Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Size: px
Start display at page:

Download "Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue"

Transcription

1 Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade do Porto INESC Porto Rua Dr. Roberto Frias, Porto PORTUGAL {julio.pires, jpsousa, Abstract: - To ensure the correct behaviour of a Networked Control Syste, the counication network ust provide a reliable and tiely counication service. The two coponents with the highest ipact on the counication delays are the Mediu Access Control (MAC) protocol and the local counication stack, therefore, the usage of an adequate counication stack is of utost iportance to guarantee the tiing correctness of a feedback control application. In this paper, we propose the use of state-of-the-art scheduling algoriths to anage the outgoing queue of a local counication stack. We deonstrate that it is possible to iprove the responsiveness of applications supported by the CAN counication protocol, by using just a light scheduling iddleware to adequately schedule the outgoing queue. We also show that ipleenting such iddleware even on top of COTS counication hardware, opens the possibility to enhance the counication process by iniizing the nuber of deadline isses for highly loaded network scenarios. Keywords: - CAN Counication, Fieldbus Systes, Real-Tie Counication, Networked Control Systes, Priority Inversion, Message Scheduling. 1 Introduction Fieldbus networks becae increasingly popular in coputer-controlled systes. Coputer-controlled systes wherein the control loops are closed through a real-tie fieldbus network are called Networked Control Systes (NCS). Figure 1 represents an exaple of a Networked Control Syste. Fieldbus Network Figure 1: Networked Control Syste (NCS) A fieldbus network interconnecting sensors, actuators and controllers in a feedback control syste, ust be able to: a) support periodic essage streas, in order to convey the control-related periodic data between the controller and the set of related sensors / actuators; b) guarantee upper-bounded response ties for the essage transfers, in order to cope with the controlrelated delays; c) guarantee a predictable tiing behavior in the presence of a variable network load due to traffic non related to the control application (such as alars, surveillance video/audio streas, etc.); d) guarantee a predictable tiing behaviour in the presence of a faulty counication behaviour. In addition, a well-known proble when using a fieldbus network is the presence of induced jitter, that is, the variability of the tie interval between consecutive transfers. For instance, in spite of periodically requesting the transfer of a specific sensor value, the actual transfer will not be iediately executed, as essages need to be scheduled for transission in a shared resource (the counication ediu). As a consequence, in soe of the control cycles the sensor essage will be transferred earlier in the cycle period, and in soe other cycles it will be transferred later. The real-tie service provided by the fieldbus network will just guarantee that the sensor essage will always be transferred before its deadline. Controller Area Network (CAN) [1] was originally designed for use within road vehicles, to solve cabling probles arising fro the growing use of icroprocessor-based coponents in vehicles. Due to its interesting characteristics, CAN is also being considered for the autoated anufacturing and distributed process control environents [], to support sall-scale Networked Control Systes.

2 Several studies on how to guarantee the tiing requireents of essages in CAN networks are available (e.g. [3]), thus providing pre-run-tie schedulability conditions for the analysis of the tiing requireents of NCS traffic. More recently, the CAN counication protocol has attracted an increased attention fro the research counity, naely in what concerns the guarantee of real-tie constraints [4], the ipleentation of innovative scheduling approaches, either server-based [5] or cyclic table-based [6], and the provision of reliable counication services [7]. However, when assessing the ost coon COTS counication boards, one of the perceived drawbacks is that the outgoing counication queues are FIFO queues. Therefore, the essage transfer in CAN networks using such counication boards is prone to priority inversions. That is, lower priority essages will be regularly transferred before higher priority essages. As a consequence, essage deadlines will be frequently issed, whereas they could be respected if the adequate scheduling strategies were ipleented. This paper assesses a set of state-of-the-art scheduling algoriths that have been proposed for scheduling essages in CAN networks. Specifically, it assesses how such algoriths can be ipleented to re-order the outgoing counication queue and, as a consequence, to guarantee the real-tie behavior of CAN counications, iniizing or even avoiding the priority inversion proble. The ain goal of this paper is to deonstrate that, using COTS hardware and a light scheduling software layer ipleenting adequate real-tie essage scheduling strategies, it is possible to iprove the responsiveness of real-tie applications supported by the CAN counication protocol. The reainder of this paper is organized as follows. Section describes soe of the ost relevant available research works on response tie analysis of CAN networks. In Section 3 we briefly describe the experiental setup used to ipleent and to assess the proposed iddleware. Then, in Section 4, we present the ain strategies to schedule the local outgoing queues, which are proposed in this paper. These strategies will be assessed in Section 5. Finally, soe conclusions are drawn in Section 6. CAN Real-Tie Counications In [3], the authors addressed in detail the analysis of real-tie counications in CAN, assuing fixed priorities for essage streas. In such case, the worst-case response tie of a queued essage, easured fro the release of the queuing task to the tie the essage is fully transitted, is: R = J + I + C (1) J is the queuing jitter of essage strea S, inherited fro the worst-case response tie R sender() (where sender() denotes the task which queues the essage ). The ter I represents the worst-case queuing delay - longest tie between placing the essage in the priority-ordered outgoing queue - and the start of the essage transission. The deadline onotonic (DM) priority assignent [8] can be directly ipleented in a CAN network, by setting the identifier field of each essage strea to a unique priority, according to the DM rule. Therefore: I = B + j hp( ) I + J j + τ bit Cj () Tj where B is the worst-case blocking factor, which is equal to the longest tie taken to transit a lower priority essage, and is given by: B = ax{ 0, C k } (3) k lp( ) The set lp() is the set of essage streas with lower-priority than essage strea S. τ bit is the tie taken to transit a bit on the bus and hp() is the set of essage streas in the syste with higher-priority than the essage strea S. C is the longest tie taken to transit a essage fro strea S. CAN has a 47 bit overhead per essage, and a stuff width of 5 bits. Only 34 of the 47 bits of overhead are subject to stuffing, so C can be defined as: db C = s τbit (4) where db is the nuber of data bytes in the essage. Alternatives for the fixed priority assignent are the dynaic priority schees, such as the nonpreeptive Earliest Deadline First (EDF). In [], the authors analyze how the EDF scheduling algorith [9] could be used to schedule CAN essages. In this work, the authors propose the use of a ixed traffic scheduler (MTS), which attepts to provide a high utilization of the counication ediu while using the standard 11-bit forat for the identifier field. The goal of the MTS scheduler is to ake the identifier fields of different essage streas to reflect the deadlines of essages. However, considering that each essage ust have a unique identifier field (which is a requireent of CAN), they suggested the division of the identifier field into three

3 sub-fields, as shown in Figure 3, where a) is for the essages that are to be scheduled according to the EDF. b) is for essages to be scheduled according to the DM, and c) is for low-priority essages. For the higher-priority essage, the deadline field is derived fro the deadline of the essage. To deal with the case where two essages have the sae deadline, the one with the highest uniqueness code will win (note that Zuberi and Shin assue a Wired- OR bus, thus being '1' the doinant bit). The uniqueness code also serves to identify the essage for reception purposes. 1 Identifier 11 bits deadline 5 bits a) uniqueness 5 bits Identifier 11 bits 0 1 Identifier 11 bits DM Priority 9 bits b) coponents for CAN counications, both for hardware and software. 3.1 Hw Fraework When selecting a hardware fraework, iportant topics are the icrocontroller faily, the eory size (both progra and data eory), the internal peripherals of the icrocontroller and the available prograing tools (and its cost). After the analysis of all these characteristics, we have set up a fraework with the following ites: 1) One IXXAT Autoation ipc-i30 board in a desktop PC, for the reception/transission of control data in the CAN. ) Several Phytec PhyCORE AduC81 odules for the reote data acquisition or data output nodes. (Figure 5). 0 0 Low Priority 9 bits c) Figure 3: Identifier field of a MTS essage This type of encoding raises two probles: the first is that the reaining slack tie of a essage changes with every clock tick. This requires identifiers of all essages to be continually updated, and also that each local clock ust be synchronized. The second is that in a typical syste, essage streas ay have largely different deadlines, which raises a proble with the length of the identifier field (only 5 bits to encode the deadline). To solve the second proble, the authors divided the tie into regions and encoded deadlines according to which region they fall in. Deadlines are then expressed relatively to a periodically increasing reference called the start of epoch (SOE). Figure 4 illustrates this concept for =. SOE Deadline sub-field region l th end of epoch Figure 4: Deadline field, encoded in only two bits 3 Experiental Setup In order to define an adequate experiental setup, we have ade a careful analysis of the available COTS Figure 5: PHYTEC phycore AduC81 The ain purpose of this fraework was to ipleent and assess a set of state-of-the-art scheduling algoriths that have been proposed for scheduling essages in CAN networks. Such scheduling strategies were ipleented in the PhyCORE odules, and a desktop PC, through the IXXAT Autoation ipc-i30 board, was used to onitor the tiing characteristics of the network traffic. 3. Network Traffic Load A highly loaded network scenario was ipleented, in order to assess the proposed scheduling strategies. Specifically, we are interested in the coparison of the tiing results (nuber of deadline isses) when different essage scheduling approaches are used to handle a highly loaded network scenario. Therefore, the first step is to derive such load scenario. We consider a CAN network transferring 8 essage streas, with priorities set according to the Deadline Monotonic rule [8], that is: the essage strea with the saller deadline (d i ) will be assigned with the highest priority identifier. All the transferred essages have the sae essage length: C i =5,5s and a deadline value equal to its periodicity (d i = T i ).

4 The periodicities of the essage streas were set according to the following rules: a) The essage strea with saller periodicity generates a essage every 30s; b) The periodicity (Ti) of the other essage streas are related by a integer coefficient a, which enables setting up different network loads for related sets of essage streas. Therefore, the overall network load (U) can be evaluated using the following equation: C C C C U = T1 at1 4aT1 6aT (6) 1 Considering that T 1 = 30s and C=5,5s, the a paraeter can be expressed as follows: 11 a = (7) 360U 13 For the experiental setup, the eight above defined essage strea sets were used, with a network load ranging fro 70% up to 95%. Figure 6 illustrates two of those essage strea sets, taken fro an experience with only two reote nodes (odd and even streas). Message T C Strea i (s) i, d i (s) U i (%) F1 5, ,3 F 5, ,3 F3 5,5 60 9, F4 5,5 60 9, F5 5,5 11 4,5 F6 5,5 11 4,5 F7 5, ,0 F8 5, ,0 total: 70,% C i (s) T i, d i (s) U i (%) F1 5, ,3 F 5, ,3 F3 5, ,7 F4 5, ,7 F5 5,5 69 8,0 F6 5,5 69 8,0 F7 5, ,3 F8 5, ,3 total: 94,6% Figure 6: Exaple of essage strea sets Finally, the essage scheduling was observed during a 60s snapshot and the nuber of deadline isses for each scheduling strategy were counted and copared. The total nuber of generated essages during the 60s snapshot, for each essage strea and for each network load, can be observed in Figure 7. Message F F F F F F F F Figure 7: Total nuber of generated essages 4 Scheduling of the Outgoing Counication Queue Our ain goal was to assess a set of state-of-the-art scheduling algoriths, used to schedule essages in CAN networks. Specifically, we were interested in the assessent of the outgoing counication queue and, as a consequence, to guarantee the real-tie behaviour of the CAN counication protocol. Three scheduling strategies were devised to anage the software-ipleented outgoing counication queue. The ipleented setup is briefly described in Figure 8. Message Generation SJA1000 CAN Counication Controller Proposed iddleware Queue Scheduling Mechaniss SJA1000 outgoing buffer CAN Network Figure 8: Inside a reote node 4.1 Message generation Messages are generated at each node by the periodic interrupt of one of the icrocontroller s internal tiers and according to several predefined periodicities. A axiu of four essage streas are generated at each node and stored on the outgoing essage queue according to one of three possible scheduling disciplines. 4. Local FIFO Scheduling This scheduling strategy is ipleented just for coparison purposes. This is the algorith

5 traditionally used in CAN counication boards for scheduling the outgoing essage queue. In order to enable a direct coparison between the results obtained when using different scheduling strategies, we ipleented the FIFO Scheduling algorith in the proposed iddleware using a circular buffer with onotonic input and output pointers. 4.3 Local Priority Scheduling This scheduling strategy anipulates the positions where generated essages are placed. Such anipulation is supported by a tied pointer increented every 5s. Whenever a essage is generated and oved to the circular buffer, it is placed in the (pointer + T i ) position, where T i is the periodicity of essage strea M i expressed in ultiples of 5 illiseconds. This eans that the essage with the earliest deadline in the circular buffer is the one that will be scheduled for transission. If the SJA1000 is unable to iediately transfer the scheduled essage and a newly arrived essage to the circular buffer has an earlier deadline, then those two essages will be swapped. This eans that the previously scheduled essage is oved back to the circular buffer. 4.4 Local Priority Scheduling with Teporal Epochs The third scheduling strategy ipleents the concept of Teporal Epochs proposed by Zuberi and Shin [], that was briefly explained in Section. The proposed schee ipleents the Mixed Traffic Scheduler (MTS) to schedule essages siilarly to the EDF scheduling algorith [9]. Basically, it encodes the deadline field (DF) according to the following set of rules (as detailed in Figure 3a): x tieout x tieout, if < DF = (8) x tieout 55, if together with the ipleentation of the Local Priority Scheduling proposed in the previous subsection. 5 Experiental Evaluation The assessent of the proposed scheduling strategies was done for a highly loaded network, according to the Network Traffic Load scenario defined in subsection Deadline isses The obtained results during a 60s snapshot are illustrated in Figures 9, 10 and 11. Deadline Misses Deadline Misses FIFO queues in each node Figure 9: Results for FIFO Scheduling Local Priority Scheduling Figure 10: Results for Local Priority Scheduling Deadline Misses Local Priority Scheduling and Teporal Epochs Figure 11: Results for Local Priority Scheduling with Teporal Epochs Clearly, the nuber of deadline isses is totally unacceptable for the case of the FIFO Scheduling approach as there are deadline isses for the highest priority streas M1 and M even with network loads as sall as 75%.

6 With the Local Priority Scheduling strategy, the results are significantly different. While for interediate network load scenarios, there were no experienced deadline isses, for higher network load scenarios there was a significant increase in the nuber of deadline isses, but now just for the lowest priority streas M6 and M8. Finally, when ipleenting the Local Priority Scheduling with Teporal Epochs, the obtained results are clearly better than the results for any of the previous scheduling strategies. The nuber of deadline isses both for interediate and for highly loaded network scenarios is significantly saller than in the previous cases. This behaviour forecasts an iproved capability to support real-tie applications. 5. Scheduling code overhead The three ipleented strategies were scrutinized for code overhead and the results of this analysis are illustrated in Figure 1. Msg generation FIFO scheduling EDF scheduling MTS scheduling Other % of CPU tie Figure 1: Code profiler results As it can be observed, the results of the code profiler tool reveal that the iddleware ipleentation represents an overhead saller than 1%, even for the case of the used sall perforance icrocontroller. When coparing the proposed scheduling approaches, it also reveals a very sall code overhead for the second and third strategies over the FIFO strategy. 6 Conclusions In this paper, we propose the use of state-of-the-art scheduling algoriths to anage the outgoing queue of CAN counication stacks, in order to iprove the responsiveness of supported applications. We showed that it is possible to reduce the occurrence of priority inversions in the counication ediu, and therefore it becoes possible to decrease the nuber of deadline isses even for highly loaded network scenarios. We provided early ipleentation results of deadline isses versus network load for two scheduling algoriths and showed their better perforance and sall coputing overhead when copared with the FIFO scheduling ethod, aking the very attractive for ipleentation on low end processors. References: [1] ISO (1993). Road Vehicle - Interchange of Digital Inforation - Controller Area Network (CAN) for High-Speed Counication. ISO. [] Zuberi, K. and Shin, K. (1997). Scheduling essages on Controller Area Network for Real Tie CIM Applications. In IEEE Transactions on Robotics and Autoation, Vol. 13, No., pp [3] Tindell, K., Burns, A. and Wellings, A. (1995). Calculating Controller Area Network (CAN) Message Response Tie. In Control Engineering Practice, Vol. 3, No. 8, pp [4] Cavalieri, S., Meeting Real-Tie Constraints in CAN, IEEE Trans. on Industrial Inforatics, 005, vol. 1, no., pp [5] Nolte, T.; Nolin, M.; Hansson, H.A., Real- Tie Server-Based Counication With CAN, IEEE Trans. on Industrial Inforatics, 005, vol. 1, no. 3, pp [6] L. Aleida, P. Pedreiras, J. Fonseca, The FTT- CAN protocol: why and how, IEEE Transactions on Industrial Electronics, Volue 49, Issue 6, Dec. 00 Page(s): [7] L. Pinho, F. Vasques, Reliable Real-Tie Counication in CAN Networks", IEEE Transactions on Coputers, Volue 5, Issue 1, Dec. 003 Page(s): [8] N. Audsley A. Burns M. Richardson A. Wellings, Hard Real-Tie Scheduling: The Deadline Monotonic Approach. In Proceedings of the 8th IEEE Workshop on Real-Tie Operating Systes and Software, Atlanta, [9] C. Liu, J. Layland, "Scheduling Algoriths for Multiprograing in a Hard-Real-Tie Environent. In Journal of the ACM, Vol 0, No. 1, January 1973, pp [10] K. Etschberger; Controller Area Network: Basics, Protocols, Chips and Applications; IXXAT Autoation, 001.

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Real-Time Communication for Smart Sensor Networks: A CAN Based Solution

Real-Time Communication for Smart Sensor Networks: A CAN Based Solution Real-Time Communication for Smart Sensor Networks: A CAN Based Solution António J. Pires, Erico Meneses Leão, João P. Sousa, Luiz Affonso Guedes, and Francisco Vasques, Member, IEEE, Abstract Due to the

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Implementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer

Implementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer Ipleenting and Evaluating Various Response-Tie Analyses for Mixed s in CAN using MPS-CAN Analyzer Saad Mubeen, Jukka Mäki-Turja and Mikael Sjödin Mälardalen Real-Tie Research Centre, Mälardalen University,

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

COMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS. J.L.Posadas, P.Pérez, J.E.Simó, G.Benet, F.Blanes

COMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS. J.L.Posadas, P.Pérez, J.E.Simó, G.Benet, F.Blanes COMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS J.L.Posadas, P.Pérez, J.E.Sió, G.Benet, F.Blanes Departaento de Inforática de Sisteas y Coputadores (D.I.S.C.A.) Universidad

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Research Article A Novel Data Classification and Scheduling Scheme in the Virtualization of Wireless Sensor Networks

Research Article A Novel Data Classification and Scheduling Scheme in the Virtualization of Wireless Sensor Networks International Journal of Distributed Sensor Networks Volue 2013, Article ID 546708, 14 pages http://dx.doi.org/10.1155/2013/546708 Research Article A Novel Data Classification and Scheduling Schee in the

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

IPP-HURRAY! Research Group. Polytechnic Institute of Porto School of Engineering (ISEP-IPP)

IPP-HURRAY! Research Group. Polytechnic Institute of Porto School of Engineering (ISEP-IPP) IPP-HURRAY! Research Group Polytechnic Institute of Porto School of Engineering (ISEP-IPP) An Architecture For Reliable Distributed Computer-Controlled Systems Luís Miguel PINHO Francisco VASQUES (FEUP)

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

(12) United States Patent Kumar et al.

(12) United States Patent Kumar et al. (12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

End-to-end Quality Adaptation Scheme Based on QoE Prediction for Video Streaming Service in LTE Networks

End-to-end Quality Adaptation Scheme Based on QoE Prediction for Video Streaming Service in LTE Networks End-to-end Quality Adaptation Schee Based on QoE Prediction for Video Streaing Service in LTE etworks Huifang Chen 1,2 Xin Yu 1 Lei Xie 1,2 1 Dept. of Inforation Science and Electronic Engineering, Zhejiang

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

cm3520 cm3525 Security Function

cm3520 cm3525 Security Function wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Approaching the Skyline in Z Order

Approaching the Skyline in Z Order Approaching the Skyline in Z Order KenC.K.Lee Baihua Zheng Huajing Li Wang-Chien Lee cklee@cse.psu.edu bhzheng@su.edu.sg huali@cse.psu.edu wlee@cse.psu.edu Pennsylvania State University, University Park,

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996. Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Lighting Control System with Low Rate Network Green Computing System. Abstract

Lighting Control System with Low Rate Network Green Computing System. Abstract The 2 nd RMUTP International Conference 2010 Page 24 Lighting Control Syste with Low Rate Network Green Coputing Syste Wanapun Waiyawut Departent of Coputer Engineering, Faculty of Engineering, Rajaangala

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

An Architecture for a Distributed Deductive Database System

An Architecture for a Distributed Deductive Database System IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA

More information

Vision Based Mobile Robot Navigation System

Vision Based Mobile Robot Navigation System International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Stream Clustering: Efficient Kernel-based Approximation using Importance Sampling

Stream Clustering: Efficient Kernel-based Approximation using Importance Sampling Strea Clustering: Efficient Kernel-based Approxiation using Iportance Sapling Radha Chitta, Rong Jin and Anil K. Jain Departent of Coputer Science and Engineering, Michigan State University, East Lansing,

More information

Research Article Design and Analysis of an Energy-Saving Distributed MAC Mechanism for Wireless Body Sensor Networks

Research Article Design and Analysis of an Energy-Saving Distributed MAC Mechanism for Wireless Body Sensor Networks Hindawi Publishing Corporation EURASIP Journal on Wireless Counications and Networking Volue 2010, Article ID 571407, 13 pages doi:10.1155/2010/571407 Research Article Design and Analysis of an Energy-Saving

More information