A Wireless MAC Protocol with Efficient Packet Recovery
|
|
- Amos Reeves
- 5 years ago
- Views:
Transcription
1 A Wreless MAC Protocol wth Effcent Packet Recovery Muhammad Naveed Aman and Bplab Skdar Department of Electcal, Computer and Systems Engneeng, Rensselaer Polytechnc Insttute, Troy NY 8 USA Abstract Exstng wreless medum access control (MAC protocols provde relablty aganst corrupted packets by provdng mechansms for packet error detecton and retransmsson. The effcency of exstng mechansms for provdng relablty s usually low snce they requre the entre packet to be retransmtted even though only parts of t may have been corrupted. To address ths ssue, ths paper presents a MAC protocol wth an effcent packet recovery mechansm for packets corrupted due to both channel errors and collsons. The proposed MAC protocol frst determnes the cause of the errors n a packet and then uses the acknowledgment (ACK packets to provde feedback on the sectons of the packets that have errors. To mnmze the packet recovery tme, the proposed MAC protocol allows the sender to retransmt the corrupted sectons of the packet mmedately, wthout requng a new channel access. Usng smulatons, t s shown that the proposed MAC protocol has hgher effcency and ncreases the acheved throughput. I. INTRODUCTION The causes of errors n wreless networks may be broadly classfed as ether ( caused by poor channel condtons resultng from factors such as fadng, path loss and nose and ( those caused by collsons resultng from smultaneous transmssons from more than one node. The MAC layer of most wreless networks provde relablty aganst these errors by ncludng mechansms to detect the presence of errors and retransmttng the corrupted packets. A fundamental lmtaton wth exstng protocols that lmts the acheved throughput s that the retransmsson mechansms usually resend the entre packet, even though only parts of t may have been corrupted. Snce most errors are confned to parts of a packet, retransmttng the entre packet leads to waste of channel bandwdth and s an overhead that should be avoded. To address ths ssue, ths paper presents a wreless MAC protocol capable of effcent packet recover n the presence of errors that may be caused by the channel or collsons. The presence of errors n a receved packet s usually detected through the use of error detecton codes, such as the cyclc redundancy check (CRC used n IEEE 8. [. Mechansms such as automatc repeat request (ARQ are then used to retransmt the corrupted packet [. Snce CRCs cannot solate the bts wth errors, most ARQ schemes retransmt the entre packet. A methodology for markng the bts that are lkely n error s presented n [3 and t s shown that the throughput may be ncreased by retransmttng only these bts. However, ths approach requres specalzed /4/$3. c 4 IEEE. hardware, and has a hgh overhead feedback strategy. A packet recovery mechansm that works by combnng multple copes of a packet from dfferent access ponts s proposed n [4. The overhead and delay assocated wth combnng agents lmts the applcaton of ths scheme. Moreover, only AWGN channels are consdered n [4 and ts effectveness n more practcal channels has not been establshed. In [5, a softwareonly soluton to packet recovery based on harnessng partal packets s presented. Ths scheme reles on ncremental redundancy and codng schemes, whch can become a bottleneck at hgh data rates. In contrast, the proposed packet recovery mechansm does not requre any customzed hardware, has lower overhead, and provdes real tme operaton. The man contbuton of ths paper s a MAC protocol that effcently recovers packets that are corrupted dung transmsson. The proposed protocol s based on the use of our mechansm to solate the cause and locaton of errors n transmtted packet. The proposed methodology to localze the errors s based on calculatng the Error Vector Magntude (EVM of the receved symbol. The recever n the proposed protocol frst detects the symbols that were corrupted dung transmsson. It then conveys the locatons of the corrupted portons of the packet to the transmtter usng the ACK packet and the transmtter can then uses precse retransmssons of only the corrupted symbols. The performance of the proposed MAC protocol has been evaluated usng both analyss and smulatons. The rest of the paper s organzed as follows. Secton II presents the proposed MAC protocol. Sectons III and IV present mechansms for detectng the cause of packet errors and localzng the errors, respectvely. Secton V presents smulaton results, and Secton VI concludes the paper. II. A MAC PROTOCOL WITH EFFICIENT PACKET RECOVERY The proposed MAC protocols uses carer sense multple access wth collson avodance (CSMA/CA for channel arbtraton and ts basc operaton s based on IEEE 8. [. The proposed protocol may be consdered to an extenson for IEEE 8. for effcent packet recovery. The operaton of the protocol conssts of two steps: ( when a packet s deemed to be corrupt (as determned by a CRC check, the frst step s to detect the sectons of the packet that are corrupted, and ( facltate the effcent and targeted retransmsson of only the
2 DIFS data BO ACK SIFS SIFS SIFS SIFS one packet transmsson Backoff slot SIFS DIFS Fg.. Proposed MAC Protocol for Effcent Packet Recovery corrupted sectons of the packet. A. Error Localzaton tme A key part of the packet recovery mechansm s the mechansm that localzes the sectons of the packet that are corrupted. For the purposes of error localzaton, we consder each packet to be dvded nto a number of equal szed blocks. For each corrupted packet, we frst establsh the cause (collson or channel error usng the mechansm descbed n Secton III. If the packet s corrupted by a collson we use a thresholdng mechansm to dentfy the blocks n error, whle K-means clusteng s used f the packet s corrupted by channel errors, as descbed n Secton IV. B. MAC Protocol The operaton of the proposed MAC protocol s shown n Fgure. Under CSMA/CA based channel access, each node wth a packet to transmt frst senses the state of the channel. If the channel s sensed to be dle for an nterval greater than the Dstbuted Inter-Frame Space (DIFS, the node proceeds wth ts transmsson. If the channel s busy, the node defers ts transmsson tll the channel becomes dle. The node then ntalzes ts backoff tmer wth a randomly selected backoff nterval and decrements ths tmer every tme t senses the channel to be dle. The node transmts ts data when the backoff tmer reaches zero. An exponental backoff mechansm such as that n IEEE 8. s used n the presence of collsons. After recevng a packet, the recever wats for a Short Inter-Frame Space (SIFS, before t transmts an ACK. However, unlke IEEE 8. that only uses postve ACKs, the proposed MAC protocol uses the ACK to convey nformaton about the sectons of the packet that are corrupted. Once the blocks n error are dentfed, a btmap ndcatng these blocks s sent to the transmtter usng the ACK packet. On recevng the block-level error btmap, the sender proceeds to retransmt the packet but only ncludes the blocks wth errors. A key aspect of the proposed protocol s that the retransmssons do not requre a new channel access. Once the ACK s receved, the sender retransmts the corrupted blocks mmedately after a SIFS peod. Snce all other nodes n the vcnty of the sender have to wat for a DIFS peod before they can begn ther transmsson or backoff, ths prevents any collsons. The recever reples to the retransmtted blocks wth an ACK that agan uses a btmap to ndcate the blocks that may stll be n error. The sender agan retransmts the corrupted blocks after a SIFS peod and ths contnues tll all the blocks of the packet are receved correctly. The MAC layer at the recever assembles all the blocks of the packet before sendng t to the upper layer. An upper lmt may be placed on the number of retransmsson attempts that are allowed for a block before the current transmsson s aborted. Such a lmt may be requred for farness and to prevent a sngle node from monopolzng the channel for too long. The entre packet needs to be retransmtted f the current transmsson attempt exceeds the number of retransmssons attempts for ts blocks n a sngle channel access. The advantage of the proposed protocol stems from three factors. Frst, only the sectons of the packet that are corrupted are retransmtted, thereby elmnatng the waste of channel resources. Secondly and more sgnfcantly, the retransmsson does not requre a separate channel accesses. The channel access tme s a major contbutor to the delays expeenced by the packets [6. By allowng retransmssons after only a SIFS peod as opposed to a full-fledged channel access nvolvng backoffs and deferments to transmssons from other nodes. Fnally, the thrd advantage of the proposed MAC protocols s that snce t can dentfy the cause of a corrupted packet, a node does not have to do an exponental backoff n the cases where the errors are caused by channel errors. Extenson for RTS/CTS: the descpton of the protocol above llustrated the operaton of the protocol n the absence of request-to-send (RTS and clear-to-send (CTS packets. RTS- CTS packet exchange before the data transmsson are usually recommended to address the problem of hdden termnals. Under the operaton wth RTS-CTS based reservaton, a node wth packet to transmt sends a RTS packet to the recever (after successful channel access usng CSMA/CA and the recever responds wth a CTS packet f t s wllng to accept the packet and s currently not busy. The RTS/CTS packets contan tmng nformaton about the length of the ensung transacton, and all nodes that overhear ths exchange defer ther transmssons tll the current transmsson s complete. Wth the proposed retransmsson mechansm, the tmng nformaton contaned n the RTS/CTS packets may not be vald f retransmssons are requred for any of the blocks of the packet. Consequently t s possble that hdden nodes may nterfere wth subsequent transmssons. To address ths stuaton, the proposed MAC protocol adds tmng nformaton to the ACK packets. When an ACK packet sends a btmap wth the lst of blocks wth errors, t also needs to nclude the tmng nformaton that the retransmsson wll take. Nodes overheang the ACK packet wll update ther network allocaton vector (NAV and defer ther transmsson. At the sender s sde, no modfcaton s requred snce the retransmsson begns after a SIFS nterval whle all other nodes have a wat of at least a DIFS nterval. The MAC header of the retransmtted packet can also convey the tmng nformaton requred for the nodes n the vcnty of the sender. III. DETECTING THE CAUSE OF PACKET CORRUPTION Ths secton presents a methodology for detectng the cause of packet errors. Ths nformaton s necessary for accurately solatng the locatons of the symbols wth errors. If X k
3 3 denotes the reference or transmtted sgnal and Y k denotes the receved (dstorted sgnal, then the error vector s E k = Y k X k. Let the transmtter and recever be denoted by T x and R x, respectvely. Consder an OFDM system wth T subcarers and a frequency flat multpath Raylegh fadng channel. The receved tme doman OFDM sgnal y n s y n = H n x n +η n +ζ n ( where H n s the Raylegh channel coeffcent, η n s addtve whte Gaussan nose wth zero-mean and vaance ση, and ζ n s the nterference due to collson. The reference sgnal n our model s obtaned from the receved sgnal by demodulatng the receved symbols and then modulatng them once agan. Ths re-modulated sgnal works as an approxmaton for the transmtted sgnal. x n s the n th tme doman OFDM sgnal and can be obtaned from X k, the M-QAM modulated symbol at the kth subcarer as [7, T x n = IDFT{X k } = X k e jπkn/n ( k= Let us ntroduce a random vaable Z defned as Z = E k. (3 N P k= where P s the average power of all the symbols for a gven modulaton, and N s the number of receved symbols. Let e n be the error vector n the tme doman.e., e n = y n x n. We also know that e n = IDFT{E k } and y n = IDFT{Y k }. Thus, applyng Parseval s theorem, we can rewte (3 as Z = e n. (4 N P Note that Z s the sum of N..d. random vaables. Usng the central lmt theorem (for large N, we approxmate Z as a Gaussan wth probablty densty functon (pdf f Z (z = e (zµz σ Z. (5 πσ Z To obtan the pdf f Z (z of Z n the presence and absence of collsons, we need to fnd ts mean (µ Z and vaance (σz for both cases. We frst evaluate µ Z and σz for the case when there s no collson. In ths case the error vector s gven by e n = H n x n +η n x n = x n (H n +η n. (6 We assume the path loss law l(r = α mean power of the Raylegh channel (H n. Then, µ Z = ε{z} = ( π [σx + P, and take r α +σ η as the. (7 To fnd σz, we need to evaluate ε{z } gven as follows: ( Z = e n = NP N P e n e n. (8 n =n = We now assume block fadng wth a block length of m symbols. Then, ε{z } s gven by ε{z } = [ NP mε{e 4 n}+ N m ( ε{e m n } ( where ε{e n} s gven by { ε{e n} = σx } π + α +ση ( and ε{e 4 n} s gven by (9. Combnng (7 and (, we can obtan the vaance of Z as σ Z = ε{z }(µ Z. Now consder the case when a packet s corrupted by collsons. We assume a network wth J nterferers at dstance r j from R x, that transmt wth probablty p ndependent of each other. The startng locaton of a collson wthn a packet s assumed to be unformly dstbuted between and N. If a collson starts at symbol n, the error vector s gven by { e en n < n n = (3 e n +ζ J n n where ζ J s gven as follows ζ J = J B H W. (4 = Here B s are..d. Bernoull random vaables wth parameter p, H s Raylegh dstbuted wth mean power / α, and W s the OFDM symbol transmtted by nterferer, whch s approxmately..d. Gaussan dstbuted wth zero-mean and vaance σx. We can then rewte (4 as follows: Z = NP ( n e n + Takng the expectaton of (5, we get ε{z } = σx π + P n=n ( e n +ζ J + p(n+ N J r α j= j. (5 +σ η and smlarly, we have ε{z } = [( ( N N P mε{e 4 (N 3 n}+ 4 m 3 (N + (ε{e (N m n} N+ +( 3 ε{e n}ε{e n }+ (N+ [ mε{e n4 }+ 4m N( N +5N3 ( 5N N+ + 3 m(n++ ( ε{e n } (6 4m whereε{e n} andε{e 4 n} are gven by ( and (9. respectvely. ε{e n } s gven by { } ε{e n π J } = σx α + α +ση+pσ x rj α (7 j= and ε{e n 4 } s gven by (. Thus, we can now obtan the
4 4 ε{e 4 n} = (3σ 4 x ε{e n4 } = [ ( (3σ 4 x 8 α ( [ { 6 σx α 8 r α 4 + π r 3 α α α 4 + r 3 α r α π + ( + +3ση +6σxσ η ( π + +3ση +6σxσ η } +ση pσx J r α j= j +6pσx 4 J j= r α j π + π α + + (9 ( vaance of Z as σ Z = ε{z }(µ Z. A. Classfyng the Cause of Packet Errors To classfy the cause of each packet loss, we frst calculate the EVM of each receved packet and then compare t aganst a threshold value. If the calculated EVM s greater than the threshold, the packet s classfed as a collson, and vce versa. The optmum threshold value s determned by choosng the threshold that leads to equal false postve and false negatve rates (.e., the threshold that leads to the crossover error rate. A false postve s defned as an event where the cause of a packet loss s attbuted to a collson, when the actual cause was a weak sgnal (not a collson. If we denote the threshold by γ, then the probablty of a false postve s gven by P Z [Z > γ = P e [ f Z (zdz (8 where P e s the symbol error rate. Smlarly a false negatve s defned as an event where the cause of a packet loss s attbuted to a weak sgnal, when the actual cause was a collson. The probablty of a false negatve s gven by [ P Z [Z γ = P e f Z (z dz. (9 To obtan the threshold that leads to the crossover error rate, we can fnd γ by equatng (8 and (9. Thus, to get the threshold we need to solve the followng equaton numecally: f Z (zdz + f Z (z dz =. ( IV. IDENTIFYING THE LOCATION OF ERRONEOUS BLOCKS The error dentfcaton mechansm detects blocks of symbols wth errors nstead of ndvdual symbols wth errors. To dentfy the symbols wth errors, we calculate the EVM over blocks of m symbols (m. Ths block based approach serves two purposes: ( justfyng the use of (5 and ( loweng the overhead of the feedback sent to the transmtter. A. Error Locatons n Packets Corrupted by Collsons Once a packet s classfed as a collson, the recever compares the EVM of each block wth a threshold. The threshold s determned usng the mechansm descbed n Secton III. Note that the threshold for dentfyng blocks wth errors s dfferent from the threshold for dentfyng the cause of a packet loss. The dfference ases because the cause of a packet loss s classfed usng all the symbols n the packet whle blocks wth errors are detected based only on the symbols wthn a block. The blocks wth EVM greater than the threshold are tagged as erroneous blocks. B. Error Locatons n Packets Corrupted by Channel Nose To detect the error locatons n case of corrupton due to channel nose, we perform K-means clusteng [8 on the EVM values of the blocks n the packet. Clusteng s used nstead of thresholdng because the dfference n the vaances of the pdfs of the EVM of blocks affected by channel nose, and the blocks that are unaffected, s small. Ideally, blocks wth errors should form one cluster whle blocks wthout error form another cluster. The process starts wth two ponts randomly chosen as cluster centers. The EVM of the blocks n the corrupted packet are then assgned to ther closest cluster center based on the Eucldean dstance. The centrod of the two resultng clusters s then calculated and used as the new cluster centers. The EVM value assgnment process s then repeated, and ths process contnues untl the cluster centers stablze. V. RESULTS In ths secton we present the smulaton results to evaluate the performance of our proposed methodology. The smulatons were done usng a mx of MATLAB/Smulnk and NS. The transmtter and recever models were desgned accordng to the IEEE 8.a specfcatons [9. The network smulaton was done usng NS, whch n turn used the output of the channel model created usng MATLAB/Smulnk. The wreless nodes n the smulaton are connected through a frequency flat multpath Raylegh fadng channel. The channel s realzed through the Jake s model [. Results were generated for BPSK, QPSK, 6QAM and 64QAM. We only show the results for 64QAM, for whch two data rates were consdered: 48Mbps and 54Mbps. For both cases, there were 6 coded bts per subcarer and 88 coded bts per OFDM symbol. For the 48Mbps case the codng rate was /3 and data bts per OFDM symbol was 9. The correspondng numbers for the 54Mbps case was 3/4 and 6. Fgures and 3 show the throughput acheved by the proposed MAC protocol and IEEE 8. for channel data rates of 48 and 54 Mbps respectvely, for a channel sgnal to nose rato (SNR of 4 db. For these smulatons, saturated traffc condtons were assumed at each node. All nodes exchanged data wth a sngle base staton and the nodes were located on a crcle of radus 5 meters around the base staton, at regular angular ntervals. We observe that the proposed mechansm
5 5 Throughput (bts/sec 3e+6.5e+6 IEEE 8. Proposed e+6.5e+6 e Number of nodes [4 G. Woo, P. Kheradpour, D. Shen and D. Katab, Beyond the bts: cooperatve packet recovery usng physcal layer nformaton, Proceedngs of ACM MOBICOM, pp , Montreal, Canada, September 7. [5 K. Ln, N. Kushman and D. Katab, ZpTx: harnessng partal packets n 8. networks, Proceedngs of ACM MOBICOM, pp , New York, NY, September 8. [6 O. Tckoo abd B. Skdar, A Queueng Model for Fnte Load IEEE 8. Random Access MAC, Proceedngs of IEEE ICC, pp , Pas, France, June 4. [7 Y. Choo, J. Km, W. Yang and C. Kang, MIMO-OFDM Wreless Communcatons wth MATLAB, Wley-IEEE press, Sngapore,. [8 I. Wtten and E. Frank, Data Mnng: Practcal Machne Learnng Tools and Technques, Morgan Kaufman, San Francsco, CA, 5. [9 Hgh-Speed Physcal Layer n the 5 GHz Band, IEEE Standard 8.a- 999, 999. [ W. Jakes, Mcrowave Moble Communcatons, New York: Wley, 974. Fg.. Compason of throughput of the proposed packet recovery mechansm and IEEE 8. at 48 Mbps and SNR of 4dB. 3.5e+6 3e+6 IEEE 8. Proposed Throughput (bts/sec.5e+6 e+6.5e+6 e Number of nodes Fg. 3. Compason of throughput of the proposed packet recovery mechansm and IEEE 8. at 54 Mbps and SNR of 4dB. provdes more than % mprovements n the throughput at all loads. Ths mprovement ncreases as the dstance between the source and the destnaton nodes ncreases or the channel becomes poorer. VI. CONCLUSIONS Ths paper presented a MAC protocol for the fast and effcent recovery of corrupted packets. The proposed MAC protocol s based on frst determnng the cause of the errors n a packet and then selectvely retransmttng the sectons of the packet wth losses. Addtonal effcency s acheved by the proposed MAC protocol by allowng the sender to retransmt the corrupted sectons of the packet mmedately, wthout requng a new channel access. Our smulaton results show that the proposed MAC protocol performs sgnfcantly better than the conventonal IEEE 8. protocol. REFERENCES [ Wreless LAN Medum Access Control (MAC and Physcal Layer (PHY Specfcatons, IEEE Standard 8., 997. [ D. Bertsekas and R. Gallager, Data Networks, Englewood Clffs, NJ: Prentce-Hall, 987. [3 K. Jameson and H. Balakshnan, PPR: partal packet recovery for wreless networks, Proceedngs of ACM SIGCOMM, pp. 49-4, Kyoto, Japan, August 7.
Simulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationPerformance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks
RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationVoice capacity of IEEE b WLANs
Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationIR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication
Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton
More informationInterclass Collision Protection for IEEE e Wireless LANs
Interclass Collson Protecton for IEEE 82.e Wreless LANs Woon Sun Cho, Chae Y. Lee Dstrbuted Coordnaton Functon (DCF) n IEEE 82. and Enhanced Dstrbuted Channel Access (EDCA) n IEEE 82.e are contenton-based
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationAdaptive Subband Allocation in FH-OFDMA with Channel Aware Frequency Hopping Algorithm
Internatonal Journal on Communcatons Antenna and Propagaton (I.Re.C.A.P.), Vol. 2,. ISS 2039-5086 February 202 Adaptve Subband Allocaton n FH-OFDMA wth Channel Aware Frequency Hoppng Algorthm Ardalan Alzadeh,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationEfficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks
1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationOPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET
OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor
More informationBuffer-aided link selection with network coding in multihop networks
Loughborough Unversty Insttutonal Repostory Buffer-aded lnk selecton wth network codng n multhop networks Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Ctaton:
More informationFast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,
More informationIEEE n Aggregation Performance Study for the Multicast
IEEE 802.11n Aggregaton Performance Study for the Multcast Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour To cte ths verson: Yousr Daldoul, Toufk Ahmed, Djamal-Eddne Meddour. IEEE 802.11n Aggregaton
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationAvoiding congestion through dynamic load control
Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach
More informationAD hoc wireless networks consist of wireless nodes that
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 1 Topology Control n Ad Hoc Wreless Networks Usng Cooperatve Communcaton Mhaela Carde, Member, IEEE, JeWu,Senor Member, IEEE, and Shuhu Yang
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationIEEE E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS
ACCEPTED FROM O PEN C ALL IEEE 802.11E: QOS PROVISIONING AT THE MAC LAYER YANG XIAO, THE UNIVERSITY OF MEMPHIS ess AIFS[j] AIFS[] PIFS SIFS AIFS[] Content 0 to CW Bac Slot Select s The emergng IEEE 802.11e
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationA Free-Collision MAC Proposal for Networks
12th Brazlan Workshop on Real-Tme and Embedded Systems 89 A Free-Collson MAC Proposal for 802.11 Networks Omar Alment 1,2, Gullermo Fredrch 1, Gullermo Reggan 1 1 SITIC Group Unversdad Tecnológca Naconal
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationSpatially Coupled Repeat-Accumulate Coded Cooperation
Spatally Coupled Repeat-Accumulate Coded Cooperaton Naok Takesh and Ko Ishbash Advanced Wreless Communcaton Research Center (AWCC) The Unversty of Electro-Communcatons, 1-5-1 Chofugaoka, Chofu-sh, Tokyo
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationMobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks
Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton
More informationExtension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors
Extenson and Comparson of QoS-Enabled W-F Models n the Presence of Errors Ioanns Papapanagotou, Georgos S. Paschos*, Stavros A. Kotsopoulos** and Mchael Devetskots Electrcal and Computer Engneerng, North
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationPerformance Analysis of the IEEE MAC Protocol over a WLAN with Capture Effect
Vol. IPSJ Dgtal Courer Nov. 25 Regular Paper Performance Analyss of the IEEE 82. MAC Protocol over a WLAN wth Capture Effect Xaolong L, and Qng-An Zeng, In ths paper, we use a dscrete Markov chan model
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationAchievable Bandwidth Estimation for Stations in Multi-Rate IEEE WLAN Cells
Achevable Bandwdth Estmaton for Statons n Mult-Rate IEEE 802. WLAN Cells Eduard Garca, Davd Vamonte, Rafael Vdal and Josep Paradells Wreless Networks Group - echncal Unversty of Catalona (UPC) {eduardg,
More informationEfficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks
Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,
More informationRetransmission-Based Partially Reliable Transport Service: An Analytic Model *
Retransmsson-Based Partally Relable Transport Servce: An Analytc Model * Rahm Marasl Paul D. Amer Phllp T. Conrad Computer and nformaton Scence Department Unversty of Delaware, Newark, DE 19716 USA Emal:
More informationRouting in Degree-constrained FSO Mesh Networks
Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng
More informationWIRELESS communication technology has gained widespread
616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationAggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks
Ann. Telecommun. (29) 64:75 721 DOI.7/s12243-9-95- Aggregated traffc flow weght controlled herarchcal MAC protocol for wreless sensor networks M. Abdur Razzaque M. Mamun-Or-Rashd Muhammad Mahbub Alam Choong
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationQuantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control
Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationMinimum Cost Optimization of Multicast Wireless Networks with Network Coding
Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu
More informationAn Analytical Model for IEEE Point-to-Point Link
An Analytcal Model for IEEE 82. Pont-to-Pont Lnk Yong Yan, Xaowen hu Department of omputer cence, Hong Kong Baptst Unversty Emal: {yyan, chxw}@comp.hkbu.edu.hk Abstract - Wreless mesh networks have attracted
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationAnalysis of Non-coherent Fault Trees Using Ternary Decision Diagrams
Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England R.Remenyte-Prescott@lboro.ac.uk
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrcal and Computer Systems Engneerng Techncal Report MECSE-5-2004 A Survey of IEEE 802.11 MAC Mechansms for Qualty of Servce (QoS) n Wreless Local Area Networks (WLANs) D. Pham, A. Sekercoglu
More informationImproving Load Balancing mechanisms in Wireless Packet Networks 1
Improvng Load Balancng mechansms n Wreless Packet etworks 1 Guseppe Banch, Ilena Tnnrello Dept. Electrcal Engneerng, Unversty of Palermo Vale Delle Scenze, Parco D'Orleans, 90128 Palermo, Italy Abstract
More informationUtility Constrained Energy Minimization In Aloha Networks
Utlty Constraned Energy nmzaton In Aloha Networks Amrmahd Khodaan, Babak H. Khalaj, ohammad S. Taleb Electrcal Engneerng Department Sharf Unversty of Technology Tehran, Iran khodaan@ee.shrf.edu, khalaj@sharf.edu,
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationTHE IEEE standard for wireless local area networks
IEEE RANSACIONS ON VEHICULAR ECHNOLOGY, VOL. 58, NO. 2, FEBRUARY 2009 855 Determnstc Prorty Channel Access Scheme for QoS Support n IEEE 802.11e Wreless LANs Sunmyeng Km, Rongsheng Huang, Student Member,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationRe-routing Instability in IEEE Multi-hop Ad-hoc Networks *
Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationPerformance Analysis of Markov Modulated 1-Persistent CSMA/CA Protocols with Exponential Backoff Scheduling
Performance Analyss of Markov Modulated -Persstent CSMA/CA Protocols wth ponental Backoff Schedulng Pu ng Wong, Dongje Yn, and Tony T. Lee, Abstract. Ths paper proposes a Markovan model of -persstent CSMA/CA
More informationA General Model of Wireless Interference
A General Model of Wreless Interference Ll Qu Yn Zhang Feng Wang M Kyung Han Ratul Mahajan Unversty of Texas at Austn Mcrosoft Research Austn, TX 7872, USA Redmond, WA 9852, USA {ll,yzhang,wangf,hanm2}@cs.utexas.edu
More informationNETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK
NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationLife Tables (Times) Summary. Sample StatFolio: lifetable times.sgp
Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables
More informationDelay Constrained Multiuser Scheduling Schemes Based on Upper-Layer Performance
Delay Constraned Multuser Schedulng Schemes Based on Upper-Layer Performance Hongyuan Zhang Dept. Electrcal and Computer Engneerng North Carolna Unversty Ralegh, NC USA hzhang@ncsu.edu Huayu Da Dept. Electrcal
More informationChannel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Channel-Aware Detecton of Gray Hole Attacks n Wreless Mesh Networks Devu Mankantan Shla, Yu Cheng and Trcha Anjal Dept. of Electrcal and Computer Engneerng, Illnos Insttute of Technology, Chcago, USA Abstract
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationBayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks
Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationQoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding
Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons
More informationA Background Subtraction for a Vision-based User Interface *
A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton
More informationWITH rapid improvements of wireless technologies,
JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue
More informationFibre-Optic AWG-based Real-Time Networks
Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationPERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1
PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationLOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit
LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE
More informationFIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS
OPERATING MANUAL EN FIBARO WALL PLUG FGBWHWPE-102/FGBWHWPF-102 CONTENTS #1: Descrpton and features 3 #2: Parng the accessory 4 #3: Reset 5 #4: Functonalty 6 v1.0 #5: W-F 8 #6: Confgurable parameters 9
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationOnline Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks
12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele
More informationChannel-Quality Dependent Earliest Deadline Due Fair Scheduling Schemes for Wireless Multimedia Networks
Channel-Qualty Dependent Earlest Deadlne Due Far Schedulng Schemes for Wreless Multmeda Networks Ahmed K. F. Khattab Khaled M. F. Elsayed ahmedkhattab@eng.cu.edu.eg khaled@eee.org Department of Electroncs
More informationy and the total sum of
Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton
More information