A Wireless MAC Protocol with Efficient Packet Recovery

Size: px
Start display at page:

Download "A Wireless MAC Protocol with Efficient Packet Recovery"

Transcription

1 A Wreless MAC Protocol wth Effcent Packet Recovery Muhammad Naveed Aman and Bplab Skdar Department of Electcal, Computer and Systems Engneeng, Rensselaer Polytechnc Insttute, Troy NY 8 USA Abstract Exstng wreless medum access control (MAC protocols provde relablty aganst corrupted packets by provdng mechansms for packet error detecton and retransmsson. The effcency of exstng mechansms for provdng relablty s usually low snce they requre the entre packet to be retransmtted even though only parts of t may have been corrupted. To address ths ssue, ths paper presents a MAC protocol wth an effcent packet recovery mechansm for packets corrupted due to both channel errors and collsons. The proposed MAC protocol frst determnes the cause of the errors n a packet and then uses the acknowledgment (ACK packets to provde feedback on the sectons of the packets that have errors. To mnmze the packet recovery tme, the proposed MAC protocol allows the sender to retransmt the corrupted sectons of the packet mmedately, wthout requng a new channel access. Usng smulatons, t s shown that the proposed MAC protocol has hgher effcency and ncreases the acheved throughput. I. INTRODUCTION The causes of errors n wreless networks may be broadly classfed as ether ( caused by poor channel condtons resultng from factors such as fadng, path loss and nose and ( those caused by collsons resultng from smultaneous transmssons from more than one node. The MAC layer of most wreless networks provde relablty aganst these errors by ncludng mechansms to detect the presence of errors and retransmttng the corrupted packets. A fundamental lmtaton wth exstng protocols that lmts the acheved throughput s that the retransmsson mechansms usually resend the entre packet, even though only parts of t may have been corrupted. Snce most errors are confned to parts of a packet, retransmttng the entre packet leads to waste of channel bandwdth and s an overhead that should be avoded. To address ths ssue, ths paper presents a wreless MAC protocol capable of effcent packet recover n the presence of errors that may be caused by the channel or collsons. The presence of errors n a receved packet s usually detected through the use of error detecton codes, such as the cyclc redundancy check (CRC used n IEEE 8. [. Mechansms such as automatc repeat request (ARQ are then used to retransmt the corrupted packet [. Snce CRCs cannot solate the bts wth errors, most ARQ schemes retransmt the entre packet. A methodology for markng the bts that are lkely n error s presented n [3 and t s shown that the throughput may be ncreased by retransmttng only these bts. However, ths approach requres specalzed /4/$3. c 4 IEEE. hardware, and has a hgh overhead feedback strategy. A packet recovery mechansm that works by combnng multple copes of a packet from dfferent access ponts s proposed n [4. The overhead and delay assocated wth combnng agents lmts the applcaton of ths scheme. Moreover, only AWGN channels are consdered n [4 and ts effectveness n more practcal channels has not been establshed. In [5, a softwareonly soluton to packet recovery based on harnessng partal packets s presented. Ths scheme reles on ncremental redundancy and codng schemes, whch can become a bottleneck at hgh data rates. In contrast, the proposed packet recovery mechansm does not requre any customzed hardware, has lower overhead, and provdes real tme operaton. The man contbuton of ths paper s a MAC protocol that effcently recovers packets that are corrupted dung transmsson. The proposed protocol s based on the use of our mechansm to solate the cause and locaton of errors n transmtted packet. The proposed methodology to localze the errors s based on calculatng the Error Vector Magntude (EVM of the receved symbol. The recever n the proposed protocol frst detects the symbols that were corrupted dung transmsson. It then conveys the locatons of the corrupted portons of the packet to the transmtter usng the ACK packet and the transmtter can then uses precse retransmssons of only the corrupted symbols. The performance of the proposed MAC protocol has been evaluated usng both analyss and smulatons. The rest of the paper s organzed as follows. Secton II presents the proposed MAC protocol. Sectons III and IV present mechansms for detectng the cause of packet errors and localzng the errors, respectvely. Secton V presents smulaton results, and Secton VI concludes the paper. II. A MAC PROTOCOL WITH EFFICIENT PACKET RECOVERY The proposed MAC protocols uses carer sense multple access wth collson avodance (CSMA/CA for channel arbtraton and ts basc operaton s based on IEEE 8. [. The proposed protocol may be consdered to an extenson for IEEE 8. for effcent packet recovery. The operaton of the protocol conssts of two steps: ( when a packet s deemed to be corrupt (as determned by a CRC check, the frst step s to detect the sectons of the packet that are corrupted, and ( facltate the effcent and targeted retransmsson of only the

2 DIFS data BO ACK SIFS SIFS SIFS SIFS one packet transmsson Backoff slot SIFS DIFS Fg.. Proposed MAC Protocol for Effcent Packet Recovery corrupted sectons of the packet. A. Error Localzaton tme A key part of the packet recovery mechansm s the mechansm that localzes the sectons of the packet that are corrupted. For the purposes of error localzaton, we consder each packet to be dvded nto a number of equal szed blocks. For each corrupted packet, we frst establsh the cause (collson or channel error usng the mechansm descbed n Secton III. If the packet s corrupted by a collson we use a thresholdng mechansm to dentfy the blocks n error, whle K-means clusteng s used f the packet s corrupted by channel errors, as descbed n Secton IV. B. MAC Protocol The operaton of the proposed MAC protocol s shown n Fgure. Under CSMA/CA based channel access, each node wth a packet to transmt frst senses the state of the channel. If the channel s sensed to be dle for an nterval greater than the Dstbuted Inter-Frame Space (DIFS, the node proceeds wth ts transmsson. If the channel s busy, the node defers ts transmsson tll the channel becomes dle. The node then ntalzes ts backoff tmer wth a randomly selected backoff nterval and decrements ths tmer every tme t senses the channel to be dle. The node transmts ts data when the backoff tmer reaches zero. An exponental backoff mechansm such as that n IEEE 8. s used n the presence of collsons. After recevng a packet, the recever wats for a Short Inter-Frame Space (SIFS, before t transmts an ACK. However, unlke IEEE 8. that only uses postve ACKs, the proposed MAC protocol uses the ACK to convey nformaton about the sectons of the packet that are corrupted. Once the blocks n error are dentfed, a btmap ndcatng these blocks s sent to the transmtter usng the ACK packet. On recevng the block-level error btmap, the sender proceeds to retransmt the packet but only ncludes the blocks wth errors. A key aspect of the proposed protocol s that the retransmssons do not requre a new channel access. Once the ACK s receved, the sender retransmts the corrupted blocks mmedately after a SIFS peod. Snce all other nodes n the vcnty of the sender have to wat for a DIFS peod before they can begn ther transmsson or backoff, ths prevents any collsons. The recever reples to the retransmtted blocks wth an ACK that agan uses a btmap to ndcate the blocks that may stll be n error. The sender agan retransmts the corrupted blocks after a SIFS peod and ths contnues tll all the blocks of the packet are receved correctly. The MAC layer at the recever assembles all the blocks of the packet before sendng t to the upper layer. An upper lmt may be placed on the number of retransmsson attempts that are allowed for a block before the current transmsson s aborted. Such a lmt may be requred for farness and to prevent a sngle node from monopolzng the channel for too long. The entre packet needs to be retransmtted f the current transmsson attempt exceeds the number of retransmssons attempts for ts blocks n a sngle channel access. The advantage of the proposed protocol stems from three factors. Frst, only the sectons of the packet that are corrupted are retransmtted, thereby elmnatng the waste of channel resources. Secondly and more sgnfcantly, the retransmsson does not requre a separate channel accesses. The channel access tme s a major contbutor to the delays expeenced by the packets [6. By allowng retransmssons after only a SIFS peod as opposed to a full-fledged channel access nvolvng backoffs and deferments to transmssons from other nodes. Fnally, the thrd advantage of the proposed MAC protocols s that snce t can dentfy the cause of a corrupted packet, a node does not have to do an exponental backoff n the cases where the errors are caused by channel errors. Extenson for RTS/CTS: the descpton of the protocol above llustrated the operaton of the protocol n the absence of request-to-send (RTS and clear-to-send (CTS packets. RTS- CTS packet exchange before the data transmsson are usually recommended to address the problem of hdden termnals. Under the operaton wth RTS-CTS based reservaton, a node wth packet to transmt sends a RTS packet to the recever (after successful channel access usng CSMA/CA and the recever responds wth a CTS packet f t s wllng to accept the packet and s currently not busy. The RTS/CTS packets contan tmng nformaton about the length of the ensung transacton, and all nodes that overhear ths exchange defer ther transmssons tll the current transmsson s complete. Wth the proposed retransmsson mechansm, the tmng nformaton contaned n the RTS/CTS packets may not be vald f retransmssons are requred for any of the blocks of the packet. Consequently t s possble that hdden nodes may nterfere wth subsequent transmssons. To address ths stuaton, the proposed MAC protocol adds tmng nformaton to the ACK packets. When an ACK packet sends a btmap wth the lst of blocks wth errors, t also needs to nclude the tmng nformaton that the retransmsson wll take. Nodes overheang the ACK packet wll update ther network allocaton vector (NAV and defer ther transmsson. At the sender s sde, no modfcaton s requred snce the retransmsson begns after a SIFS nterval whle all other nodes have a wat of at least a DIFS nterval. The MAC header of the retransmtted packet can also convey the tmng nformaton requred for the nodes n the vcnty of the sender. III. DETECTING THE CAUSE OF PACKET CORRUPTION Ths secton presents a methodology for detectng the cause of packet errors. Ths nformaton s necessary for accurately solatng the locatons of the symbols wth errors. If X k

3 3 denotes the reference or transmtted sgnal and Y k denotes the receved (dstorted sgnal, then the error vector s E k = Y k X k. Let the transmtter and recever be denoted by T x and R x, respectvely. Consder an OFDM system wth T subcarers and a frequency flat multpath Raylegh fadng channel. The receved tme doman OFDM sgnal y n s y n = H n x n +η n +ζ n ( where H n s the Raylegh channel coeffcent, η n s addtve whte Gaussan nose wth zero-mean and vaance ση, and ζ n s the nterference due to collson. The reference sgnal n our model s obtaned from the receved sgnal by demodulatng the receved symbols and then modulatng them once agan. Ths re-modulated sgnal works as an approxmaton for the transmtted sgnal. x n s the n th tme doman OFDM sgnal and can be obtaned from X k, the M-QAM modulated symbol at the kth subcarer as [7, T x n = IDFT{X k } = X k e jπkn/n ( k= Let us ntroduce a random vaable Z defned as Z = E k. (3 N P k= where P s the average power of all the symbols for a gven modulaton, and N s the number of receved symbols. Let e n be the error vector n the tme doman.e., e n = y n x n. We also know that e n = IDFT{E k } and y n = IDFT{Y k }. Thus, applyng Parseval s theorem, we can rewte (3 as Z = e n. (4 N P Note that Z s the sum of N..d. random vaables. Usng the central lmt theorem (for large N, we approxmate Z as a Gaussan wth probablty densty functon (pdf f Z (z = e (zµz σ Z. (5 πσ Z To obtan the pdf f Z (z of Z n the presence and absence of collsons, we need to fnd ts mean (µ Z and vaance (σz for both cases. We frst evaluate µ Z and σz for the case when there s no collson. In ths case the error vector s gven by e n = H n x n +η n x n = x n (H n +η n. (6 We assume the path loss law l(r = α mean power of the Raylegh channel (H n. Then, µ Z = ε{z} = ( π [σx + P, and take r α +σ η as the. (7 To fnd σz, we need to evaluate ε{z } gven as follows: ( Z = e n = NP N P e n e n. (8 n =n = We now assume block fadng wth a block length of m symbols. Then, ε{z } s gven by ε{z } = [ NP mε{e 4 n}+ N m ( ε{e m n } ( where ε{e n} s gven by { ε{e n} = σx } π + α +ση ( and ε{e 4 n} s gven by (9. Combnng (7 and (, we can obtan the vaance of Z as σ Z = ε{z }(µ Z. Now consder the case when a packet s corrupted by collsons. We assume a network wth J nterferers at dstance r j from R x, that transmt wth probablty p ndependent of each other. The startng locaton of a collson wthn a packet s assumed to be unformly dstbuted between and N. If a collson starts at symbol n, the error vector s gven by { e en n < n n = (3 e n +ζ J n n where ζ J s gven as follows ζ J = J B H W. (4 = Here B s are..d. Bernoull random vaables wth parameter p, H s Raylegh dstbuted wth mean power / α, and W s the OFDM symbol transmtted by nterferer, whch s approxmately..d. Gaussan dstbuted wth zero-mean and vaance σx. We can then rewte (4 as follows: Z = NP ( n e n + Takng the expectaton of (5, we get ε{z } = σx π + P n=n ( e n +ζ J + p(n+ N J r α j= j. (5 +σ η and smlarly, we have ε{z } = [( ( N N P mε{e 4 (N 3 n}+ 4 m 3 (N + (ε{e (N m n} N+ +( 3 ε{e n}ε{e n }+ (N+ [ mε{e n4 }+ 4m N( N +5N3 ( 5N N+ + 3 m(n++ ( ε{e n } (6 4m whereε{e n} andε{e 4 n} are gven by ( and (9. respectvely. ε{e n } s gven by { } ε{e n π J } = σx α + α +ση+pσ x rj α (7 j= and ε{e n 4 } s gven by (. Thus, we can now obtan the

4 4 ε{e 4 n} = (3σ 4 x ε{e n4 } = [ ( (3σ 4 x 8 α ( [ { 6 σx α 8 r α 4 + π r 3 α α α 4 + r 3 α r α π + ( + +3ση +6σxσ η ( π + +3ση +6σxσ η } +ση pσx J r α j= j +6pσx 4 J j= r α j π + π α + + (9 ( vaance of Z as σ Z = ε{z }(µ Z. A. Classfyng the Cause of Packet Errors To classfy the cause of each packet loss, we frst calculate the EVM of each receved packet and then compare t aganst a threshold value. If the calculated EVM s greater than the threshold, the packet s classfed as a collson, and vce versa. The optmum threshold value s determned by choosng the threshold that leads to equal false postve and false negatve rates (.e., the threshold that leads to the crossover error rate. A false postve s defned as an event where the cause of a packet loss s attbuted to a collson, when the actual cause was a weak sgnal (not a collson. If we denote the threshold by γ, then the probablty of a false postve s gven by P Z [Z > γ = P e [ f Z (zdz (8 where P e s the symbol error rate. Smlarly a false negatve s defned as an event where the cause of a packet loss s attbuted to a weak sgnal, when the actual cause was a collson. The probablty of a false negatve s gven by [ P Z [Z γ = P e f Z (z dz. (9 To obtan the threshold that leads to the crossover error rate, we can fnd γ by equatng (8 and (9. Thus, to get the threshold we need to solve the followng equaton numecally: f Z (zdz + f Z (z dz =. ( IV. IDENTIFYING THE LOCATION OF ERRONEOUS BLOCKS The error dentfcaton mechansm detects blocks of symbols wth errors nstead of ndvdual symbols wth errors. To dentfy the symbols wth errors, we calculate the EVM over blocks of m symbols (m. Ths block based approach serves two purposes: ( justfyng the use of (5 and ( loweng the overhead of the feedback sent to the transmtter. A. Error Locatons n Packets Corrupted by Collsons Once a packet s classfed as a collson, the recever compares the EVM of each block wth a threshold. The threshold s determned usng the mechansm descbed n Secton III. Note that the threshold for dentfyng blocks wth errors s dfferent from the threshold for dentfyng the cause of a packet loss. The dfference ases because the cause of a packet loss s classfed usng all the symbols n the packet whle blocks wth errors are detected based only on the symbols wthn a block. The blocks wth EVM greater than the threshold are tagged as erroneous blocks. B. Error Locatons n Packets Corrupted by Channel Nose To detect the error locatons n case of corrupton due to channel nose, we perform K-means clusteng [8 on the EVM values of the blocks n the packet. Clusteng s used nstead of thresholdng because the dfference n the vaances of the pdfs of the EVM of blocks affected by channel nose, and the blocks that are unaffected, s small. Ideally, blocks wth errors should form one cluster whle blocks wthout error form another cluster. The process starts wth two ponts randomly chosen as cluster centers. The EVM of the blocks n the corrupted packet are then assgned to ther closest cluster center based on the Eucldean dstance. The centrod of the two resultng clusters s then calculated and used as the new cluster centers. The EVM value assgnment process s then repeated, and ths process contnues untl the cluster centers stablze. V. RESULTS In ths secton we present the smulaton results to evaluate the performance of our proposed methodology. The smulatons were done usng a mx of MATLAB/Smulnk and NS. The transmtter and recever models were desgned accordng to the IEEE 8.a specfcatons [9. The network smulaton was done usng NS, whch n turn used the output of the channel model created usng MATLAB/Smulnk. The wreless nodes n the smulaton are connected through a frequency flat multpath Raylegh fadng channel. The channel s realzed through the Jake s model [. Results were generated for BPSK, QPSK, 6QAM and 64QAM. We only show the results for 64QAM, for whch two data rates were consdered: 48Mbps and 54Mbps. For both cases, there were 6 coded bts per subcarer and 88 coded bts per OFDM symbol. For the 48Mbps case the codng rate was /3 and data bts per OFDM symbol was 9. The correspondng numbers for the 54Mbps case was 3/4 and 6. Fgures and 3 show the throughput acheved by the proposed MAC protocol and IEEE 8. for channel data rates of 48 and 54 Mbps respectvely, for a channel sgnal to nose rato (SNR of 4 db. For these smulatons, saturated traffc condtons were assumed at each node. All nodes exchanged data wth a sngle base staton and the nodes were located on a crcle of radus 5 meters around the base staton, at regular angular ntervals. We observe that the proposed mechansm

5 5 Throughput (bts/sec 3e+6.5e+6 IEEE 8. Proposed e+6.5e+6 e Number of nodes [4 G. Woo, P. Kheradpour, D. Shen and D. Katab, Beyond the bts: cooperatve packet recovery usng physcal layer nformaton, Proceedngs of ACM MOBICOM, pp , Montreal, Canada, September 7. [5 K. Ln, N. Kushman and D. Katab, ZpTx: harnessng partal packets n 8. networks, Proceedngs of ACM MOBICOM, pp , New York, NY, September 8. [6 O. Tckoo abd B. Skdar, A Queueng Model for Fnte Load IEEE 8. Random Access MAC, Proceedngs of IEEE ICC, pp , Pas, France, June 4. [7 Y. Choo, J. Km, W. Yang and C. Kang, MIMO-OFDM Wreless Communcatons wth MATLAB, Wley-IEEE press, Sngapore,. [8 I. Wtten and E. Frank, Data Mnng: Practcal Machne Learnng Tools and Technques, Morgan Kaufman, San Francsco, CA, 5. [9 Hgh-Speed Physcal Layer n the 5 GHz Band, IEEE Standard 8.a- 999, 999. [ W. Jakes, Mcrowave Moble Communcatons, New York: Wley, 974. Fg.. Compason of throughput of the proposed packet recovery mechansm and IEEE 8. at 48 Mbps and SNR of 4dB. 3.5e+6 3e+6 IEEE 8. Proposed Throughput (bts/sec.5e+6 e+6.5e+6 e Number of nodes Fg. 3. Compason of throughput of the proposed packet recovery mechansm and IEEE 8. at 54 Mbps and SNR of 4dB. provdes more than % mprovements n the throughput at all loads. Ths mprovement ncreases as the dstance between the source and the destnaton nodes ncreases or the channel becomes poorer. VI. CONCLUSIONS Ths paper presented a MAC protocol for the fast and effcent recovery of corrupted packets. The proposed MAC protocol s based on frst determnng the cause of the errors n a packet and then selectvely retransmttng the sectons of the packet wth losses. Addtonal effcency s acheved by the proposed MAC protocol by allowng the sender to retransmt the corrupted sectons of the packet mmedately, wthout requng a new channel access. Our smulaton results show that the proposed MAC protocol performs sgnfcantly better than the conventonal IEEE 8. protocol. REFERENCES [ Wreless LAN Medum Access Control (MAC and Physcal Layer (PHY Specfcatons, IEEE Standard 8., 997. [ D. Bertsekas and R. Gallager, Data Networks, Englewood Clffs, NJ: Prentce-Hall, 987. [3 K. Jameson and H. Balakshnan, PPR: partal packet recovery for wreless networks, Proceedngs of ACM SIGCOMM, pp. 49-4, Kyoto, Japan, August 7.

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Interclass Collision Protection for IEEE e Wireless LANs

Interclass Collision Protection for IEEE e Wireless LANs Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Adaptive Subband Allocation in FH-OFDMA with Channel Aware Frequency Hopping Algorithm

Adaptive Subband Allocation in FH-OFDMA with Channel Aware Frequency Hopping Algorithm Internatonal Journal on Communcatons Antenna and Propagaton (I.Re.C.A.P.), Vol. 2,. ISS 2039-5086 February 202 Adaptve Subband Allocaton n FH-OFDMA wth Channel Aware Frequency Hoppng Algorthm Ardalan Alzadeh,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Buffer-aided link selection with network coding in multihop networks

Buffer-aided link selection with network coding in multihop networks Loughborough Unversty Insttutonal Repostory Buffer-aded lnk selecton wth network codng n multhop networks Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Ctaton:

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

IEEE n Aggregation Performance Study for the Multicast

IEEE n Aggregation Performance Study for the Multicast IEEE 802.11n Aggregaton Performance Study for the Multcast Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour To cte ths verson: Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour. IEEE 802.11n Aggregaton

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

AD hoc wireless networks consist of wireless nodes that

AD hoc wireless networks consist of wireless nodes that IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 1 Topology Control n Ad Hoc Wreless Networks Usng Cooperatve Communcaton Mhaela Carde, Member, IEEE, JeWu,Senor Member, IEEE, and Shuhu Yang

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS

IEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A Free-Collision MAC Proposal for Networks

A Free-Collision MAC Proposal for Networks 12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Spatially Coupled Repeat-Accumulate Coded Cooperation

Spatially Coupled Repeat-Accumulate Coded Cooperation Spatally Coupled Repeat-Accumulate Coded Cooperaton Naok Takesh and Ko Ishbash Advanced Wreless Communcaton Research Center (AWCC) The Unversty of Electro-Communcatons, 1-5-1 Chofugaoka, Chofu-sh, Tokyo

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors

Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect

Performance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells

Achievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

Retransmission-Based Partially Reliable Transport Service: An Analytic Model *

Retransmission-Based Partially Reliable Transport Service: An Analytic Model * Retransmsson-Based Partally Relable Transport Servce: An Analytc Model * Rahm Marasl Paul D. Amer Phllp T. Conrad Computer and nformaton Scence Department Unversty of Delaware, Newark, DE 19716 USA Emal:

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks

Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

An Analytical Model for IEEE Point-to-Point Link

An Analytical Model for IEEE Point-to-Point Link An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England R.Remenyte-Prescott@lboro.ac.uk

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu

More information

Improving Load Balancing mechanisms in Wireless Packet Networks 1

Improving Load Balancing mechanisms in Wireless Packet Networks 1 Improvng Load Balancng mechansms n Wreless Packet etworks 1 Guseppe Banch, Ilena Tnnrello Dept. Electrcal Engneerng, Unversty of Palermo Vale Delle Scenze, Parco D'Orleans, 90128 Palermo, Italy Abstract

More information

Utility Constrained Energy Minimization In Aloha Networks

Utility Constrained Energy Minimization In Aloha Networks Utlty Constraned Energy nmzaton In Aloha Networks Amrmahd Khodaan, Babak H. Khalaj, ohammad S. Taleb Electrcal Engneerng Department Sharf Unversty of Technology Tehran, Iran khodaan@ee.shrf.edu, khalaj@sharf.edu,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

THE IEEE standard for wireless local area networks

THE IEEE standard for wireless local area networks IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling

Performance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA

More information

A General Model of Wireless Interference

A General Model of Wireless Interference A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu

More information

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

Delay Constrained Multiuser Scheduling Schemes Based on Upper-Layer Performance

Delay Constrained Multiuser Scheduling Schemes Based on Upper-Layer Performance Delay Constraned Multuser Schedulng Schemes Based on Upper-Layer Performance Hongyuan Zhang Dept. Electrcal and Computer Engneerng North Carolna Unversty Ralegh, NC USA hzhang@ncsu.edu Huayu Da Dept. Electrcal

More information

Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks

Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks Channel-Aware Detecton of Gray Hole Attacks n Wreless Mesh Networks Devu Mankantan Shla, Yu Cheng and Trcha Anjal Dept. of Electrcal and Computer Engneerng, Illnos Insttute of Technology, Chcago, USA Abstract

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE

More information

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS OPERATING MANUAL EN FIBARO WALL PLUG FGBWHWPE-102/FGBWHWPF-102 CONTENTS #1: Descrpton and features 3 #2: Parng the accessory 4 #3: Reset 5 #4: Functonalty 6 v1.0 #5: W-F 8 #6: Confgurable parameters 9

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks

Channel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks Channel-Qualty Dependent Earlest Deadlne Due Far Schedulng Schemes for Wreless Multmeda Networks Ahmed K. F. Khattab Khaled M. F. Elsayed ahmedkhattab@eng.cu.edu.eg khaled@eee.org Department of Electroncs

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information