Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata
|
|
- Norma James
- 6 years ago
- Views:
Transcription
1 Net_CA: A Tool for Simulation and Modeling of Wired/Wireless Computer Networks based on Cellular Automata Vasilios Mardiris 1, Georgios Ch. Sirakoulis 1, Charilaos Mizas 1, Ioannis Karafyllidis 1, and Adonios Thanailakis 1 1 Democritus University of Thrace, Department of Electrical and Computer Engineering, Laboratory of Electrical and Electronic Materials Technology, GR Xanthi, Greece {mardiris, mizas}@teikav.edu.gr {gsirak, ykar, athanail}@ee.duth.gr Abstract. A tool for simulation and modeling of wired/wireless computer networks based on Cellular Automata (CAs), is presented. More specifically, a two-dimensional NaSch CA model for computer network simulation has been developed and implemented in the proposed tool. Furthermore, algorithms for connectivity evaluation, system reliability evaluation and shortest path computation in a wired/wireless computer network have also been implemented. The Net_CA system was designed and developed as an interactive tool that offers automated modeling with the assistance of a dynamic and user friendly graphical environment. The simulation algorithms developed in the present work offer high flexibility. Furthermore, connection reliability and other important parameters are inputs to the algorithms rendering Net_CA a very reliable and fast simulator for wireless networks, ad hoc networks and, generally, for low connection reliability networks. (Research Paper, Keywords: Computer Networks, Cellular Automata, Simulation, Modeling, Connectivity, Reliability) 1 Introduction The proliferation of computing and communications as well as the ever-increasing number of Internet users is driving a revolutionary change in our information society. The requirements for large scale wired and/or wireless computer networks characterized by extremely complicated topologies and, in the same time, by huge bandwidth rates are truly skyrocketing [1]. It is obvious that such complicated computer networks demand meticulous design in topology level, careful choice of the proper communication protocols as well as secured transition of extremely big data with high bandwidth rates. Furthermore, the determination of the parameters set applicable to the aforementioned computer networks that are responsible for their high speed functionality is an extremely difficult task. As a result, modeling the performance of computer networks is without any doubt a crucial and difficult interdisciplinary subject. The principal idea behind simulation modelling is to represent accurately the
2 topology and functions performed in a network in order to obtain statistical results about the network s performance under investigation [2]. Computer networks can be categorized based on the nature of data transmission in three different types; namely, the copper networks where the electric voltage is used as the transmission medium, the optical networks where the light is used and finally the wireless networks where electromagnetic waves are used for the transmission. Because of the pronounced freedom of node movement in a wireless computer network and the undersized connections found in it, a computer network model is indispensable [3]. Computer network models should be a simplified representation of the examined system and hence, only important features should be focussed on [4]. In order to model accurately real computer networks and allow predictive simulation during technology research and development, a system, named Net_CA, was constructed and is presented in this paper. The Net_CA is an interactive simulation tool that includes a Graphical User Interface [GUI] which has been implemented using Tcl/Tk facilities [5]. It simulates the network operation and provides performance measurements. No programming is required as network descriptions are created using a graphical user interface, which is designed to model a wide variety of networks. The proposed system includes four different algorithms for computer network modelling all based on Cellular Automata (CAs). CAs are models of physical systems, where space and time are discrete and interactions are local and they can easily handle complicated boundary and initial conditions, inhomogeneities and anisotropies [6]. CAs are very effective in simulating systems and solving scientific problems, because they can capture the essential features of systems where global behavior arises from the collective effect of simple components which interact locally [7-8]. As a result, first of all a two dimensional CA NaSch computer network model was developed and implemented in Net_CA system. This algorithm is based on the NaSch CA highway traffic model and on the corresponding one-dimensional analogous NaSch CA computer network model found in literature [9-10]. A CA algorithm for network connectivity evaluation, a CA algorithm for network reliability evaluation and a CA shortest path network connectivity algorithm [11] were developed and implemented in the Net_CA system. The proposed Net_CA succeeds a mere numerical agreement with the examined computer network and matches the simulated system s own structure, its topology, its connectivity and every deep network property. The paper is organised as follows: In Section 2 a detailed mathematical description of Cellular Automata is given. The Net_CA simulation tool and all the corresponding CA algorithms are presented in full detail with examples in Section 3. Finally, the conclusions are drawn in Section 4. 2 Cellular Automata In this section a more formal definition of a CA will be presented [12]. In general, a CA requires: 1. A regular lattice of cells covering a portion of a d-dimensional space;
3 2. A set ( r t) = { C ( r, t), C ( r, t),..., C ( r, t) } C of variables attached to each site, 1 2 m r of the lattice giving the local state of each cell at the time t = 0, 1, ; 3. A rule R={R 1, R 2,, R m } which specifies the time evolution of the states C ( r,t) in the following way: C ( r, t + 1) = R ( C( r, t), C( r + δ 1, t), C( r + δ 2, t),..., C( r + δ q t ) j j, where r + δ k designates the cells belonging to a given neighbourhood of cell r. In the above definition, the rule R is identical for all sites, and it is applied simultaneously to each of them, leading to a synchronous dynamics. It is important to notice that the rule is homogeneous, i.e. it does not depend explicitly on the cell position r. However, spatial (or even temporal) inhomogeneities can be introduced by ascribing definite and permanent values for some states ( r) (1) C j in some given locations of the lattice. In the above definition, the new state at time t+1 is only a function of the previous state at time t. It is sometimes necessary to have a longer memory and introduce a dependence on the states at time t-1, t-2,, t-k. Such a situation is already included in the definition, if one keeps a copy of the previous state in the current state. The neighbourhood of cell r is the spatial region in which a cell needs to search in its vicinity. In principle, there is no restriction on the size of the neighbourhood, except that it is the same for all cells. However, in practice, it is often made up of adjacent cells only. For two-dimensional CA, two neighborhoods are often considered: the von Neumann and Moore neighbourhoods [12]. Extending the neighbourhood leads to various types of boundary conditions such as periodic (or cyclic), fixed, adiabatic or reflection [12]. 3 Net_CA Simulation Tool Net_CA is an automated computer network modelling system. In computer network modelling, graphic output is a necessary tool for rapid and clear understanding of computation results. Thus user-friendly tools allowing users to interact with the system is a basic part of the Net_CA s environment. Net_CA s user interface has been implemented using Tcl/Tk GUI s facilities, enabling interactive simulation. The proposed tool is platform independent. The simulation results are produced using the four aforementioned CA algorithms. More details regarding these algorithms are given later on this section. All algorithms codes were also developed with the usage of Tcl/Tk and interact instantly with the user s defined parameters. These parameters are the topology of the examined network, the nodes of the network and their maximum number of data packets and corresponding boundary conditions, as well as the links between the nodes of the network and their bandwidth, reliability and cost. Each algorithm is executed using
4 the corresponding button found in the top of the Net_CA s initialization window. The aforementioned parameters remain unchanged during the simulation. It should be mentioned that Net_CA does not impose any a priori limitations on these parameters which are modifiable and can be changed interactively. Simulation results can be looked at in graphical form. Furthermore, the case of false values given to one or more parameters is examined by the system and the user is forced to correct these values. The Net_CA includes a help window that gives information related to the scope, the abilities and the usage of the system. A demo version of the presented system would be available after the presentation of the paper from the The two-dimensional NaSch network model The original NaSch network model is a one-dimension CA model for computer network, which is similar to the NaSch model used in the research on road traffic [9-10]. In the proposed simulation tool a two-dimensional NaSch network model is presented for the first time. Unlike the NaSch traffic model, the NaSch network model is composed of two kinds of cells, node cells and link cells. The node cells represent computers, routers, and switchers in a computer network. The link cells represent the lines of communication between nodes. Node cells are allowed to have more than one data packets at any time, while link cells can be occupied by at most one packet at a given instant. The two-dimensional NaSch network model results in an extended Moore neighboohood, its size corresponding to the topology of the simulated network. It should be mentioned that every cell of the extended Moore neighbourhood is found in one of three possible states: (a) node cell, (b) link cell and (c) non active. The number of link cells connecting two adjacent node cells represents the bandwidth of network. A large number of link cells results in more time for transferring packets from a node cell to the other. This directly leads to a lower bandwidth. The bandwidth reaches the maximum if no link cell exists between two adjacent node cells. In this case, packets can be directly transferred from one node to the other. This implies that the link cell is not necessary and the NaSch network model can consist of node cells only. The state of cell can be characterized by the number of packets it has. Obviously, for a node cell, it can take an arbitrary value from 0 to N, where N is the maximum number of packets a node cell can hold. However, the state of a link cell can have only the value of 0 or 1. Each packet in the NaSch network model has a velocity property. This property holds information of how the packet move ahead in the next time step. For the sake of simplicity, the maximum velocity of a packet is limited to 1, that is, it must be taken 0 or 1. The developed two-dimensional NaSch network model is assumed to obey the evolution rules as follows: 1. Acceleration: For packets that are in the link cells or at the front of the queue of node cells, their velocities are set to be 1. The velocities of other packets remain unchanged. 2. Slowing down: The velocity of a packet will reduce to 0, if the packet satisfies any of the alternatives:
5 For any cell that holds one packet, the next adjacent one is a link cell and only one packet is occupied in this link node. For any cell that holds one packet, the next adjacent one is a node cell and the number of packets in this link node has reached the maximum. 3. Randomization: For each node cell, slow down the packet lined at the front of queue and set its velocity to 0 with probability p, if this cell is not empty (or it holds at least one packet). 4. Exit of packets from node cells: In this case the followings result: If N>L, then L packages of the node attain to velocity 1. If N<L, then N packages of the node cell, attain to velocity 1 and move to random departure cells; where, in both cases, N is the number of packages of node cell, L is the number of the links cells found in the exit of node cell and could possible receive data. 5. Entrance of packets in node cells: In this case the followings result: If N-N max >L, then L packages attain to velocity 1 and enter the node cell. If N-N max <L, then N-N max packages, chosen randomly from the L link cells found in the entrance of the examined node cell, attain to velocity 1 and enter the node cell; where, in both cases, N is the number of packages of node cell, N max is the maximum number of packages that can be storied in node cell, L is the number of the links cells found in the entrance of node cell and could possible send data (are occupied by data package). 6. Packet motion: Each packet goes ahead according to its velocity. If its destination is a node cell, it will be added to the end of the queue. In step 3, the randomization, should be attracted special attention. The randomization is regarded as the abstract of the forwarding packet process of switchers or routers in a real world network. Through the above steps, we can have dynamic behaviors of network. As mentioned above, we use several parameters, including the number of node cells N, the number of link cells L, the capacity of node cell Q, the random probability p, and the packet density ρ, for describing the NaSch network model. Thus the NaSch network model is generally written as CA(N,L,Q,p,ρ) for convenience. An example of the proposed two-dimensional NaSch model for modelling a computer network through the Net_CA simulation tool is depicted in Figure 1. The Net_CA gives the opportunity to the user to define the minimum number of link cells corresponding to the maximum bandwidth connection. In other words, the user defines the connection with the minimum bandwidth which would be used by the system as the basis for the computation of the link cells for the rest connections depending on the bandwidth of each one. Additionally, the white coloured link cells correspond to empty of data packets, while the red ones hold data packets. 3.2 The s-t connectivity evaluation algorithm The problem of s t connectivity evaluation consists in finding if there is a path from a source node s to a terminal node t. Ascertaining the connectivity of the network requires knowledge of the cut sets or path sets of the system [9] or a depth-first procedure [10 12]. To address the problem, a generalised class of Boolean networks will
6 be used: each node has a binary OR state machine as local transition function with k inputs and m outputs. Fig. 1. The Net_CA simulation tool for the modeling of computer network with the usage of NaSch model after the initialization of the computer network. Let G=(N, A) be a graph, where N is the set of n nodes, A N N is the set of arcs and L i is the neighbourhood of the node i. That is, each node i is mapped to a cell whose neighbourhood is the set of nodes connected to it by its input arcs. Source node s has one input arc and terminal node t has one output arc. Note that in a computer network, each node corresponds to a computer. The state w(i) of each node is binary, with w(i)=1 corresponding to the activated state and w(i)=0 to the quiescent state. Each node i performs an OR Boolean transition function over the states of the nodes in its neighbourhood. That is: [ ( j),..., w( k) ], where j k Λi w i) = OR w,..., ( (2) To determine if there is a path from a source node s to a terminal node t, the CA propagates information from one node to another: each node is activated if there is at least one activated node in its neighbourhood. In this way, a path of activated nodes from node s to node t could be generated. Initially, all nodes are in the quiescent state and the source node s is activated. Then each node executes its transition function, just waiting for the activation of any of its neighbors. The computation ends either when node t is activated or the process
7 stagnates. The longest s t path in G consists of n-1 nodes, therefore the s t connectedness can be computed in O(n) time. The basic algorithm is: 1. Set all nodes in the quiescent state 2. Activate the input node s 3. Iteration=1 4. Update each node state in parallel by transition formula (2) 5. Iteration=iteration+1 6. If node t is activated, then stop: a path between s and t is found 7. If iteration < n-1 go to 4, else 8. If node t is in the quiescent state then s t path does not exist. An example of the proposed s-t connectivity evaluation algorithm using the Net_CA simulation tool is depicted in Figure 2. In the beginning, the starting node s is coloured red while all the other nodes are coloured yellow. In the following time step the nodes connected to the starting node s, with connectivity direction pointing from the s node to them are coloured red and the process keeps on going till the ending node t is coloured red. Then a message of success is shown in the upper right corner of the Net_CA simulation tool screen. Otherwise a proper message informs instantly the user about the inability of finding a connectivity path between the examined nodes of the computer network. Fig. 2. The final screen of the Net_CA simulation tool for the s-t connectedness evaluation algorithm applied to the given topology of the considered computer network.
8 3.3 System reliability evaluation algorithm Let us consider a system with n components and its network representation. Each component has two states (failure and success) and component failures are independent events. Each arc, between node i and j, represents a component with associated reliability r ij. The state of each arc x ij can be evaluated using its reliability and a random number U, distributed uniformly between [0, 1], as: x ij 1 (success state) if U r (3) ij = 0 (failure state) if 0 U rij To take into account the probabilistic nature of each arc, the Boolean transition function for each node Eq. (2) is written as: w(i)=or [AND(w(j),x ji ),, AND(w(k),x ki )], j,..., k (4) In order to perform a Monte-Carlo reliability evaluation with the Number of Evaluation (NE) given, we proceed as follows: 1.. Set iteration=1 2. Generate a random system state X. 3. Using CA algorithm evaluate if there is a path. 4. If there is a path then update number of good system states. 5. Iteration=iteration If iteration < NE go to 2, else STOP. At the end, we can estimate the system reliability as: Reliabilit y = Number of System States with connectivity NE The presented system reliability evaluation algorithm has been implemented in the proposed Net_CA simulation tool and tested with a simple example shown in Figure 3. After the definition of the starting node s and the ending node t of this computer network topology, the previously described reliability evaluation algorithm is used. First, the presented network connections are examined about the status of their function according to the aforementioned probabilistic model. Then, the s-t connectedness evaluation algorithm is executed and the user has the opportunity to examine if there is a physical connection between the nodes of the specified network. Finally, the reliability is calculated using Eq. (5). It should be mentioned that the working connections are displayed with the help of continuing arrows and the non-working connections are displayed with dashed arrows. The final number of the execution time steps of the proposed system reliability evaluation algorithm is determined by the user. i (5)
9 Fig. 3. The Net_CA Simulation tool for the modeling of computer network with the usage of system reliability evaluation algorithm. 3.4 Shortest path computation The problem of finding the shortest path (SP) from a single source to a single destination in a graph arises as a sub-problem to many broader problems. In general, different path metrics are used for different application. For example, in communication systems, if each link cost is 1, then the minimum number of hubs is found. However, cost can also represent the propagation delay, the link congestion or the reliability of each link. In the latter case, if the individual communication links operate independently, then the problem can be stated as to find what path has the maximum reliability. Let G=(N, A) be a graph, where N is the set of n nodes, A N N is the set of arcs and L i is the neighbourhood of the node i. That is, each node i is mapped to a cell whose neighbourhood is the set of nodes connected to it by its input arcs. Associated with each arc ( p, q) A is a non-negative number. C pq stands for the cost of arc from node p to node q. Non-existing arc costs are set to infinite. Let P st be a path from a source node s to a destination node t, defined as the set of consecutive connected nodes: P st ={s; n 1 ; n 2 ; ; n i ; t}. The state of each node, at each time step t s, is 1 2 represented by a vector with two entries ( t ) = V ( t ), V ( t ) : the first com- V i s i s> { } ponent is a pointer to the previous node in the path, while the second is the cost of the i s
10 1 partial path up to node i. V i ( t s ) is not necessary for evaluating the shortest path length, but it is used only for indicating the shortest path itself. The basic algorithm is: 1. Initialise the state of the node as V s (0)={s,0} and V i (0)={i, }, i s, t s =0. k L that minimise 2. Synchronously update each automaton i, i s finding i 2 2 ( t ) = ( V ( t + C ) or, in case of conflict, minimise V k ( t s ) and set U i, k s k s ) k, i 2 { k, ( V ( t ) C )} V i ( ts 1) = k s + k, i t s =t s If t s =n-1 or the process stagnates stop, else go to 2. The minimum s t path cost is the second component of the state vector of node t. In case this value is infinity, then there exists no s t path. The results of the implementation of the presented shortest path computation algorithm to the proposed Net_CA computer network simulation system are depicted in Figure 4. As before the user defines the starting node s and the ending node t of the given computer network topology. During the execution of the aforementioned algorithm each node is described by a pair of values, one for its number (name) according to the cost of the connection up to it, and the other for the minimum cost of connection of the starting node to the examined node. After the execution of the algorithm the shortest connectivity path between nodes s and t is colored yellow. Fig. 4. The final screen of the Net_CA system during the execution of the shortest path algorithm in order to find the shortest connectivity path between nodes s and t.
11 4 Conclusions Net_CA, a tool for simulation and modeling of wired/wireless computer networks based on CAs, was presented. More specifically, a two-dimensional NaSch CA model for computer network simulation has been developed and implemented in the proposed tool. Furthermore, algorithms for connectivity evaluation, system reliability evaluation and shortest path computation in a wired/wireless computer network have also been implemented. The Net_CA system was designed and developed as an interactive tool that offers automated modeling with the assistance of a dynamic and user friendly graphical environment. Net_CA s user interface has been implemented using Tcl/Tk enabling platform independence and possible cooperation with other well known computer network simulation tools based on Tcl/Tk, like ns2. Furthermore, connection reliability and other important parameters are inputs to the algorithms rendering Net_CA a very reliable and fast simulator for wireless networks, ad hoc networks and, generally, for low connection reliability networks. The proposed system can be easily modified enabling the modeling of computer network protocols like TCP/IP. Finally, the inherent parallelism of the proposed CA algorithms and its easy VLSI implementation make it suitable for real-time applications in the field of computer networks. References 1. Weiser, M.: The Computer for the Twenty-First Century. Scientific American. 265 (1991) Gralewitz, M., Michel, A., Stipidis, E., Ali, F.H.: Modelling and simulation of DSP using IP and ATM: illustrative comparisons in COMNET III. Simulation Modelling Practice and Theory. 12 (2004) Tanenbaum, A.S.: Computer Networks. 2 nd edn. Prentice Hall, Englewood Cliffs NJ (1988) 4. Tsaoussidis, V., Zhang, C.: TCP-Real: Receiver-oriented Congestion Control. The Journal of Computer Networks. 40 (2002) Welch, B., Jones, K., Hobbs, J.: Practical Programming in Tcl and Tk. 4th edn. Prentice Hall, Englewood Cliffs NJ (2003) 6. von Neumann, J.: Theory of Self-Reproducing Automata. University of Illinois Press, Urbana IL (1996) 7. Feynman, R.P.: Simulating physics with computers. International Journal of Theoretical Physics. 21 (1982) Wolfram, S.: Theory and Applications of Cellular Automata. World Scientific, Singapore (1986) 9. Ren, Z., Deng, Z., Sun, Z.: Cellular automaton modeling of computer network. Computer Physics Communications. 144 (2002) Nagel, K., Schreckenberg, M.: A cellular automaton model for freeway traffic. Journal de Phys. I. 2 (1992) Rocco, C.M.S., Moreno, J.A.: Network reliability assessment using a cellular automata approach. Reliability Engineering and System Safety. 78 (2002) Chopard, B., Droz, M.: Cellular Automata Modeling of Physical systems. Cambridge University Press, Cambridge (1998)
Application of Two-dimensional Periodic Cellular Automata in Image Processing
International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular
More information7. Traffic Simulation via Cellular Automata
EX7CellularAutomataForTraffic.nb 1 7. Traffic Simulation via Cellular Automata From Chapter 12 (mainly) of "Computer Simulations with Mathematica", Gaylord & Wellin, Springer 1995 [DCU library ref 510.2855GAY]
More informationDetermining the minimal cut sets and Fussell-Vesely importance measures in binary network systems by simulation
Safety and Reliability for Managing Risk Guedes Soares & Zio (eds) 2006 Taylor & Francis Group, London, ISBN 0-415-41620-5 Determining the minimal cut sets and Fussell-Vesely importance measures in binary
More informationCELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR. 1. History
CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR 1. History Cellular automata were initially conceived of in 1948 by John von Neumann who was searching for ways of modeling evolution. He was trying
More informationCOMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung
POLYTECHNIC UNIVERSITY Department of Computer and Information Science COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung Abstract: Computer simulation of the dynamics of complex
More informationCellular Automata. Cellular Automata contains three modes: 1. One Dimensional, 2. Two Dimensional, and 3. Life
Cellular Automata Cellular Automata is a program that explores the dynamics of cellular automata. As described in Chapter 9 of Peak and Frame, a cellular automaton is determined by four features: The state
More informationGeneralized Coordinates for Cellular Automata Grids
Generalized Coordinates for Cellular Automata Grids Lev Naumov Saint-Peterburg State Institute of Fine Mechanics and Optics, Computer Science Department, 197101 Sablinskaya st. 14, Saint-Peterburg, Russia
More informationComplex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata
Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata Paulina A. León Centro de Investigación y de Estudios Avanzados Instituto Politécnico Nacional
More informationModelling traffic congestion using queuing networks
Sādhanā Vol. 35, Part 4, August 2010, pp. 427 431. Indian Academy of Sciences Modelling traffic congestion using queuing networks TUSHAR RAHEJA Mechanical Engineering Department, Indian Institute of Technology
More informationTwo-dimensional Totalistic Code 52
Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable
More informationNetwork Routing Protocol using Genetic Algorithms
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a
More informationChapter-4. Simulation Design and Implementation
Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview
More informationChapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.
Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.
More informationWe will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing
In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output
More informationRobots & Cellular Automata
Integrated Seminar: Intelligent Robotics Robots & Cellular Automata Julius Mayer Table of Contents Cellular Automata Introduction Update Rule 3 4 Neighborhood 5 Examples. 6 Robots Cellular Neural Network
More informationChapter 8 OSI Physical Layer
Chapter 8 OSI Physical Layer Upper OSI layer protocols prepare data from the human network for transmission to its destination. The Physical layer controls how data is placed on the communication media.
More informationSelf-formation, Development and Reproduction of the Artificial System
Solid State Phenomena Vols. 97-98 (4) pp 77-84 (4) Trans Tech Publications, Switzerland Journal doi:.48/www.scientific.net/ssp.97-98.77 Citation (to be inserted by the publisher) Copyright by Trans Tech
More informationOutline Introduction to CA (LGA HPP model) CA computation model for real CA applications Detailed computation method Validate the model using specific
Performance evaluation of FPGA-based Cellular Automata accelerators S. Murtaza, A. G. Hoekstra, P. M. A. Sloot Section Computational Science Institute for Informatics University of Amsterdam Amsterdam,
More informationPoonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)
An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing
More informationL Modeling and Simulating Social Systems with MATLAB
851-0585-04L Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Karsten Donnay and Stefano Balietti Chair of Sociology, in particular of Modeling and Simulation ETH Zürich 2011-03-14
More informationSystolic Super Summation with Reduced Hardware
Systolic Super Summation with Reduced Hardware Willard L. Miranker Mathematical Sciences Department IBM T.J. Watson Research Center Route 134 & Kitichwan Road Yorktown Heights, NY 10598 Abstract A principal
More informationChapter 2 Mobility Model Characteristics
Chapter 2 Mobility Model Characteristics Abstract The salient characteristics of mobility models of mobile nodes in mobile ad hoc networks are described. We have described how the different mobility models
More informationAN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS
AN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS Zubair Jeelani 1, Fasel Qadir 2 1 Department of Computer Science, University of Kashmir, India 2 Department of Computer Science,
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationCongestion Propagation among Routers in the Internet
Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,
More informationGraph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California
Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)
More informationModeling Robot Path Planning with CD++
Modeling Robot Path Planning with CD++ Gabriel Wainer Department of Systems and Computer Engineering. Carleton University. 1125 Colonel By Dr. Ottawa, Ontario, Canada. gwainer@sce.carleton.ca Abstract.
More informationA Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks
International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2
More informationPerformance Analysis of Routing Techniques in Networks
International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Performance Analysis of Routing Techniques in Networks J.Mahesh, M.Antony Kumar P.M.R.Engineering College
More informationModeling and Simulating Social Systems with MATLAB
Modeling and Simulating Social Systems with MATLAB Lecture 4 Cellular Automata Olivia Woolley, Tobias Kuhn, Dario Biasini, Dirk Helbing Chair of Sociology, in particular of Modeling and Simulation ETH
More informationGPU-based Distributed Behavior Models with CUDA
GPU-based Distributed Behavior Models with CUDA Courtesy: YouTube, ISIS Lab, Universita degli Studi di Salerno Bradly Alicea Introduction Flocking: Reynolds boids algorithm. * models simple local behaviors
More informationPerformance Study of Routing Algorithms for LEO Satellite Constellations
Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.
More informationNetaji Subhash Engineering College, Technocity, Garia, Kolkata , India
Classification of Cellular Automata Rules Based on Their Properties Pabitra Pal Choudhury 1, Sudhakar Sahoo 2, Sarif Hasssan 3, Satrajit Basu 4, Dibyendu Ghosh 5, Debarun Kar 6, Abhishek Ghosh 7, Avijit
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationUCLA UCLA Previously Published Works
UCLA UCLA Previously Published Works Title Parallel Markov chain Monte Carlo simulations Permalink https://escholarship.org/uc/item/4vh518kv Authors Ren, Ruichao Orkoulas, G. Publication Date 2007-06-01
More informationAn Evolution of Mathematical Tools
An Evolution of Mathematical Tools From Conceptualization to Formalization Here's what we do when we build a formal model (or do a computation): 0. Identify a collection of objects/events in the real world.
More informationSteganography by using Logistic Map Function and Cellular Automata
Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01
More informationA Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks
A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks Ali Mohammad Saghiri *, Mohammad Reza Meybodi Soft Computing Laboratory, Computer Engineering
More informationγ 2 γ 3 γ 1 R 2 (b) a bounded Yin set (a) an unbounded Yin set
γ 1 γ 3 γ γ 3 γ γ 1 R (a) an unbounded Yin set (b) a bounded Yin set Fig..1: Jordan curve representation of a connected Yin set M R. A shaded region represents M and the dashed curves its boundary M that
More informationModule 7 VIDEO CODING AND MOTION ESTIMATION
Module 7 VIDEO CODING AND MOTION ESTIMATION Lesson 20 Basic Building Blocks & Temporal Redundancy Instructional Objectives At the end of this lesson, the students should be able to: 1. Name at least five
More informationCellular Learning Automata-Based Color Image Segmentation using Adaptive Chains
Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Ahmad Ali Abin, Mehran Fotouhi, Shohreh Kasaei, Senior Member, IEEE Sharif University of Technology, Tehran, Iran abin@ce.sharif.edu,
More informationConnection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information
Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering
More informationCellular Automata + Parallel Computing = Computational Simulation
Cellular Automata + Parallel Computing = Computational Simulation Domenico Talia ISI-CNR c/o DEIS, Università della Calabria, 87036 Rende, Italy e-mail: talia@si.deis.unical.it Keywords: cellular automata,
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed
More informationCellular Automata and Roundabout Traffic Simulation
Cellular Automata and Roundabout Traffic Simulation Enrico G. Campari 1, Giuseppe Levi 1, and Vittorio Maniezzo 2 1 Scienze dell Informazione dell Università di Bologna, sede di Cesena via Sacchi, 3 I-47023
More informationData and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet
Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,
More information4.1 Introduction to Media and Devices
Chapter 4 Network Hardware 4.1 Introduction to Media and Devices Many of the issues discussed in this course, such as topology, scalability, and speed, depend on hardware. Unlike many of your computer
More informationCROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK
CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK Le Van Minh a,b, Yang MingChuan a, and Guo Qing a a Communication research center, Harbin Institute of Technology,
More informationCellular Automata. Nicholas Geis. January 22, 2015
Cellular Automata Nicholas Geis January 22, 2015 In Stephen Wolfram s book, A New Kind of Science, he postulates that the world as we know it and all its complexities is just a simple Sequential Dynamical
More informationDirected Graph for Finite-State Machine
Directed Graph for Finite-State Machine Tito D. Kesumo Siregar (13511018) 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132,
More informationNetwork Connectivity and Mobility
Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network
More informationUNIT 2 ROUTING ALGORITHMS
UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity
More informationCharacterization of Boolean Topological Logics
Characterization of Boolean Topological Logics Short Form: Boolean Topological Logics Anthony R. Fressola Denison University Granville, OH 43023 University of Illinois Urbana-Champaign, IL USA 61801-61802
More informationBandwidth Efficient Distant Vector Routing for Ad Hoc Networks
Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Ralph Jansen and Bernd Freisleben Department of Electrical Engineering & Computer Science University of Siegen Hölderlinstr. 3 D 57068 Siegen
More informationVariations on Genetic Cellular Automata
Variations on Genetic Cellular Automata Alice Durand David Olson Physics Department amdurand@ucdavis.edu daolson@ucdavis.edu Abstract: We investigated the properties of cellular automata with three or
More informationSwitched Multimegabit Data Service
CHAPTER 14 Chapter Goals Tell how SMDS works, and describe its components. Describe the operational elements of the SMDS environment, and outline its underlying protocol. Discuss related technologies.
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationTHE ADJACENT VEHICLES QUERY ALGORITHM OF MICROSCOPIC TRAFFIC SIMULATION
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 THE ADJACENT VEHICLES QUERY ALGORITHM OF MICROSCOPIC
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationResearch on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud
2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationExploring Multiple Paths using Link Utilization in Computer Networks
7 Exploring Multiple Paths using Link Utilization in Computer Networks 1 Shalini Aggarwal, 2 Shuchita Upadhyaya 1 Teacher Fellow, Department of Computer Science & Applications, Kurukshetra University Kurukshetra,
More informationA Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks
A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of
More informationUNIT 9C Randomness in Computation: Cellular Automata Principles of Computing, Carnegie Mellon University
UNIT 9C Randomness in Computation: Cellular Automata 1 Exam locations: Announcements 2:30 Exam: Sections A, B, C, D, E go to Rashid (GHC 4401) Sections F, G go to PH 125C. 3:30 Exam: All sections go to
More informationA Quality of Service Decision Model for ATM-LAN/MAN Interconnection
A Quality of Service Decision for ATM-LAN/MAN Interconnection N. Davies, P. Francis-Cobley Department of Computer Science, University of Bristol Introduction With ATM networks now coming of age, there
More informationCHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS
59 CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 4.1 OVERVIEW OF SIMULATION MODEL The performance of a MANET routing protocol under varying network conditions is to be evaluated in order to understand
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationDevelopment of a Maxwell Equation Solver for Application to Two Fluid Plasma Models. C. Aberle, A. Hakim, and U. Shumlak
Development of a Maxwell Equation Solver for Application to Two Fluid Plasma Models C. Aberle, A. Hakim, and U. Shumlak Aerospace and Astronautics University of Washington, Seattle American Physical Society
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationSwitched Multimegabit Data Service (SMDS)
CHAPTER 14 Switched Multimegabit Data Service (SMDS) Background Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication
More informationFIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues
FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues D.N. Serpanos and P.I. Antoniadis Department of Computer Science University of Crete Knossos Avenue
More informationIMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS
IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India
More informationBuffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 18, NO. 6, JUNE 2000 757 Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks Jinhan Song and Saewoong Bahk Abstract In this paper we
More informationON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS Natarajan Meghanathan 1 and Sireesha Gorla 1, Jackson State University, 1400 Lynch St, Jackson, MS, USA
More informationUser Based Call Admission Control Policies for Cellular Mobile Systems: A Survey
User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey Hamid Beigy and M. R. Meybodi Computer Engineering Department Amirkabir University of Technology Tehran, Iran {beigy, meybodi}@ce.aut.ac.ir
More informationSIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE
78 Proceedings of the 4 th International Conference on Informatics and Information Technology SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE D. Ulbikiene, J. Ulbikas, K.
More informationInspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges
Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Sudip Misra Yale University Model M racers running towards a goal. Non-interfering
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationPERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET
PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,
More informationTravel-Time Sensitivity Kernels in Long-Range Propagation
Travel-Time Sensitivity Kernels in Long-Range Propagation Emmanuel Skarsoulis Foundation for Research and Technology Hellas Institute of Applied and Computational Mathematics P.O. Box 1385, GR-71110 Heraklion,
More informationRead Chapter 4 of Kurose-Ross
CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationRouting. 4. Mar INF-3190: Switching and Routing
Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines
More informationApplication of Totalistic Cellular Automata for Noise Filtering in Image Processing
Journal of Cellular Automata, Vol. 7, pp. 207 221 Reprints available directly from the publisher Photocopying permitted by license only 2012 Old City Publishing, Inc. Published by license under the OCP
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science
More informationIntroduction. Communication
Introduction These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable copy and print a single copy of each
More informationA Fuzzy System for Adaptive Network Routing
A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationLiquefaction Analysis in 3D based on Neural Network Algorithm
Liquefaction Analysis in 3D based on Neural Network Algorithm M. Tolon Istanbul Technical University, Turkey D. Ural Istanbul Technical University, Turkey SUMMARY: Simplified techniques based on in situ
More informationPerformance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model
Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationA Review: Optimization of Energy in Wireless Sensor Networks
A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department
More informationVolume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationNormal Algorithmetic Implementation of Cellular Automata
Normal Algorithmetic Implementation of Cellular Automata G. Ramesh Chandra, V. Dhana Lakshmi Dept. of Computer Science and Engineering VNR Vignana Jyothi Institute of Engineering & Technology Hyderabad,
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/
More informationDrawdown Automata, Part 1: Basic Concepts
Drawdown Automata, Part 1: Basic Concepts Cellular Automata A cellular automaton is an array of identical, interacting cells. There are many possible geometries for cellular automata; the most commonly
More informationTwo-dimensional Four Color Cellular Automaton: Surface Explorations
Two-dimensional Four Color Cellular Automaton: Surface Explorations Robert H. Barbour School of Computing and Information Systems, Unitec New Zealand, Carrington Road, Mount Albert, Auckland, New Zealand
More informationData Communication. Chapter # 1: Introduction. By: William Stalling
Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications
More informationLow Power using Match-Line Sensing in Content Addressable Memory S. Nachimuthu, S. Ramesh 1 Department of Electrical and Electronics Engineering,
Low Power using Match-Line Sensing in Content Addressable Memory S. Nachimuthu, S. Ramesh 1 Department of Electrical and Electronics Engineering, K.S.R College of Engineering, Tiruchengode, Tamilnadu,
More information