpaton, Moble Computng of IEEE Trans, vol. 11, no. 5, pp , Artcle (CrossRef Lnk) [14] Chuang Y J, Ln K C J. Cellular traffc offloadng through communty-based opportunstc dssemnaton, n Proc. of Wreless Communcatons and Networkng Conference (WCNC), IEEE, pp , Artcle (CrossRef Lnk) [15] LU Xaofeng, HUI Pan, Petro Lo, Offloadng Moble Data from Cellular Networks Through Peer-to-Peer WF Communcaton: A Subscrbe-and-Send Archtecture, Chna Communcatons, vol. 10, no. 6, pp , Artcle (CrossRef Lnk) [16] A. Mtbaa, M. May, M. Ammar, C. Dot, PeopleRank: Socal Opportunstc Forwardng, n Proc. of INFOCOM, Artcle (CrossRef Lnk) [17] C. Lndemann, O. P. Waldhorst, Modelng Epdemc Informaton Dssemnaton on Moble Devces wth Fnte Buffers, n Proc. of SIGMETRICS 2005, pp , [18] M. Papadopoul, H. Schulzrnne, Effects of power conservaton, wreless coverage and cooperaton on data dssemnaton among moble devces, In Proc. of MOBIHOC 2001, pp , Artcle (CrossRef Lnk) [19] N. Eagle, A. Pentland, D. Lazer, Inferrng Socal Network Structure usng Moble Phone Data, n Proc. of the Natonal Academy of Scences, vol. 106, no. 36, pp , Artcle (CrossRef Lnk)

14 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, March Zhgang L receved the B.Sc. degree from Huanghe Scence and Technology College n 2006 and the M.Sc. degrees from Behang Unversty n He s currently workng toward the Ph.D. degree wth State Key Laboratory of Networkng and Swtchng Technology, Beng Unversty of Posts and Telecommuncatons (BUPT), Beng, Chna. Hs current research nterests nclude moble computng and cellular network. Yan Sh receved her Ph.D. degree from Beng Unversty of Posts and Telecommuncatons (BUPT) n She s currently a research staff of the State Key Laboratory of Networkng and Swtchng Technology. Her current research nterests nclude network archtecture evoluton, protocol desgn and performance optmzaton of future networks and moble computng, especally moblty management technology. Shanzh Chen receved hs Ph.D. degree from Beng Unversty of Posts and Telecommuncatons (BUPT), Chna, n He oned Datang Telecom Technology & Industry Group n 1994, and has been servng as CTO snce He was a member of the steerng expert group on nformaton technology of the 863 Program of Chna from1999 to He s the vce drector of State Key Laboratory of Wreless Moble Communcatons, and the board member of Semconductor Manufacturng Internatonal Corporaton (SMIC). He has made great contrbutons to TD-SCDMA 3G ndustralzaton and TD-LTE-advanced 4G standardzaton. He receved State Scence and Technology Progress Award of Chna n 2001 and Hs current research nterests nclude wreless moble communcaton, IoT and emergency communcaton. Jngwen Zhao s currently pursung her B.E n Beng Unversty of Posts and Telecommuncatons. Her maor s e-commerce Engneerng wth Law.

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Maximizing Timely Content Advertising in DTNs

Maximizing Timely Content Advertising in DTNs Maxmzng Tmely Content Advertsng n DTs Wexong Rao, Ka Zhao, Yan Zhang, Pan Hu and Sasu Tarkoma Department of Computer Scence Smula Research Laboratory Deutsche Telekom Laboratores Unversty of Helsnk, Fnland

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Efficient Routing Algorithms Combining History and Social Predictors in Mobile Social Networks

Efficient Routing Algorithms Combining History and Social Predictors in Mobile Social Networks Effcent Routng Algorthms Combnng and Socal Predctors n Moble Socal Networks Xao Chen 1, Chengyn Lu 2, Cong Lu 2 1 Department of Computer Scence, Texas State Unversty, San Marcos, TX USA 2 Department of

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMC.25.2388476, IEEE Transactons

More information

Study on Properties of Traffic Flow on Bus Transport Networks

Study on Properties of Traffic Flow on Bus Transport Networks Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

The Hybrid Mobile Wireless Sensor Networks for Data Gathering

The Hybrid Mobile Wireless Sensor Networks for Data Gathering The Hybrd Moble Wreless Sensor Networks for Data Gatherng Bao Ren Bejng Unv. of Posts & Telecommuncatons, Bejng 876, Chna +86--62287 renb@bupt.edu.cn Jan Ma Noka Research Center, Bejng 3, Chna +86--65392828-2883

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

DUE to the recent popularization of hand-held mobile

DUE to the recent popularization of hand-held mobile IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 4, APRIL 2016 803 Contact Duraton Aware Data Replcaton n DTNs wth Lcensed and Unlcensed Spectrum Jng Zhao, Student Member, IEEE, Xuejun Zhuo, Qnghua

More information

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Advanced radio access solutions for the new 5G requirements

Advanced radio access solutions for the new 5G requirements Advanced rado access solutons for the new 5G requrements Soumaya Hamouda Assocate Professor, Unversty of Carthage Tuns, Tunsa Soumaya.hamouda@supcom.tn IEEE Summt 5G n Future Afrca. May 3 th, 2017 Pretora,

More information

Contact Duration Aware Data Replication in Delay Tolerant Networks

Contact Duration Aware Data Replication in Delay Tolerant Networks Contact Duraton Aware Data Replcaton n Delay Tolerant Networks Xuejun Zhuo, Qnghua L, We Gao, Guohong Cao, Yq Da Tsnghua Natonal Laboratory for Informaton Scence and Technology, Tsnghua Unversty, Chna.

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 4, Apr. 2014 1424 Copyrght c 2014 KSII Clusterng Based Adaptve Power Control for Interference Mtgaton n Two-Ter Femtocell Networks Hong

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS THE MA MATCHING ALGORITHM OF GS DATA WITH RELATIVELY LONG OLLING TIME INTERVALS Jae-seok YANG Graduate Student Graduate School of Engneerng Seoul Natonal Unversty San56-, Shllm-dong, Gwanak-gu, Seoul,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information