An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

Size: px
Start display at page:

Download "An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng"

Transcription

1 An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0

2 International Journal of Advanced Information Tecnologies (IJAIT), Vol. 5, No. An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang # and ei-heng Ceng * # Department of Information Management, Hsuan Cuang University Hsin-Cu, Taiwan,.O.C. yalo.uang@gmail.com * Department of Computer Science and Information ngineering, YuanPei University Hsin-Cu, Taiwan,.O.C reieng@gmail.com Abstract Since sensors located in different positions wile tey are deployed uniformly in a wireless sensor network (WSN) bear different communication responsibilities, te energy consumption of sensors in te network are eterogeneous so tat some may die earlier tan te oters. In tis paper, we evaluate te energy consumption of sensors in networks. Furtermore, a sensor deployment by linear density control to balance te loading of sensors for WSNs is proposed, so tat te network availability is significantly improved. Simulation results sow tat te proposed metod can acieve up to 3% iger data delivery rate tan previous researc did. Keywords Wireless Sensor Network, Sensor Deployment, Linear Density Control, Compression, Data Delivery ate.. INTODUCTION A design of wireless sensor networks involves deployment of undreds or tousands of omogenous, and energy limited sensor nodes in a region were information will be collected. Hence sensor nodes will sense teir nearby environment and send te information to te BS (Base Station) wic is neiter energy nor computing power limited. Wile te power range is fixed, a node will eiter transmit te information directly to te BS or via oter nodes wic are nearer to te BS according to te distance between it and te BS. Te forwarding routes can be built by gradient based protocols []. In tis paper, a node is in -tier if it is ops away from te BS. Tus, in addition to te information generated by nodes temselves in te networks, nodes will also ave to forward te data sent by oter nodes in iger tiers to te BS. In tis way, nodes in lower tiers will ave to bear more communication responsibilities tan nodes in iger tiers. Terefore, nodes closer to te BS will lose its battery power very soon. Wile many (all) nodes in low tiers die, te data transmitted from nodes in ig tiers cannot reac te BS. Tis causes low data delivery rate and leads to a bottleneck penomenon [-5]. Previous literatures [6-3] addressed te problem of energy efficient deployment of nodes and base stations witout considering te impact of bottleneck penomenon. Tese proposed protocols may prolong te network lifetime, but te effectiveness of network suc as data delivery rate or network availability was not necessarily good as expected. In tis paper, we develop an analytic model to evaluate te energy consumption of nodes in different tiers by considering te op counts of nodes away from te BS. Based on te evaluations, a linear density control deployment metod is proposed and analysed. Simulation results sow tat te proposed metod can significantly improve te network availability. In te best case, te proposed metod can acieve up to 3% iger data delivery rate tan previous researc did. Te rest of paper is organized as follows. Section introduces some related work. Section 3 evaluates te energy consumption of sensors in network and a sensor deployment by linear density control is proposed. Section 4 presents te simulation results of our 資訊科技國際期刊第五卷第二期 -76-

3 International Journal of Advanced Information Tecnologies (IJAIT), Vol. 5, No. metod and some previous studies. Te conclusion and future work are presented in Section 5.. LATD WOK Considering te different loading on tiers, some literatures [-5] proposed solutions to problems of energy efficient deployment of nodes and base stations for prolonging te network lifetime. Sicitiu and Dutta [] proposed tat te nodes adjacent to te BS sould be equipped wit batteries of larger capacity and oter nodes aving te battery capacity inversely proportional to te distance from te BS. Since te geograpical location were a sensor network is supposed to be deployed is azardous in nature and not so easily accessible, it is very difficult to place a particular node wit a particular battery capacity at a particular location. Besides, te total manufacturing cost of te sensor nodes individually equipped wit distinct battery level will be more tan tat of mass production of exactly similar nodes. Padmanab and oy [3, 5] tougt tat te density of te sensor nodes required depends upon te distance away from te BS, probability of event occurrences, te transmission range of te nodes and te coverage area. If any of tese parameters is canged, te required density of te sensor nodes will cange as well. Increasing te number of nodes placed around BS may decrease te bottleneck effect. Te cost of deploying omogenous sensors in network is cost-efficient too. However, by converting te -dimensional problem into multiple identical - dimensional problems in data forwarding, te analysis of bottleneck in WSN will underestimate te loading of nodes in low tiers since te number of nodes in te farter tiers is mostly more tan tose in low tiers. Padmanab et al. [4] proposed to set te transmission distance between two successive nodes around te BS smaller tan tat between two periperal nodes, so tat te bottleneck around te BS could be avoided. Te smaller te transmission range, te less te power needed to transmit. However, in many practical applications, bi-directional transmission is needed for data transmitting and control. Te asymmetric transmission range design would make te communication from BS to nodes not easy. Moreover, te smaller sensing range will cause te smaller number of nodes in te corresponding tier. Tus, te smaller number of nodes in low tiers may bear muc more responsibility of forwarding from te bigger number of nodes in ig tiers. Tis may make te bottleneck effect more serious. All autors in te above studies concluded tat te loading of sensors in different tiers would be inversely proportional to te distance away from te BS. Moreover, eiter tey proposed linear deployments of sensors, i.e. te density of sensors in some tier would be linearly dependent on its tier number, or set te battery capacity of sensors linearly dependent on te distance away from te BS to balance te loading of sensors in different tiers and prolong te network lifetime terefore. Obviously, linear deployment of sensors is practical and easy to implement. Terefore, in tis paper, we also assume te density of sensors deployed in te network will be linearly dependent on teir corresponding tier number. By adjusting te slope of te linear density function, we can find te load distribution of sensors in different tiers so tat an effective sensor deployment by linear density control to balance te loading of sensors in WSN can ten be proposed to improve te network availability and increase te successful data delivery rate. 3. LINA DNSITY CONTOL A general wireless sensor network wit a single BS can be viewed as te deployment of ) nodes in a circle wit radius. Since every sensor transmits information in a fixed power range r, te circle can be split into many circular rings wic, in practice, may be possible tat all te nodes in a particular ring are present and te sape of te circular ring is not smoot [3]. However, a node deployed in a particular ring, namely i-tier, is i ops away from te BS and te number of -77- 資訊科技國際期刊第五卷第二期

4 International Journal of Advanced Information Tecnologies (IJAIT), Vol. 5, No. nodes in i-tier is denoted as. It is clear tat te fartest tier, namely, in te network is equal to /r, and. ) = () i= m=0 m=5 m=0 m=0 m=30 m=40 m=50 Assume te deployment of sensors in i-tier wit density, denoted as, wic is inversely proportional to i. Te relationsip between i and /) can be diagrammed as a line passing troug two points (0, m+) and (, ) were m 0. Te condition m 0 means tat te density of sensors in low tiers will be larger tan tat in ig tiers. An example density function for =5 is sown in Fig.. ) Tier Fig. Density functions wit respect to different values of m were te 5t-tier is te fartest tier in network. m m=0 m=5 m=0 m=0 m=30 m=40 m= =5 i Fig. Te density function for =5 and m 0. Te corresponding line function can be represented as m = [( m + ) i] ), were i and m 0 () Tere are two special cases of m=0 and m= represent for density functions of uniform deployment and sensor deployment proposed in [5] respectively. Fig. sows by deploying,000 sensors in te example network wit different values of m. In tis paper, we find te m tat makes te energy consumption of sensors te most loadbalancing, and tat te network availability, i.e. data delivery rate, can be increased Tier Fig. 3 Te number of sensors in i-tier, wit respect to different values of m. Let te area corresponding to i-tier is A(. Te number of sensors in i-tier,, can be calculated as below. = A( = (i ) πr (3) Te values of wit respect to different values of m are sown in Fig. 3. Te total number of sensors ) in network is rewritten as follows. = A( = N. ( ) = (i ) πr i= i= i= (4) By quations (), (3) and (4), we obtain 資訊科技國際期刊第五卷第二期 -78-

5 International Journal of Advanced Information Tecnologies (IJAIT), Vol. 5, No. N. ( ) = (i ) πr and i= 6 ) D ) =. π r ( m 3m + m m [( m + ) i] ) (5) ( + 6 ) (6) Now we can evaluate te energy consumption of sensors in different tiers. Te energy required for a single node is described below. At any node energy consumption takes place in ( sensing, (i computation, and (ii communication (reception and transmission). Te energy consumption in sensing, computation and reception are independent from te transmission distance. According to te data given by [3], we consider tat te energy consumption in computation is negligibly small in comparison to oter counter parts. Since te energy needed for sensing is almost constant, we take only te energy consumption in transmission and reception into consideration in te following analysis. Tus wen a bit of information is generated at a source node and forwarded to te BS, te energy is consumed in ( transmission at eac node in te forwarding pat, and (i reception at eac node in te forwarding pat except te source one. Te energy required to transmit and receive a packet of information is assumed as ξ T and ξ in tis paper respectively. At te beginning, we analyse te average energy required for a sensor in i-tier to forward packets from all sensors in x-tier, namely i (, were 0<i x. Assume tat V events are randomly triggered among sensors; te expected amount of packets triggered and transmitted by a sensor is V/N. We use ρ =V/N for abbreviation. Te number of events sensed and packets transmitted by te nodes in x-tier is ρ, tus te energy consumed for transmitting tese packets to (x-)-tier is equal to ρξ T. quation (7) sows te average transmitting energy consumed for eac node in x-tier. x ρ ξ T x ( ) = = ρξt (7) All packets transmitted from x-tier would be received totally by sensors in (x-)-tier. And all received packets will be retransmitted to sensors in (x-)-tier. So tat te average energy consumed for eac node in tier x- to receive and forward all te packets transmitted from x-tier is as sown in quation (8). ( x ρ ξ + ρ ξt = x ) ρ = ( ξ ) x ) (8) quation (9) is a general form for te nodes in i-tier to bear te communication responsibility for sensors in x-tier. ρ i ( = ( ξ ) were i is in {, x- } (9) However, once te density of sensor in tiers is controlled, it is no more uniform random distribution. So te expected amount of packets triggered and transmitted by a sensor in tier x is defined as follow. V A( ρ x = were A( ) is te overall A( ) area of network (0) For a sensor density controlled network, te ρ in equations (7) to (9) sould be replaced by ρ x. At last, we can get te overall energy consumption of a sensor in i-tier, denoted as i, after V events are randomly triggered among te network as sown below. i = i ( = ρ x ( ξ ) x= i x= i V = ( ξ ) (x ) x= i () -79- 資訊科技國際期刊第五卷第二期

6 International Journal of Advanced Information Tecnologies (IJAIT), Vol. 5, No. Te average energy consumption for a sensor in different tiers wit different values of m is sown in Fig. 4. is equal to as derived from [5], and m is 0 in uniformly random deployment. i m=0 m=5 m=0 m= Tier Fig. 4 Average energy consumption for a sensor in i-tier. In order to minimize te difference of loading between sensors in low and ig tiers, sould be as close to as possible. Tat is, / approaces to one if te load distribution of sensors is te most loadbalancing. Tus te best value of m is defined as te one wic makes equal to ereafter. It is easy to find tat ( ξ ) V ( ξ ) V = (x ) = ) x= ) () and ( ξ ) V ( ξ ) V = ( ) = ( ) x ) x= ) (3) Terefore, 3 ) ) = = = ) m [( m + ) ] ) m + m (4) Wile / is equal to, te value of m is +. Different values of m represent different deployment strategies. For instance, m 4. SIMULATION SULTS Te simulation program is written wit Borland c and run on a Pentium 4 CPU 3.0 GHz macine wit G AM. In te simulations,,000 stationary sensor nodes are deployed by linear density control in a circular area wit 300 meters in radius, and te BS is set up at te centre of te area (300, 300). Power range of eac sensor is 60 meters. To simulate te network operations, 35,000 events are triggered randomly among sensors wic need to deliver a fixed-lengt packet to te BS. According to te energy model used by [4], we ave equations (5) and (6). Tus te energy consumptions of transmitting and receiving a bit witin 60 meters for a sensor are 40 nj (ξ T ) and 50 nj (ξ ) respectively. Te initial power of eac sensor is 0,000 nj. ac result is te average value of 30 different simulations. We assume sensors are omogeneous and initially ave te same energy. ξ T ( d ) = 50 nj / bit + 0. nj / bit / m d were d is te transmitting range (5) ξ = 50 nj bit (6) / From te analysis in Section 3, we know tat te uniform random deployment and te deployment metod proposed in [5] are equal to linear deployment wit m=0 and 5 respectively, and tese two metods are referred as ANDOM and PADMANABH in te following paragraps. On te oter and, te linear density control strategy proposed in tis paper uses te best value of m wic is equal to +, and tis strategy is referred as OUS ereafter. Since te value of in our simulation is equal to /r = 300/60 = 5, te best value of m is equal to 30. Tat is to say, in Figs. 5 and 6, OUS uses m=30 to determine te number of nodes deployed in eac tier. 資訊科技國際期刊第五卷第二期 -80-

7 International Journal of Advanced Information Tecnologies (IJAIT), Vol. 5, No. Survival rate ANDOM PADMANABH OUS Number of events Fig. 5 Te Comparison of survival rates in te first tier wit respect to different deployments of sensors. Since sensors in te first tier always die earlier to result in te bottleneck penomenon tat lowers te amount of data successfully delivered to te BS, we analyse te survival rate of sensors in te first tier wit different values of m and sow te results in Fig. 5. Meanwile, Fig. 6 sows te data delivery rate and sensors survival rate corresponding to sensor deployments by linear density control wit different values of m. rate and sensors survival rate so tat te network availability is enanced. Actually, PADMANABH (m=5) is also better tan te ANDOM significantly. Tis can also explain tat te bottleneck penomenon does exist for multi-opped routing protocols implemented in WSN. Increasing te number of sensors or density around te BS could effectively balance te loading of network so tat te network availability can be improved correspondingly. However, autors in [5] underestimated te loading of sensors around te BS so tat sensors in low tiers would die earlier tan oter sensors in ig tiers, wic results in te same bottleneck penomenon wit lower data delivery. Wen we increase te value of m to 30, te sensors deployed around te BS are increased, and te bottleneck penomenon is smoot away. Fig. 6(a) depicts tat OUS can acieve up to 3% iger data delivery rate tan PADMA- NABH did..0 Data delivery rate (%) Sensors survival rate (%) ANDOM PADMANABH OUS Number of events ANDOM PADMANABH OUS (a) Number of events (b) Fig. 6 Te Comparisons of data delivery rate and sensors survival rate wit respect to different deployments of sensors. 5. CONCLUSIONS In tis paper, we evaluate te energy consumption of sensors in network more precisely tan previous related works did by considering te energy consumption for sensors in eac tier instead of only a single route. Wit te knowledge of load distribution, a deployment strategy of sensors by linear density control is proposed to balance te loading of sensors in different tiers suc tat te bottleneck penomenon can be proibited as possible to improve te network availability. Simulation results sow our metod outperform te uniform random deployment significantly and also better tan deployment proposed in previous researc in data delivery rate and survival rate. To include te compression mecanism in our evaluation model migt be addressed in future researc. Clearly, te OUS metod (m=30) outperforms te oter two metods in data delivery -8- 資訊科技國際期刊第五卷第二期

8 International Journal of Advanced Information Tecnologies (IJAIT), Vol. 5, No. FNCS [] F. Ye, G. Zong, S. Lu, and L. Zang, GAdient Broadcast: A obust Data Delivery Protocol for Large Scale Sensor Networks, Wireless Networks, vol., pp , 005. [] M. L. Sicitiu and. Dutta, Benefits of Multiple Battery Levels for te Lifetime of Large Wireless Sensor Networks, in Proceedings of Networking, 005, pp [3] K. Padmanab and. oy, Bottleneck around Base Station in Wireless Sensor Network and its Solution, in 3rd Annual International Conference on Mobile and Ubiquitous Systems - Worksops, 006, pp. -5. [4] K. Padmanab, P. Gupta, and. oy, Transmission range management for lifetime maximization in wireless sensor network, in International Symposium on Performance valuation of Computer and Telecommunication Systems, 008, pp [5] K. Padmanab and. oy, Transmission range and density gradient management to avoid bottleneck around base station in wireless sensor network, International Journal of Communication Networks and Distributed Systems, vol. 4, pp , 00. [6] N. Bulusu, J. Heidemann, and D. strin, GPS-less low-cost outdoor localization for very small devices, I Personal Communications, vol. 7, pp. 8-34, 000. [7] N. Bulusu, J. Heidemann, and D. strin, Adaptive beacon placement, in st International Conference on Distributed Computing Systems, 00, pp [8] S. Meguerdician, F. Kousanfar, M. Potkonjak, and M. B. Srivastava, Coverage problems in wireless ad-oc sensor networks, in INFOCOM 00, 00, pp [9] P. Bergamo and G. Mazzini, Localization in sensor networks wit fading and mobility, in 3t I International Symposium on Personal, Indoor and Mobile adio Communications, 00, pp [0] S. Capkun, M. Hamdi, and J. P. Hubaux, GPS-free positioning in mobile ad-oc networks, in Proceedings of te 34t Annual Hawaii International Conference on System Sciences, 00, p. 0. [] A. Howard, M. J. Mataric, and G. S. Sukatme, An Incremental Self-Deployment Algoritm for Mobile Sensor Networks, Autonomous obots, vol. 3, pp. 3-6, 00. [] J. Pan, L. Cai, Y. T. Hou, Y. Si, and S. X. Sen, Optimal base-station locations in two-tiered wireless sensor networks, I Transactions on Mobile Computing, vol. 4, pp , 005. [3] C. Huang,.-H. Ceng, T.-K. Wu, and S.-. Cen, Localized outing Protocols Based on Minimum Balanced Tree in Wireless Sensor Networks, in 5t International Conference on Mobile Ad-oc and Sensor Networks, 009, pp [4] W.. Heinzelman, A. Candrakasan, and H. Balakrisnan, nergy-efficient communication protocol for wireless microsensor networks, in Proceedings of te 33rd Annual Hawaii International Conference on System Sciences, 000, p. 0. 資訊科技國際期刊第五卷第二期 -8-

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Protecting Storage Location Privacy in Sensor Networks

Protecting Storage Location Privacy in Sensor Networks Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Traffic Sign Classification Using Ring Partitioned Method

Traffic Sign Classification Using Ring Partitioned Method Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

All truths are easy to understand once they are discovered; the point is to discover them. Galileo

All truths are easy to understand once they are discovered; the point is to discover them. Galileo Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

You should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by

You should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by Section. Te Tangent Line Problem 89 87. r 5 sin, e, 88. r sin sin Parabola 9 9 Hperbola e 9 9 9 89. 7,,,, 5 7 8 5 ortogonal 9. 5, 5,, 5, 5. Not multiples of eac oter; neiter parallel nor ortogonal 9.,,,

More information

Cooperation in Wireless Ad Hoc Networks

Cooperation in Wireless Ad Hoc Networks Cooperation in Wireless Ad Hoc Networks Vikram Srinivasan, Pavan Nuggealli, Carla F. Ciasserini, Rames R. Rao Department of Electrical and Computer Engineering, University of California at San Diego email:

More information

Analytical CHEMISTRY

Analytical CHEMISTRY ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Test Generation for Acyclic Sequential Circuits with Hold Registers

Test Generation for Acyclic Sequential Circuits with Hold Registers Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

Obstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Vehicles

Obstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Vehicles 2009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 10-12, 2009 FrC10.6 Obstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Veicles Ji-wung Coi,

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks An Evaluation of Alternative Continuous Media eplication Tecniques in Wireless Peer-to-Peer Networks Saram Gandearizade and Tooraj Helmi Department of Computer Science University of Soutern California

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

Non-Interferometric Testing

Non-Interferometric Testing NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

The impact of simplified UNBab mapping function on GPS tropospheric delay

The impact of simplified UNBab mapping function on GPS tropospheric delay Te impact of simplified UNBab mapping function on GPS troposperic delay Hamza Sakidin, Tay Coo Cuan, and Asmala Amad Citation: AIP Conference Proceedings 1621, 363 (2014); doi: 10.1063/1.4898493 View online:

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Search-aware Conditions for Probably Approximately Correct Heuristic Search

Search-aware Conditions for Probably Approximately Correct Heuristic Search Searc-aware Conditions for Probably Approximately Correct Heuristic Searc Roni Stern Ariel Felner Information Systems Engineering Ben Gurion University Beer-Seva, Israel 85104 roni.stern@gmail.com, felner@bgu.ac.il

More information

A novel hob cutter design for the manufacture of spur-typed cutters

A novel hob cutter design for the manufacture of spur-typed cutters journal of materials processing tecnology 29 (29) 847 855 journal omepage: www.elsevier.com/locate/jmatprotec A novel ob cutter design for te manufacture of spur-typed cutters Jen-Kuei Hsie a, Huang-Ci

More information

Energy efficient temporal load aware resource allocation in cloud computing datacenters

Energy efficient temporal load aware resource allocation in cloud computing datacenters Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient

More information

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating

Soft sensor modelling by time difference, recursive partial least squares and adaptive model updating Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou

More information

PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT

PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT IMEKO 21 TC3, TC5 and TC22 Conferences Metrology in Modern Context November 22 25, 21, Pattaya, Conburi, Tailand PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT Tassanai Sanponpute 1, Cokcai Wattong

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2)

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2) LIGHT (Basic information) - Considering te ligt of a projector in a smoky room, one gets to geometrical optics model of ligt as a set of tiny particles tat travel along straigt lines called "optical rays.

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis Selective Acquisition of 3-D Information Enoug for Finding Passable Free Spaces Using an Active Stereo Vision System Atsusi Nisikawa, Atsusi Okubo, and Fumio Miyazaki Department of Systems and Human Science

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

The navigability variable is binary either a cell is navigable or not. Thus, we can invert the entire reasoning by substituting x i for x i : (4)

The navigability variable is binary either a cell is navigable or not. Thus, we can invert the entire reasoning by substituting x i for x i : (4) A Multi-Resolution Pyramid for Outdoor Robot Terrain Perception Micael Montemerlo and Sebastian Trun AI Lab, Stanford University 353 Serra Mall Stanford, CA 94305-9010 {mmde,trun}@stanford.edu Abstract

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Economic design of x control charts considering process shift distributions

Economic design of x control charts considering process shift distributions J Ind Eng Int (2014) 10:163 171 DOI 10.1007/s40092-014-0086-2 ORIGINAL RESEARCH Economic design of x control carts considering process sift distributions Vijayababu Vommi Rukmini V. Kasarapu Received:

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Laser Radar based Vehicle Localization in GPS Signal Blocked Areas

Laser Radar based Vehicle Localization in GPS Signal Blocked Areas International Journal of Computational Intelligence Systems, Vol. 4, No. 6 (December, 20), 00-09 Laser Radar based Veicle Localization in GPS Signal Bloced Areas Ming Yang Department of Automation, Sangai

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin. 1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Excel based finite difference modeling of ground water flow

Excel based finite difference modeling of ground water flow Journal of Himalaan Eart Sciences 39(006) 49-53 Ecel based finite difference modeling of ground water flow M. Gulraiz Akter 1, Zulfiqar Amad 1 and Kalid Amin Kan 1 Department of Eart Sciences, Quaid-i-Azam

More information

On the use of FHT, its modification for practical applications and the structure of Hough image

On the use of FHT, its modification for practical applications and the structure of Hough image On te use of FHT, its modification for practical applications and te structure of Houg image M. Aliev 1,3, E.I. Ersov, D.P. Nikolaev,3 1 Federal Researc Center Computer Science and Control of Russian Academy

More information

DraXRouter: Global Routing in X-Architecture with Dynamic Resource Assignment*

DraXRouter: Global Routing in X-Architecture with Dynamic Resource Assignment* DraXRouter: Global Routing in X-Arcitecture wit Dynamic Resource Assignment* Zen Cao 1, Tong Jing 1, Yu Hu 2, Yiyu Si 2, Xianlong Hong 1, Xiaodong Hu 3, Guiying Yan 3 1 Computer Science & Tecnology Department

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information