A Base Station-Coordinated Contention Resolution for IEEE PMP Networks

Size: px
Start display at page:

Download "A Base Station-Coordinated Contention Resolution for IEEE PMP Networks"

Transcription

1 A Base Staton-Coordnated Contenton Resoluton for IEEE PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083, Chna 2 Dertment of Comuter Scence, Cty Unversty of Hong Kong, 83 Tat Chee Ave. Hong Kong, Chna {wenyanlu, tja, wenfeng}@ctyu.edu.hk Abstract. IEEE PMP mode recommends usng truncated Bnary Exonental Backoff (BEB) algorthm to resolve the contenton when multle Subscrber Statons (SSs) comete for the connecton and resource allocaton from the Base Staton (BS). The BEB aroach may not be effectve and transmsson oortuntes (TOs) may be wasted due to ndeendent contenton and backoff of each SS. Ths aer rooses an effcent coordnated backoff algorthm (COB) through BS coordnaton so that a global wndow can be assgned by the BS and the TOs can be effectvely consumed by the SSs. Theoretcal analyss and smulaton results show that COB s adatve to the dynamc change of actve SSs and outerforms the BEB aroach. Introducton The IEEE famly of standards and ts assocated ndustry consortum, WMax (Worldwde Interoerablty for Mcrowave Access), romsng to delver hgh data rates over large areas to a large number of users n the near future, are of great concern n recent years[]. The MAC layer of suorts a rmarly Pont-to- Multont (PMP) archtecture, wth an otonal mesh toology. A PMP network conssts of one Base Staton (BS) and multle Subscrber Statons (SSs). The downlnk (from BS to SS) s generally broadcast. But the ulnk (from SS to BS) s shared by the SSs. IEEE has defned the MAC rotocol stack for BS to assgn the ulnk channel to SSs. But durng ntal mantenance and bandwdth contenton erods, all SSs stll need to contend the ulnk channel. An effectve contenton resoluton s crucal to the whole system. At resent the mandatory method of contenton resoluton that shall be suorted by s based on a truncated Bnary Exonental Backoff (BEB) algorthm. BEB has been wldly nvestgated n IEEE 802. networks[2][4][7][0]. However, the MAC layer of IEEE s much dfferent from that of IEEE 802., whch makes the dsadvantage of BEB more obvous n IEEE It s too cautous that SS enlarges ts backoff wndow whenever there s a collson. Some SSs may be treated unfarly durng the contenton rocess. The radcal reason for these drawbacks s that BEB only use a small amount of contenton nformaton to make a decson for the J. Ma et al. (Eds.): UIC 2006, LNCS 459, , Srnger-Verlag Berln Hedelberg 2006

2 606 W. Lu et al. whole networks. In fact there are many lteratures [2][3][0] tryng to mrove the erformance of BEB wth more system nformaton n IEEE In ths aer, we resent an effcent coordnated backoff algorthm through BS coordnaton. Based on the observaton that n one tme frame the backoff wndow s otmal f t equals to the number of actve SSs, we roose an algorthm to calculate ths number. In each tme frame, all actve SSs wll contend for the transmsson oortunty wth the wndow equal to ths number. Theoretcal analyss and smulatons results show that COB (coordnated backoff) resoluton outerforms BEB resoluton. The remnder of ths aer s organzed as follows. Secton 2 brefly descrbes the BEB based contenton resoluton of IEEE The dsadvantages of BEB are also been onted out. In secton 3, COB resoluton and the algorthm to calculate the number of actve SSs are resented. Secton 4 s the erformance analyss and smulaton results. Fnally, secton 5 concludes the aer. 2 BEB Based Contenton Resoluton n IEEE In IEEE 802.6, both ntal mantenance and Request Contenton are contentonbased. Snce they have the same contenton resoluton, n ths aer we take the Request Contenton as examle. 2. Background of BEB In order to effectvely schedule the data transmsson among SSs, IEEE defnes a comlex data structure. The detal s shown n Fg.. Data are sent and receved n tme frame cycle. Each tme frame s dvded nto ulnk subframe and downlnk subframe. The BS controls the assgnment on ulnk subframe through the UL_MAP whch s broadcasted n downlnk subframe. The orton of request contenton can be defned by a request Informaton Element (IE) whch may consst of multle transmsson oortuntes. A transmsson oortunty s defned as an allocaton rovded n a UL_MAP or art thereof ntended for a grou of SS authorzed to transmt BW requests. An SS whch has nformaton to send s called actve SS. Before enterng ts contenton resoluton rocess, an actve SS frst gets the ntal backoff wndow W and the maxmum backoff wndow W max from BS and then randomly select a backoff value wthn the ntal backoff wndow. Ths random value ndcates the number of transmsson oortuntes that the SS shall defer before transmttng. Backoff value decreases by one on every transmsson oortunty. When ths value reach zero, n the next transmsson oortunty the SS sends out ts BW request. After a transmsson, the SS wats for a Data Grant Burst tye IE n the subsequent tme frame. Once receved, whch means the request s succeed and the contenton resoluton s comlete. Otherwse the BW request transmsson s unsuccessful. The SS now ncreases ts backoff wndow by a factor of two as long as the t s less than W max, the SS shall randomly select a backoff value wthn ts new wndow and reeat the deferrng rocess descrbed above. Ths retry rocess contnues untl the maxmum number of retres f has been reached. Then the BW request shall be dscarded.

3 A Base Staton-Coordnated Contenton Resoluton for IEEE PMP Networks 607 Fg.. Data Structure of BW request 2.2 Dsadvantages of BEB The BEB has been wldly used n DCF, but s not erfect n IEEE Frst, there s blndfold for the SS enlargng ts backoff wndow whenever t encounters a collson. Unlke n IEEE 802., the SS n IEEE doesn t sense whether the channel s busy or not before t transmts a request. Ths leads to a large collson robablty whch s caused by the nature feature of random access method. It doesn t always ndcate that the contenton s severe. When there s a severe collson SS should enlarge ts backoff wndow. But t does not mean that SS should enlarge ts backoff wndow whenever there s a collson. Another dsadvantage s that BEB may be unfar to some SS. In tme frame, when SS j chose ts backoff value b,j n nterval [0, w], f b,j s bgger than the number of transmsson oortuntes O, SS j shall defer the oortunty and contends wth the backoff values b,j -O n tme frame +. But the SSs that contend n tme frame + have no dea of the SS j. So the transmsson oortuntes from to b,j -O n frame + are ncdent to collsons. In another word, the SSs that have b,j >O, have more oortuntes of collsons. 3 Coordnated Backoff Algorthm From the nsuffcences of BEB t s easy to know that lackng global contenton nformaton causes the SSs take an unerfected olcy. If we can use the characterstc of central schedulng of PMP and let the BS control the contenton, we may mrove the erformance. Based on ths deal we resent a coordnated backoff algorthm.

4 608 W. Lu et al. 3. Statement of COB In Our algorthm the contenton s coordnated by BS. In each tme frame BS rovdes a global wndow whch s closed to be an otmal wndow n one tme frame. All SSs wll content wth ths wndow. The detal of the algorthm s as follows. ) In tme frame, BS calculates the global backoff wndows w. Along wth O, w s broadcasted to all SS through UCD message. 2) The actve SS j random select a backoff value b,j n[0 w ]. If b,j > O, SS j do not send n ths frame. If b,j O, SS j sends out ts BW request. 3) BS assgns the bandwdth and records the BW request results. 4) If SS j has been assgned the bandwdth, the contenton rocess s comlete. If SS j s request encounter collson SS j wll content wth the new wndow w + n tme frame Global Backoff Wndow One of the key stes of COB s to rovde a roer global wndow n each tme frame. Ths wndow should make the BS correctly receve the BW request as many as ossble. We defne the success robablty s as the robablty that BS receve a correct BW request n a generc (.e., randomly chosen) transmsson oortunty. It s not hard to know that s s the robablty when anyone of the actve SS sends out a BW request whle the other n- SSs don t send. Note that when w<o, SS can not use those transmsson oortuntes whose ordnal numbers are bgger than w. These transmsson oortuntes are wasted. We wll always kee w O and then we have To maxmze the s we have n n w n s = Cn ( ) = ( ) () w w w w ds n w n n( n ) w n 2 = ( ) + ( ) = 0 (2) 2 3 dw w w w w Form (2) t s very easy to know that the otmal wndow s w= n (3) For the convenence of further dscuss, we also calculate the robablty of collson c for a random chosen transmsson oortuntes. n w w w n n c = ( ) ( ) (4) 3.3 Algorthm of Calculatng the Number of Actve SS The otmal wndow equals to the number of actve SS. whle ths number s changng all the whle. How to estmate the number s crucal to COB method. In -th tme

5 A Base Staton-Coordnated Contenton Resoluton for IEEE PMP Networks 609 frame, denote O - as the number of transmsson oortuntes, C - as the number of transmsson oortuntes that suffer collsons, S - as the number of succeeded transmsson oortuntes, s- =S - /O - as the success rate, ˆ s as the estmated success rate, c- =C - /O - as the collson rate and ˆ c as the estmated collson rate. Usng the technology of exonental smoothness we get the success rate of th tme frame: ˆ = βˆ + ( β) (5) s s s In (5), β s called smooth ndex whch s determned by the varable rate of actve SS. If t changes radly the value wll be large. Suose we know the number of actve SSs n, accordng to (), we can calculate ˆ s as s n w w n ( ) = (6) ˆ Let s = s, wth (5) and (6) we can get an equaton on n. But t s not a snglevalued functon, gven a ˆ s there may be two answers. Whch one s true need further analyze. Smlar to s, we also estmate the collson rate by ˆ = β ˆ + ( β) (7) c c c n n n c = ( ) ( ) (8) w w w From (7) and (8) we get a sngle-valued functon of n. Solvng the equatons we get an estmated number of actve SS denoted as n ˆc. If there are two solutons to (5) and (6) we use the one that s closer to n ˆc as the estmated value n ˆs. Consderng success and collson rate are stochastc we use the average value as the result, nˆ ˆ s + nc nˆ = (9) 2 Takng the number of transmsson oortunty O nto account we set the wndow as w ( ˆ, ) = Max n O (0) Ths wndow s the global ndcator on the contenton. If contenton s server, whch means there are many actve nodes, the wndow s bg so as each actve node sends request n each wth small robablty and eventually acheve better erformance.

6 60 W. Lu et al. 4 Performance Analyses and Smulaton As we have mentoned above, s reflects the use of transmsson oortunty. We use t as the man metrc of erformance. From the vewont of SS, whenever t wants to send data, t hoes ts BW request can be receved by BS as soon as ossble. We use delay d to measure ths character. 4. The Maxmal Success Probablty If we know the number of actve SSs exactly, substtute w=n nto () we have n max ( ) n s = () But unfortunately we have to estmate the number. Suose there s an error between estmated value and actual value. Denotng ˆn= n±δ n, accordng to COB resoluton, all actve SSs shall use / ˆn as ther backoff wndows. So the success robablty can be calculated by: n s = C ( ) = ( ) n ˆ n ˆ n ±Δ n n ±Δ n n n n Snce (2) exress the actual success robablty of COB resoluton, we use s to denote the error between s and smax : n n n Δ s = ( ) ( ) (3) n n±δ n n±δn A numerc examle can show that s s not senstve to n. Suosng n=20, the error of n s 20%, t s easy to fnd out that when n ˆ = 6, s get the maxmal value. The value s whch s only about 2.8% of the smax. So even f there s a bg error between the estmated value and the actual value the s can reman a hgh values. It ndcates that COB s robust. 4.2 Calculaton of Delay When SS sends out a BW request t needs to wat the next tme frame to know f the BW request s succeeded or not. Snce transmsson oortunty s much shorter than a tme frame. We gnore the delay wthn a tme frame. We calculate the delay wth the unt of tme frame. Accordng to COB resoluton, n the frst tme frame the success robablty VO s /w, so the robablty for the delay equals to one tme frame s (- O s /w ) O s /w. The robablty that the delay s k tme frames can be calculated by k Ok O (delay k frame) = sk ( s ) w w k = (2) (4)

7 A Base Staton-Coordnated Contenton Resoluton for IEEE PMP Networks 6 The exectaton values of delay shall be O O ED ( ) = k ( s ) w k k sk k = wk = Suosng O, w, s be constant O, w, s we have k= (5) O O w O ED ( ) = k ( ) k s s s = w w O (6) By (6), we know that delay s determned by O,w, s. The bgger of s s the less of d s. The more of actve SSs s the less of d s. And the bgger of backoff wndow s the bgger d s. 4.3 Smulaton Results To the best our knowledge, there s no lterature to analyze the erformance of BEB n IEEE by now. So we man comare the erformance of BEB and COB by smulaton. We develo a rogram to smulate the rocess of BW request n IEEE The rogram consst of two knds of objects BS and SS. BS send out O transmsson oortuntes n each tme frame and the actve SSs randomly chose a backoff value wthn ts backoff wndow w,j. The BS reads the status and backoff values of each SS and then gve a judgment f the request s succeeded or not. Here we assume the wreless channel s deal, that s, we gnore the ossblty of errors due to nose and also gnore the ossblty of cature technques by whch a SS sometme cature one transmsson n the resence of multle transmssons. The whole smulaton s wrtten wth event drvng model. Frst, we comare the erformances n a steady status. Under ths condton, we kee the number of actve SS as a constant. Each SS generates a new BW request mmedately after a succeed one and SS wll not dscard ts BW request tll t has been successfully transmtted. For smlfy we kee the number of transmsson oortuntes unchanged. We record the number of successful BW request and corresondng delay n each tme frame. Fg. 2 and Fg. 3 are the corresondng value of BEB and COB from tme frame 500 to 550. Here n=32, ntal backoff wndow n BEB s 32 and the smooth ndex β n COB s 0.8. Note that the delays n Fg. 3 are the average delay of all the successful transmsson oortuntes n one tme frame. From Fg 2 we may observe that the success tmes n COB s bgger than that n TEBE. Fg.3 enable us to conclude that: () The delay of COB s less than that of BEB n general; (2) n some fame the delay are very large n BEB whch llustrate the unfar roblem n secton 2.2. Gven an n we smulate the contenton rocess wth 00,000 tme frames. Let n change from 5 to 00, we draw the curve of s and d for BEB and COB resectvely n Fg. 4 and Fg. 5. From Fg. 4, we can observe that When O=32 and n<60 COB s better than BEB both on s and d. But when n>60, BEB erform better than COB. Takng a careful study we can fnd out that when n>60 the delay of BW request s bg (more than 4 tme frames). So the BS should rovde more transmsson oortunty to reduce the delay. When we enlarge transmsson oortunty to 64, COB outerforms BEB. s

8 62 W. Lu et al. Number of Success BWR er tme frame %(%Q Z 2 &2%Q β Tme frame Delay (tme frame) %(%Q Z 2 &2%Q β Tme frame Fg. 2. Varaton of success BWR wth tme frame Fg. 3. Varaton of delay wth tme frame Average success rate BEB O=32,w=32 C O B O =32,β=0.8 BEB O=64,w=32 C O B O =64,β= The number of actve SS Average Delay (Tme Frame) %(%2 Z &2%2 β %(%2 Z &2%2 β The number of actve SSs Fg. 4. Varaton of s wth n Fg. 5. Varaton of d wth n Be used n ractce, the number of actve SS may change dynamcally. It may need a erod of tmes for SS generatng a new BW request. At the same tme, the number of transmsson oortunty that BS rovdes n a tme frame s lmted by some other factor such as bandwdth assgnment method. The number may vary from frame to frame. Takes these factors nto account, we smulate the dynamc feature of IEEE n two asects: on one hand, the arrvng of BW request obeys negatve exonental dstrbuton; on the other hand, the number of transmsson oortunty obeys constant dstrbuton. Furthermore, after tryng sendng a BW request more than f tme fame we dscard t. We don t do t n f retransmsson just n order to comare them easly. And more, the SS who dscards a BW request may generate one after a tme t d. We set N equal to 000. By adjust the value of λ we control the number of actve SS. The exact vales are: w=32, β=0.5, f=25, w max =024, t d =000, λ= 0.005, 0.0, 0.02, 0.03, 0.04, 0.05, 0.06, 0.08 (.e., we control the arrve rate aroxmate to 5, 0, 20, 30, 40, 50, 60, 80 er tme frame). We smulate the O n two dfferent ways: ) O s randomly chosen from 0 to 80; 2) O s calculated by COB resoluton. In ths case we lmt the O to 50. Fg. 6, 7 and 8 are the curve of average success rate, average delay and losng rate under three condtons resectvely.

9 A Base Staton-Coordnated Contenton Resoluton for IEEE PMP Networks 63 Average Success rate Arrve rate of actve SS Average Delay Arrve rate of actve SS Fg. 6. Varaton of s wth the arrve rate of actve SS Fg. 7. Varaton of d wth the arrve rate of actve SS From these Fgures, we may observe that: frstly, the average success robablty of COB s larger than BEB, and s much better when O s decded by COB. Secondly, the delay of COB s less than that of BEB when the number of actve SS s less than 2, but the delay of COB tends to be bgger than BEB when the arrval rate of request contnues ncreasng. However, by analyzng the delay and request losng rate carefully, t s not hard to know that the request losng rate of BEB s much more than that of COB. That s to say, we decrease the delay of BEB by throwng away BW request. When the value of f s large enough, the delay of BEB would ncrease remarkably, and wll bgger than COB. If O les on COB, the request losng rate may be much less. Average request losng rate Arrve rate of actve SS Fg. 8. Varaton of d wth the arrve rate of actve SS 5 Conclusons The foundaton of BEB based contenton resoluton s dstrbuted coordnated functon. In BEB, all the SSs judge the degree of contenton ndvdually and take acton ndvdually. Snce each SS only use a small amount of nformaton (the result of ts transmsson), ther contenton olcy may be ncomleton. In ths aer we roose an effectve coordnated backoff algorthm n whch the evaluaton of the contenton condton s conducted by BS. Comarng wth the sngle feedback of SS, BS s able to know of the cometton condton of the whole networks, therefore be able to control the system s cometton n a better way. Smulaton results show ths resoluton outerforms BEB.

10 64 W. Lu et al. Acknowledgement Ths work s suorted by Strategy Grant of Cty Unversty of Hong Kong under No and and artally suorted by the Natonal Grand Fundamental Research 973 Program of Chna under Grant No. 2003CB References []. IEEE IEEE Standard for Local and Metrooltan Area Networks Part 6: Ar Interface for Fxed Broadband Wreless Access Systems [S] [2]. G. BIANCHI, L. FRATTA, M. OLIVERIC, Performance evaluaton and enhancement of the CSMA/CA MAC rotocol for 802. wreless LAN [A] [C] Proc. of the IEEE Int'l Sym on Personal, Indoor and Moble Rado Communcatons (PIMRC'96) ~396. [3]. FEDERICO CALÌ, MARCO CONTI, AND ENRICO GREGORI, IEEE 802. Protocol: Desgn and Performance Evaluaton of an Adatve Backoff Mechansm [J], IEEE Journal on Selected Area n Communcatons, (9), 774~786. [4]. G. BIANCHI, Performance Analyss of IEEE 802. Dstrbuted Coordnaton Functon [J], IEEE JSAC, (3), 535~547. [5]. CALI F, CONTI M, GREGORI E. Dynamc tunng of the IEEE 802. rotocol to acheve a theoretcal throughut lmt [J]. IEEE/ACM Trans. on Networkng, 2000, 8(6):785~799. [6]. RAPHAEL ROM MOSHE SIDI Multle Access Protocols Performance and analyss [M], 990. Srnger-Verlag New York, Inc. [7]. Qxang Pang, Soung C.Levw, Performance evaluaton of an adatve backoff scheme for WLAN [J] Wreless Communcatons and Moble Comutng. 2004; 4:867~879 [8]. R.L. RIVEST, Network Control by Bayesan Broadcast [J], IEEE Trans. on Informaton Theory, 987, IT-33(3). 323~328 [9]. ZHANG Zhao-Feng, WEI Gang A new random access mode for moble Internet JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS Vol.24 No.4 Arl 2003 [0]. PENG Yong, CHENG Sh-DuanA Self-Adatve Wreless LAN Protocol Journal of Software Chna Vol.5, No []. Arunabha Ghosh, Davd R, Wolter, Jeffrey G.Andrews and Runhua Chen,Broadband Wreless Access wth WMax/8O2.6: Current Performance Benchmarks and Future Potental IEEE Communcatons Magazne February 2005, 29-36

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun

More information

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs Advanced LEACH: A Statc Clusterng-based Heteroneous Routng Protocol for WSNs A. Iqbal 1, M. Akbar 1, N. Javad 1, S. H. Bouk 1, M. Ilah 1, R. D. Khan 2 1 COMSATS Insttute of Informaton Technology, Islamabad,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Time-based Adaptive Retry for Wireless Video Streaming 1

Time-based Adaptive Retry for Wireless Video Streaming 1 Tme-based Adatve etry for Wreless Vdeo Streamng 1 Me-Hsuan Lu, Peter Steenkste, and Tsuhan Chen Electrcal and Comuter Engneerng Deartment Carnege Mellon Unversty 5000 Forbes Avenue, Pttsburgh PA 15213-3890,

More information

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks

A Fair Access Mechanism Based on TXOP in IEEE e Wireless Networks 11 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 8, No. 1, Aprl 16 A Far Access Mechansm Based on TXOP n IEEE 8.11e Wreless Networks Marjan Yazdan 1, Maryam Kamal, Neda

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures. Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Enhanced Signaling Scheme with Admission Control in the Hybrid Optical Wireless (HOW) Networks

Enhanced Signaling Scheme with Admission Control in the Hybrid Optical Wireless (HOW) Networks Enhanced Sgnalng Scheme wth Admsson Control n the Hybrd Optcal Wreless (HOW) Networks Yng Yan, Hao Yu, Henrk Wessng, and Lars Dttmann Department of Photoncs Techncal Unversty of Denmark Lyngby, Denmark

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Gentle Early Detection Algorithm

Gentle Early Detection Algorithm Gentle Early etecton Algorthm Hussen Abdel-jaber 1, Mahmoud Abdeljaber 2, Hussen Abu Mansour 1, Malak El-Amr 1 1 Faculty of Comuter Studes, eartment of Informaton Technology and Comutng, Arab Oen Unversty,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 3, MARCH

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 3, MARCH IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 3, MARCH 07 7 A Game Theoretc Aroach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Student Member,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN 21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2)

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2) Broadcast Tme Synchronzaton Algorthm for Wreless Sensor Networs Chaonong Xu )2)3), Le Zhao )2), Yongun Xu )2) and Xaowe L )2) ) Key Laboratory of Comuter Archtecture, Insttute of Comutng Technology Chnese

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Traffic Classification Method Based On Data Stream Fingerprint

Traffic Classification Method Based On Data Stream Fingerprint 5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence

More information

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network Recognton of Identfers from Shng Contaner Images Usng uzzy Bnarzaton and Enhanced uzzy Neural Networ Kwang-Bae Km Det. of Comuter Engneerng, Slla Unversty, Korea gbm@slla.ac.r Abstract. In ths aer, we

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

MULTIHOP wireless networks are a paradigm in wireless

MULTIHOP wireless networks are a paradigm in wireless 400 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 Toward Optmal Dstrbuted Node Schedulng n a Multhop Wreless Network Through Local Votng Dmtros J. Vergados, Member, IEEE, Natala

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,

More information

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives

An Energy-Efficient MAC Protocol for WSNs: Game-Theoretic Constraint Optimization with Multiple Objectives Wreless Sensor Network, 2009, 1, 358-364 do:10.4236/wsn.2009.14044 Publshed Onlne November 2009 (http://www.scrp.org/ournal/wsn). An Energy-Effcent MAC Protocol for s: Game-Theoretc Constrant Optmzaton

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

Design of a prioritized error control scheme based on load differentiation for time sensitive traffic on the wireless LAN

Design of a prioritized error control scheme based on load differentiation for time sensitive traffic on the wireless LAN JOURNAL O NETWORKS, VOL. 1, NO. 2, JUNE 2006 45 Desgn of a prortzed error control scheme based on load dfferentaton for tme senstve traffc on the wreless LAN Mkyung Kang, Junghoon Lee*, Yongmoon Jn, Gyung-Leen

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Bandwidth Allocation for Service Level Agreement Aware Ethernet Passive Optical Networks

Bandwidth Allocation for Service Level Agreement Aware Ethernet Passive Optical Networks Bandwdth Allocaton for Servce Level Agreement Aware Ethernet Passve Optcal Networks Dawd Nowak Performance Engneerng Laboratory School of Electronc Engneerng Dubln Cty Unversty Emal: nowakd@eengdcue Phlp

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Lecture Note 08 EECS 4101/5101 Instructor: Andy Mirzaian. All Nearest Neighbors: The Lifting Method

Lecture Note 08 EECS 4101/5101 Instructor: Andy Mirzaian. All Nearest Neighbors: The Lifting Method Lecture Note 08 EECS 4101/5101 Instructor: Andy Mrzaan Introducton All Nearest Neghbors: The Lftng Method Suose we are gven aset P ={ 1, 2,..., n }of n onts n the lane. The gven coordnates of the -th ont

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

HIERARCHICAL SCHEDULING WITH ADAPTIVE WEIGHTS FOR W-ATM *

HIERARCHICAL SCHEDULING WITH ADAPTIVE WEIGHTS FOR W-ATM * Copyrght Notce c 1999 IEEE. Personal use of ths materal s permtted. However, permsson to reprnt/republsh ths materal for advertsng or promotonal purposes or for creatng new collectve wors for resale or

More information

Making Name-Based Content Routing More Efficient than Link-State Routing

Making Name-Based Content Routing More Efficient than Link-State Routing Makng Name-Based Content Routng More Effcent than Lnk-State Routng Ehsan Hemmat and J.J. Garca-Luna-Aceves, Comuter Engneerng Deartment, UC Santa Cruz, Santa Cruz, CA 95064 PARC, Palo Alto, CA 94304 {

More information

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

Contour Error of the 3-DoF Hydraulic Translational Parallel Manipulator. Ryszard Dindorf 1,a, Piotr Wos 2,b

Contour Error of the 3-DoF Hydraulic Translational Parallel Manipulator. Ryszard Dindorf 1,a, Piotr Wos 2,b Advanced Materals Research Vol. 874 (2014) 57-62 Onlne avalable snce 2014/Jan/08 at www.scentfc.net (2014) rans ech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.874.57 Contour Error of the 3-DoF

More information

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal

UBICC Publishers 2008 Ubiquitous Computing and Communication Journal UBICC Journal Ubqutous Computng and Communcaton Journal 008 Volume 3. 008-04-30. ISSN 99-844 Specal Issue on Moble Adhoc Networks UBICC ublshers 008 Ubqutous Computng and Communcaton Journal Edted by Usman

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

IMRT workflow. Optimization and Inverse planning. Intensity distribution IMRT IMRT. Dose optimization for IMRT. Bram van Asselen

IMRT workflow. Optimization and Inverse planning. Intensity distribution IMRT IMRT. Dose optimization for IMRT. Bram van Asselen IMRT workflow Otmzaton and Inverse lannng 69 Gy Bram van Asselen IMRT Intensty dstrbuton Webb 003: IMRT s the delvery of radaton to the atent va felds that have non-unform radaton fluence Purose: Fnd a

More information

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks

Clustering Based Adaptive Power Control for Interference Mitigation in Two-Tier Femtocell Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 4, Apr. 2014 1424 Copyrght c 2014 KSII Clusterng Based Adaptve Power Control for Interference Mtgaton n Two-Ter Femtocell Networks Hong

More information

Region Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided

Region Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided Regon Segmentaton Readngs: hater 10: 10.1 Addtonal Materals Provded K-means lusterng tet EM lusterng aer Grah Parttonng tet Mean-Shft lusterng aer 1 Image Segmentaton Image segmentaton s the oeraton of

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

USEFUL AUTHENTICATION MECHANISM FOR IEC BASED SUBSTATIONS

USEFUL AUTHENTICATION MECHANISM FOR IEC BASED SUBSTATIONS USEFUL AUTHENTICATION MECHANISM FOR IEC 61850-BASED SUBSTATIONS Nastaran Abar M.H.Yaghmaee Davod Noor S.Hedaat Ahbar abar.nastaran@gmal.com yaghmaee@eee.org Hed_lan@yahoo.com ABSTRACT By ncreasng the use

More information

MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH

MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH بسم االله الرحمن الرحيم (الهي همه چيز را به تو مي سپارم ياريم كن) MOBILITY-BASED MULTICAST ROUTING ALGORITHM FOR WIRELESS MOBILE AD-HOC NETWORKS: A LEARNING AUTOMATA APPROACH JAVAD AKBARI TORKESTANI Deartment

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Modeling TCP Throughput: A Simple Model and its Empirical Validation

Modeling TCP Throughput: A Simple Model and its Empirical Validation Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Jtendra Padhye, Vctor Frou, Don Towsley, Jm Kuros 0-09-9 Presenter: Ognjen Vukovc Modelng TCP Throughut: A Smle Model and ts mrcal Valdaton Motvaton

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Design of the Application-Level Protocol for Synchronized Multimedia Sessions

Design of the Application-Level Protocol for Synchronized Multimedia Sessions Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,

More information

Buffer Management Algorithm Design and Implementation Based on Network Processors

Buffer Management Algorithm Design and Implementation Based on Network Processors (IJCSIS) Internatonal Journal of Computer Scence and Informaton Securty, Buffer Management Algorthm Desgn and Implementaton Based on Network Processors Yechang Fang, Kang Yen Dept. of Electrcal and Computer

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information